The Exit Node Problem
Tor encrypts traffic between you and the exit node, but the exit node sees unencrypted traffic to the destination. Malicious exits can intercept, modify, or log this traffic.
Traffic Flow
You ══[Encrypted]══► Guard ══► Middle ══► Exit ──[PLAIN]──► Site
│
Can see traffic
if not HTTPS!
Attack Types
Traffic Sniffing
Read unencrypted data (HTTP, FTP)
PassiveSSL Stripping
Downgrade HTTPS to HTTP
ActiveContent Injection
Add malware to downloads
MaliciousCredential Theft
Capture login credentials
TheftReal Incidents
Bitcoin Theft (2020)Malicious exits rewrote Bitcoin addresses
Certificate ManipulationExits caught issuing fake certificates
Malware InjectionExits adding malware to downloads
Protection Strategies
- Always use HTTPS - encrypt end-to-end
- Enable HTTPS-Only mode in Tor Browser
- Verify certificate fingerprints for sensitive sites
- Use .onion services when available (no exit)
- Don't login to accounts over HTTP
- Verify file hashes after downloading
Key Rule: Never send sensitive data without end-to-end encryption. The exit node is untrusted—always assume it's hostile.