Wiimote
Member
By publishing his TOR hack, Swedish researcher Dan Egerstadt recently provided users with a timely reminder that The Onion Router (TOR) anonymisation network should be enjoyed with caution. By setting up five exit-nodes, Egerstad sniffed out large amounts of e-mail access data from embassies and government agencies and published some of this data on the internet. Since a user cannot know who operates the individual exit-node through which his traffic passes, TOR users are advised to always make use of additional encryption.
source: http://www.heise-security.co.uk/news/99333
and also see the links at the bottom, for info on TOR exit nodes doing MITM (man in the middle) attacks, and the first part of this story
source: http://www.heise-security.co.uk/news/99333
and also see the links at the bottom, for info on TOR exit nodes doing MITM (man in the middle) attacks, and the first part of this story