The hoster handled this case quiet professionally, I guess it's a standardized process for most hosting operators. As far as I know the police just seizes the disks and the hoster just adds new ones.
On 12.09.18 17:08, Roman Mamedov wrote: > On Wed, 12 Sep 2018 16:34:48 +0200 > [email protected] wrote: > >> I'd guess it's ok to just set up a new exit node on the same IP and >> everything should be fine but I'm not quite 100% sure on this. > > I find it surprising that you are able to do that, is the provider not mad at > you for having one of their servers seized? Or even if yours, for causing a > commotion and ruckus in their datacenter. > >> And another question about this topic: Would it be better to create a >> new exit from scratch or is it ok to restore the latest backup with all >> keys, etc. ? > > It is certainly not okay to run a node keeping the same private key that the > police now has. You should start from scratch, and I think the procedure is > actually such that the Tor project will blacklist the affected fingerprint. > _______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
