|
ignifugo
Translation approved |
|
|
ignifugo
Changes committed |
Changes committed
4 years ago
|
|
ignifugo
Changes committed |
Changes committed
4 years ago
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Changes committed |
Changes committed
4 years ago
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Translation approved |
|
|
ignifugo
Changes committed |
Changes committed
4 years ago
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Suggestion accepted |
|
|
ignifugo
Suggestion accepted |
|
Gli exit node di Tor sono stati usati in passato per raccogliere informazioni sensibili da connessioni non criptate. I nodi di uscita Pericolosi sono regolarmente identificati e rimossi dalla rete Tor. Come esempio, vedi <a href="https://arstechnica.com/information-technology/2007/09/security-expert-used-tor-to-collect-government-e-mail-passwords/">Ars Technica: Esperto di sicurezza ha usato Tor per raccogliere le password delle e-mail del governo</a>.