Like to run TOR-Node

BlueStar88 BlueStar88 at Xenobite.eu
Fri Sep 14 16:13:46 UTC 2007


Another possible way would be, to integrate the server hoster into your
security considerations.
What about telling the provider what you are going to do, which risks
there are and how to handle abuse inquiries?

This way of open (and fair) play could give you some advantages in
serious situations later!

They want you as customer, but only if they're able to evaluate the
possible risks. This is understandable. But on this open play, i could
imagine, they have the chance to succor your business and probable are
able to explain to the officers, *before* they take your server off...

If the node operators claim to be white hats, wouldn't that be a good
way to obtain some serious understanding?

Just a thought.


Greets



Am Freitag, den 14.09.2007, 16:47 +0200 schrieb Ricky Fitz:
> Am Freitag, den 14.09.2007, 10:15 -0400 schrieb Wilfred L. Guerin:
> 
> > Your best option, in any case, is to test it! (maximal loss is 1 month
> > service fee?)
> 
> 3 months, but that's okay. Probably we should start a Wiki-Page with
> experiences about different Hosting-Provider?
> 
> Regards,
> Ricky.
-- 
BlueStar88 <BlueStar88 at Xenobite.eu>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Dies ist ein digital signierter Nachrichtenteil
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20070914/340df044/attachment.pgp>


More information about the tor-talk mailing list