Exit node connection statistics

coderman coderman at gmail.com
Mon Jul 14 18:03:03 UTC 2008


On Mon, Jul 14, 2008 at 8:43 AM,  <mplsfox02 at sneakemail.com> wrote:
>
>... do you blindly trust all other Tor operators until they show some
> "bad" behaviour?
>
> [that's] nothing but security by obscurity.

this is why use of SSL/TLS over Tor is so strongly encouraged.


> Can you explain what the threat scenario is for what I'm doing?
> ...
> I'm not argument-resistant. So tell me your views.

the strongest argument is not for the privacy of those who exit your
node, but your own personal liability for knowing what exits your
node.  see the Tor Legal FAQ:

https://www.torproject.org/eff/tor-legal-faq.html.en
"""
Should I snoop on the plaintext that exits through my Tor relay?

No. You may be technically capable of modifying the Tor source code or
installing additional software to monitor or log plaintext that exits
your node. However, Tor relay operators in the U.S. can create legal
and possibly even criminal liability for themselves under state or
federal wiretap laws if they affirmatively monitor, log, or disclose
Tor users' communications, while non-U.S. operators may be subject to
similar laws. Do not examine the contents of anyone's communications
without first talking to a lawyer.
"""

best regards,



More information about the tor-talk mailing list