Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites
These nodes — ordinary nodes, not exit nodes — sorted through all the traffic that passed through them, looking for anything bound for a hidden service, which allowed them to discover hidden services that had not been advertised. These nodes then attacked the hidden services by making connections to them and trying common exploits against Read more about Researchers find over 100 spying Tor nodes that attempt to compromise darknet sites[…]