nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqvgzrqfnrgpdaq6g06gfamsfqpglnpkffyk5cn69g57rmgpr9c8fsznwk48 nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqx0r5gflnk2mn6h3c70nvnywpy2j46gzqwg6k7uw6fxswyz0md9qq0kp50y nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpq8c2ljqudu3dm9e0de9sea3gqy67f6kj4e6cwe243rseenf9gmmmqmsuxme yeah if you read up on firewall docs and shit you can hear about them telling IT guys "how to find tor traffic on your network", hence being visible in the sense that an IT guy who knows his shit can know you're using it.
https://lantern.splunk.com/Security/UCE/Guided_Insights/Threat_hunting/Detecting_TOR_traffic