Hacker News new | past | comments | ask | show | jobs | submit login

That's correct, people talk about shady things happening over Tor but how many cases that come up are actually something shady going over an exit node?



Thinking about it, they're probably quite useful for spam/hacking/extortion.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: