On Mon, 21 Jul 2014 17:28:42 +0000, Josh wrote: ...
There are exploits that do not require any interaction from the user. The sentiment that the rest of the list is trying to impress on you is that by running a Tor nod on XP you are potential putting the entire Tor network at risk to a malicious actor.
How more so than the malicious actor simply running his own node(s)?
Andreas