Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

That's correct, people talk about shady things happening over Tor but how many cases that come up are actually something shady going over an exit node?


Thinking about it, they're probably quite useful for spam/hacking/extortion.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: