Why is D.O. so against Tor?

Now I have lost three servers to bogus DMCA takedown requests simply for running a passive Tor relay.

Are D.O.'s staff so anti-privacy and anti-anonymity that they choose to do this? Makes me wonder how “secure” the servers are in their data centers.


Submit an answer
You can type!ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

How might they monitor the encrypted Tor traffic? I am running a Tor Exit node, and the services have been shut off without warning, or substantial proof that I am infringing copyright.

I assert that running a Tor Exit node does not imply copyright infringement. This is simply because I am unable to break the encryption and choose which packets to allow through, and which packets to drop.

Further, I am offering complete file listings, network traffic logs, et al., but apparently they go by the mantra ‘guilty until proven innocent.’ I am offering proof of the innocence, regardless, but it appears that no amount of proof can satisfy the litigation hungry copyright companys (IP Echelon in particular).

Do you have proof those DMCA takedown requests were bogus because you’d need some evidence to prove that. anti-privacy or anti-anonymity has nothing to do with security to their datacenter or racks. This is just terms they have to stick to. They don’t want you abusing the bandwidth limits and if done so they will remove your server without warning.