[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Why you need balls of steel to operate a Tor exit node
- To: or-talk@xxxxxxxxxxxxx
- Subject: Re: Why you need balls of steel to operate a Tor exit node
- From: Ted Smith <teddks@xxxxxxxxx>
- Date: Wed, 09 Sep 2009 17:08:58 -0400
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-talk-outgoing@xxxxxxxx
- Delivered-to: or-talk@xxxxxxxx
- Delivery-date: Wed, 09 Sep 2009 17:09:02 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:subject:from:to:in-reply-to :references:content-type:date:message-id:mime-version:x-mailer; bh=hTBtNJwnTpKsAQ5YKh7gGRIxqeyQoDePqu7jtiV1De4=; b=inq0CidMoW9GX8ArNB0IsAzC8L38jFxDXrZEGOnPYHxT4H6Ydcns215QI9rURfIr6Z YSCbtZlTarANA4O2e/4hdc4KPXnCUxxQNXOfFFEhXLnIKZ2+bKXrTHeHV5nOeQl3LyPG vqieZ9VSoDOQ1PX9/hcX8VTSQ4OiIcZlbR0XE=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=subject:from:to:in-reply-to:references:content-type:date:message-id :mime-version:x-mailer; b=FEZcKgt1bBN+eF6a1F5zw/NU+qpKyoJP8UMGElvi6MIGidMXwOeKSbjXRDfjevTB43 Ml8/nOEuhfDNIJBSsQVJi1l4xrI1VD7Ansi7MRDkfM/7PlxuRrymFRdlPzwAchz5RHD0 IV7phAtDgS0SQ0jZBqBNGw+rMq71LVThMm8HE=
- In-reply-to: <20090909200916.GF9828@xxxxxxxxx>
- References: <20090909200916.GF9828@xxxxxxxxx>
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-talk@xxxxxxxxxxxxx
There's a lot of FUD thrown around about how "you need balls of steel to
operate a Tor exit node", but I've ever only seen this one account. Are
there any other accounts, or better yet, any actual numbers as to what
percentage of tor node operators face significant legal harassment (not
misplaced DMCA notices or other similar things that only require a chat
with your ISP, but getting arrested / raided because of your node)?
Attachment:
signature.asc
Description: This is a digitally signed message part