[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] malicious exit relays by andrejgvozdev55@xxxxxxxxx



nusenu:
> Hi Andrey,
> 
> Roger Dingledine:
>> For completeness, I'm including below the set of fingerprints that we
>> bumped out.
> [...]
>> Group #7: other
>> 4E6C7297F16523A236EE1A2EE23AF54ABEF15490
>> 55D490E9E440DD4458F16ABCDD79F48396D55EA9
>> 78F699D58F3353AB6C4CE39E3BD96CE87439753A
>> B1896E58FDEB5627B6B8334E6ABD42767AB8B0D9
> 
> 
> after confirming with the hoster that you were and are in fact their
> customer at these and other IPs used by malicious tor relays, I was wondering
> whether you wanted to comment on that?
> 
> Especially since you recently added more exit relays.

FWIW: we kicked a bunch of relays out of the network today which might
or might not contain any of those, hard to tell. (In addition to other
relays, too, which might or might not be related to those).

Thanks for staying vigilant, everyone. Much appreciated and needed.

Georg

> kind regards,
> nusenu
> 


Attachment: OpenPGP_signature
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays