checking tor exit nodes & nopeing out when suspicious things happen

im sure most people do this anyway, but after the recent events with various kinds of attacks or potential ones caused via certain exit nodes, e.g. that guy losing 700 btc through using blockchain via tor and others examples i cba to think of right now.

I cant help but think these are dutch and US nodes in particular. Those two governments are the most anti dnms (thus putting in reinforcements to stop it) sorry i dont have a source but i defo read it, if anyone has the source. was from a few months ago.

Anyway, i always try to use nodes that you cant see the host, thats located in some random ass country, they look and feel safer. And if anything seems dodge i tend to just "nope, new identity" bitch...............maybe its overkill


Comments


[3 Points] TehrowAvey:

I highly recommend everyone grab the torrc file linked to below which was put together to avoid nodes owned by organizations or in countries which are likely to have rampant snooping. It prefers specific entry/exit nodes such as those owned by NGO/activist organizations, all listed on the page.

https://bitcointalk.org/index.php?topic=331077.0 (torrc file last updated mid-august 2014)

I find I have to replace torrc each time I update the browser bundle.

Before using this I once experienced certificate errors (on very well reputed sites) that definitely pointed to some MITM/fakery somewhere in my tor circuit. Scary shit.