Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you want to run a tor exit node, you can improve the security by subscribing to a rigorous hygiene process that provides accountability of your security upkeep.

* System Hardening

* Log Monitoring

* Intrusion Prevention

* Write proceses

* Perimeter Control

A compromised tor exit node is no good because all it takes is switching on NetFlow and all those sensitive packets are captured.

http://motherboard.vice.com/read/how-the-nsa-or-anyone-else-...



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: