[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] UK Exit Node



Advice taken
I was debating to switch over to relay-only or not. I must note, the Tor node is on it's own address, under a residential contract. I was taking extra precaution by running PeerGuardian and specifically blocking malicious IPs, and will continue to do so while I have a relay node. I have tor-relay.itschip.com set in torrc.. guess I have to fiddle with more things?
Anyone with Debian experience who can help in that field?

On 06/07/2014 07:24, Jeroen Massar wrote:
On 2014-07-06 07:06, Michael Banks wrote:
Any tips for UK Exit Node operators on a Residential ISP (BT)?
I would be EXTREMELY careful in running an exit on a residential location.

There is no way for you to prove that it was not you causing that
connection but the Tor process causing that connection and thus some
'other' user.

The UK government has all kinds of regulations/systems in place to
protect children and to enforce copyright laws. They are also known to
index/analyze all traffic.


You might want to consider changing that into a relay instead as then
you at least are not reaching out to a "scary" host (unless it also runs
Tor).


Also:

150.57.130.86.in-addr.arpa PTR
host86-130-57-150.range86-130.btcentralplus.com.

As such, it looks just like any other link, it has no relation to
tor-relay.itschip.com at all. Except for folks with access to dnsdb,
which law enforcement typically does have, but as DNS is not used in
Tor, it is all irrelevant.

Greets,
  Jeroen
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays