I run a Tor exit node (not just relay) in Australia from my residential home for about a decade now, and I’ve gotten contacted by multiple law enforcement officials now, although not frequently anymore.
Thankfully each and every one was resolved quickly when I explained I run a Tor exit node, to help people in dictatorships bypass their censorship. I’m surprised actually.
It’s probably on file somewhere which is why I haven’t been hassled for years now.
and one day, you're gonna get a knock on your door, and some law enforcement officers will ask you very nicely to install a backdoor or a wiretap onto your tor exit node.
They wouldn't need to. They'd ask his residential ISP to monitor him instead.
If you're using Tor, take it as a base assumption that the exit node is logging your traffic, or even modifying your http traffic.
Tor's value is in concealing the association between your visible access of an entry node, with visible activity on an exit node.
That’s right, Tor doesn’t mean your traffic is completely hidden for the public web. It just attempts to break the link.
The list of exit nodes are public, it’s not a difficult exercise for Five Eye to intercept like >90% of its traffic through the ISP or backbone level.