Hacker News new | past | comments | ask | show | jobs | submit login

Can just anybody still run an exit node?



In some democratic countries you are responsible for everything that gets out of your exit node.


I think, yes, in theory. But your node will not receive general public traffic until it has demonstrated uptime, bandwidth, etc.


So the network designed to prevent snooping really doesn't.

It just limits snooping to actors with the time and resources to do it on a large enough scale to capture what they are looking for.

What percentage of exit nodes are run by spy agencies and other snoops? Does anyone really know?


> What percentage of exit nodes are run by spy agencies and other snoops? Does anyone really know?

Most of them. The cost to operate top-bandwidth nodes are estimated at least five figures per month. Thankfully the Tor design spec explicitely calls out government panopticons as being squarely outside the threat model. So, adjust your infosec policy accordingly.


I run one of the bigger Tor relay families [0] with around 3.5% of the exit bandwidth [1]. Hosting high bw stuff is actually pretty cheap if you stay away from the cloud. I don't pay five figures per month for all these relays it's less than 1k$. For the actual question there was a big attacker uncovered in 2021 [2] and removed from the network. I'm pretty sure there are still malicious relays on the network the hard part is to know which.

[0] https://metrics.torproject.org/rs.html#search/family:C466C9A...

[1] https://nusenu.github.io/OrNetStats/#exit-families (tuxli.org)

[2] https://nusenu.medium.com/is-kax17-performing-de-anonymizati...


> I run one of the bigger Tor relay families [0] with around 3.5% of the exit bandwidth

> https://metrics.torproject.org/rs.html#search/bauruine

> 1113 bauruine@mail.ru 0.01

You're off by a factor of 350.


Ups forgot that that there is this one relay that I don't run that is also called bauruine. I've updated the link to MyFamily. nusenu shows the authenticated domain which is tuxli.org for my relays.


So, adjust your infosec policy accordingly.

I already have. You can get the same or better "privacy" using public wifi with a random MAC address.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: