[tor-relays] List of Relays' Available SSH Auth Methods

Dan Rogers dan at holdingitwrong.com
Tue Nov 18 18:18:16 UTC 2014


Not that hard;

- pay in bitcoins
- only login to node using Tor / Tails




On 18/11/14 18:16, Niklas Kielblock wrote:
> This only applies if you're able to rid your hardware of all evidence 
> of ever connecting to your node, and have no record of ownership of 
> that node whatsoever. I find that a fairly unlikely scenario, to be 
> honest.
>
> On 18/11/14 19:10, Dan Rogers wrote:
> >
> >
> > IMO there could occasionally be reasons not to use key logins (although
> > I do normally disable pwd login). E.g. if I have a key, I then have
> > evidence somewhere (USB/HD), whereas a secure password can be kept only
> > in my head (until they waterboard me). Especially in countries (e.g. 
> the
> > UK) that can force you to hand over encryption keys. I'd rather have an
> > insecure Tor node than get arrested (although tbh with fail2ban
> > installed I don't think pwd bruteforcing is a threat).
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-- 
Dan Rogers
+44 7539 552349
skype: dan.j.rogers
gpg key <https://secure.techwang.com/gpg/public_key.txt>
linkedin <http://www.linkedin.com/in/danrogerslondon> | twitter 
<http://twitter.com/danjrog> | spotify 
<http://open.spotify.com/user/bonkbonkonk> | music 
<http://holdingitwrong.com>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20141118/6de4a9e9/attachment.html>


More information about the tor-relays mailing list