A Researcher Used a Honeypot to Identify Malicious Tor Exit Nodes

The Tor network, used everyday by thousands of people around the world to surf the web anonymously and to circumvent internet censorship, depends on its volunteer “operators,” the people who run and maintain the network’s final set of servers, also called “exit nodes.”

Whoever controls these exit nodes can potentially see the traffic coming out of the Tor network, and, if they want, spy on it. In an experiment dubbed BADONION, an independent security researcher that only goes by the pseudonym “Chloe” devised a clever way to find out who, among these operators, is maliciously sniffing and intercepting traffic.
READ MORE: http://motherboard.vice.com/read/badonion-honeypot-malicious-tor-exit-nodes