> For example, say you’re a sysadmin at a local business wishing to further secure its comms. You propose running a Tor node or using Tor internally.
I had to stifle a giggle at this 'example'. I have to wonder how many 'local businesses' so value their comms that they want to hide their origin at the expense of significantly downgrading their bandwidth... and what do these 'local businesses' look like?
I had to stifle a giggle at this 'example'. I have to wonder how many 'local businesses' so value their comms that they want to hide their origin at the expense of significantly downgrading their bandwidth... and what do these 'local businesses' look like?