5 comments

  • ouk3 hours ago
    Infomaniak is listed in the France section but it's a swiss company.
    • xattt3 hours ago
      There is an 18-year-old record (updated in 2008<i>!</i>) about TekSavvy in Canada. The internet was different place back then. This info wouldn’t even relevant anymore as TekSavvy has since taken a business-centric approach in the interest of survival.<p>This list is fluffed up, without any checking for veracity. GIGO type of situation.
  • observationist6 hours ago
    If you have trouble accessing the site: <a href="https:&#x2F;&#x2F;archive.is&#x2F;MbT8n" rel="nofollow">https:&#x2F;&#x2F;archive.is&#x2F;MbT8n</a>
    • JaggedJax5 hours ago
      I would recommend the Wayback machine archive instead: <a href="https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20260306172113&#x2F;https:&#x2F;&#x2F;community.torproject.org&#x2F;relay&#x2F;community-resources&#x2F;good-bad-isps&#x2F;" rel="nofollow">https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20260306172113&#x2F;https:&#x2F;&#x2F;community...</a><p>Given that archive.is is known to DDOS and alter archives (See all the recent HN posts about them)
      • observationist4 hours ago
        I&#x27;m perfectly happy to continue using archive.is for so long as it remains functional.
      • JaggedJax3 hours ago
        The turfing with this topic is strong and needs to be called out. Reliable sources are crucial now more than ever. We cannot tolerate and promote botnets once they are uncovered.
      • anonym294 hours ago
        archive.org outright removes large numbers of pages, including political content; archive.is has edited a handful of pages to redact the doxxing of the archive.is owners.
    • uyzstvqs5 hours ago
      Or: <a href="http:&#x2F;&#x2F;xmrhfasfg5suueegrnc4gsgyi2tyclcy5oz7f5drnrodmdtob6t2ioyd.onion&#x2F;relay&#x2F;community-resources&#x2F;good-bad-isps&#x2F;index.html" rel="nofollow">http:&#x2F;&#x2F;xmrhfasfg5suueegrnc4gsgyi2tyclcy5oz7f5drnrodmdtob6t2i...</a>
      • CableNinja5 hours ago
        What the fuck is this url
        • binaryturtle5 hours ago
          .onion, aka a TOR internal URL. They look like this.
          • vaylian4 hours ago
            Documentation: <a href="https:&#x2F;&#x2F;support.torproject.org&#x2F;about-tor&#x2F;onion-services&#x2F;what-is-a-dot-onion&#x2F;" rel="nofollow">https:&#x2F;&#x2F;support.torproject.org&#x2F;about-tor&#x2F;onion-services&#x2F;what...</a><p>There are also many web sites that provide an onion address in addition to their clearnet address. For example, the BBC: <a href="https:&#x2F;&#x2F;www.bbc.com&#x2F;news&#x2F;technology-50150981" rel="nofollow">https:&#x2F;&#x2F;www.bbc.com&#x2F;news&#x2F;technology-50150981</a>
          • halJordan4 hours ago
            And onion urls are a sha hash of i think the private key of the site
        • poly2it5 hours ago
          It&#x27;s an onion link (TOR).
    • cc-d5 hours ago
      thanks for rocking our archive site!
  • kittikitti4 hours ago
    Thank you for sharing this, I was previously unaware of this table. While I don&#x27;t plan on running a Tor node on any VPS or residential ISP, an option to do so signals that they value their customers. I will cross reference this table when picking out my next VPS at the very least.
  • knowaveragejoe5 hours ago
    I see Comcast but no Verizon?
    • WalterGR4 hours ago
      How is Verizon when it comes to Tor?
  • TZubiri4 hours ago
    If you are on the other team, this is also a good list if you want to avoid bad neighbors.<p>Hosts that don&#x27;t ban tor nodes probably don&#x27;t have a great reputation.
    • petcat4 hours ago
      Not to mention, why on earth would I ever operate a TOR relay or exit node on my home internet connection? Maybe if I could guarantee that it could only be used by journalists or political dissidents, but everything else? No.<p>I don&#x27;t need the authorities at my door every few weeks wondering why some of the most deplorable internet traffic of all time is coming from my house.
      • blfr3 hours ago
        Relay nodes don&#x27;t pose much risk and help mask&#x2F;blend your own Tor traffic.
        • ssl-33 hours ago
          I agree with the concept. I should not be liable for the actions of others. If someone does something nefarious using my exit node (or the free wifi at my coffee shop) then that shouldn&#x27;t be my responsibility.<p>After all, I have no way of knowing what they&#x27;re up to. It may be good or it may be bad; I can&#x27;t know. (I suppose I can set up a router to discard packets with the RFC 3514 evil bit set, as a show of good faith, but...)<p>So I think the risk <i>should</i> be low, but that&#x27;s just, like, my opinion, man. My opinion doesn&#x27;t mean that the risk is in fact low.<p>Has the risk of running an exit node ever been tested in court? Many people, myself included, simply can&#x27;t afford to have that kind of experience even if we&#x27;re reasonably sure that it will end up OK.
          • ikmckenz3 hours ago
            Parent comment was talking about relay nodes, not exit nodes. The risk of running a relay node is essentially zero in a free country.
            • ssl-33 hours ago
              I appreciate the correction. It&#x27;s been so long since I&#x27;ve looked at tor that I guess I forgot that relay nodes were a thing and conflated the two terms. Or maybe the coffee hadn&#x27;t started working yet.<p>So with the correction, I agree completely: Running relay node (a thing that deals only with indecipherably-encrypted anonymized data) is not a meaningful risk.
        • giantg23 hours ago
          Yeah, I&#x27;ve run a relay node without issues for a couple years.
    • ikmckenz3 hours ago
      I think the hosts that Tor recommends against because there are already so many nodes hosted on them like OVH and Hetzner are perfectly happy with their (quite good) reputations.