<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<div class="moz-cite-prefix">On 8/30/2013 1:04 PM, Andy Isaacson
wrote:<br>
</div>
<blockquote cite="mid:20130830180453.GG27637@hexapodia.org"
type="cite">
<pre wrap="">On Fri, Aug 30, 2013 at 11:38:26AM -0400, That Guy wrote:
</pre>
<blockquote type="cite">
<blockquote type="cite">
<pre wrap="">I run an exit node off of a residential Verizon connection and I
haven't seen a single threat, legal or otherwise so far, I dunno
why you're having so much trouble.
</pre>
</blockquote>
<pre wrap="">
Thank you for the reply but I have not either. My comments come from
reading many such issues on the mailing list and the many many
experiences documented on the Good/bad ISP lists on the torproject
websites. I've had zero trouble with the sigle relay I'm running but
as I also try to encourage others to run relays I was curious as I
don't want to put OTHERS in a bad situation.
</pre>
</blockquote>
<pre wrap="">
I ran a non-exit relay at home for many years without hearing any
complaints. (I moved away from that ISP at the end of 2012 so I no
longer run that relay). I haven't seen a credible description of a
non-exit relay being the cause of a complaint -- in most cases I have
seen described, there were several possible causes for a complaint and
the Tor relay was just one possible cause.
So, I would have no problem encouraging others to run a non-exit relay
on their home connection, since I don't believe that it is likely to put
them in a bad situation. I would be clear with them that they should be
aware of the technical issues when doing so, of course.
-andy
_______________________________________________
tor-relays mailing list
<a class="moz-txt-link-abbreviated" href="mailto:tor-relays@lists.torproject.org">tor-relays@lists.torproject.org</a>
<a class="moz-txt-link-freetext" href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays">https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays</a>
</pre>
</blockquote>
I have recently seen several e-commerce websites blocking all
traffic coming from IP addresses that are known to be used by Tor
relays, including non-exit relays. That means <u>all</u> traffic,
including legitimate traffic. In my personal experience,
Ancestry.com and justanswer.com are currently blocking my
residential IP address because I am running a non-exit relay from
home. Others are having similar experiences. If this is the
beginning of a trend, the useability of Tor will drop dramatically
unless a counter-measure is developed.<br>
<br>
David C<br>
</body>
</html>