Watchman Privacy

71 – Tor Part II: Running a Tor Relay

Gabriel Custodiet gives the floor to Urban Hacker again to explain what a Tor relay is and how to run one. They cover why you should run a relay, why you shouldn’t run an exit relay, and why Bitcoiners in particular have an obligation to run a relay in their homes. Urban Hacker offers a lot of insider details, such as what to expect from your ISP, what equipment you need, how to protect your home router, and why a Tor bridge might be the best way to start.


Tor Links → →


Guest Links → → → (Telegram) → (Urban Hacker’s Bitcoin game)

Watchman Privacy → (newsletter, consultation requests) → →


Privacy Courses (supports the show) → →


Monero Donation Address (If you can’t see the whole string, double click in the middle to select all) →8829DiYwJ344peEM7SzUspMtgUWKAjGJRHmu4Q6R8kEWMpafiXPPNBkeRBhNPK6sw27urqqMYTWWXZrsX6BLRrj7HiooPAy


Please subscribe to and rate this podcast wherever you can to help it thrive. Thank you! →  →



0:00 – Introduction 1:26 – What is a Tor Relay? 2:23 – Three types of relays 4:03 – Which relay should a beginner run? 6:34 – What do we know about people who run Tor relays? 8:25 – Does one connect to one’s own relay? 9:38 – What does your ISP see when you run a Tor relay? 12:36 – Basic requirements for running a Tor relay 15:55 – Hardware requirements 20:13 – Personal consequences of running a Tor relay 24:43 – First steps to setting up a relay; what to expect 28:33 – Common mistakes 30:48 – Running a Tor bridge 33:29 – Snowflake 36:20 – Why should Bitcoiners care about Tor relays? 38:48 – Final thoughts 

#WatchmanPrivacy #TorNetwork #TorRelay #BitcoinPrivacy