-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 First of all, some informationa about the situation: http://frapedia.se/wiki/Information_in_English
I'm running two nodes in Finland, very restricted exit poliecies (googles ip's, scroogle, https, pops and imaps allowed). Circa 90% of traffic originating from Finland and going outside of Finland is routed through Sweden (that bites a lot). As Swedish FRA is listening, logging, building "sosiograms" and trying to decrypt all traffic going through their borders should I be worried about my exit nodes? Should I do something about exit-policies? Encryption does protect the data but it does not protect from tracking who is in connection with who. As I run exit-nodes that routes traffic about 2Mb/s/2Mb/s - 10Mb/s/10Mb/s and 4Mb/s/4Mb/s I'm getting my fair share of tor's traffic. So.. FRA is building a nice file of my ip and thinks that everything coming from tor is really traffic originated by me. M ps: as always, sorry for my bad "fenno-english". -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFIa03KeaKwdrf2V0oRAgXVAJ0c9Ol4QEBh0pDlvSZuqEyj1PcvwgCdFEZk SDJ+5atghs8tD6glpcGmz3E= =iTXG -----END PGP SIGNATURE-----