[tor-relays] Planning a relay

TT tbr66 at riseup.net
Sat Dec 6 08:54:31 UTC 2014


> Yes, that is an issue. It's not enough that the VPN provider allows you
> to run a Tor exit. You must also trust that they won't reveal your
> identity to LEA, when pressed. And you must trust that LEA can't get
> logs from the VPN provider's ISP or hosting provider.
>
> There's also the issue that all Tor traffic will traverse the VPN link
> in both directions. That adds latency, and doubles your traffic cost.
> It's also a very distinctive traffic signature.
>
> You could hide your identity from the VPN provider, by connecting
> through some impromptu mix network, and paying with well-mixed Bitcoins.
> You could use a nested chain of VPNs, and perhaps add JonDonym to the
> mix for better anonymity. That would increase latency and reduce
> bandwidth even more. But it might increase anonymity.
>
> Overall, using a hosted VPS is probably best.
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

I believe i understand. My logic for using the VPN was that it would 
offer me one layer of potential protection, in case my relay would 
attract unwanted attention. I have nothing to fear in terms of
being found with illegal content whatsoever, but a raid can still 
possibly ruin one's life because, well,
some accusations are never forgotten no matter how unwarranted they were 
later found to be.

This appears to be one of the most inhibiting factors for people to run 
Tor relays. It's a shame, but i'll bury the idea for now then. I need 
the VPN service for myself with or without Tor, paying for additional 
hosting is not possible.

Thanks all for your replies.


More information about the tor-relays mailing list