On Thu, 28 Sep 2017, at 14:10, Jonathan D. Proulx wrote: > The design of Tor is that you don't need to trust all the nodes. You > just need to be sure the first one and the last in any connection > chain aren't run by the *same* malicious actor. You don't even have to know how to use the email, the case of Jonathan D. Proulx