Hi all! On Wed, 2013-09-18 at 19:29 -0400, tor@xxxxxxx wrote: > Also. It makes me wonder things when, for example, you say "Think > bigger" while pointing to a couple of potential dollars in someone's > pocket. Safeguarding the operators of the exit relays is a bigger deal > than chump change. I'm not making an honest accusation but, to the > people who are the most vocal in approving of this - you don't work > for the NSA, right? :) > I am quite new to tor but I decided a few days ago that it is not just "something for people in far far away countries". I simply decided that I have to support this if I do not want to be in the risk that I am asked later: "What did you do when they took the control over the net?". So I started a tor node on a dedicated root server. But now you scared me a little bit: Is there a need to be safeguarded as a tor node operator? - At least the hosting company might know me. At least it should be easy for the government to track me down even if I tried to hide because all they have to do is follow the money. - I even used my Name and Email address inside the contact information. Just check out the "idkneitzel" Node. - Reverse DNS even points back to my private domain. Was this something that I shouldn't have done? Is it something that I should change? Would be nice to hear your opinions on this topic. With kind regards, Konrad
Attachment:
signature.asc
Description: This is a digitally signed message part
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays