The first column shows the first 4 characters of the fingerprint, the second
how may relays have it
and when and where (AS) they joined the network.
+--+---+-++
| FP | # | first_seen
On Tue, Dec 11, 2018 at 09:54:00PM +, nusenu wrote:
> it is pretty obvious from their fingerprints that they are a group of relays
> that aim to be
> at a certain position on the DHT ring to become the HSDir of someone's onion
Right. We have bumped them out of the network, along with some
it is pretty obvious from their fingerprints that they are a group of relays
that aim to be
at a certain position on the DHT ring to become the HSDir of someone's onion
--
https://twitter.com/nusenu_
https://mastodon.social/@nusenu
signature.asc
Description: OpenPGP digital signature
It looks like they are all running an alpha release with various Gmail
addresses. Maybe they're trying to correlate some traffic. What can be done in
situations like this where the operator is (likely intentionally) being
dishonest about their identity?
Cordially,
Nathaniel Suchy
Dec 11,
these relays look rather strange and are likely operated by a single entity,
watch out.
2018-12-10
| Up | Ext | JoinTime | IP | CC | ORp | Dirp | Version
| Contact | Nickname | eFamMembers | FP
|