Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It wasn't one guy that made me shut it down, it's the pattern of use that typically comes with offering a service like this. At the time, it wasn't my primary focus, just a one off, "What would happen if I did this?" type of experiment.

Yes, I knew that there could be abuse, but I didn't know how the abuse would come. As I said, I learned, it cost me very little to do.

> What insight does that give?

For one, how do you maintain a service that actually has traffic. At the time I had very little experience with mass amounts of users. You can build personal websites all day long and still never know what it is like to handle high levels of traffic.

Additionally, given the type of content I received on the service, how could I handle the patterns of use better and encourage the sharing I wanted from users? Given the type of content I got very clear patterns developed that if I wanted to expand I could have.

> Surely you knew there is at least one bad guy using the internets before the experiment?

Yea, there are people with ill intent on the internet and they are constantly attempting to break into my servers as we speak. Why would I use that as a reason to not offer something online? This reason alone, shouldn't be a deterrent.



Did you require accounts? Otherwise it could in theory be one guy I guess since the service was anonymous (however, unlikely, of course).

I ran a Tor exit node once. However I pulled out once I realized what kind of traffic I could be relaying. I guess it is a similar learning experience.


I never understood why people single out Tor for this logic. Obviously Comcast and Verizon are doing the same thing; even the Tor traffic itself traverses their networks. Half the internet is on Cloudflare and it's not just the good half. If you build a technology like TLS or ssh or BitLocker, some of the people who use it will be bad. As is the case with web browsers and RAM and hammers.

The proportion of disreputable things on Tor might be higher, but it's a difference in degree, not in kind. And the proportion of dissidents trying not to be killed by their own government and Ukrainians trying not to be killed by Russians is higher too.


> I never understood why people single out Tor for this logic.

Because the other examples you mention, are corporations with lawyers. They (usually) won’t get a random police raid, and even if, it’d not be as potentially disastrous as it would be for a random person.


Tor exit nodes don't usually get a random police raid either.

But in any event that seems like more of an argument for not running one at your house than for having some moral objection in this case but not to any of those corporations transferring the same content.


Possibly depends on the country. There have been issues in Germany, but we have some pretty atrocious networking laws.

And I guess you could interpret GP’s comment as moral, I was reading it as legal, but there’s no real sign one way or the other.


I take it as a moral argument because awareness of the behavior of abusive police departments wouldn't have changed by looking at the traffic.


Risk obviously would. And it’s about the laws.


But it isn't about the laws, or why isn't that a problem for Cloudflare or Comcast? It's about police departments doing what they ought not to do out of incompetence or a desire to harass innocent people who inconvenience them without violating any laws. Which they could just as easily be doing because of Napoleon syndrome or lobbyist pressure from the RIAA.


I didn't close the node due to moral reasons, I am all for Tor, but for personal risk reasons due to risks with local law enforcement.


But then what difference does the content make? It's not like they don't still put on their ridiculous assault garb or steal your stuff when they want to unjustifiably grief you over a third party's violation of some copyright law.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: