Chapter 5

Sharing Tor Resources

This chapter explains how people can share their resources with others to access the Tor anonymity network and discusses the issues and risks involved with doing so.

5.1 How (and Why) I Should Contribute Services

The more computers are connected through the Tor network, the better the network works: with more hosts passing Tor network data around the Internet, the less likely any one Tor user will be identified out of that mass of connecting computers.

Connecting to Tor and offering to share your connection as an exit relay, a transit relay, or a bridge is a good way to share your excess network bandwidth—as long as it is permitted under the terms of your ISP account. If it is allowed, you may find it gratifying ...

Get Practical Anonymity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.