Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They'd have the whole of the tor network, including entry and exit nodes. Why run your own exit nodes when you can just sniff the traffic of the existing ones?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: