How to run an exit node and not getting raided by police?
schaedpq2 at gmx.de
Sun Jan 27 09:30:21 UTC 2008
> How to avoid that nasty raid (at you home) and that oh so sweet paranoid
> feeling after that? Any ideas?
> Running exit node on computer that is physically located at some ISP's
> server farm?
Well, that is probably better than running it at home. But there were cases in
germany, when they came anyway to the home of the node admin and took the
personal hardware away in addition to the hostet server.
The lawyer of the CCC reported, they they even asked his bank about him
several times, although he is not the admin or registered contact for the
server, but only pays the bills for the machine.
> Renting a server from a different country, maybe a whole different
> continent and running exit node there? If you live in Europe and your
> country belongs to EU then maybe outside of EU? What would be a "good"
> country? How about service providers? - Maybe a good idea?
If you can afford it and can pay anonymously, that is definitely a good idea. ;-)
> PTR records (reverse dns)? Ip that translates to something like
> proxy.domain.com or tor-proxy.domain.com? Are the cops smart enough? Do
> they care? (I don't personally think that they care or understand.)
Well, I think, it helps a bit. Probably you should also run a web server on
port 80 on the node and have some disclaimer page with explanations of Tor an
anonymizers and an abuse contact on the page. The CCC reported, that it helped
> Running a exit node on computer owned by some "civilrights group"?
Yes, that is also a very good idea. There are some groups in germany (CCC,
Foebud, some others) which run quite big exit nodes. They have a an abuse
contact on a dedicated phone, email address, a laywer who takes over in case
of problems and so on.
If you fear problems with an own exit node, it may be a good idea to donate
money to these organizations (for this dedicated purpose) and run a middle-man
Ah, if you understand german, than you can watch and listen to a presentation
on the CCCongress 2007, where the people running CCCs anonymizers reported
about their experiences with law enforcement during the last 2 years:
More information about the tor-talk