[tor-relays] non-encrypted connections from Tor exit relays
Camie Hethcote
snuffluau at mailbox.org
Thu Sep 10 17:15:58 UTC 2020
Hi !
SMTP ports are often used for spamming so that's why most exit relay operators blocking them.
Spamming from your machine = abuse reports = potential suspension of your service by provider
> On 09/10/2020 4:52 PM kirgali at riseup.net wrote:
>
>
> hi, generalized question about Tor exit relays and exit relay operators.
> do some exit relay operators have a policy to prevent connections
> leaving their exit node via non-encrypted ports (e.g. port 25)?
>
> this could be a philosophical position - not even wanting to be in a
> position to observe users' data passing through the exit node in clear
> text. or a pragmatic position - hoping that encrypted connections
> provide some level (even very weak) of plausible deniability in the
> event that a connection attracts the attention of law enforcement. this
> is just my thoughts.
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
More information about the tor-relays
mailing list