1 thought on “Query about how Tor works, test feedback”
So in this explanation the guy says that your data will be vulnerable between the exit node and the server. Because the exit node decrypts the last bit of your data, but why isn’t it made so that the server you are trying to reach, decrypts the last bit of data? So that the connection between the exit node and destination server is secure and so that the exit node can’t see your data.
So in this explanation the guy says that your data will be vulnerable between the exit node and the server. Because the exit node decrypts the last bit of your data, but why isn’t it made so that the server you are trying to reach, decrypts the last bit of data? So that the connection between the exit node and destination server is secure and so that the exit node can’t see your data.