Filtering traffic from your node - for exit points
Martin Senftleben
DrMartinus at drmartinus.de
Tue Sep 11 06:20:38 UTC 2007
Am Dienstag, 11. September 2007 07:10 schrieb jeffery statin:
> In summation: I agree with your motivation but not
> your rationalization or execution. There are going to
> be bad apples in each bunch; always have been and
> always will be.
Agreed. It's impossible to filter out every bad bit, and it will
always hit innocent people.
I had the police in my house for much less than running an exit node,
searching my PC for illegal material, which they didn't find of
course - at least enough suspicion was there, totally unreasonable
for every knowledgeable person, for a judge to order this
investigation. They could have taken my PC and other stuff.
I wonder what would happen if I would run an exit node... I don't want
to take that risk. Well, I live in Germany, a country where the
government is becoming paranoid and beginning to do exactly what
George Orwell has foreseen almost 60 years ago.
I don't know where this will end, but I am currently very afraid of
running an exit node, and won't do it. I give some resources as relay
node, that's all I can afford to do.
I would like to run an exit node, by the way. There just needs to be
some legal clarity on whether and how I could be held responsible for
what is going on there. I would even be willing to rent a vserver
just for that purpose. But I can't evaluate the risk properly.
Martin
--
Dr. Martin Senftleben, Ph.D. (S.V.U.)
http://www.drmartinus.de/
http://www.daskirchenjahr.de/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20070911/dfd1b675/attachment.pgp>
More information about the tor-talk
mailing list