[tor-talk] Innocent Seattle Exit Operators And Privacy Advocates Raided

Phil Mocek phil-lists at mocek.org
Tue Apr 5 23:23:43 UTC 2016


On 04/04/2016 03:13 AM, Roger Dingledine wrote:
> On Mon, Apr 04, 2016 at 12:04:44AM -0400, krishna e bera wrote:
> > Somewhere is a piece of advice from TorProject recommending people
> > not to run an exit node from home for the above and other reasons.
> 
> Actually it's EFF's Tor legal faq:
> https://www.torproject.org/eff/tor-legal-faq
> ("Should I run an exit relay from my home?")

That entry doesn't cite "above and other reasons," but only one
reason for refraining from running an exit relay from one's home:
risk of police seizing hardware:

    Q: Should I run an exit relay from my home?

    A: No. If law enforcement becomes interested in traffic from
    your exit relay, it's possible that officers will seize your
    computer. For that reason, it's best not to run your exit
    relay in your home or using your home Internet connection.

This leaves one to wonder if preparation for such potential
seizure, such as isolation of "your computer" on which the exit
runs from other computer hardware effectively satisfies EFF's
objection to running an exit at home.

-- 
Phil Mocek
https://mocek.org
-- 
Phil Mocek
https://mocek.org

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20160405/bee6184b/attachment.sig>


More information about the tor-talk mailing list