On 03/24/2015 11:09 PM, yl wrote: > Assume you run a tor exit or relay on a public server and you enable the > socks port and listen on 0.0.0.0 or so and accept all incomming > connections. Then you post the socks port publicly. What are the reasons > not to do so?
SOCKS does not encrypt traffic at all; all your traffic will travel to the SOCKS server in plain. Also, you need to fully trust the provider of the SOCKS port -- Tor is designed so you don't have to trust any participant in the network. -- Moritz Bartl https://www.torservers.net/ _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
