6
I'm using a hotel's wifi service and need to send sensitive documents back home. A coworker has suggested using tor but I'm uncertain when and where the decryption takes place.
Is it decrypted at the exit node? If it is, when you send or receive a document through tor while using a public network, won't others on the same network be able to view the contents?
This answer is not completely right. Saying that traffic thru tor is not secure means that an attacker listening on the sender should be able to find out the exit node, and pick up the message from there. But this is exactly what tor makes impossible, especially by using nodes in multiple countries, so that even powerful governments do not have jurisdiction over all of them. And as for intercepting traffic on the receiver's end, good luck with that. But the part about the VPN is right, provided sender and receiver either host the VPN server, or they share a common server. – MariusMatutiae – 2017-05-03T05:20:25.930
@MariusMatutiae The problem is not the data traveling through tor, but what happens to the data after it leaves tor. And yes, if you run enough exit nodes, you may not be able to decrypt 100% of the messages, but you can still de-anonymize a large enough percentage of them to be worthwhile. – Darth Android – 2017-05-06T23:13:22.480
Also, with tor you can chose your exit node, contrary to what you say in your answer. – MariusMatutiae – 2017-05-07T05:57:13.260