Tor’s shadowy reputation will only end if we all use it | Engadget

seasonone@opidea.xyz to Technology@beehaw.org – 357 points –
Tor’s shadowy reputation will only end if we all use it | Engadget
engadget.com
151

You are viewing a single comment

Would it be possible to allow exit nodes to blacklist specific kinds of traffic and somehow privately verify that the traffic is not one of the blacklisted kinds (zero knowledge proof perhaps sorry not a CS person)?

An exit node can put in place any filters, blacklists, mitm, exploit injection, logging, and anything else it wants... on unencrypted traffic. Using HTTPS through an exit node, limits all of that to the destination of the traffic, there is no way to get a ZK proof of all the kinds of possible traffic and contents that can exist.

What I meant was blacklisting certain destinations. It obviously wouldn't prevent all malicious traffic