Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I'd avoid hosting a tor exit node at all costs, considering that they are a lot of bad actors on tor. Even some 3 letter agents can host cp on your tor sites and then accuse you.


> Even some 3 letter agents can host cp on your tor sites and then accuse you.

Well they can probably put illegal material in your apartment and then accuse you.


Yes but you're unlikely to be on their radar, a lot more likely though when you're running exit nodes and your IP comes up in investigations.


Sorry, but I don't think it's quite how it works. Because you show up in an investigation doesn't mean that the police will frame you.


its also possible to mail it to you under a "controlled delivery" investigation


I'm under the impression that mail doesn't "belong" to you until it is opened.


its not very hard to convince someone to open or sign for registered mail.

this usually last resort with hopes of eliciting self incriminatory statements.

i.e. [i didnt do the CP i was just snooping servers]


>Even some 3 letter agents can host cp on your tor sites and then accuse you.

You can't use exit nodes to run "tor sites", because they only allow outbound connections. You can run hidden services, but they work entirely through relays (ie. not exit nodes). Given that hidden services are end to end encrypted (none of the relays in the middle can see the traffic), and to my knowledge relay operators have generally not been prosecuted, your specific scenario is unlikely to play out.

That said, if you're running a exit node and the FBI wants to frame you, they can still use your relay to conduct some illegal action (eg. uploading CSAM to some clearnet site), and pin it on you.


If you become an ISP (with your AS) then it is less of a concern (in the US) since ISP have some protections. Emerald Onion [0] is an example of doing this. Actually in their faq [1], they state:

"Digital Millennium Copyright Act Safe Harbor

The Digital Millennium Copyright Act (DMCA) offers four safe harbors to protect ISPs from copyright liability for the acts of their users, provided that certain requirements are met (17 U.S.C. § 512). Emerald Onion is a section 512(a) “conduit” provider."

If you want to read the section it is here: https://www.law.cornell.edu/uscode/text/17/512 (it is generally about "Limitations on liability relating to material online" not just copyright)

[0] https://emeraldonion.org/

[1] https://emeraldonion.org/faq/




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: