← Back to context

Comment by TZubiri

10 hours ago

If you are on the other team, this is also a good list if you want to avoid bad neighbors.

Hosts that don't ban tor nodes probably don't have a great reputation.

Not to mention, why on earth would I ever operate a TOR relay or exit node on my home internet connection? Maybe if I could guarantee that it could only be used by journalists or political dissidents, but everything else? No.

I don't need the authorities at my door every few weeks wondering why some of the most deplorable internet traffic of all time is coming from my house.

  • Relay nodes don't pose much risk and help mask/blend your own Tor traffic.

    • I agree with the concept. I should not be liable for the actions of others. If someone does something nefarious using my exit node (or the free wifi at my coffee shop) then that shouldn't be my responsibility.

      After all, I have no way of knowing what they're up to. It may be good or it may be bad; I can't know. (I suppose I can set up a router to discard packets with the RFC 3514 evil bit set, as a show of good faith, but...)

      So I think the risk should be low, but that's just, like, my opinion, man. My opinion doesn't mean that the risk is in fact low.

      Has the risk of running an exit node ever been tested in court? Many people, myself included, simply can't afford to have that kind of experience even if we're reasonably sure that it will end up OK.

      7 replies →

I think the hosts that Tor recommends against because there are already so many nodes hosted on them like OVH and Hetzner are perfectly happy with their (quite good) reputations.

I've run a personal mailserver from one of the "Don't use these ASN/Companies because there are already too many tor nodes" VPS hosts for 14 years (and going). They've had excellent service, I never had a problem with my neighbors on the shared hardware, and my mail deliverability rate has been on par with other services. Just one data point for you.