About Tor, only a relatively few exit nodes need to be compromised to enable tracking of individual users through the entire network. There is a math heavy paper about this somewhere.
About Tor, only a relatively few exit nodes need to be compromised to enable tracking of individual users through the entire network. There is a math heavy paper about this somewhere.