If you want to run a tor exit node, you can improve the security by subscribing to a rigorous hygiene process that provides accountability of your security upkeep.
* System Hardening
* Log Monitoring
* Intrusion Prevention
* Write proceses
* Perimeter Control
A compromised tor exit node is no good because all it takes is switching on NetFlow and all those sensitive packets are captured.
* System Hardening
* Log Monitoring
* Intrusion Prevention
* Write proceses
* Perimeter Control
A compromised tor exit node is no good because all it takes is switching on NetFlow and all those sensitive packets are captured.
http://motherboard.vice.com/read/how-the-nsa-or-anyone-else-...