On 04/03/2016 10:06 PM, grarpamp wrote: > https://www.thestranger.com/slog/2016/03/30/23885710/police-go-on-fishing-expedition-search-the-home-of-seattle-privacy-activists-who-maintain-tor-network > https://twitter.com/seattleprivacy > quote: > Robinson said the authorities should have known better than to target > them. One of the officers praised Tor as a useful tool and clearly > understood how it works, he said. Actually, the police had it right. The only way police could know whether the exit node operators were the source of the CP traffic was to search their computer. An exit node is indistinguishable from the computers that it is acting the proxy for (barring ip leaks), from the destination site's point of view. Their own traffic would be mixed in with exit node traffic. Somewhere is a piece of advice from TorProject recommending people not to run an exit node from home for the above and other reasons. (I was going to link to https://www.torproject.org/docs/faq-abuse.html.en#TypicalAbuses but the link on that page to https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment leads nowhere. )
Attachment:
signature.asc
Description: OpenPGP digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk