Abuse FAQ
+# # # - #
+
Questions
+-
+
- Doesn't Tor enable criminals to do bad things? +
- What about distributed denial of service attacks? +
- What about spammers? +
- Does Tor get much abuse? +
- So what should I expect if I run an exit relay? +
- Tor is banned from the IRC network I want to use. +
- Your nodes are banned from the mail server I want to use. +
- I want to ban the Tor network from my service. +
- I have a compelling reason to trace a Tor user. Can you help? +
- I want some content removed from a .onion address. +
- I have legal questions about Tor abuse. +
Doesn't Tor enable criminals to do bad things?
@@ -157,6 +172,13 @@ Template, which explains why your ISP can probably ignore the notice without any liability. [Arbitrary ports] + +For a complete set of template responses to different abuse complaint + types, see the collection of templates + on the Tor wiki. You can also proactively reduce the amount of abuse you + get by following these tips + for running an exit node with minimal harassment.
You might also find that your Tor relay's IP is blocked from accessing some Internet sites/services. This might happen regardless of your exit @@ -338,14 +360,27 @@ to ensure their anonymity (identity theft, compromising computers and using them as bounce points, etc).
- + ++ This ultimately means that it is the responsibility of site owners to protect + themselves against compromise and security issues that can come from + anywhere. This is just part of signing up for the benefits of the + Internet. You must be prepared to secure yourself against the bad elements, + wherever they may come from. Tracking and increased surveillance are not + the answer to preventing abuse. +
+But remember that this doesn't mean that Tor is invulnerable. Traditional police techniques can still be very effective against Tor, such as - interviewing suspects, surveillance and keyboard taps, writing style - analysis, sting operations, and other physical investigations. + investigating means, motive, and opportunity, interviewing suspects, + writing style analysis, technical analysis of the content itself, sting operations, + keyboard taps, and other physical investigations. The Tor Project is also happy to work with everyone + including law enforcement groups to train them how to use the Tor software to safely conduct + investigations or anonymized activities online.
- + +I want some content removed from a .onion address.
The Tor Project does not host, control, nor have the ability to @@ -359,15 +394,21 @@ owner and location of the .onion site is hidden even from us.
But remember that this doesn't mean that hidden services are invulnerable. Traditional police techniques can still be very effective - against them, such as interviewing suspects, surveillance and keyboard - taps, writing style analysis, sting operations, and other physical - investigations.
+ against them, such as interviewing suspects, writing style analysis, + technical analysis of the content itself, sting operations, keyboard taps, + and other physical investigations. +If you have a complaint about child pornography, you may wish to report it to the National Center for Missing and Exploited Children, which serves as a national coordination point for investigation of child pornography: http://www.missingkids.com/. We do not view links you report.
- + +The Tor Project also encourages the use of Tor by law enforcement in + the investigation, stings, and infiltration of child pornography rings. + Please contact us for information on Tor trainings. +
+