Last year I was running my torserver (baphomet) as exit for port 80/443. The results were interesting: first a DOS attack, then later my box was seized by the german Staatsanwalt because of childporn. OK, I got my box back from them but this took 3 months. Then I got trouble with my ISP who told me that it were forbidden to run a tor exit (bullshit). So I configured my meanwhile 2 nodes (baphomet & info4all) to run as middleman, I only allowed them to be exit for DNS requests over tor. But I am not satisfied with that. These days I read about Dan Egerstad and his mailsniffer experience and I started thinking: If I open exit ports for only those that do encrypted access to mailservers (465,993,995), I should be save from the Staatsanwaltschaft. If they seize a mailserver, they should be interested in getting the realname of the account owner, not of the IP, from where the traffic came. Is that right? On the other hand I support those protocols that work with encryption. If lots of people close their unencrypted mail ports, users experience that it is slow over tor and (hopefully) switch to secure protocols and cannot be sniffed anymore. Last not least: how great, do you think, is the danger of supporting spammers when setting up my node for 465,993,995? Kind Regards Thomas Hluchnik