Quote Originally Posted by Hanna View Post
Are you sure about that? Correct me if I'm wrong here, I'm no expert. I read that this is a hyped rumour, and not in fact true. Plus it's completely down to the people running the exit nodes. Most of them are activists and believers in the ideals of TOR. And there are many thousands. Even if somebody set up a honey trap exit node, I still don't think they can trace your communication all the way back to you. It's highly theoretical anyway, and you'd have to be suspected for something really major for anyone to bother. I don't want to give an example, because it would probably probably trigger the alerts with GCHQ... But you can imagine the kind of stuff.
You have a very good point. Someone in an office could have said, 'we don't want people to use TOR, so plant a story...' On the flip side of that is that the TOR was originally developed by naval intelligence or some such, and it seems that there is a significant amount of official use, so they would have their own servers, and be able to do all the exit node monitoring they want. Doesn't the majority of traffic go through the US? Also official use needs other users to use the system, otherwise it becomes obvious that the major users are official. So they want other traffic for cover. 'absolutely have to be a security service to do it' yes, they are.
So its a question of how much effort it takes, and do you have a good reason. http://www.theregister.co.uk/2007/09...ssword_breach/
.