Click to copy, then share by pasting into your messages, comments, social media posts and websites.
Click to copy, then add into your webpages so users can view and engage with this video from your site.
Report Content
We also accept reports via email. Please see the Guidelines Enforcement Process for instructions on how to make a request via email.
Thank you for submitting your report
We will investigate and take the appropriate action.
Tor Part II: Running a Tor Relay
Episode 71 of The Watchman Privacy Podcast – Tor Part II: Running a Tor Relay
Gabriel Custodiet gives the floor to Urban Hacker again to explain what a Tor relay is and how to run one. They cover why you should run a relay, why you shouldn’t run an exit relay, and why Bitcoiners in particular have an obligation to run a relay in their homes. Urban Hacker offers a lot of insider details, such as what to expect from your ISP, what equipment you need, how to protect your home router, and why a Tor bridge might be the best way to start.
Tor Links
→ https://community.torproject.org/relay/
→ https://metrics.torproject.org/rs.html
→ https://community.torproject.org/relay/setup/bridge/
Guest Links
→ https://urbanhacker.net/
→ https://twitter.com/realUrbanHacker
→ https://t.me/Realurbanhacker (Telegram)
→ https://geyser.fund/project/theorangepillsimulator (Urban Hacker’s Bitcoin game)
Watchman Privacy
→ https://watchmanprivacy.com (newsletter, consultation requests)
→ https://twitter.com/watchmanprivacy
→ https://www.amazon.com/Watchman-Guide-Privacy-Financial-Lifestyle/dp/B08PX7KFS2
Privacy Courses (supports the show)
→ https://rpf.gumroad.com/l/privatebitcoin
→ https://rpf.gumroad.com/l/hackproof
Monero Donation Address (If you can't see the whole string, double click in the middle to select all)
→8829DiYwJ344peEM7SzUspMtgUWKAjGJRHmu4Q6R8kEWMpafiXPPNBkeRBhNPK6sw27urqqMYTWWXZrsX6BLRrj7HiooPAy
Please subscribe to and rate this podcast wherever you can to help it thrive. Thank you!
→ https://www.youtube.com/@WatchmanPrivacy
→https://odysee.com/@WatchmanPrivacy
Timeline
0:00 – Introduction
1:26 – What is a Tor Relay?
2:23 – Three types of relays
4:03 – Which relay should a beginner run?
6:34 – What do we know about people who run Tor relays?
8:25 – Does one connect to one’s own relay?
9:38 – What does your ISP see when you run a Tor relay?
12:36 – Basic requirements for running a Tor relay
15:55 – Hardware requirements
20:13 – Personal consequences of running a Tor relay
24:43 – First steps to setting up a relay; what to expect
28:33 – Common mistakes
30:48 – Running a Tor bridge
33:29 – Snowflake
36:20 – Why should Bitcoiners care about Tor relays?
38:48 – Final thoughts
#WatchmanPrivacy #TorNetwork #TorRelay #BitcoinPrivacy
Category | News & Politics |
Sensitivity | Normal - Content that is suitable for ages 16 and over |
Playing Next
Related Videos
Ungovernable Misfits with MaxBitBuyBit
2 months, 1 week ago
Coincards: Buy Gift Cards with Monero and Bitcoin
2 months, 2 weeks ago
Paul Rosenberg: Cypherpunk Apes
2 months, 3 weeks ago
The Monero Standard with Stoic.xmr
3 months ago
Max Tannahill: Core Devs vs Real Users
3 months ago
Finney Forum with Ragnar Lifthrasir
3 months, 1 week ago
Warning - This video exceeds your sensitivity preference!
To dismiss this warning and continue to watch the video please click on the button below.
Note - Autoplay has been disabled for this video.