This is serious issue and if now quarter of all Tor nodes are malicious we can expect to see this number growing in future,
As per the blog post, it went as high as 23%, so yes it's almost a quarter. But it went down to 10% as of Aug 8, but still the numbers are high.
and I think solution for this is not so easy to find.
There is a solution on Tor's end,
https://lists.torproject.org/pipermail/tor-relays/2019-December/017961.htmlUntil the pandemic hits and employees are lay-off working on the said improvements.
Can we see anything suspicious in our browser in case something like this happens, like certificate change etc ?
Definitely, if they strip the SSL, then you will see a different certificate.
It is also interesting as to who or what bitcoin mixers have already somewhat mitigate it.
I’ve reached out to some of the known affected bitcoin sites, so they can mitigate this on a technical level using HSTS preloading. Someone else submitted HTTPS-Everywhere rules for the known affected domains (HTTP Everywhere is installed by default in Tor Browser). Unfortunately none of these sites had HSTS preloading enabled at the time. At least one affected bitcoin website deployed HSTS preloading after learning about these events.
Is th