-
Notifications
You must be signed in to change notification settings - Fork 0
/
tor-exit-notice.html
38 lines (34 loc) · 2.35 KB
/
tor-exit-notice.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
<?xml version="1.0"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<title>This is a Tor Exit Router</title>
</head>
<body>
<h1 style="text-align:center; font-size:xx-large; font-weight:bold">This is a
Tor Exit Router</h1>
<p>
Most likely you are accessing this website because you had some issue with
the traffic coming from this IP. This router is part of the <a
href="https://www.torproject.org/">Tor Anonymity Network</a>, which is
dedicated to <a href="https://www.torproject.org/about/overview">providing
privacy</a> to people who need it most: average computer users. This
router IP should be generating no other traffic, unless it has been
compromised.</p>
<p>
As can be seen from the <a href="http://www.torproject.org/overview.html">Tor overview page</a>, the Tor network is designed to make tracing of users impossible. This is because the Tor network is a censorship resistance, privacy, and anonymity system used by whistle blowers, journalists, Chinese dissidents skirting the Great Firewall, abuse victims, stalker targets, the US military, and law enforcement, just to name a few. See the <a href="https://www.torproject.org/about/torusers.html">Tor users page</a> for more info.
</p>
<p>
Although Tor can be abused, the vast majority of users are legitimate. It is not illegal to operate exit nodes. In terms of applicable law, the best way to understand Tor is to consider it a network of routers operating as common carriers, much like the Internet backbone. However, unlike the Internet backbone routers, Tor routers explicitly do not contain identifiable routing information about the source of a packet.
</p>
<p>
As such, there is little the operator of this router can do to help you track the connection further. This router maintains no logs of any of the Tor traffic, so there is little that can be done to trace either legitimate or illegitimate traffic (or to filter one from the other). Attempts to seize any of our equipment will accomplish nothing.
</p>
<h2>
This relay is part of the <b>torservers.net</b> family. Please see <a href="https://www.torservers.net/abuse.html">https:
//www.torservers.net/abuse.html</a> for more details and contact information.
</h2>
</body>
</html>