Comment Re:The TOR Project was well aware of this a while (Score 1) 83
Malicious exit nodes do not per se compromise TOR...
What other obvious use would there be?
I need a car analogy, damn it...
Ok, Ok, how's this?
What if you were driving down the road, and lost control of your car, and plowed into an onion patch?
How may onions have to be run over for the field to considered compromised?