I would put the risk about the same. In certain respects it seems more devious to use a compromised node than it does to create your own to do bad stuff.
On 07/22/2014 01:38 AM, Andreas Krey wrote:
On Mon, 21 Jul 2014 17:28:42 +0000, Josh wrote: ...
There are exploits that do not require any interaction from the user. The sentiment that the rest of the list is trying to impress on you is that by running a Tor nod on XP you are potential putting the entire Tor network at risk to a malicious actor.
How more so than the malicious actor simply running his own node(s)?
Andreas