This commit is contained in:
Amolith 2019-07-15 20:51:49 -04:00
parent 450a3b81fc
commit dce4ddfed9
Signed by: Amolith
GPG Key ID: 51FD40936DB0065B
1 changed files with 1 additions and 1 deletions

View File

@ -16,7 +16,7 @@ You can verify that they are, in fact, part of Tor by looking at the relevant pa
* 209.141.34.95 - [Illana](https://metrics.torproject.org/rs.html#details/7731E125924324B7405BA20E2759EE16780237E2) * 209.141.34.95 - [Illana](https://metrics.torproject.org/rs.html#details/7731E125924324B7405BA20E2759EE16780237E2)
# Who's running this # Who's running this
The [exit relay](https://trac.torproject.org/projects/tor/wiki/TorRelayGuide#Exitrelay) that directed you here is run by Amolith (me) under NixNet, a network of sites and services available to anyone free of charge. Despite the potential legal ramifications, I decided to run them because I am *very* passionate about online privacy, anonymity, and freedom of speech. In today's society, Tor is one of the very few ways to truly achieve and I wanted to directly help those that need it by running fast exits. The [exit relay](https://trac.torproject.org/projects/tor/wiki/TorRelayGuide#Exitrelay) that directed you here is run by Amolith (me) under NixNet, a network of sites and services available to anyone free of charge. Despite the potential legal ramifications, I decided to run them because I am *very* passionate about online privacy, anonymity, and freedom of speech. In today's society, Tor is one of the very few ways to truly achieve that and I wanted to directly help those that need it by running fast exits.
# Who is it for # Who is it for
Tor sees use by many important [segments of the population](https://www.torproject.org/about/torusers), including whistle blowers, journalists, Chinese dissidents skirting the Great Firewall and oppressive censorship, abuse victims, stalker targets, the US military, and law enforcement, just to name a few. While Tor is not designed for malicious computer users, it is true that they can use the network for malicious ends. In reality however, the actual amount of [abuse](https://www.torproject.org/docs/faq-abuse) is quite low. This is largely because criminals and hackers have significantly better access to privacy and anonymity than do the regular users whom they prey upon. Criminals can and do [build, sell, and trade](http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_tools.html) far larger and [more powerful networks](http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_distributing_your.html) than Tor on a daily basis. Thus, in my mind, the social need for easily accessible censorship-resistant private, anonymous communication trumps the risk of unskilled bad actors, who are almost always more easily uncovered by traditional police work than by extensive monitoring and surveillance anyway. Tor sees use by many important [segments of the population](https://www.torproject.org/about/torusers), including whistle blowers, journalists, Chinese dissidents skirting the Great Firewall and oppressive censorship, abuse victims, stalker targets, the US military, and law enforcement, just to name a few. While Tor is not designed for malicious computer users, it is true that they can use the network for malicious ends. In reality however, the actual amount of [abuse](https://www.torproject.org/docs/faq-abuse) is quite low. This is largely because criminals and hackers have significantly better access to privacy and anonymity than do the regular users whom they prey upon. Criminals can and do [build, sell, and trade](http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_tools.html) far larger and [more powerful networks](http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_distributing_your.html) than Tor on a daily basis. Thus, in my mind, the social need for easily accessible censorship-resistant private, anonymous communication trumps the risk of unskilled bad actors, who are almost always more easily uncovered by traditional police work than by extensive monitoring and surveillance anyway.
# Legal ramifications # Legal ramifications