[tor-relays] Thoughts on new relay

ZEROF security at netmajstor.com
Tue Feb 10 05:53:48 UTC 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Any server from "new" countries are good. If you are relay in this
time, that is good as well. Doing what you are doing now with your
relay is more then you think. If people from your country see that
somebody start to do what you do, more will come and join the network.

Keep server rolling.


-----BEGIN PGP SIGNATURE-----
Version: OpenPGP.js v0.9.0
Comment: http://openpgpjs.org
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=v8H0
-----END PGP SIGNATURE-----


On 10 February 2015 at 14:03, Niklas Femerstrand <nik at qnrq.se> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Moin,
>
> Our relay is online as of Jan 23 and recently I've been thinking about
> pivoting it into a bridge instead. The relay lives in Cambodia and may
> naturally be a bit off from the rest of the network (latency).
>
> Consensus weight is steadily increasing despite various initial
> downtime incidents, which you can see in Atlas graphs. (We've had some
> network upgrades and during a separate event even had a monkey yanking
> the eth from the nic.)
>
> Currently we advertise 435.66 KB/s and with our current ~9d 10h uptime
> we have downloaded 3.6 GB resp uploaded 3.7 GB. Theoretically our
> tubes fit 10 Mbps download and 30 Mbps upload.
>
> The question is whether the relay is worth keeping with its current
> setup or if we can contribute more by re-configuring into a bridge.
> Unfortunately it is very risky for us to allow exit traffic, but we <3
> any cipher packet.
>
> Please advice!
>
> https://atlas.torproject.org/#details/94F806110B23E727AE8BAD74DD95B0EE0B7A8EEC
>
> Regards,
>
> King Kong
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
>
> iQIcBAEBCAAGBQJU2gGzAAoJEHxAR3sGx+rLTzEP/05TJK3vzfPe3kUjUfg0G/wm
> vlc1vZLshAvK/pE1mf2DqDSgnuxR+QHHJI8htJOaU5VJVMlnEy4nsF0uE76It1EW
> OLUo7+LU452Sx7XjyVYMKOu6OJ9kD1Cg6OkNT2HEIOR+57x7vNJTYr7oF0uNu6dt
> UzVFJKkM3Y1ca4GsMS2M/oXFw2jGrrvmx4DLHu2OSDwNumy3ndOETnZscVfErAMK
> A/K4JI0Ws6pInBRciEHdak9ZBkR/f9jYGPbUXOSwnJN6XIsawijTIbrRLfYiUcro
> 0wj6mZYqXgKRDOvP57UNkf5UaolADQb6ssiLkhhAGu+DHnTt5V8g2vkqtY3wU02N
> 823X7o3oNZYq5yZFTbexH8Al+ys9KvKlu5q0YRYvbBwvI/yGHyr/gEI7ufV+9tZ6
> z9Mo2hCBsaM0vrikBzejhjSw5qc4HcwMKErlC3cHQHIbszryu1O0WY1G22pwYgss
> mAGDr6OcdeIdMyNcJlpyH8+jToRSJrkAwDSPdQz+IVMq785x0GnOo2uV2/7NTr2J
> +LVUjSjAenRhPX+TrAFFujNYXZf5uD/EUfsGyUyCdBhJ5PWsLjYQ/EYD6PToDX8P
> BdocR3XfxZS7nD5PYRDfyWNeckCL6VPrnZrgMGIYBEXAn7jhX608vzmZV7IU7mzv
> 3NrnDWpllK4M42hT7fXs
> =hV51
> -----END PGP SIGNATURE-----
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>



-- 
http://www.backbox.org
http://www.pentester.iz.rs
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20150210/11f3fcd2/attachment.html>


More information about the tor-relays mailing list