See also:

Fernanda Weiden showed her belly button to get a Wikipedia vanity page



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Tor exit nodes



Receiving unknown encrypted data and sending it on shouldn't be an issue. I am going to setup a relay on a system I am co-sysadmin for in the near future.

I wouldn't be inclined​ to run one at home though. A bit of paranoia is ok when dealing with such things.

On 12 April 2017 4:41:15 am AEST, Adam Borowski <[email protected]> wrote:
>On Tue, Apr 11, 2017 at 08:44:42PM +1000, Russell Coker wrote:
>> On Tue, 11 Apr 2017 07:49:25 PM Alexander Gerasiov wrote:
>> > Security service and police came to his house and took away all the
>> > computers, cause he had Tor exit node on his PC which was used by
>some
>> > black-hats to attack government's site.
>> 
>> I think it would be best if DDs don't run Tor exit nodes from the
>same 
>> location as the machine holding their GPG keys etc.  If anything goes
>wrong we 
>> don't want systems that can compromise Debian security being
>collected by the 
>> police.  As this has apparently happened more than once it seems that
>it's 
>> something we need to discuss here.
>
>Do you think there's a reason to be wary about running an entry/middle
>node?
>
>I for one run such a small node at home (200KB, burst 500KB), mostly to
>have
>enough noise to hide my own traffic (well, external input is equal to
>output, but there's enough jitter to make a difference).

-- 
Sent from my Nexus 6P with K-9 Mail.