Feeds

Tor launches DIY relays in Amazon cloud

Easy to build, cheap to run

Choosing a cloud hosting partner with confidence

The Tor Project is tapping Amazon's EC2 cloud service to make it easier for volunteers to donate bandwidth to the anonymity network.

Developers with the project have released preconfigured Tor Cloud images that volunteers can use to quickly deploy bridges that allow users to access the service. The new system is designed to take some of the pain out running such Tor relays by reducing the work and cost of deploying and running the underlying hardware and software.

“Setting up a Tor bridge on Amazon EC2 is simple and will only take you a couple of minutes,” developers a project member wrote in a post published on Monday. “The images have been configured with automatic package updates and port forwarding, so you do not have to worry about Tor not working or the server not getting security updates.”

In many cases, those availing themselves of the images to set up Tor bridges will qualify for Amazon's free usage tier. That will allow volunteers to run a bridge on EC2 for a full year. Those who don't qualify will need to pay about $30 a month.

Tor bridges are relays that aren't listed in the main directory, making them harder to be blocked by repressive governments and service providers. The volunteer-maintained relays act as the first hop in the network. From there, traffic is forwarded to other relays.

The preconfigured server images are available in six of Amazon's service regions, including Virginia, Northern California, Oregon, Ireland, Tokyo, and Singapore. They come with bandwidth limits to keep the cost of running a bridge below the $30 threshold. Once they are installed, they require little maintenance, the Tor posting said. ®

Remote control for virtualized desktops

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.