Gregory and Ted -
Thanks for sharing your ideas. The challenge here runs deep...
At this time, I am measuring the 'effectiveness' of my contribution to Tor
though the bandwidth that is used. In 2008, I had over a TBytes of bandwidth
that I didn't use. (Purchased as a part of my server hosting
Tor Gurus -
So, I have just started running a Tor Relay. Currently I am in operating in
bridge mode, with a exit policy that rejects all. I am concerned about
having to deal with DCMA or other complaints, but I want to balance that
concern with providing real privacy value to the people who need
On Fri, 2009-01-02 at 11:43 -0500, Erik Heidt wrote:
Tor Gurus -
So, I have just started running a Tor Relay. Currently I am in
operating in bridge mode, with a exit policy that rejects all. I
am concerned about having to deal with DCMA or other complaints, but I
want to balance that
On Fri, Jan 2, 2009 at 11:43 AM, Erik Heidt erik.he...@artofinfosec.com wrote:
[snip]
- Permitting exit to key informational resources (e.g. wikipedia services)
- Permitting exit to top 5 or 10 web mail services (e.g. google mail,
hotmail, yahoo, etc.)
And manage to make yourself look like
4 matches
Mail list logo