[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Innocent Seattle Exit Operators And Privacy Advocates Raided

On 04/03/2016 10:06 PM, grarpamp wrote:
> https://www.thestranger.com/slog/2016/03/30/23885710/police-go-on-fishing-expedition-search-the-home-of-seattle-privacy-activists-who-maintain-tor-network
> https://twitter.com/seattleprivacy

> Robinson said the authorities should have known better than to target
> them. One of the officers praised Tor as a useful tool and clearly
> understood how it works, he said.

Actually, the police had it right.  The only way police could know
whether the exit node operators were the source of the CP traffic was to
search their computer.  An exit node is indistinguishable from the
computers that it is acting the proxy for (barring ip leaks), from the
destination site's point of view.  Their own traffic would be mixed in
with exit node traffic.

Somewhere is a piece of advice from TorProject recommending people not
to run an exit node from home for the above and other reasons.

(I was going to link to
but the link on that page to
leads nowhere.  )

Attachment: signature.asc
Description: OpenPGP digital signature

tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to