mick: > On Tue, 28 Jan 2014 19:02:32 +0000 > Paul Blakeman <blakey...@mac.com> allegedly wrote: > > > > > SO… > > Can using a Tor relay result in your IP getting a “bad” flag? > > Yes. Running a Tor node on an IP address you share with your domestic > usage can result in you being unable to reach sites which blacklist Tor > nodes. This sometimes only happens with exit nodes, but some site > operators are even more draconian than others and just block all Tor > IPs. This can be particularly unfortunate if the site in question is > your bank.
This is correct, *if* you are running a Tor relay (even a non-exit). And unfortunate. > > Is there anyway of running a relay where you “hide” your IP? > > No. Tor relay IP addresses have to be visible to be reachable. This is not fully correct. You can run your Tor relay as a Tor Bridge, in which case its IP is not visible in the public node directory. We only hand it out to people who solve a captcha on https://bridges.torproject.org/bridges We're also looking for people to run Obfsproxy bridges, which are also unlisted but additionally obscure their traffic so the traffic does not look like a Tor. As far as I know, we don't provide packages for this yet, but if you are technically inclined, you can set one up manually on Linux by following these instructions: https://www.torproject.org/projects/obfsproxy-instructions.html.en#instructions -- Mike Perry
signature.asc
Description: Digital signature
_______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays