[tor-relays] Tor Relay Operator Community Health - Final report (June 2024)
boldsuck
lists at for-privacy.net
Thu Oct 17 16:33:32 UTC 2024
On Thursday, 17 October 2024 16:17 gus wrote:
> - Main report:
> https://www.sr2.uk/reports/2024-TorRelayOperatorCommunityHealth.pdf -
> Mirror:
> https://gitlab.torproject.org/-/project/60/uploads/846d7d1816aee92fd2ee283b6
> a354c7d/2024-TorRelayOperatorCommunityHealth.pdf
Wow, I'm only up to 4.4.
- So I'm the only DAU in this survey ;-)
- Exit operators (some of whom have been to jail). are the ones most expected
to disclose their data.
- A trusted group, exceeding a certain percentage of the total consensus
weight most people find worse than a single operator running multiple relays
using different personas and alias?
Yes, more distribution is nice. But I'd rather have NTH and quetzo in my node
list than the next KAX17.
Whether now after the reports about 'Operation Liberty' where it was about
detecting onion services¹ and guard nodes, the answers would be the same?
¹All node types are involved in hidden services (guard, middle, exit).
Every assistant admin at Hetzner and OVH can monitor a significant part of the
Tor network. In addition, Netflow data is transmitted to anyone who can pay for
it. But well-known relay groups are the bad guys :-)
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you freedom!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 3872 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20241017/5d85fd00/attachment-0001.sig>
More information about the tor-relays
mailing list