This commit is contained in:
Amolith 2019-07-15 20:51:49 -04:00
parent 450a3b81fc
commit dce4ddfed9
Signed by: Amolith
GPG Key ID: 51FD40936DB0065B
1 changed files with 1 additions and 1 deletions

View File

@ -16,7 +16,7 @@ You can verify that they are, in fact, part of Tor by looking at the relevant pa
* 209.141.34.95 - [Illana](https://metrics.torproject.org/rs.html#details/7731E125924324B7405BA20E2759EE16780237E2)
# Who's running this
The [exit relay](https://trac.torproject.org/projects/tor/wiki/TorRelayGuide#Exitrelay) that directed you here is run by Amolith (me) under NixNet, a network of sites and services available to anyone free of charge. Despite the potential legal ramifications, I decided to run them because I am *very* passionate about online privacy, anonymity, and freedom of speech. In today's society, Tor is one of the very few ways to truly achieve and I wanted to directly help those that need it by running fast exits.
The [exit relay](https://trac.torproject.org/projects/tor/wiki/TorRelayGuide#Exitrelay) that directed you here is run by Amolith (me) under NixNet, a network of sites and services available to anyone free of charge. Despite the potential legal ramifications, I decided to run them because I am *very* passionate about online privacy, anonymity, and freedom of speech. In today's society, Tor is one of the very few ways to truly achieve that and I wanted to directly help those that need it by running fast exits.
# Who is it for
Tor sees use by many important [segments of the population](https://www.torproject.org/about/torusers), including whistle blowers, journalists, Chinese dissidents skirting the Great Firewall and oppressive censorship, abuse victims, stalker targets, the US military, and law enforcement, just to name a few. While Tor is not designed for malicious computer users, it is true that they can use the network for malicious ends. In reality however, the actual amount of [abuse](https://www.torproject.org/docs/faq-abuse) is quite low. This is largely because criminals and hackers have significantly better access to privacy and anonymity than do the regular users whom they prey upon. Criminals can and do [build, sell, and trade](http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_tools.html) far larger and [more powerful networks](http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_distributing_your.html) than Tor on a daily basis. Thus, in my mind, the social need for easily accessible censorship-resistant private, anonymous communication trumps the risk of unskilled bad actors, who are almost always more easily uncovered by traditional police work than by extensive monitoring and surveillance anyway.
# Legal ramifications