[OPSEC/Computer] How Toxic are TOR exit nodes really ?

So there have been many numbers thrown around in the past, the one I most often heard was that 3% of all exit nodes are malicious.

Are some nodes compromised by LE or does this still ring true:

'Organizations like the NSA have read/write access to large parts of the Internet backbone. They simply do not need to run Tor relays. We believe that the attacks we discovered are mostly done by independent individuals who want to experiment.'

Is there a way to safeguard against 'spoiled onions' in the TorNetwork ? What are your guys thoughts on this topic ?


Comments


[4 Points] DarknetHeroesLeague:

Tunnel a VPN through Tor. SSH tunnel works as well.


[3 Points] PM_ME_VAGINA_PICS:

The whole point of tor is they need to compromise all your nodes to ruin your anonymity. As long as what your doing is encrypted, the exit node can't see anything anyway. Even if they can see what your doing via an unencrypted website, they can't know your the one doing it, exit nodes don't know your IP address


[1 Points] greaterhongkong:

The vast majority of the operators of exit of Tor are with much probability honest and fun-loving quality folks. The error in that assessment is the forgetting of such facts as the number of mistakes required for great loss is but one. Vigilance is your most trusted friend when using the Tor for access of the great internet communications between peoples.