Comment by tg180
No!
The client controls path selection, and each hop is verified using its encryption keys.
No!
The client controls path selection, and each hop is verified using its encryption keys.
If you run a node that forwards traffic to any node other than the one requested by the client then that node won't be able to decrypt the traffic.
The client encrypts traffic to each node on its selected path in turn. If the traffic doesn't reach every desired node in order the traffic can't be decrypted.
You're saying that if you modify the tor software, other clients will be able to tell before connecting to you? And you can't trick them into sending to a bad node?