Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Exit nodes are already unnecessary; TOR allows you to operate services on the network itself ("hidden services").

However, it seems not everything is kept on the TOR network. I would've assumed that if someone were using TOR for criminal purposes, they wouldn't expose themselves to monitoring by accessing resources off TOR, but that doesn't seem to be the case.



Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: