Obviously, the original IP address of the TOR user isn't available to the website they are viewing, but when the website responds back to the exit node, what information is the exit node maintaining that allows it to route back to the user? How is that response communication structured such that a malicious exit node isn't trivially able to de-anonymize the user?
Thanks.