Except that running a *relay* (not an *exit node*) is entirely different and
entirely safe. You're not dealing with anyone's unencrypted data, just acting
as an encrypted pass through. As far as anyone can tell, you're (in essence)
streaming a bunch of data over SSL.
On Tue 19 March 2013 20:20:02 Michael Butash wrote:
> Using tor is one thing for anonymizing yourself outwardly, but running
> as a router is another. I'd not act as a router, or a proxy for anyone
> from anywhere connection-wise with my name on it, or anyone that even
> knows of me lest I ignite some penchant for lawful destruction of my
> life. ISP's are bound to record this for legal purposes, if they're at
> all interested in continued existence.
>
> Your mac address binding to a given dhcp IP address, bound to a given
> modem serial/mac, provisioned to your account, bound to your house, and
> payment info means that's where they go first when that IP does
> something naughty and someone tells, and this info is often kept
> indefinitely.
>
> That can be running a tor router, leaving your wifi unprotected, or
> someone stealing an unlocked cell phone with data.
>
> -mb
>
> On 03/18/2013 04:08 PM, Derek Trotter wrote:
> > In the story above, a man ended up in trouble when cops found out
> > his ip address was used for accessing child porn. It was someone on
> > tor, but the cops went looking for him first.
>
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.phxlinux.org/mailman/listinfo/plug-discuss
--
Ryan Rix
http://rix.si
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.phxlinux.org
To subscribe, unsubscribe, or to change your mail settings:
http://lists.phxlinux.org/mailman/listinfo/plug-discuss