I run a Tor relay on my home network on a BeagleBone Black. It’s certainly not the fastest Tor relay out there, but it’s inexpensive, small, and doesn’t affect my home network. But more importantly, it allows users who are censored to access the Internet and the Tor project helps protect privacy online. The Tor project, IMHO, is one of the best open source projects around.
As a non-exit relay, one does not typically encounter many issues as none of the Tor traffic exits my relay to the open Internet. For those seeking a description of Tor traffic, there is a great infographic on the EFF site. Anyway, I tried to watch Family Guy and I was presented this:
All Tor relays have their IP address publicized; this is how Tor clients can find them. There are some exceptions with things called “Bridges,” which I won’t go into any detail here. It’s pretty easy to collect a list of public Tor relays, since well, they are public and simply blacklist all of those IP addresses. Which is what I think is happening here.
I sent the following email to Hulu support; we’ll see if I get a response. There was a response on the Tor-talk mailing. I like Family Guy, but I like Internet freedom more.
I run a non-exit Tor relay on my home network. This allows Internet users, who are censored, to access the Internet and protects users who wish to keep their privacy while online. There is a great description of who uses Tor at: https://www.torproject.org/about/torusers.html.en
As you can tell, my IP is based in the U.S. and I would like to access Hulu. Can you please lift the blacklist on my IP?
I received my Tor t-shirt the other day! One can receive a t-shirt by meeting one of the following criteria (from the Tor Project website):
A large enough ($65+) donation to the Tor Project.
Operate a fast Tor relay that’s been running for the past two months: you are eligible if you allow exits to port 80 and you average 100 KBytes/s traffic, or if you’re not an exit but you average 500 KBytes/s traffic.
I run two non-exit relays, one of which is on a remote server and qualified for #2 above. The other is my BeagleBone Black relay, which doesn’t quite meet the traffic requirement but makes up for it in coolness. 😉
I’m posting my slides from last Wednesday’s Loveland CreatorSpace (LCS) show-and-tell. There was a great turn-out for our first meeting and an impressive display of art, jewelry, electronics, CNC milling, Daft Punk Helmets, and chickens. I decided to lay off some of the technical details with my project and instead present a Bildungsroman of how I became interested in cryptography and Internet privacy. The slides probably don’t mean much without the presentation behind it, but I expressed my motivation for free and open source software, open source hardware, the BeagleBone Black, and my latest project, the CryptoCape.
This Wednesday, I’ll be hosting a class entitled Practical Internet Privacy with Tor. If you go, you’ll learn how to download, install, run, and verify that Tor is working. I’ll also talk about other fun
If you don’t go, we are recording the class and the video and slides will be posted. But, it will be better in person :p