Hacker News new | past | comments | ask | show | jobs | submit login

If you're going to run a Tor node at home make it a relay, not an exit. There is practically no risk to running a relay. Exits have risk because of situations like this.

If you want to run exit nodes use a hosted server. It separates it from your normal traffic and makes it clear that it has a specific purpose.




You'll also get the occasional website that blocks or reduces services for you because they (or their IP reputation provider) doesn't understand Tor and grabs the entire list of relays.

Notably, BrightCloud (Webroot) is such an ill-informed provider, and Dan's DNS blocklist offers both exit and relay lists (the latter is an attractive nuisance). Care2 is a consumer that blocks intermediate relays, although only on their http: traffic, not https:. (I'm guessing their SSL termination proxy messes up their IP detection!)

The odd thing is that the Tor Project provides an easy to parse, up-to-date list of exits (https://check.torproject.org/exit-addresses) but these providers go to a lot of trouble to harvest bad data themselves.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: