•  jarfil   ( @jarfil@beehaw.org ) 
    link
    fedilink
    2
    edit-2
    2 years ago

    An exit node can put in place any filters, blacklists, mitm, exploit injection, logging, and anything else it wants… on unencrypted traffic. Using HTTPS through an exit node, limits all of that to the destination of the traffic, there is no way to get a ZK proof of all the kinds of possible traffic and contents that can exist.