Filtering traffic from your node - for exit points

Martin Senftleben DrMartinus at drmartinus.de
Tue Sep 11 06:20:38 UTC 2007


Am Dienstag, 11. September 2007 07:10 schrieb jeffery statin:
> In summation:  I agree with your motivation but not
> your rationalization or execution.  There are going to
> be bad apples in each bunch; always have been and
> always will be.

Agreed. It's impossible to filter out every bad bit, and it will 
always hit innocent people. 
I had the police in my house for much less than running an exit node, 
searching my PC for illegal material, which they didn't find of 
course - at least enough suspicion was there, totally unreasonable 
for every knowledgeable person, for a judge to order this 
investigation. They could have taken my PC and other stuff.
I wonder what would happen if I would run an exit node... I don't want 
to take that risk. Well, I live in Germany, a country where the 
government is becoming paranoid and beginning to do exactly what 
George Orwell has foreseen almost 60 years ago.
I don't know where this will end, but I am currently very afraid of 
running an exit node, and won't do it. I give some resources as relay 
node, that's all I can afford to do.
I would like to run an exit node, by the way. There just needs to be 
some legal clarity on whether and how I could be held responsible for 
what is going on there. I would even be willing to rent a vserver 
just for that purpose. But I can't evaluate the risk properly.

Martin
-- 
Dr. Martin Senftleben, Ph.D. (S.V.U.)
http://www.drmartinus.de/
http://www.daskirchenjahr.de/

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20070911/dfd1b675/attachment.pgp>


More information about the tor-talk mailing list