
There is little we can do to trace this matter further.Īs can be seen from the overview page, the Tor network is designed to make tracing of users impossible. Common Boilerplate (Tor Intro) The IP address in question is a Tor exit node. This is the core idea that these abuse complaint templates attempt to instil in the recipient.įeel free to improve them if you feel they fall short of this goal.Īll templates should include the Common Boilerplate below, and append some additional paragraphs depending on the specific Scenario. In fact, all objective evidence seems to indicate that it has only created new markets for organized crime to preside over.


To further preach to the choir, the identity-based Internet "driver's licenses" of South Korea and China have done nothing to curtail cybercrime and Internet abuse. The difference between the proactive approach and the reactive approach to abuse is the difference between decentralized fault-tolerant Internet freedom, and fragile, corruptible totalitarian control. The philosophy of the Tor Project is that abuse should be handled proactively by the site administrators, rather than wasting effort and resources on seeking vengeance and chasing ghosts.

The general format of these templates is to inform the complainant about Tor, to help them to find a solution to their particular issue that works in general for the Internet at large (open wifi, open proxies, botnets, etc), and barring all else, how to block Tor. Please see Tips for Running an Exit Node with Minimal Harassment and Tor Exit Guidelines for more info, before reading this document.īelow are a collection of letters you can use to respond to your ISP about their complaint in regards to your Tor exit server. The best way to handle abuse complaints is to set up your exit node so that they are less likely to be sent in the first place.
