I guess my concern was based on [unfounded?] paranoia over possible isp
reprisals?
The way I see it, having my IP (and indeed email address and PGP fingerprint) on my relay info helps *prevent* ISP reprisals since it's full disclosure. That may be naive on my part, but after about 6 years of running an exit, I've not had any trouble at all.
On 4 February 2014 18:20, K. Besig suprleg@gmail.com wrote:
Thanks for the responses, both are the logical conclusion to being able to publicly view a relay's ip/dns information.. I guess my concern was based on [unfounded?] paranoia over possible isp reprisals?
On Tue, Feb 4, 2014 at 10:10 AM, Damian Johnson atagar@torproject.orgwrote:
Why shouldn't I be concerned when, by simply accessing this page, all my actual ip/dns information is readily available to all?
Better question is 'why should you be?'. :P
To work relays publish their address so others can contact them. If you consider your address to be secret then your best option is probably to run an unpublished bridge (and just give the address to people you want to use it). _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays