http://newgon77kdbgbo2xqfr7ey7he54zmjeaw3bn6o75fqnoyc3wkktjtgyd.onion/wiki/Guide_To_Computer_Security_(2022)
Upon leaving the exit node, data is visible if not encrypted by other means (such as HTTPS), although the source of the data is unknown. In the modern age, almost all sites use HTTPS and as such, this is no longer much of a concern (see below). There are weaknesses within the Tor design, but it is the safest option for anonymous communication online.