[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Planning a relay




Yes, that is an issue. It's not enough that the VPN provider allows you
to run a Tor exit. You must also trust that they won't reveal your
identity to LEA, when pressed. And you must trust that LEA can't get
logs from the VPN provider's ISP or hosting provider.

There's also the issue that all Tor traffic will traverse the VPN link
in both directions. That adds latency, and doubles your traffic cost.
It's also a very distinctive traffic signature.

You could hide your identity from the VPN provider, by connecting
through some impromptu mix network, and paying with well-mixed Bitcoins.
You could use a nested chain of VPNs, and perhaps add JonDonym to the
mix for better anonymity. That would increase latency and reduce
bandwidth even more. But it might increase anonymity.

Overall, using a hosted VPS is probably best.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

I believe i understand. My logic for using the VPN was that it would offer me one layer of potential protection, in case my relay would attract unwanted attention. I have nothing to fear in terms of being found with illegal content whatsoever, but a raid can still possibly ruin one's life because, well, some accusations are never forgotten no matter how unwarranted they were later found to be.

This appears to be one of the most inhibiting factors for people to run Tor relays. It's a shame, but i'll bury the idea for now then. I need the VPN service for myself with or without Tor, paying for additional hosting is not possible.

Thanks all for your replies.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays