Except that running a *relay* (not an *exit node*) is entirely different and entirely safe. You're not dealing with anyone's unencrypted data, just acting as an encrypted pass through. As far as anyone can tell, you're (in essence) streaming a bunch of data over SSL. On Tue 19 March 2013 20:20:02 Michael Butash wrote: > Using tor is one thing for anonymizing yourself outwardly, but running > as a router is another. I'd not act as a router, or a proxy for anyone > from anywhere connection-wise with my name on it, or anyone that even > knows of me lest I ignite some penchant for lawful destruction of my > life. ISP's are bound to record this for legal purposes, if they're at > all interested in continued existence. > > Your mac address binding to a given dhcp IP address, bound to a given > modem serial/mac, provisioned to your account, bound to your house, and > payment info means that's where they go first when that IP does > something naughty and someone tells, and this info is often kept > indefinitely. > > That can be running a tor router, leaving your wifi unprotected, or > someone stealing an unlocked cell phone with data. > > -mb > > On 03/18/2013 04:08 PM, Derek Trotter wrote: > > In the story above, a man ended up in trouble when cops found out > > his ip address was used for accessing child porn. It was someone on > > tor, but the cops went looking for him first. > > --------------------------------------------------- > PLUG-discuss mailing list - PLUG-discuss@lists.phxlinux.org > To subscribe, unsubscribe, or to change your mail settings: > http://lists.phxlinux.org/mailman/listinfo/plug-discuss -- Ryan Rix http://rix.si