As others have mentioned, that's not what Tor does by default. Just because you don't know how it works doesn't mean that it's generally unknowable.
And conversely, it's enough to visit a random website running WebTorrent or just a plain HTTP DDoS attack to possibly "use your connection for cybercrime".
Since RFC 3514 unfortunately never gained traction, distinguishing good, bad, and illegal traffic remains difficult.
And conversely, it's enough to visit a random website running WebTorrent or just a plain HTTP DDoS attack to possibly "use your connection for cybercrime".
Since RFC 3514 unfortunately never gained traction, distinguishing good, bad, and illegal traffic remains difficult.