[tor-relays] Planning a relay

Mirimir mirimir at riseup.net
Sat Dec 6 04:44:23 UTC 2014


On 12/05/2014 05:41 PM, Geoff Down wrote:
> 
> 
> On Sat, Dec 6, 2014, at 12:10 AM, TT wrote:
> 
>> Busting down doors is pretty much spot on about the reason i am 
>> unwilling to run the relay on my own IP address: i've read enough news 
>> about overzealous law enforcement in my country (non-Tor related, but 
>> still), and i'm certainly not going to face the public harassment and 
>> general fuss of an unnecessary and very embarrassing seizure.
>>
>  I don't know exactly how VPNs work, but it seems to me that if you run
>  an exit relay at home and tunnel all connections through the VPN, the
>  VPN provider (and LE when they take an interest) will have no way of
>  distinguishing between your exit relay accessing illegal content via
>  the VPN tunnel, and *you* accessing the illegal content via the VPN
>  tunnel. Therefore you are at the same risk of raid and seizure (once
>  the VPN provider tells LE where to find you) as if you used your own
>  IP.
> Someone correct me if I'm wrong.
> GD

Yes, that is an issue. It's not enough that the VPN provider allows you
to run a Tor exit. You must also trust that they won't reveal your
identity to LEA, when pressed. And you must trust that LEA can't get
logs from the VPN provider's ISP or hosting provider.

There's also the issue that all Tor traffic will traverse the VPN link
in both directions. That adds latency, and doubles your traffic cost.
It's also a very distinctive traffic signature.

You could hide your identity from the VPN provider, by connecting
through some impromptu mix network, and paying with well-mixed Bitcoins.
You could use a nested chain of VPNs, and perhaps add JonDonym to the
mix for better anonymity. That would increase latency and reduce
bandwidth even more. But it might increase anonymity.

Overall, using a hosted VPS is probably best.


More information about the tor-relays mailing list