this post was submitted on 13 Apr 2025
21 points (92.0% liked)
Privacy
5762 readers
16 users here now
A community for Lemmy users interested in privacy
Rules:
- Be civil
- No spam posting
- Keep posts on-topic
- No trolling
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
TOR is designed to resist surveillance and censorship by ISPs or national governments. Communications are encrypted in transit, and there's no way for a node to tell whether it's talking to another relay node or the end user.
It's fairly easy for a website to detect that a user is accessing it via TOR; there are lists of exit nodes like this one which a firewall or intrusion detection system can update programmatically. Many websites block or limit access via TOR using such lists, making it unsuitable for use cases such as the one I'm discussing.