It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
(visit the link for the full news article)
By necessity, however, the last node through which traffic passes has to decrypt the communication before delivering it to its final destination. Someone operating that exit node can therefore read the traffic passing through this server.
According to The New Yorker, “millions of secret transmissions passed through” the node the WikiLeaks activist operated — believed to be an exit node. The data included sensitive information of foreign governments.
The activist believed the data was being siphoned from computers around the world by hackers who appeared to be in China and who were
Wired has a beatup on WL&Tor,with no new info,spinning "our" 2006 investigation into Chinese spying. Don't be fooled.
The imputation is incorrect. The facts concern a 2006 investigation into Chinese espionage one of our contacts were involved in. Somewhere between none and handful of those documents were ever released on WikiLeaks. Non-government targets of the Chinese espionage, such as Tibetan associations were informed (by us).
Traffic passing through the Tor (The Onion Router) anonymizing network is encrypted until it reaches the point when it leaves the network, where it is decrypted and forwarded to its final destination. Traffic leaving at a particular exit node can always be monitored, a point which Tor has always emphasised. This monitoring may be a criminal offence, depending on where it takes place, and is certainly ethically questionable. Anyone using Tor should use SSH, SSL, or a VPN connection to encrypt traffic because Tor is only good for anonymity - certainly not end-to-end encryption. Users have no control over which exit nodes will be used, still less on the path traffic takes through the network, which is random by design.