[tor-relays] exit node experience: abuse over HTTP, stealrat infection

Rejo Zenger rejo at zenger.nl
Sun Oct 19 12:10:55 UTC 2014


++ 19/10/14 13:53 +0200 - Tom van der Woerdt:
>Sounds familiar. This same company (valuehost.ru?) sends me about 20 abuse
>reports a day. At first I replied with explanations of what Tor is,
>explaining why it's hard to do anything against this kind of abuse. Later I
[...]
>IANAL but you can probably just ignore those.

I have had exactly the same experience with valuehost.ru. At this moment 
I'm ignoring any automated notification I receive from them. 


-- 
Rejo Zenger
E rejo at zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl  
T @rejozenger | J rejo at zenger.nl
OpenPGP   1FBF 7B37 6537 68B1 2532  A4CB 0994 0946 21DB EFD4
XMPP OTR  271A 9186 AFBC 8124 18CF  4BE2 E000 E708 F811 5ACF
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 931 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20141019/1c3a9aaf/attachment.sig>


More information about the tor-relays mailing list