[tor-relays] malicious exit relays by andrejgvozdev55 at gmail.com

Georg Koppen gk at torproject.org
Mon Apr 12 18:34:13 UTC 2021


nusenu:
> Hi Andrey,
> 
> Roger Dingledine:
>> For completeness, I'm including below the set of fingerprints that we
>> bumped out.
> [...]
>> Group #7: other
>> 4E6C7297F16523A236EE1A2EE23AF54ABEF15490
>> 55D490E9E440DD4458F16ABCDD79F48396D55EA9
>> 78F699D58F3353AB6C4CE39E3BD96CE87439753A
>> B1896E58FDEB5627B6B8334E6ABD42767AB8B0D9
> 
> 
> after confirming with the hoster that you were and are in fact their
> customer at these and other IPs used by malicious tor relays, I was wondering
> whether you wanted to comment on that?
> 
> Especially since you recently added more exit relays.

FWIW: we kicked a bunch of relays out of the network today which might
or might not contain any of those, hard to tell. (In addition to other
relays, too, which might or might not be related to those).

Thanks for staying vigilant, everyone. Much appreciated and needed.

Georg

> kind regards,
> nusenu
> 


-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20210412/b1f95ff9/attachment.sig>


More information about the tor-relays mailing list