Hacker Newsnew | past | comments | ask | show | jobs | submit | phaer's commentslogin

Very unlikely if you just hosting an onion service with legal content, where all traffic is encrypted.

Having to deal with law enforcement is unlikely even if you run a normal, encrypted, TOR relay.

Exit nodes, on the other hand, will most likely get letters or even visits by law enforcement. But those are not involved at all when just running an onion service.


There is one form of harassment though, if you run even just a TOR Relay you tend to be put on realtime blackhole lists regularly which will cause random websites to refuse your connection. Things like banks, ticket sites, even your insurance company might suddenly block your connection because your IP is listed as "Exterme Risk, active threats, verified" on one of like 200 RBL sites because someone scraped TOR and put all of the IP addresses they found on there and tagged them as active threats.


Don't run it at home then.

Or do, and call your bank's customer support until they fix it.

Or wait until the next day when it's your neighbour's problem because your IP changes every day and your bank gets a bunch of complaints from different customers who are your neighbours.


....do ISP provided public IPs really change that often...? My homelab's public IP has been the same so long I have all four octets memorized....and I don't remember ever asking (or paying for) a static one.

I know they can, and sometimes do, but do people really experience this daily/weekly?


On DOCSIS and PON networks my experience has been that dynamic IPs are generally stable as long as your DHCP lease is active, so my IP generally wouldn't change unless I changed equipment or there was an extended outage that kept me offline during the entire time it would normally have renewed.

On DSL networks it's been the opposite, if the PPPoE session was lost I was definitely going to get a new IP address, and on some providers the session would be reset every 1-7 days so the IP would change at exactly the same time of day which almost always ended up being in the middle of a work day corresponding with whenever the equipment was last rebooted due to some other problem. I got in the habit of setting up my equipment to restart on its own terms in the middle of the night on those providers, but this came with its own downsides when something would go wrong and it'd fail to negotiate.


> because someone scraped TOR and put all of the IP addresses they found on there and tagged them as active threats.

Yeah, or, hear me out... Someone used the exit node for active attacks. (Gasp! What? On my onion?)


I'm not an exit node, only a relay.


It does make me wonder if people are running very boring polite websites that can suddenly do very not boring or polite things if you know how to ask the right way over an onion address.

Surely I can't be the only one to think of this right?


In fact dozens of US spies and informants were killed or imprisoned when a secret communications network was exposed doing just that. I wish I bookmarked a better source, it described that the HTML for the portal was reused on every site, so once it was discovered on one site, everyone using it was burned.

Here's one article that alludes to it re: CIA informants in Iran, but I seem to remember China killing US spies and it just not making the news at all

"an analysis by two independent cybersecurity specialists found that the now-defunct covert online communication system that Hosseini used – located by Reuters in an internet archive – may have exposed at least 20 other Iranian spies and potentially hundreds of other informants operating in other countries around the world.

This messaging platform, which operated until 2013, was hidden within rudimentary news and hobby websites where spies could go to connect with the CIA. Reuters confirmed its existence with four former U.S. officials."

https://www.reuters.com/investigates/special-report/usa-spie...


that seems unwise, you'd be associating your 'impolite' activities with an irl legal identity


Well, you could use a disposable legal identity. Say a hobby site, about bowling.


Tor does this sort of although not like you think. It's used as a bridge transport.

>https://blog.torproject.org/introducing-webtunnel-evading-ce...

>WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT. It works by wrapping the payload connection into a WebSocket-like HTTPS connection, appearing to network observers as an ordinary HTTPS (WebSocket) connection. So, for an onlooker without the knowledge of the hidden path, it just looks like a regular HTTP connection to a webpage server giving the impression that the user is simply browsing the web.


Sounds preferable compared to be woken up at 5 am by your cloud providers billing alert.


They have an informative website and an online emulator at https://interlisp.org/software/access-online/


You could also just not enable it. It's off by default


I think you might be mixing them up?

Opt-in means that the user needs to actively decide to use the feature, it's OFF by default. That's currently the case for atuin (happy user without sync here).

Opt-out would mean the feature would be ON by default and users would need to actively decide NOT to use it.


Had this very same payment scheme as an SRE on call in Europe almost a decade ago.


Did you try https://github.com/numtide/nix-gl-host/ to help with nix & opengl drivers on non-nixos distros?


Just a note that zoxide isn't specific to nushell in any way: I use it with great satisfaction in both zsh and bash!


> This process can take a few seconds and up to a few minutes, depending on connectivity

A pen that records everything you write and uploads it to some compute cloud sounds less interesting than the title made it sound :/


> A bigger problem is that you should never use leaded solder to repair boards that have been soldered with lead-free, which means pretty much every board out there that has been manufactured in the last 20-30 years or so.

I am unlikely to every try this, but curious: Why is that, what would happen?


It results in unreliable joints that will cause problems over time.


Source? If you’re doing board repairs and adequately clean the previous components then I see little reason why adding leaded solder to the very small amount of remaining lead free solder would be a problem. If you have a full lead free joint and then add a bit of leaded solder, sure… but how many people are doing board repairs like that?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: