Tor is not completely secure

Some people think the Tor is secure but some do not.

The article in wikipedia testifies the following weaknesses:

DNS leaks,
Traffic analysis,
Eavesdropping by exit nodes

Lets see the last one:

In September 2007, Dan Egerstad, a Swedish security consultant, revealed that by operating and monitoring Tor exit nodes he had intercepted usernames and passwords for a large number of email accounts. As Tor does not, and by design cannot, encrypt the traffic between an exit node and the target server, any exit node is in a position to capture any traffic passing through it which does not use end-to-end encryption, e.g. SSL. While this does not inherently violate the anonymity of the source, it affords added opportunities for data interception by self-selected third parties, greatly increasing the risk of exposure of sensitive data by users who are careless or who mistake Tor's anonymity for security.

This weakness can't be fixed because of Tor's design.

No comments: