Tor network was never about security, it is about anonimity only. The owner of exit node have full access to your trafic and even can do a man-in-the-middle attack, but it can't identify you. So the server you connect to using Tor. For some extent it could protect your trafic from sniffing by your ISP, but only if your exit node is on the other ISP. That is all.
You could select the country of exit nodes, but not exact nodes IIRC.
If you want just hide your identity from service you use, or get around IP ban, Tor is what you need. If your goal is different, use appropriate tools.
Who's in control, how much government IP's have been identified running TOR-Nodes. How much nodes are compromised? How much nodes runned by freedom activists.
That questions have no sense, because you want to use Tor for something Tor was never designed for.
Tor is not about security or privacy. Tor is about anonimity. I.e. when you make a request to server, server have no chance to identify your real IP. That is all. It does not matter, who owns nodes, are they belong to government or freedom activists. Server will see only IP of exit node, not your real IP. That is Tor for, no more, no less.
If you want privacy, use encryption, if you want security, use good auth. Tor is for anonimity. And it works perfectly for that.
privacy != security != anonimity
Many computer users, who don't want to learn how things works, mix that orthogonal things and make bad decisions.
Tor network was never about security, it is about anonimity only. The owner of exit node have full access to your trafic and even can do a man-in-the-middle attack, but it can't identify you. So the server you connect to using Tor. For some extent it could protect your trafic from sniffing by your ISP, but only if your exit node is on the other ISP. That is all.
You could select the country of exit nodes, but not exact nodes IIRC.
If you want just hide your identity from service you use, or get around IP ban, Tor is what you need. If your goal is different, use appropriate tools.
That questions have no sense, because you want to use Tor for something Tor was never designed for.
Tor is not about security or privacy. Tor is about anonimity. I.e. when you make a request to server, server have no chance to identify your real IP. That is all. It does not matter, who owns nodes, are they belong to government or freedom activists. Server will see only IP of exit node, not your real IP. That is Tor for, no more, no less.
If you want privacy, use encryption, if you want security, use good auth. Tor is for anonimity. And it works perfectly for that.
privacy != security != anonimity
Many computer users, who don't want to learn how things works, mix that orthogonal things and make bad decisions.