Yes, that is an issue. It's not enough that the VPN provider allows you to run a Tor exit. You must also trust that they won't reveal your identity to LEA, when pressed. And you must trust that LEA can't get logs from the VPN provider's ISP or hosting provider.
There's also the issue that all Tor traffic will traverse the VPN link in both directions. That adds latency, and doubles your traffic cost. It's also a very distinctive traffic signature.
You could hide your identity from the VPN provider, by connecting through some impromptu mix network, and paying with well-mixed Bitcoins. You could use a nested chain of VPNs, and perhaps add JonDonym to the mix for better anonymity. That would increase latency and reduce bandwidth even more. But it might increase anonymity.
Overall, using a hosted VPS is probably best. _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
I believe i understand. My logic for using the VPN was that it would offer me one layer of potential protection, in case my relay would attract unwanted attention. I have nothing to fear in terms of being found with illegal content whatsoever, but a raid can still possibly ruin one's life because, well, some accusations are never forgotten no matter how unwarranted they were later found to be.
This appears to be one of the most inhibiting factors for people to run Tor relays. It's a shame, but i'll bury the idea for now then. I need the VPN service for myself with or without Tor, paying for additional hosting is not possible.
Thanks all for your replies.