Sort:  

There were some security holes in version 2.6. The 2.7 update resolved all of the issues.

Has to do with all of the exit nodes being comprimised...

http://www.makeuseof.com/tag/priority-wretched-hive-scum-villainy-5-ways-stay-safe-bad-tor-exit-nodes/

Mononymous Swedish security researcher “Chloe,” developed a clever technique for tricking corrupt nodes into outing themselves. Basically, it works like this: Chloe set up a website, using a legitimate-looking domain names and web design, to serve as a honeypot. For this specific test, she created a domain intended to resemble a Bitcoin merchant. She then downloaded a list of every exit node, logged onto Tor, and used each exit node in turn to log into the site, using a unique account specific to the exit node in question.

Then she sat back and waited for a month. Any nodes that were attempting to steal login credentials would see her login, steal her user name and password, and attempt to use it. Her honeypot websites would notice the multiple login attempts, and make a note. Because the passwords are unique to each node, Chloe can pin down exactly which node took the bait.

The results of the experiment are interesting. Of about 1400 exit notes, 16 attempted to steal the password and log in. This number isn’t too alarming on the face of it, but there are a few facts it’s worth remembering.

Coin Marketplace

STEEM 0.18
TRX 0.16
JST 0.029
BTC 63013.55
ETH 2460.64
USDT 1.00
SBD 2.64