TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Operating a Tor Relay

193 pointsby presiozoalmost 5 years ago

9 comments

seven4almost 5 years ago
I often wonder what incentives drive people to run TOR exit nodes; the risk even if remote of getting raided is enough to stop most I&#x27;d imagine. Got me thinking on the legal implications and interestingly TOR doesn&#x27;t recommend running an exit node at home -<p>Found this FAQ quite interesting <a href="https:&#x2F;&#x2F;2019.www.torproject.org&#x2F;eff&#x2F;tor-legal-faq.html.en" rel="nofollow">https:&#x2F;&#x2F;2019.www.torproject.org&#x2F;eff&#x2F;tor-legal-faq.html.en</a><p>Particularly<p>~<i>Has anyone ever been sued or prosecuted for running Tor?</i> No, we aren&#x27;t aware of anyone being sued or prosecuted in the United States just for running a Tor relay. Further, we believe that running a Tor relay — including an exit relay that allows people to anonymously send and receive traffic — is legal under U.S. law.<p>~<i>Should I run an exit relay from my home?</i> No. If law enforcement becomes interested in traffic from your exit relay, it&#x27;s possible that officers will seize your computer. For that reason, it&#x27;s best not to run your exit relay in your home or using your home Internet connection.
评论 #23548306 未加载
评论 #23549872 未加载
评论 #23548532 未加载
评论 #23549224 未加载
评论 #23548359 未加载
评论 #23548485 未加载
评论 #23549469 未加载
评论 #23557637 未加载
评论 #23551262 未加载
praptakalmost 5 years ago
I have doubts about running a relay on a VPS, or on any other machine that I don&#x27;t physically control for that matter.<p>Tor security relies on multiple nodes being hard to seize synchronously. This property goes away if the majority of people run their nodes as virtual machines on infrastructure provided by a few cloud providers.
评论 #23549881 未加载
评论 #23549465 未加载
评论 #23548571 未加载
traspleralmost 5 years ago
I have run a relay&#x2F;entry node at home for a while, just to figure out how all of this worked and with symmetrical gigabit I have bandwidth to spare.<p>The network never promoted my node to an entry but it operated as a relay.<p>One thing I noticed that my IP must have suddenly been in some lists. I can&#x27;t prove it but on multiple forums my IP was blacklisted an I had issues accessing some services from telco providers. Never had these issues before and never again after I stopped running the relay... maybe I&#x27;m just paranoid.
评论 #23552513 未加载
评论 #23552176 未加载
simonpurealmost 5 years ago
Another interesting project I&#x27;ve learned about recently is Snowflake [0] using WebRTC datachannels to use the browser as a proxy to help with additional entry nodes. Technical details are at [1].<p>I have no experience using it for any extended period of time so use at your own risk.<p>[0] <a href="https:&#x2F;&#x2F;snowflake.torproject.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;snowflake.torproject.org&#x2F;</a> [1] <a href="https:&#x2F;&#x2F;trac.torproject.org&#x2F;projects&#x2F;tor&#x2F;wiki&#x2F;doc&#x2F;Snowflake" rel="nofollow">https:&#x2F;&#x2F;trac.torproject.org&#x2F;projects&#x2F;tor&#x2F;wiki&#x2F;doc&#x2F;Snowflake</a>
john4532452almost 5 years ago
The screen shot at the bottom of the post is an i3 window manager with title bar hidden. Did not knew titlebar can be hidden in i3 window manager. Its 2 line configuration <a href="https:&#x2F;&#x2F;gist.github.com&#x2F;lirenlin&#x2F;9892945" rel="nofollow">https:&#x2F;&#x2F;gist.github.com&#x2F;lirenlin&#x2F;9892945</a>.
评论 #23549899 未加载
评论 #23552239 未加载
walrus01almost 5 years ago
Why you need balls of steel to operate a tor exit node: <a href="https:&#x2F;&#x2F;lists.torproject.org&#x2F;pipermail&#x2F;tor-talk&#x2F;2009-September&#x2F;019511.html" rel="nofollow">https:&#x2F;&#x2F;lists.torproject.org&#x2F;pipermail&#x2F;tor-talk&#x2F;2009-Septemb...</a><p>Why you need balls of steel to operate a Tor exit node<p>By calumog<p>I became interested in Tor in the spring of 2007 after reading about the situation in Burma and felt that I would like to do something, anything, to help. As a geek and lover of the internet it seemed the best thing I could do was to run Tor as an exit node to allow those under jurisdictions that censor the internet free access to the information they need. I had a lot of unused bandwidth and it seemed like a philanthropic use of it to donate that to Tor.<p>Tor is a system of anonymizing proxy servers which allows you to visit resources on the web, not just web sites, without revealing your ip address. This is extremely useful for those who are compromised in their access to the internet because it means, rather than attempting to connect directly to the resource in question, say Wikipedia, which might be filtered by their government, they connect to a Tor relay which ultimately routes the request to the resource in question via an exit node. Exit nodes are special kinds of relays which proffer the request on behalf of the original client revealing their ip address, not that of the original requestor, to the destination resource. I sometimes imagine how exciting it must be for soemone in Burma, say, or China, to load up Tor and browse to a web site they have never been able to see before. And to know that there is nothing, nothing, that reveals who it really is who is visiting.