Wow Tor seems really vulnerable with only 3 layers. And if the source has to exchange keys with every step in the path isn't that a huge leak- it tells the other machine that it is 1 of the steps in a connection path?
Wow Tor seems really vulnerable with only 3 layers. And if the source has to exchange keys with every step in the path isn't that a huge leak- it tells the other machine that it is 1 of the steps in a connection path?
Wow Tor seems really vulnerable with only 3 layers. And if the source has to exchange keys with every step in the path isn't that a huge leak- it tells the other machine that it is 1 of the steps in a connection path?