Take a second and set up your computer to be a tor relay.
Take a second and set up your computer to be a tor relay
Other urls found in this thread:
eff.org
torproject.org
jordan-wright.com
forbes.com
github.com
twitter.com
No thanks.
>wanting the feds to show up at your house
Not an exit relay. A regular one. I've done it on every computer I've had for years.
>buy a vps using vpn
>set it up as tor relay
>feds show up at vps hosts' building and they don't even show up here
KEK
So that I can be held responsible when someone downloads childporn with me as an endpoint? Sounds like a great idea, thank you.
Already do. I also seed my torrents.
>relay
>endpoint
It doesn't work like that.
What for, OP?
Make the world a better place, user.
Internal onion addresses can probably be tracked to you with a lot of traffic going through.
Relays aren't onion address.
The traffic through relays is unreadable, even if you are on the system the traffic is going through.
There's really no risk to you being a relay. You're more at risk downloading a torrent.
Network packet analysis.
Encryption.
It's clear you've already made up your mind. I'm not going to try convince you, I just wish you'd known more about what you're talking about before you did.
retarded
How exactly does this tor relay work?
>For greater security, all Tor traffic passes through at least three relays before it reaches its destination. The first two relays aremiddle relayswhich receive traffic and pass it along to another relay. Middle relays add to the speed and robustness of the Tor network without making the owner of the relay look like the source of the traffic. Middle relays advertise their presence to the rest of the Tor network, so that any Tor user can connect to them. Even if a malicious user employs the Tor network to do something illegal, the IP address of a middle relay will not show up as the source of the traffic. That means a middle relay is generally safe to run in your home, in conjunction with other services, or on a computer with your personal files.
What is the default behaviour of tor? If woud run tor.exe will it became a relay or not?
>supporting a compromised service
>Take a second and get child porn routed through your network
>using tor
>when i2p exists
You sir, are a gentleman and a scholar.
The Tor project recommends you don't set up your home computers as relays.
You need to add ExitPolicy reject *:* to the config
That's just not true.
>That means a middle relay is generally safe to run in your home, in conjunction with other services, or on a computer with your personal files.
>Not an exit relay. A regular one.
How do I know which type I'm configuring my pc for?
I love you.
If you die today, you can be assured that at least one person in this selfish world has held true feelings of admiration and affection to you as a human being.
Also, I'd suck your dick.
Used a rasbpi as a tor relay for a few months until I killed it with a shitty power supply
how?
By selecting which type of relay to run when setting it up of course
First thing you do on new new install
alias agi='apt-get install'
then
agi tor
"No"
This 2bh fampai
>all users are automatically relays
>built in torrent, IRC, email clients
>literally no central point of failure
>development is done over i2p so devs aren't at risk of being targetted
lurker here
Are you implying tor has a central point of failure? Could you elaborate or give pointers?
Not him but...
Tor has a set of something like 8 directory authorities that catalog and serve information about the network.
If you were to DDoS them the Tor network would become inoperable after some time (a few hours or a day).
If you were to hack them you could fuck all kinds of shit up.
There are relatively few relays in Tor. It's possible for a large government entity to simply DDoS the entire network, at very minimal cost. i2p is entirely peer to peer. You would need to take down virtually every node in order to stop the network from operating
Also this
Most interesting, thanks.
Further reading if anybody else is curious:
jordan-wright.com
>Tor
>imperfect but full of stuff
>I2P
>very secure but barren wasteland
>barren wasteland
I hate that part.
There's this one russian i2p web hosting service that bans only the following
kiddie porn
drugs
And, in their own words
"jihad or islam"
Why does nobody use it?
a.) I'm scared, even of being a non-exit relay. Torrenting requires defending yourself from civilian copyright trolls that very much want to pick only easy targets. Big deal. Tor attracts the interest of three-letter agencies. I don't feel equipped to secure myself against that.
b.) The Tor project says on their website that they want a minimum of something like 250KB/s up and down at all times for a relay. I'm not sure I can commit that. Both because I want to make sure it doesn't slow down all the other things and other people on this internet connection, and because my ISP has implemented or threatened data caps in many ares.
Not him, but you are not responsible for what happens with your IP, since the Feds can't prove you are the one who used it. Same would apply to Tor, I imagine.
Damn, Tor shills are desperately shilling on inage boards right after the disinformation campaign on Jacob Appelbaum.
Is this you Isis Agora? Fuck your genders and all LGBT SJW fags in Tor.
I'm in the UK; given the Investigatory Powers Act is likely to pass with some disastrous terms, it would be irresponsible of me to choose to become a service provider under the terms of that Act and set up a Tor relay under my jurisdiction or control if I could be forced to log, or worse.
I do fund the largest organisation that offers independent Tor relays, bridges and outproxies. It's better that someone else does it.
No, you won't.
How did the UK manage to become such a dystopian nightmare police state in such a short span of time?
It was actually a very gradual change. It was done silently for year, and innocuously through political correctness campaigns. It's just got to the stage now where they don't have to hide it anymore.
the inevitable fate of a population that wants to be protected and taken care of more than they want liberty for themselves and others. Same thing is happening in the US.
You are a god among men.
>not in states
I just starting using tor
can I just go the market sites and look at them? or is going to those sites one of the last things you do after taking all the precautions?
He learnt it from takedownmam
the moment youre part of the relay its not compromised anymore :) are you dumb?
Short amount of time? Hardly.
Gradually. Shit's been ongoing since at least the 80s. The US is just as bad in many ways.
There are occasional successes; NO2ID were able to prevent compulsory identity cards.
We'll be completely fucked if the UKIP contingent votes to Leave the EU on Thursday, the Tories can do whatever they want with no meaningful oversight, and we can't even go to another EU country in Shengen because we'd need a visa.
Sure, great idea, let me just completely rape my uplink.
Idiot.
>bandwidth caps don't exist
A few drug markets moved there if that's what you mean people using it.
They also have a few forums like Tor. Tor's imageboards are down half the time or slow as shit so you're not really missing out on anything.
>short span
>the entirety of British history is a short span
Geoffrey Everyman has been at the mercy of the government in England since the dawn of England. Whether it be 1200 AD or 2020 AD, they've always been very authoritarian
Even if it's a non-exit relay stupid kikes still put your IP on blocklists and harass you with CAPTCHAs.
Are you okay? It sounds like you had a stroke.
No, that's not correct. I don't know why you'd make stuff up like that.
you cant analyze it when its encrypted to the max
It's more than that, you can't even know who is more than one step away from you in the chain.
I already did on my desktop at home :^)
Thank you
> Take a second and set up your computer to be a relay for various illegal activities.
No thank you.
lol no, unless you can somehow foil the encryption.
There was a guy who said that his bank blocked him because they were too stupid to differentiate between non-exit and exit nodes.
If you're using tor to go to websites yourself, yeah, lots of sites will make you do captchas or whatever. Try it yourself - open up tor browser and to Google, and you may get a warning that you're making too many searches. If you have a thousand people going through the same exit node, it can look like a suspicious amount of traffic to a bank.
Relays are different.
1. Your own traffic doesn't through your relay. A relay doesn't mean you're using tor to browse the web.
2. The traffic going through your relay never goes directly to anywhere on the web.
In short, there's no way a bank would block you for running a relay, or even know that you are running one.
You are retard
>Waking up to local police detectives pounding on one’s door is hardly an ideal way to start a morning but that’s what happened on Wednesday to a Seattle couple that hosts a Tor Exit node on their network.
>According to a spokesman for the SPD, the detectives were acting based on a tip to the NCMEC from the notorious website Sup Forums which had relayed to the center the IP address
forbes.com
This pedo network needs to die, why should I set a relay up?
>i2p
>slow like shit
>takes 10 minutes to launch
>no outproxy
>java
>eats all your ram and cpu
>onion have much more content then i2p
This thread is about relays, not exit nodes. Of course people running exit nodes will be raided. But relay traffic is heavily encrypted in and out.
Unless you're running a relay with unpublished IP address your IP is handed out to clients who use it to build connections. These lists are public, just like the list of exit nodes.
That's fine.
Bump rather dank thread
It is dank, isn't it.
Do you need to keep it connected all time? I cant afford the electricity bills
>java
literally never
reminder that you still can't possess lolicon in the UK
It's illegal to browse sad panda in the UK? kek
not necessarily; I believe you should just avoid viewing anything that could be risky.
I haven't used i2p since 2009/2010 or so, back then there was a pretty big torrenting community.
Has that changed?
I was mainly into it for weird and unusual ebooks.
>I was mainly into it for weird and unusual ebooks.
nice euphemism
Java's part of why I moved on from the project: it really is incredibly shit especially for this purpose, as I'd hoped we learned from Freenet. I believe that the people currently working on I2P are currently working on an I2P router in C, however.
Current new project status: redesign phase, still trying to unshit CMix to achieve global latency under 5000ms without trusted nodes
A pi uses less power than your router. In a civilized country that's about a dollar in electricity per month.
You'll go to heaven
everyone ignored the small negative changes
did you guys know of the i2p client in c++?
How does the tor browser differ from vanilla ESR besides adding addons that support tor and tweaking defaults in about:config? Does it strip out integration for bloatware and DRM shit, like Pocket and EME? I'm in the market for a trimmed down, possibly privacy enhanced firefox fork with reasonably fast security updates. I am most in hate with things like google analytics.
Were you an i2p developer?
I turn off my computer during night so no point in hosting a Tor relay.
I imagine a little is better than nothing
A downstairs club is hosting a tor exit node on a Raspi. They don't know they are. But they are. They are also seeding torrents Thats what you get for using default router passwords...
Even if they're using the default password, their WiFi is still technically 'secured' and not open.
Is that a misdemeanor or a felony?
If in the US, Theft of Services, probably a misdemeanor in most jurisdictions.
Using a "secured" system without authorization is bordering on CFAA territory.
Not sure what legal precedence there is in these types of cases.
Where i live, in order to keep a legally secured system you need to have a permit in order for it to be enforced.
You can have a password on your router, but if you don't have a permit and you get hacked your are on your own.
Where do you live, and why is that the law?
>tor exit node
>They don't know they are. But they are
Update us on when the FBI bust their doors down pls