On Tue, Sep 29, 2020 at 02:47:30PM +0000, [email protected] wrote:
> Is there a security problem with turning a middle relay, whose ip address is 
> known, into a bridge?
>

It depends on why you make this change.

I did it a few weeks ago because one of my nodes was on a server hosting 
several services (and being seen as a Tor node was painful for some of them). 
The node disappeared from node lists after a few days. This includes external 
lists (like dan tor) used to blacklist exit or all tor relays.
It was enough for me (but the contribution to the network is really lower now 
so I will find another way :).


If you need more I would suggest to modify/renew the node's name and 
fingerprint to avoid being simply found with the old ones with a simple relay 
search.

Then AFAIK it depends on what you want to protect your node from.

(I will be interested like you if any other advice on the subject)


Corl3ss
 

Attachment: signature.asc
Description: PGP signature

_______________________________________________
tor-relays mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to