Advice taken I was debating to switch over to relay-only or not. I must note, the Tor node is on it's own address, under a residential contract. I was taking extra precaution by running PeerGuardian and specifically blocking malicious IPs, and will continue to do so while I have a relay node. I have tor-relay.itschip.com set in torrc.. guess I have to fiddle with more things? Anyone with Debian experience who can help in that field?
On 06/07/2014 07:24, Jeroen Massar wrote:
On 2014-07-06 07:06, Michael Banks wrote:
Any tips for UK Exit Node operators on a Residential ISP (BT)?
I would be EXTREMELY careful in running an exit on a residential location.
There is no way for you to prove that it was not you causing that connection but the Tor process causing that connection and thus some 'other' user.
The UK government has all kinds of regulations/systems in place to protect children and to enforce copyright laws. They are also known to index/analyze all traffic.
You might want to consider changing that into a relay instead as then you at least are not reaching out to a "scary" host (unless it also runs Tor).
Also:
150.57.130.86.in-addr.arpa PTR host86-130-57-150.range86-130.btcentralplus.com.
As such, it looks just like any other link, it has no relation to tor-relay.itschip.com at all. Except for folks with access to dnsdb, which law enforcement typically does have, but as DNS is not used in Tor, it is all irrelevant.
Greets, Jeroen _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays