[tor-relays] http://torstatus.blutmagie.de/

Jonathan Baker-Bates jonathan at bakerbates.com
Wed Feb 5 10:08:28 UTC 2014


> I guess my concern was based on [unfounded?] paranoia over possible isp
reprisals?

The way I see it, having my IP (and indeed email address and PGP
fingerprint) on my relay info helps *prevent* ISP reprisals since it's full
disclosure. That may be naive on my part, but after about 6 years of
running an exit, I've not had any trouble at all.


On 4 February 2014 18:20, K. Besig <suprleg at gmail.com> wrote:

> Thanks for the responses, both are the logical conclusion to being able to
> publicly  view a relay's ip/dns information..
> I guess my concern was based on [unfounded?] paranoia over possible isp
> reprisals?
>
>
> On Tue, Feb 4, 2014 at 10:10 AM, Damian Johnson <atagar at torproject.org>wrote:
>
>> > Why shouldn't I be concerned when, by simply accessing this page, all my
>> > actual ip/dns information is readily available to all?
>>
>> Better question is 'why should you be?'. :P
>>
>> To work relays publish their address so others can contact them. If
>> you consider your address to be secret then your best option is
>> probably to run an unpublished bridge (and just give the address to
>> people you want to use it).
>> _______________________________________________
>> tor-relays mailing list
>> tor-relays at lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>>
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20140205/065e278b/attachment-0001.html>


More information about the tor-relays mailing list