On 1/8/13 10:40 PM, Moritz Bartl wrote:
I wrote a small incapable script [4] that visualizes how often a relay
is a fast relay over time. In its current form, it is not very
helpful, but slightly modified to output monthly overviews or just a
percentage figure per relay, it might already be
First of all, AFAIK, bridge relays act as entry guards, meaning they
*replace* the first step of your tor circuits, they don't extend them to 4
nodes. With that in mind you might be able to do this:
your client - bridge (obfuscated or not) - tor node B - tor node C -
whatever (clearnet /
Moritz Bartl:
Hi Micah,
On 08.01.2013 19:47, Micah Lee wrote:
FYI, I just discovered a VPS provider DigitalOcean, and they seem fine
with people running non-exit nodes:
Thanks for the hint. In general, I don't see why VPS providers would not
allow internal Tor relaying, and I would not
Hi
I want to share my experience with a hoster I discovered about a year
ago: https://serverastra.com/
I set up a non-exit relay in feburary 2012. They offer a VPS with
100Mbit unmetered traffic for about 15$/month. Here are the vnstat
stats: http://paste.scratchbook.ch/view/26af6ae0
Recently,
My experience with ServerAstra is that they will null-route your IP
address on reports of abuse. No notification to me, their customer.
This put me in the position on several occasions of noticing that my VPS
had been down for x days. It was only when opening a Support Ticket to
complain
On 1/9/2013 4:41 AM, Konstantinos Asimakis wrote:
First of all, AFAIK, bridge relays act as entry guards, meaning they
*replace* the first step of your tor circuits, they don't extend them
to 4 nodes. With that in mind you might be able to do this:
your client - bridge (obfuscated or not) -
On 1/9/2013 2:57 PM, Coyo wrote:
On 1/9/2013 4:41 AM, Konstantinos Asimakis wrote:
First of all, AFAIK, bridge relays act as entry guards, meaning they
*replace* the first step of your tor circuits, they don't extend them
to 4 nodes.
When I say entry guards i mean entry guards from the