Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Where to put a Tor Exit node? - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Where to put a Tor Exit node?

2»

Comments

  • rm_rm_ IPv6 Advocate, Veteran

    Pop open ipinfo.io in Tor browser, repeatedly hit 'New Tor circuit for this site' - will give you a ton of friendly ASNs.

    Or you could just go to http://torstatus.blutmagie.de/ for a full list.

    Thanked by 1deadbeef
  • Yeah @rm_, if you sort this list by ASName. So, OVH has the most exit nodes, maybe OVH is your choice ..

  • @wi8UJvavk6 said:
    That page is useless. There's no way it can stay current with the multitude of ISP and their changing policies. Look at the dates on some of those entries.

    It is easy enough to register and help update and keep the wiki page current. Please do if you can.

  • Suggestion, don't waste your time with it. Don't get into trouble. I have yet to see someone who's intention of using or doing TOR are not suspicious.

    Thanked by 1doughmanes
  • @Hxxx said:
    Suggestion, don't waste your time with it. Don't get into trouble. I have yet to see someone who's intention of using or doing TOR are not suspicious.

    Maybe it depends on how you define suspicious. I use it for all sorts of benign web browsing, especially when traveling on random unsecure networks. II know lots of people who use it for reasons of enhancing privacy as well. Extrapolating your limited experience and perspection onto the world of Tor and its many legitimate users won't fit. Yes there is a lot of junk and suspicious things that go through Tor, especially when hidden services are factored in, but isn't that also true of the Internet as a general rule?

    Thanked by 1willie
  • @Hxxx said:
    Suggestion, don't waste your time with it. Don't get into trouble. I have yet to see someone who's intention of using or doing TOR are not suspicious.

    People who run Tor nodes have heard this type of advice before, and they decided that Tor does more good than harm, by enough that they're willing to deal with hassle for it (especially exit node ops). For example, many major news outlets now accept news tips through SecureDrop (securedrop.org) as a way of maintaining source confidentiality via Tor.

    Tor operators are generally well-informed so you haven't told them anything they haven't already considered and rejected. If you've got some new info or analysis to bring, that's great, but I'd have to say what you posted above is shallow and unhelpful.

    Thanked by 1mik997
  • joepie91joepie91 Member, Patron Provider

    Hxxx said: I have yet to see someone who's intention of using or doing TOR are not suspicious.

    I can't help but feel that this says more about you than about Tor users.

  • HarambeHarambe Member, Host Rep
    edited December 2016

    @Hxxx said:
    Suggestion, don't waste your time with it. Don't get into trouble. I have yet to see someone who's intention of using or doing TOR are not suspicious.

    I had somewhat similar feelings until I sat down and spent some time with it. Watched the Snowden movie and re-watched Citizenfour recently.. I just realized I don't want to hand over everything about myself on a silver platter.

    My ISP doesn't need to know about my browsing habits and have a nice catalogue of all the clearnet stuff I view, so most stuff goes over VPN/Socks proxy/whatever. Only thing I use clearnet traffic for is basically paying bills and a few things that will freak out if I use a random IP.

    Also made me re-think some things for my own sites/projects, such as making sure everything uses SSL. I don't host anything sketchy, but for people viewing over Tor there's a good chance (almost a guarantee) every exit node is monitored and don't want to make it any easier for someone to sniff clearnet traffic - even if it's to a silly site about tech stuff.

    I'm running a few middle relays now myself and will continue to wherever I can get cheap bandwidth (that isn't at one of the big cheap traffic providers that are inundated with relays and exits) and not in France/NL/Germany. I'm not ballsy enough to run an exit node, so I think I'm just going to donate to the project itself and some groups that provide exits - will let the pros handle that stuff.

    To any of the well versed in Tor - who should I give money to?

    Thanked by 1mik997
  • MikeAMikeA Member, Patron Provider
    edited December 2016

    @Harambe said:
    Watched the Snowden movie and re-watched Citizenfour recently.. I just realized I don't want to hand over everything about myself on a silver platter.

    In the Swoden movie they make a few claims that the government has numerous Tor exploits :P

    (I mean, lets be real, probably?)

    Thanked by 1KillaKev
  • HarambeHarambe Member, Host Rep

    @MikeA said:

    @Harambe said:
    Watched the Snowden movie and re-watched Citizenfour recently.. I just realized I don't want to hand over everything about myself on a silver platter.

    In the Swoden movie they make a few claims that the government has numerous Tor exploits :P

    (I mean, lets be real, probably?)

    If the NSA wants you, they're gonna get you.. one way or another. They're gonna be real pissed when they find out my encrypted traffic is just me looking at dank memes, doing random (sometimes embarrassing) Google searches and searching for torrents of shitty movies :P

  • @Harambe said:

    @beardlyness said:

    Can I get legitimate suggestions..

    http://summerhost.biz/

    http://pauperhosting.nl

  • edited December 2016

    @beardlyness said:

    @sin said:

    beardlyness said: Thanks for this. We already had a node from Trabia but didn't get a lot of bandwidth so had to drop it.

    Oh okay, what about Leaseweb Netherlands? Their abuse system is pretty much automatic so as long as you reply you should be alright (they're listed on https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs too)

    -edit- nevermind saw you said you've been with most of the popular providers so I'm sure you have tried them already then

    Thank you for this. If you find a good deal from Leaseweb let us know. We've personally been in contact with them, and they've given us the "green light" on all of their locations. Correctly we've only got their German location up. But if they have some good deals we'll get another local from them.

    Thanks,

    You might want to update https://trac.torproject.org/projects/tor/wiki/doc/ISPCorrespondence with a Leaseweb entry for likeminded people.

  • @Harambe said:

    @MikeA said:

    @Harambe said:
    Watched the Snowden movie and re-watched Citizenfour recently.. I just realized I don't want to hand over everything about myself on a silver platter.

    In the Swoden movie they make a few claims that the government has numerous Tor exploits :P

    (I mean, lets be real, probably?)

    If the NSA wants you, they're gonna get you.. one way or another. They're gonna be real pissed when they find out my encrypted traffic is just me looking at dank memes, doing random (sometimes embarrassing) Google searches and searching for torrents of shitty movies :P

    Exactly, that's why I always laughed whenever I hear about those spy conspiracy theories or invasion into privacy...what is actually "protecting" us is not TOR nor VPN or any sort of BS like that...it is the fact that we (as 99.999999999999999% of people on LET) are just simply "not important enough" for the authorities to care about us.

    The governments, be it US, UK, China, NK, don't care if you sent a love letter to your loved ones, nor they care about what you watched yesterday, they only step in if you are considered as a threat to their governments, which none of us are (I hope).

  • @spammy said:
    spy conspiracy theories

    Conspiracy theories? You've been living under a rock or inside a cave in the last years?

    Thanked by 1vimalware
  • @deadbeef said:

    @spammy said:
    spy conspiracy theories

    Conspiracy theories? You've been living under a rock or inside a cave in the last years?

    Theories or realities...it doesn't matter

  • williewillie Member
    edited December 2016

    spammy said: The governments, be it US, UK, China, NK, don't care if you sent a love letter to your loved ones, nor they care about what you watched yesterday,

    That's right! The problem is that surveillance is so pervasive now that they spy on everyone, whether they care about the person or not. So even though they don't care about you, their automated systems monitor you anyway, and save the data forever. Disk drives are cheap after all.

    Then decades later maybe you do something that makes them care (like become a big CEO or run for office, or simply write a blog post critical of President Palin). That's when they retrieve the surveillance data and see what kind of dirt they can find. Don't think they'll have the manpower to search decades of recordings by hand? By then they'll have AI that can do it with a click of a button.

    So it's best to avoid the surveillance if you can, even if you're currently a nobody.

    Thanked by 1netomx
  • @AnthonySmith said:
    Why not just get a 2 or 3 good fiber/dsl lines in at home and run them there?

    Maybe ask @William what hell of a nice idea that is! :D

    Thanked by 1netomx
  • AnthonySmithAnthonySmith Member, Patron Provider
    edited December 2016

    Bochi said: Maybe ask @William what hell of a nice idea that is! :D

    Well, there are probably only a handful of DC's that will actually stand behind or rather in front of you if you run exits and the equipment is seized and they are not cheap, no one is going to be your bullet proof shield for a couple of bucks, so you might was well either run them from home or run them where ever you want and sign up with completely fake details using BTC.

    Thanked by 2Hxxx netomx
  • HxxxHxxx Member
    edited December 2016

    People usually believe they can hide behind these protocols. False sense.

    Thanked by 1ricardo
  • Actually, Tor is very useful and practical for people in 3rd world countries and those living under oppressive regimes, as these economies simply do not have the budget or know-how to counter VPN/Tor encrypted traffic.

    Most underdeveloped countries are still left with capturing insecure HTTP packets and SMS/phone calls.

  • 90% of tor traffic is torrents, webporn and childporn. But the last 10% might very well be journalist and bloggers in oppressed countries. Even for the <10% it would be worth to keep tor running, but I do not wish to deal with a terrorist/cp subpoenas which you eventually WILL get for running an exit. Relays and bridges in other hand are much safer to operate.

  • oneilonlineoneilonline Member, Host Rep

    Make sure to read in detail any hosting providers TOS to ensure you are not in violation. I think you will be hard pressed to find anyone who would accept to host tor.

  • imo, any technology which enhances online privacy should be supported .. unfortunately for Tor, its origin as US Naval Research project means that there will always be a question mark over whether its mathematical foundation and algorithms have been compromised by NSA, GCHQ, etc.

    so, use Tor by all means but don't assume it will shield your online activities from certain nation state agencies ,,,

  • williewillie Member
    edited December 2016

    mik997 said: origin as US Naval Research project means that there will always be a question mark over whether its mathematical foundation and algorithms have been compromised by NSA, GCHQ, etc.

    I don't think there is much mystery about the mathematical foundation and algorithms. What's not known is how many of the nodes are owned or compromised by those agencies. If that number is high enough, they can track everything going through the network.

  • @stefeman said:
    Even for the <10% it would be worth to keep tor running,

    Oh, goodness, no. For that 10% it is worth designing a better system to allow a similar form of communication, but without the flaw of allowing the other 90% to abuse the world at will. It strikes me as being very much like a DDoS problem; it will likely have a similar solution.

Sign In or Register to comment.