New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
Or you could just go to http://torstatus.blutmagie.de/ for a full list.
Yeah @rm_, if you sort this list by ASName. So, OVH has the most exit nodes, maybe OVH is your choice ..
It is easy enough to register and help update and keep the wiki page current. Please do if you can.
Suggestion, don't waste your time with it. Don't get into trouble. I have yet to see someone who's intention of using or doing TOR are not suspicious.
Maybe it depends on how you define suspicious. I use it for all sorts of benign web browsing, especially when traveling on random unsecure networks. II know lots of people who use it for reasons of enhancing privacy as well. Extrapolating your limited experience and perspection onto the world of Tor and its many legitimate users won't fit. Yes there is a lot of junk and suspicious things that go through Tor, especially when hidden services are factored in, but isn't that also true of the Internet as a general rule?
People who run Tor nodes have heard this type of advice before, and they decided that Tor does more good than harm, by enough that they're willing to deal with hassle for it (especially exit node ops). For example, many major news outlets now accept news tips through SecureDrop (securedrop.org) as a way of maintaining source confidentiality via Tor.
Tor operators are generally well-informed so you haven't told them anything they haven't already considered and rejected. If you've got some new info or analysis to bring, that's great, but I'd have to say what you posted above is shallow and unhelpful.
I can't help but feel that this says more about you than about Tor users.
I had somewhat similar feelings until I sat down and spent some time with it. Watched the Snowden movie and re-watched Citizenfour recently.. I just realized I don't want to hand over everything about myself on a silver platter.
My ISP doesn't need to know about my browsing habits and have a nice catalogue of all the clearnet stuff I view, so most stuff goes over VPN/Socks proxy/whatever. Only thing I use clearnet traffic for is basically paying bills and a few things that will freak out if I use a random IP.
Also made me re-think some things for my own sites/projects, such as making sure everything uses SSL. I don't host anything sketchy, but for people viewing over Tor there's a good chance (almost a guarantee) every exit node is monitored and don't want to make it any easier for someone to sniff clearnet traffic - even if it's to a silly site about tech stuff.
I'm running a few middle relays now myself and will continue to wherever I can get cheap bandwidth (that isn't at one of the big cheap traffic providers that are inundated with relays and exits) and not in France/NL/Germany. I'm not ballsy enough to run an exit node, so I think I'm just going to donate to the project itself and some groups that provide exits - will let the pros handle that stuff.
To any of the well versed in Tor - who should I give money to?
In the Swoden movie they make a few claims that the government has numerous Tor exploits :P
(I mean, lets be real, probably?)
If the NSA wants you, they're gonna get you.. one way or another. They're gonna be real pissed when they find out my encrypted traffic is just me looking at dank memes, doing random (sometimes embarrassing) Google searches and searching for torrents of shitty movies :P
http://pauperhosting.nl
You might want to update https://trac.torproject.org/projects/tor/wiki/doc/ISPCorrespondence with a Leaseweb entry for likeminded people.
Exactly, that's why I always laughed whenever I hear about those spy conspiracy theories or invasion into privacy...what is actually "protecting" us is not TOR nor VPN or any sort of BS like that...it is the fact that we (as 99.999999999999999% of people on LET) are just simply "not important enough" for the authorities to care about us.
The governments, be it US, UK, China, NK, don't care if you sent a love letter to your loved ones, nor they care about what you watched yesterday, they only step in if you are considered as a threat to their governments, which none of us are (I hope).
Conspiracy theories? You've been living under a rock or inside a cave in the last years?
Theories or realities...it doesn't matter
That's right! The problem is that surveillance is so pervasive now that they spy on everyone, whether they care about the person or not. So even though they don't care about you, their automated systems monitor you anyway, and save the data forever. Disk drives are cheap after all.
Then decades later maybe you do something that makes them care (like become a big CEO or run for office, or simply write a blog post critical of President Palin). That's when they retrieve the surveillance data and see what kind of dirt they can find. Don't think they'll have the manpower to search decades of recordings by hand? By then they'll have AI that can do it with a click of a button.
So it's best to avoid the surveillance if you can, even if you're currently a nobody.
Maybe ask @William what hell of a nice idea that is!
Well, there are probably only a handful of DC's that will actually stand behind or rather in front of you if you run exits and the equipment is seized and they are not cheap, no one is going to be your bullet proof shield for a couple of bucks, so you might was well either run them from home or run them where ever you want and sign up with completely fake details using BTC.
People usually believe they can hide behind these protocols. False sense.
Actually, Tor is very useful and practical for people in 3rd world countries and those living under oppressive regimes, as these economies simply do not have the budget or know-how to counter VPN/Tor encrypted traffic.
Most underdeveloped countries are still left with capturing insecure HTTP packets and SMS/phone calls.
90% of tor traffic is torrents, webporn and childporn. But the last 10% might very well be journalist and bloggers in oppressed countries. Even for the <10% it would be worth to keep tor running, but I do not wish to deal with a terrorist/cp subpoenas which you eventually WILL get for running an exit. Relays and bridges in other hand are much safer to operate.
Make sure to read in detail any hosting providers TOS to ensure you are not in violation. I think you will be hard pressed to find anyone who would accept to host tor.
imo, any technology which enhances online privacy should be supported .. unfortunately for Tor, its origin as US Naval Research project means that there will always be a question mark over whether its mathematical foundation and algorithms have been compromised by NSA, GCHQ, etc.
so, use Tor by all means but don't assume it will shield your online activities from certain nation state agencies ,,,
I don't think there is much mystery about the mathematical foundation and algorithms. What's not known is how many of the nodes are owned or compromised by those agencies. If that number is high enough, they can track everything going through the network.
Oh, goodness, no. For that 10% it is worth designing a better system to allow a similar form of communication, but without the flaw of allowing the other 90% to abuse the world at will. It strikes me as being very much like a DDoS problem; it will likely have a similar solution.