operated without difficulties. This broadens the base
of relays and additionally moves operating an exit
node closer to end-users, which would improve over-
all performance and anonymity (Ngan et al., 2010). If
all end users simultaneously act as exit-nodes with
their excess bandwidth, that would provide plausible
deniability for their own traffic too.
It is also important to note that we only offered an
exit node, i.e. a relay to the public Internet. There was
never any question of hosting hidden services for
third parties, as this would have exposed the univer-
sity to much larger legal dangers as a hosting pro-
vider. Similarly, although we of course participate in
the operation of hidden services as any other Tor
node, we did not provide any directory or list of onion
URLs or similar: while not hosting the content,
providing directions to them would still have required
investigating/checking each of them for legality.
We can therefore conclude that operating a Tor
exit node is easily possible from the technical point of
view, but the biggest problem seems to remain on the
organizational level. Nonetheless, our multi-year pro-
ject successfully established precedent to now make
operation of Tor exit nodes “state of the art” within
Austria and therefore within the EU. Legal ramifica-
tions in terms of having to consider Tor exit nodes as
a viable network anonymization techniques remain a
topic for future research.
REFERENCES
BVerfG 8.8.1978, 2 BvL 8/77 - Kalkar I,
https://dejure.org/dienste/vernetzung/rechtsprechung?
Gericht=BVerfG&Datum=08.08.1978
Collins, K., 2020. US-EU Privacy Shield data-sharing pact
invalidated https://www.cnet.com/news/
us-eu-privacy-shield-data-sharing-pact-invalidated-
over-surveillance-fears/
Dingledine, R., Mathewson, N., Syverson, P., 2004. Tor:
The second-generation onion router. In: Proc. of the
13th USENIX Security Symposium (August 2004)
Puig, A., 2020. Equifax Data Breach Settlement,
https://www.consumer.ftc.gov/blog/2019/07/
equifax-data-breach-settlement-what-you-should-
know
Fariva, C., Blankstein, A., 2019. Feds take down world's
'largest dark web child porn marketplace'
https://www.nbcnews.com/news/crime-courts/
feds-take-down-world-s-largest-dark-web-child-porn-
n1066511
Geiger, C., Izyumenko, E., 2020. Blocking Orders: As-
sessing Tensions with Human Rights, In: Frosio, G.
(Ed.), The Oxford Handbook of Intermediary Liability
Online (OUP, 2020), 566
Gibbs, S., 2015. What is 'safe harbour' and why did the
EUCJ just declare it invalid? https://www.theguard-
ian.com/technology/2015/oct/06/safe-harbour-euro-
pean-court-declare-invalid-data-protection
Goulet, D., Kadianakis, G., Mathewson, N, 2015. Next-
Generation Hidden Services in Tor, https://git-
web.torproject.org/torspec.git/tree/proposals/224-rend-
spec-ng.txt
Greschbach, B., Pulls, T., Roberts, L. M., Winter, P., Feam-
ster, N., 2017. The Effect of DNS on Tor’s Anonymity.
NDSS ’17, Internet Society
Jansen, R., Vaidya, T., Sherr, M., 2019, Point Break: A
Study of Bandwidth DoS Attacks against Tor, Proc. of
the 28th USENIX Security Symp. 2019
Lashkari, A., Gil, G., Mamun, M., Ghorbani, A., 2017.
Characterization of Tor Traffic using Time based Fea-
tures. 3rd Int. Conference on Information Systems Se-
curity and Privacy, 253-262
Lodder, A. R., Polter, P., 2017. ISP blocking and filtering:
on the shallow justification in case law regarding effec-
tiveness of measures, European Journal of Law and
Technology, Vol 8, No 2
Minárik, T., Osula, A.-M., 2016. Tor does not stink: Use
and abuse of the Tor anonymity network from the per-
spective of law, Computer Law & Security Review,
Volume 32, Issue 1, 111-127
Ngan, T.-W., Dingledine, R., Wallach, D.S., 2010. Building
Incentives into Tor, In: Sion R. (Ed.) Financial Cryp-
tography and Data Security. FC 2010. LNCS 6052,
Springer, Berlin
Panchenko, A., Lanze, F., Engel, T., 2012. Improving per-
formance and anonymity in the Tor network, 2012
IEEE 31st International Performance Computing and
Communications Conference (IPCCC), 1-10
Power, M., 2020. Online Drug Markets Are Entering a
'Golden Age', https://www.vice.com/en_us/arti-
cle/dyz3v7/online-drug-markets-are-entering-a-
golden-age
Sonntag, M., 2015. Rechtsfragen im Zusammenhang mit
dem Betrieb eines Anonymisierungsdienstes, JusIT 6,
2015, 215-222 (ISSN 1996-8228)
Szoldra, P., 2016. This is everything Edward Snowden re-
vealed in one year of unprecedented top-secret leaks,
https://www.businessinsider.com/snowden-leaks-time-
line-2016-9
TorRelayGuide, https://trac.torproject.org/pro-
jects/tor/wiki/TorRelayGuide#DNSonExitRelays
Weidenhammer, D., Gundlach, R., 2018. Wer kennt den
„Stand der Technik“? DuD 2/2018, 106-110.