operated without difficulties. This broadens the base 
of  relays  and  additionally  moves  operating  an  exit 
node closer to end-users, which would improve over-
all performance and anonymity (Ngan et al., 2010). If 
all  end  users  simultaneously  act  as  exit-nodes  with 
their excess bandwidth, that would provide plausible 
deniability for their own traffic too. 
It is also important to note that we only offered an 
exit node, i.e. a relay to the public Internet. There was 
never  any  question  of  hosting  hidden  services  for 
third parties, as this would have exposed the univer-
sity  to  much  larger  legal  dangers  as  a  hosting  pro-
vider. Similarly, although we of course participate in 
the  operation  of  hidden  services  as  any  other  Tor 
node, we did not provide any directory or list of onion 
URLs  or  similar:  while  not  hosting  the  content, 
providing directions to them would still have required 
investigating/checking each of them for legality. 
We can therefore conclude that operating a Tor 
exit node is easily possible from the technical point of 
view, but the biggest problem seems to remain on the 
organizational level. Nonetheless, our multi-year pro-
ject successfully established precedent to now make 
operation of Tor exit nodes “state of the art” within 
Austria and therefore within the EU. Legal ramifica-
tions in terms of having to consider Tor exit nodes as 
a viable network anonymization techniques remain a 
topic for future research. 
REFERENCES 
BVerfG  8.8.1978,  2  BvL  8/77  -  Kalkar  I, 
https://dejure.org/dienste/vernetzung/rechtsprechung? 
Gericht=BVerfG&Datum=08.08.1978 
Collins, K., 2020. US-EU Privacy Shield data-sharing pact 
invalidated  https://www.cnet.com/news/ 
us-eu-privacy-shield-data-sharing-pact-invalidated-
over-surveillance-fears/ 
Dingledine,  R.,  Mathewson,  N.,  Syverson,  P.,  2004.  Tor: 
The  second-generation  onion  router.  In:  Proc. of the 
13th USENIX Security Symposium (August 2004) 
Puig,  A.,  2020.  Equifax  Data  Breach  Settlement,  
https://www.consumer.ftc.gov/blog/2019/07/ 
equifax-data-breach-settlement-what-you-should-
know 
Fariva,  C.,  Blankstein,  A.,  2019.  Feds  take  down  world's 
'largest  dark  web  child  porn  marketplace' 
https://www.nbcnews.com/news/crime-courts/ 
feds-take-down-world-s-largest-dark-web-child-porn-
n1066511 
Geiger,  C.,  Izyumenko,  E.,  2020.  Blocking  Orders:  As-
sessing  Tensions  with  Human  Rights,  In:  Frosio,  G. 
(Ed.), The Oxford Handbook of Intermediary Liability 
Online (OUP, 2020), 566 
Gibbs,  S.,  2015.  What  is  'safe  harbour'  and  why  did  the 
EUCJ  just  declare  it  invalid?  https://www.theguard-
ian.com/technology/2015/oct/06/safe-harbour-euro-
pean-court-declare-invalid-data-protection 
Goulet,  D.,  Kadianakis,  G.,  Mathewson,  N,  2015.  Next-
Generation  Hidden  Services  in  Tor,  https://git-
web.torproject.org/torspec.git/tree/proposals/224-rend-
spec-ng.txt 
Greschbach, B., Pulls, T., Roberts, L. M., Winter, P., Feam-
ster, N., 2017. The Effect of DNS on Tor’s Anonymity. 
NDSS ’17, Internet Society 
Jansen,  R.,  Vaidya,  T.,  Sherr,  M.,  2019,  Point  Break:  A 
Study of Bandwidth DoS Attacks against Tor, Proc. of 
the 28th USENIX Security Symp. 2019 
Lashkari,  A.,  Gil,  G.,  Mamun,  M.,  Ghorbani,  A.,  2017. 
Characterization of Tor Traffic using Time based Fea-
tures. 3rd Int. Conference on Information Systems Se-
curity and Privacy, 253-262 
Lodder, A. R., Polter, P., 2017. ISP blocking and filtering: 
on the shallow justification in case law regarding effec-
tiveness  of  measures,  European Journal of Law and 
Technology, Vol 8, No 2 
Minárik, T.,  Osula, A.-M., 2016. Tor  does not stink:  Use 
and abuse of the Tor anonymity network from the per-
spective  of  law,  Computer Law & Security Review, 
Volume 32, Issue 1, 111-127 
Ngan, T.-W., Dingledine, R., Wallach, D.S., 2010. Building 
Incentives into Tor, In: Sion R. (Ed.) Financial Cryp-
tography and Data Security. FC 2010.  LNCS  6052, 
Springer, Berlin 
Panchenko, A., Lanze, F., Engel, T., 2012. Improving per-
formance  and  anonymity  in  the  Tor  network,  2012 
IEEE 31st International Performance Computing and 
Communications Conference (IPCCC), 1-10 
Power,  M.,  2020.  Online  Drug  Markets  Are  Entering  a 
'Golden  Age',  https://www.vice.com/en_us/arti-
cle/dyz3v7/online-drug-markets-are-entering-a-
golden-age 
Sonntag,  M.,  2015.  Rechtsfragen  im  Zusammenhang  mit 
dem Betrieb eines Anonymisierungsdienstes, JusIT 6, 
2015, 215-222 (ISSN 1996-8228) 
Szoldra, P., 2016. This is everything Edward Snowden re-
vealed  in  one  year of unprecedented  top-secret  leaks, 
https://www.businessinsider.com/snowden-leaks-time-
line-2016-9 
TorRelayGuide,  https://trac.torproject.org/pro-
jects/tor/wiki/TorRelayGuide#DNSonExitRelays 
Weidenhammer,  D.,  Gundlach,  R.,  2018.  Wer  kennt  den 
„Stand der Technik“? DuD 2/2018, 106-110.