[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Innocent Seattle Exit Operators And Privacy Advocates Raided



On 04/04/2016 03:13 AM, Roger Dingledine wrote:
> On Mon, Apr 04, 2016 at 12:04:44AM -0400, krishna e bera wrote:
> > Somewhere is a piece of advice from TorProject recommending people
> > not to run an exit node from home for the above and other reasons.
> 
> Actually it's EFF's Tor legal faq:
> https://www.torproject.org/eff/tor-legal-faq
> ("Should I run an exit relay from my home?")

That entry doesn't cite "above and other reasons," but only one
reason for refraining from running an exit relay from one's home:
risk of police seizing hardware:

    Q: Should I run an exit relay from my home?

    A: No. If law enforcement becomes interested in traffic from
    your exit relay, it's possible that officers will seize your
    computer. For that reason, it's best not to run your exit
    relay in your home or using your home Internet connection.

This leaves one to wonder if preparation for such potential
seizure, such as isolation of "your computer" on which the exit
runs from other computer hardware effectively satisfies EFF's
objection to running an exit at home.

-- 
Phil Mocek
https://mocek.org
-- 
Phil Mocek
https://mocek.org

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk