Wikipedia talk:Blocking policy/Tor nodes - Wikipedia
TOR Anonymity: Things Not To Do While Using TOR May 23, 2018 How does Tor work? | Robert Heaton Apr 06, 2019 Running a monero node over Tor - kico - Medium Jan 04, 2018
By running a TOR node, even a non-exit one, you are actually helping vandals by providing them a anonymous encrypted path to a TOR exit node. By blocking ALL TOR-nodes, even non-exit ones, we discourage usage of TOR. A block time of 1 week is suitable, and then a recheck. If its still a TOR node, extend the block by 1 week and recheck.
Monitoring Tor Exit Nodes for Malicious Activity Mar 17, 2015
Jan 04, 2018 · Install Tor and TorBrowser in the client computer (if you're running the wallet in the same computer as the node skip this step) sudo apt install tor torbrowser-launcher sudo service restart tor
Mar 19, 2019 Tor Exit Nodes Mapped and Located | HackerTarget.com Tor Exit Nodes are the gateways where encrypted Tor traffic hits the Internet. This means an exit node can be abused to monitor Tor traffic (after it leaves the onion network). It is in the design of the Tor network that locating the source of that traffic through the network should be difficult to determine.