Hiya, so been on the lookout for different services that I could help host for others to benefit from. I think TOR is a great project, and I’d like to contribute. So been thinking about hosting a TOR relay lately, and wondering how people’s experience is with running one? Please correct me if I’m wrong - but as far as I know, it only becomes “scary” to host, if you were to host an exit node? And the only real requirement to host a relay is to have a good internet speed? Mainly wondering people’s experiences with running a relay.

Edit: Very well-timed and relevant upload from Techlore, on how to use Tor just dropped: https://youtu.be/K3wmLvny5tg

    • johnassel@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      10
      ·
      8 months ago

      This is what I did on a Raspberry since snowflake can run as a normal service without a browser, too. The Raspberry then runs 24/7 and I don’t have to care if my browser is running.

    • Sips'@slrpnk.netOP
      link
      fedilink
      English
      arrow-up
      6
      ·
      8 months ago

      Wow this is neat! Wasn’t aware of this. Is this the same as running a full dedicated relay?

      Have already installed and activated it, and will do so on more of my devices.

      • johnassel@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        7
        ·
        8 months ago

        Snowflake acts as an entry point. A lot of official TOR entry nodes are blacklisted in some contries. Since Snowflake can run basically behind any IP anywhere where a browser is, it is hard to block them. In that way users in suppressed countries can still access the TOR network through Snowflake but the official entry nodes.

  • db2@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    8 months ago

    Too great a chance someone downloads csam through it and I get blamed.

    • Sips'@slrpnk.netOP
      link
      fedilink
      English
      arrow-up
      13
      ·
      8 months ago

      But as far as I understand, thats only a worry for people running exit nodes? Or?

      • db2@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        8 months ago

        You’re correct, but I still am not comfortable taking the chance.

      • LWD@lemm.ee
        link
        fedilink
        English
        arrow-up
        5
        ·
        8 months ago

        Correct. This is one article that goes over a multi-hop VPN that’s sort of relevant regarding how you, as somebody in the middle of this process, would not see what is being relayed even if you’re closer to the end-user.

        (Obviously this isn’t quite as far as Tor goes, but at least it explores the principle.)

        • Sips'@slrpnk.netOP
          link
          fedilink
          English
          arrow-up
          2
          ·
          8 months ago

          Nice illustration, thanks!

          Also: I often see your name in Lemmy posts/comments, and just wanted to say thanks for contributing so much. You come with very valuable and factual information, as far I’ve seen - and I appreciate that :)

          Have a nice day 🌻

  • shortwavesurfer@monero.town
    link
    fedilink
    English
    arrow-up
    4
    ·
    8 months ago

    I did a long time ago and don’t remember much about it other than it just worked. But then I tried again recently and couldn’t get it to work properly. Although that’s probably because I hadn’t played with it in years and was missing something with my configuration.

    • sushibowl@feddit.nl
      link
      fedilink
      English
      arrow-up
      6
      ·
      8 months ago

      Mainly true for exit relays. I do not recommend trying to run an exit relay from home at all. If you run a middle relay though you should be mostly fine.