I would have to say "it's not".. anything non-encrypted you risk being manipulated by a node of the TOR network. I bet there are people who act as relays just to try to sniff out any good non-HTTPS traffic.. although, I suppose generally anyone using TOR is mostly aware of this so there's probably not that much to gain.
Complete side note.. but this just reminds me of back when I was in college in the late 90s, and our entire apartment buildings traffic was a hub (not a switch).. so I had a packet sniffer running for fun on linux and could see everything from everyones internet since every single packet was rounting to every machine on the network, and lots of stuff had no encryption... nuts to think how open stuff was back in the day.
Pretty sure some switches (to this day) can be tricked into doing similar. eg send them a few specially crafted packets, and they fall back into broadcasting ~everything like a hub for some period of time.
Not from the point of view of "legal intercept" stuff, more like "switch gets confused and doesn't know how to route, so broadcasts as a workaround".
Complete side note.. but this just reminds me of back when I was in college in the late 90s, and our entire apartment buildings traffic was a hub (not a switch).. so I had a packet sniffer running for fun on linux and could see everything from everyones internet since every single packet was rounting to every machine on the network, and lots of stuff had no encryption... nuts to think how open stuff was back in the day.