[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Tor Relay Operator Community Health - Final report (June 2024)



On Thursday, 17 October 2024 16:17 gus wrote:

> - Main report:
> https://www.sr2.uk/reports/2024-TorRelayOperatorCommunityHealth.pdf -
> Mirror:
> https://gitlab.torproject.org/-/project/60/uploads/846d7d1816aee92fd2ee283b6
> a354c7d/2024-TorRelayOperatorCommunityHealth.pdf

Wow, I'm only up to 4.4.

- So I'm the only DAU in this survey ;-)

- Exit operators (some of whom have been to jail). are the ones most expected 
to disclose their data.

- A trusted group, exceeding a certain percentage of the total consensus 
weight most people find worse than a single operator running multiple relays 
using different personas and alias?
Yes, more distribution is nice. But I'd rather have NTH and quetzo in my node 
list than the next KAX17.

Whether now after the reports about 'Operation Liberty' where it was about 
detecting onion services¹ and guard nodes, the answers would be the same?

¹All node types are involved in hidden services (guard, middle, exit).

Every assistant admin at Hetzner and OVH can monitor a significant part of the 
Tor network. In addition, Netflow data is transmitted to anyone who can pay for 
it. But well-known relay groups are the bad guys :-) 

-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays