I guess my concern was based on [unfounded?] paranoia over possible isp reprisals?

The way I see it, having my IP (and indeed email address and PGP fingerprint) on my relay info helps *prevent* ISP reprisals since it's full disclosure. That may be naive on my part, but after about 6 years of running an exit, I've not had any trouble at all.


On 4 February 2014 18:20, K. Besig <suprleg@gmail.com> wrote:
Thanks for the responses, both are the logical conclusion to being able to publicly  view a relay's ip/dns information..
I guess my concern was based on [unfounded?] paranoia over possible isp reprisals? 


On Tue, Feb 4, 2014 at 10:10 AM, Damian Johnson <atagar@torproject.org> wrote:
> Why shouldn't I be concerned when, by simply accessing this page, all my
> actual ip/dns information is readily available to all?

Better question is 'why should you be?'. :P

To work relays publish their address so others can contact them. If
you consider your address to be secret then your best option is
probably to run an unpublished bridge (and just give the address to
people you want to use it).
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays