Sort:  

Thanks for the comment! So guy, what do you mean by that?

With Tor, you can anonymize yourself, and there are various "exit nodes" around the world. These allow users to leave the internal anonymized Tor network and interact with the 'normal' internet. A user's packets are exchanged between websites and the exit node, then relayed to them from the exit node through the Tor network. Their true IP address is hidden through the layers of encryption within the Tor network.

Generally, exit nodes are ran either by the government, so they can monitor the traffic to snoop on activity (in case some criminal drops information on a non-ssl open connection), or by universities for academic purposes. The reason? If you, as a member of the 'little people' ran an exit node (you can if you want, it's as easy as clicking a few buttons), the police will be at your door in hours. People use these exit nodes to post child pornography and conduct other illegal activity on the "light net", and the activity will appear to have come from your IP Address. This is exactly what VPNs do, they encrypt your activity to the VPN and then relay it to/from the internet so that your activity looks like it's coming from the VPN IP Address instead of your own. This is why so many sign up for VPNs in order to torrent pirated material undeterred.

So, basically, act as a VPN or a Tor Exit Node at your own peril.