Coming soon: an onslaught of unstoppable, untraceable robocalls.
Privacy
Icon base by Lorc under CC BY 3.0 with modifications to add a gradient
Haha, nah. You can only revcieve calls when listening and users will need your address and shared secret to make contact.
Would be a low conversion rate for spammers.
How well countries are managing the entry and exit nodes. Honeypot.
So, I wanna support the Onion network, but it seems hosting a middle node is the most likely way, and thus have the largest base. In looking into it, exit nodes seem very dangerous to those who're uneducated on the risks of having them, and thus are a big bottleneck.
Not to say this is a bad problem to have, as it's a growing pain and that indicates an increase in popularity, but wouldn't wide-scale adoption of this disproportionately limit the usability of the Onion network?
Middle node seems best to me as well, then your supporting services like this. This doesn't use any exit nodes at all.
The bandwidth on this is so tiny. Tor can handle this. Unless everyone uses it which i doubt will happen. I didn't include files and images for a reason. That takes a lot of bandwidth away from the network.
Now just find out who has the most entry and exit nodes.... Maybe think about why more and more has been taken off the darknet in recent years. Users are automatically more interesting because they seem to want to hide something, which is why they stand out from the crowd and feel safe in a compromised network.
1 De-anonymization has long been possible for states. It's not that fast, but there's no rush.
2 Privacy while you're on a silver platter with a few other Tor youngsters?!? The other way around is likely to be more effective... Clearnet, but you have to provide tons of entropy..
3 The entry and exit points will log every connection. This means that it can be evaluated over a longer period of time and used to investigate individuals. Then you have to ask yourself... whether you can prove that you were always acting legally before it comes to the burden of proof (as this has now become standard in the first instance).
Ot so secure that you can get away with having a insecure password.
Just in time of Congress to make it illegal.