view the rest of the comments
Selfhosted
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
Rules:
-
Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.
-
No spam posting.
-
Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.
-
Don't duplicate the full text of your blog or github here. Just post the link for folks to click.
-
Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).
-
No trolling.
Resources:
- selfh.st Newsletter and index of selfhosted software and apps
- awesome-selfhosted software
- awesome-sysadmin resources
- Self-Hosted Podcast from Jupiter Broadcasting
Any issues on the community? Report it using the report flag.
Questions? DM the mods!
Email does take some serious bandwidth
On a more serious note, people who have fast Internet should be running Tor relays. It would make the network much faster and secure.
Will you protect them from police raids and cover their legal costs for running a Tor node?
And it's quite likely they only have 10G locally, with way less bandwidth going to the outside.
There's different types of relay, including exit relays, which are the legally problematic type. Middle, guard, and bridge relays don't face the same issues with law enforcement and IP blocking.
Thanks for the correction. It's a shame that sysadmins balcklist middle nodes too, since they won't see any TOR traffic originating from your IP address anyway.
Really? That's so odd, I thought as long as you're not running an exit node, you should be fine. TIL, I'll have to check my ISP's policies before setting one up then.
Exit relays are totally fine from a legal perspective. They key is making sure the ISP and local police are aware so they don't come after you. ISPs have sent DMCA letters and such to operators when in reality they can't and shouldn't control the traffic coming out of Tor. The good news is that Tor has templates to respond.
Best practice is to let bigger organizations run exit relays so that there is the oversight from leadership.
Don't run a Tor node in places that have censorship laws or problems with freedom. In places such as the US and most of Europe it should be totally fine to run a node. What the network really needs is more middle nodes. You can inform your ISP and the local police of what you are doing just to be sure.
The only time you could get into trouble is when you are running a exit node. ISPs and police have mistakenly classified out nodes as local traffic. It is recommended that only organizations such as universities run Tor exit nodes. However, it is important to keep in mind that to my knowledge no one has ever been arrested for running a exit node in a western country.
https://news.ycombinator.com/item?id=41505009
There links to other occurrences of arrest in the comments.
That's just for a exit node. I explicitly stated that one should only let larger organizations run a node.
Also, my original comment still stands about no one being arrested
What do you mean by not being arrested? I would say German police putting a black bag on your head and taking you to their station in the middle of the night is something one could consider an arrest.