So I had an idea when I was learning about how TOR works.
I'm very beginner when It comes to this topic so high chance this probably doesn't work but still, worth a shot.
A weakness in TOR anonymity is that the exit node to the site is left unencrypted, would this work to prevent that?
Encrypt the data from your PC before sending it through the different nodes.
Then everything works as normal until the exit node, then the exit node passes the still-encrypted data onto the site host.
Then, Using a [u]separate relay[/u], your PC passes they encryption key using the same original process, where it's sent to the same server and is used to decrypt the data
Normally with TOR, the keys are sent to the corresponding nodes the same relay, why not utilize a secondary relay to help avoid exit node sniffing?
https://i.gyazo.com/c3c98a715110b741975 ... 631607.png
he person on the exit node would only be able to sniff the data in its encrypted form, or, they would only be able to get the key and not the data. To get around this, they would need to access both the key and data, which with the links being random, is highly unlikely.
Sorry if this is a completely mess up, I've only just started studying the topic, but can anyone give me feedback on this?