Hosts that don't ban tor nodes probably don't have a great reputation.
I don't need the authorities at my door every few weeks wondering why some of the most deplorable internet traffic of all time is coming from my house.
After all, I have no way of knowing what they're up to. It may be good or it may be bad; I can't know. (I suppose I can set up a router to discard packets with the RFC 3514 evil bit set, as a show of good faith, but...)
So I think the risk should be low, but that's just, like, my opinion, man. My opinion doesn't mean that the risk is in fact low.
Has the risk of running an exit node ever been tested in court? Many people, myself included, simply can't afford to have that kind of experience even if we're reasonably sure that it will end up OK.
So with the correction, I agree completely: Running relay node (a thing that deals only with indecipherably-encrypted anonymized data) is not a meaningful risk.
This list is fluffed up, without any checking for veracity. GIGO type of situation.
observationist•5h ago
JaggedJax•4h ago
Given that archive.is is known to DDOS and alter archives (See all the recent HN posts about them)
observationist•4h ago
anonym29•3h ago
JaggedJax•2h ago
uyzstvqs•4h ago
CableNinja•4h ago
binaryturtle•4h ago
halJordan•3h ago
vaylian•3h ago
There are also many web sites that provide an onion address in addition to their clearnet address. For example, the BBC: https://www.bbc.com/news/technology-50150981
poly2it•4h ago
cc-d•4h ago