On 03/24/2015 11:09 PM, yl wrote:
Assume you run a tor exit or relay on a public server and you enable the socks port and listen on 0.0.0.0 or so and accept all incomming connections. Then you post the socks port publicly. What are the reasons not to do so?
SOCKS does not encrypt traffic at all; all your traffic will travel to the SOCKS server in plain. Also, you need to fully trust the provider of the SOCKS port -- Tor is designed so you don't have to trust any participant in the network.