7
3
I understand that one of the limitations of TOR is that whoever runs the edge node can read all the traffic running through it before it gets split up amongst the TOR cloud.
Lets say you were an oppressive authority, or simply law enforcement, then you could just set up a TOR edge node and wireshark and just dump all the data and look for things of interest.
Could this limitation of the TOR concept be mitigated by having a user set up their own TOR edge node (relay) and connecting through that relay from other computers. Where simple evaluation of the TOR network would show indistinguishable edge nodes - if I understand correctly.
1The purpose of Tor is to provide IP anonymity instead of a secure connection and currently it achieves its goal nicely. Even if some evil people are able to dump all your traffic at the edge node, they will not know what the end point is. As long as you don't leaky your identity in the traffic (e.g. by sending a tracking cookie or connecting to some obscure host), you're probably safe. Of course, there's also the traffic analysis attack and no matter what you do, it's very hard to bypass. – billc.cn – 2011-08-13T03:16:56.357