[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] UK Exit Node



âThe block lists are very limited, i.e P2P, lists of known blackhats/paedophiles, unallocated IP ranges and most importantly: government-owned address and anti-tor addresses

  Original Message  
From: Sanjeev Gupta
Sent: Sunday, 6 July 2014 08:36
To: tor-relays@xxxxxxxxxxxxxxxxxxxx
Reply To: tor-relays@xxxxxxxxxxxxxxxxxxxx
Subject: Re: [tor-relays] UK Exit Node


On Sun, Jul 6, 2014 at 3:14 PM, Michael Banks <c@xxxxxxxxxx> wrote:

I was taking extra precaution by running PeerGuardian and specifically blocking malicious IPs, and will continue to do so while I have a relay node.

If you are using PeerGuardian to filter Tor traffic, that is sub-optimal.  The main reason that many people use Tor is precisely that their traffic is filtered, and blocking "malicious IPs".  Substituting your judgements for those of their Govt might be an improvement, or not.  As Tor has no way of knowing what you will block, traffic via your node will fail, but circuits will continue being created.

--
Sanjeev Gupta
+65 98551208     http://www.linkedin.com/in/ghane

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays