(no title)
phaer | 4 months ago
Having to deal with law enforcement is unlikely even if you run a normal, encrypted, TOR relay.
Exit nodes, on the other hand, will most likely get letters or even visits by law enforcement. But those are not involved at all when just running an onion service.
jandrese|4 months ago
immibis|4 months ago
Or do, and call your bank's customer support until they fix it.
Or wait until the next day when it's your neighbour's problem because your IP changes every day and your bank gets a bunch of complaints from different customers who are your neighbours.
RealityVoid|4 months ago
Yeah, or, hear me out... Someone used the exit node for active attacks. (Gasp! What? On my onion?)
TOMDM|4 months ago
Surely I can't be the only one to think of this right?
jazzyjackson|4 months ago
Here's one article that alludes to it re: CIA informants in Iran, but I seem to remember China killing US spies and it just not making the news at all
"an analysis by two independent cybersecurity specialists found that the now-defunct covert online communication system that Hosseini used – located by Reuters in an internet archive – may have exposed at least 20 other Iranian spies and potentially hundreds of other informants operating in other countries around the world.
This messaging platform, which operated until 2013, was hidden within rudimentary news and hobby websites where spies could go to connect with the CIA. Reuters confirmed its existence with four former U.S. officials."
https://www.reuters.com/investigates/special-report/usa-spie...
throawayonthe|4 months ago
bauruine|4 months ago
>https://blog.torproject.org/introducing-webtunnel-evading-ce...
>WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT. It works by wrapping the payload connection into a WebSocket-like HTTPS connection, appearing to network observers as an ordinary HTTPS (WebSocket) connection. So, for an onlooker without the knowledge of the hidden path, it just looks like a regular HTTP connection to a webpage server giving the impression that the user is simply browsing the web.