[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
What do you think about this exit policy for germany?
Last year I was running my torserver (baphomet) as exit for port 80/443. The
results were interesting: first a DOS attack, then later my box was seized by
the german Staatsanwalt because of childporn. OK, I got my box back from them
but this took 3 months. Then I got trouble with my ISP who told me that it were
forbidden to run a tor exit (bullshit).
So I configured my meanwhile 2 nodes (baphomet & info4all) to run as middleman,
I only allowed them to be exit for DNS requests over tor. But I am not
satisfied with that. These days I read about Dan Egerstad and his mailsniffer
experience and I started thinking:
If I open exit ports for only those that do encrypted access to mailservers
(465,993,995), I should be save from the Staatsanwaltschaft. If they seize a
mailserver, they should be interested in getting the realname of the account
owner, not of the IP, from where the traffic came. Is that right? On the other
hand I support those protocols that work with encryption. If lots of people
close their unencrypted mail ports, users experience that it is slow over tor
and (hopefully) switch to secure protocols and cannot be sniffed anymore.
Last not least: how great, do you think, is the danger of supporting spammers
when setting up my node for 465,993,995?
Kind Regards
Thomas Hluchnik