
22 Jul
2014
22 Jul
'14
6:38 a.m.
On Mon, 21 Jul 2014 17:28:42 +0000, Josh wrote: ...
There are exploits that do not require any interaction from the user. The sentiment that the rest of the list is trying to impress on you is that by running a Tor nod on XP you are potential putting the entire Tor network at risk to a malicious actor.
How more so than the malicious actor simply running his own node(s)? Andreas -- "Totally trivial. Famous last words." From: Linus Torvalds <torvalds@*.org> Date: Fri, 22 Jan 2010 07:29:21 -0800