<p>I totally believe in Tor. I think it is a magnificent force for the circumvention of internet censorship but there is a problem. I was visited by the police in November 2008 because my ip address had turned up in the server logs of a site offering, or perhaps trading in (I was not told the details of the offence) indecent images of children. The date of the offence was about one month after I started the server so it looks as though the site in question had been under surveillance for more than a year. It was what is known as a ‘dawn raid’ and, amazingly enough, my children were still asleep when it occured. Thank God. I explained to the officers, who we had heard threatening to break the door down before we let them in, about Tor but they had never heard of it. My wife says she thinks they were about to arrest me before that. I was not arrested. I was told not to touch the computer and it was placed, considerately, in a black plastic bag and taken away for forensic examination. I was OK at first. I knew that somebody had gone through my server to access that material and that I was not guilty of any offence but as the weeks wore on it started to get to me.<p>I was overwhelmed by horror to be implicated in such a thing. I was desperately worried about my family. One of the officers had told my wife that Social Services would be informed as a matter of course and there was a possibility that my children would be taken into care. The low point came about two weeks after the visit by the police when I totalled my car. I was distracted, stressed and unable to accurately assess the road conditions. I ploughed into a hedgerow at speed, destroying the car which we had just bought, but, luckily, walked out of it with only bruised ribs. I didn’t have the money to hire a lawyer so I just sat the thing out. From time to time the police called with an estimate of when the investigation would be finished but none of that meant very much because those dates came and passed with no resolution.<p>Eventually, four months after the visit, I picked up a voice message from the police inviting me to call back. When I called I was told that no evidence had been retrieved and the machine would be returned to me. I think, in retrospect, I was desperately naive to run a Tor exit server on a home computer but I didn’t believe that an ip address in a server log would be enough evidence to warrant seizing equipment. My wife, God bless her, was absolutely marvellous throughout the whole thing and never doubted me. I have read with interest about the need to make Tor faster and that that largely depends on having more nodes but there is no way I can contemplate offering my ip address as a service to internet anonymity any more. It was very frightening for me to be implicated in a serious crime. As a parent of very young children I have an extensive network of friends and contacts in my neighbourhood who also have children. As we know the subject of paedophilia is not one that can be debated with any rationality at all in the UK. It is surrounded by hysteria. I was terrified that people would find out that my computer had been taken because of that – ‘no smoke without fire’. I don’t know what can be done about any of this. To my mind running an exit node is extremely high risk. I think Tor is important but I don’t have any ideas about how to support it at the moment.
评论 #23552193 未加载
评论 #23551418 未加载
john4532452almost 5 years ago
I have a lot of bandwidth but don&#x27;t want to spend money on hosting. Has anyone successfully hosted on rasberry pi ?
评论 #23551541 未加载
评论 #23549950 未加载
评论 #23552543 未加载
jrwralmost 5 years ago
I ran a exit relay outbound over a VPN Tunnel for its internet access, I was mostly just interested in what kind of traffic people are doing. (Its one of the downfalls of Tor, the Exit Nodes are prone to sniffing) and the sheer amount of porn was amazing.
评论 #23552560 未加载
ed25519FUUUalmost 5 years ago
Tor is a project I <i>want</i> to like and support, but can’t. I feel (and I have no evidence) that for every 1 person using it to protect their privacy, 20 are using it for despicable purposes. I would love to be proved wrong on this.<p>I don’t want to shut it down, but at the same time I don’t feel I can personally or technically support it.
评论 #23548365 未加载
评论 #23548358 未加载
评论 #23548372 未加载
评论 #23548294 未加载
评论 #23548421 未加载
评论 #23549764 未加载
评论 #23548680 未加载
评论 #23548874 未加载
评论 #23549529 未加载
评论 #23554319 未加载
评论 #23555182 未加载
评论 #23548396 未加载
评论 #23548970 未加载
评论 #23548530 未加载
评论 #23548492 未加载