http://wikitorweeyiuv6oyiuw3rnc57riyjmemsjc4pn7lgzvr4ewraah52id.onion/index.php?title=Tor&action=edit
<ref name="LASTor-2012" />==== Exit node eavesdropping ====
In September 2007, Dan Egerstad, a [[Sweden|Swedish]] security consultant, revealed that he had intercepted usernames and passwords for a large number of e-mail accounts by operating and monitoring Tor exit nodes.<ref name="wired-rogue-nodes" /> As Tor does not, and by design cannot, encrypt the traffic between an exit node and the target server, any exit node is in a position to capture any traffic passing through it that does...