-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

First of all, some informationa about the situation:
http://frapedia.se/wiki/Information_in_English

I'm running two nodes in Finland, very restricted exit poliecies
(googles ip's, scroogle, https, pops and imaps allowed).

Circa 90% of traffic originating from Finland and going outside of
Finland is routed through Sweden (that bites a lot).

As Swedish FRA is listening, logging, building "sosiograms" and trying
to decrypt all traffic going through their borders should I be worried
about my exit nodes? Should I do something about exit-policies?

Encryption does protect the data but it does not protect from tracking
who is in connection with who. As I run exit-nodes that routes traffic
about 2Mb/s/2Mb/s - 10Mb/s/10Mb/s and 4Mb/s/4Mb/s I'm getting my fair
share of tor's traffic. So.. FRA is building a nice file of my ip and
thinks that everything coming from tor is really traffic originated by me.

M

ps: as always, sorry for my bad "fenno-english".
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFIa03KeaKwdrf2V0oRAgXVAJ0c9Ol4QEBh0pDlvSZuqEyj1PcvwgCdFEZk
SDJ+5atghs8tD6glpcGmz3E=
=iTXG
-----END PGP SIGNATURE-----

Reply via email to