I was under the impression that all traffic was encrypted. It sounds like that's up to the users; they can encrypt their traffic, but they aren't required to. Of course, failing to encrypt illegal traffic would be as boneheaded as sending a ransom note on a post card, with a correct return address.
> I was under the impression that all traffic was encrypted.
Welllll....
IIRC, traffic entering the Tor network and traffic between Tor nodes is encrypted with TLS. This means that the only place an adversary that doesn't have a compromised entry node can read your traffic is when the exit node makes any non-encrypted requests on your behalf.
To summarize: if you use TLS (or some other encrypted transport) over Tor, your communications will always be encrypted (obviously).
If you use an unencrypted transport over Tor, then the exit node[0] will be able to read your traffic, in exactly the same way that your ISP would be able to read that traffic if you chose to route it over your home Internet connection. :)
Iirc, the middle node never has access to the data being sent.
I think only the last node might, and that is because they have to be able to send and receive it, and if the website you are connecting to doesn't support ssl or anything, then there's no way the exit node can send the information it needs to send , without having access to it.
But I think the entry and middle node have no information about the content (other than some bounds on its length)
I was under the impression that all traffic was encrypted. It sounds like that's up to the users; they can encrypt their traffic, but they aren't required to. Of course, failing to encrypt illegal traffic would be as boneheaded as sending a ransom note on a post card, with a correct return address.