* R0cketCloud TOR Team via tor-relays:
The problem is Hetzner's surveillance. Any provider that constantly stores and analyzes netflow data to this degree is a risk.
Nothing like making wildly sweeping statements, is there? What lurid details do you know about Hetzner's oh so risky analysis? Retention time, scope, processes? If you have any damning evidence to share for the greater good, out with it, good sir. Of course Hetzner monitors their traffic, it would be dumb not to. I fully expect any ISP targeting a mass market to monitor traffic, if only to try and keep abuse in check. By the way, in other cases Hetzner has been criticised for being "too liberal" and people have "proposed" to block Hetzner's network ranges for allegedly not taking a tough stance on spammers hosting mail servers.
I propose all Hetzner-hosted relays get the MiddleOnly flag and be barred from becoming Guard nodes.
Propose away, that does not make it a good idea.
When did we become the censors?
... asks the guy who proposes to arbitrarily ban nodes hosten on a major ISP's infrastructure from performing important services for Tor, based on nothing but a personal preference. Or is is there perhaps another motivation? For instance, I find it interesting that Hetzner is selling services which appear to compete with what r0cket.cloud offers. -Ralph