At this point, the state of IPv6 support in Tor is already pretty good. IPv4-only clients can access IPv6-only sites, and IPv6-only clients can access IPv4-only sites. No configuration is needed. It actually makes Tor an useful 4to6 bridge. Also, hosting Onion Service on a pure IPv6 network is possible and should be reachable by everyone, opening up some possibilities (just like Onion Service behind a NAT opens up possibilities).
It's surprising how many ipv4 problems tor can solve if you're network is a mess.
I used to use it all the time in college to ssh back into my laptop/desktop when I didn't have a public ipv4 address.
I wonder who is actually hosting tor exit nodes. I doubt anyone is hosting them on their home network since that would be asking to be blocked from every website at the least.
I have considered running a relay node but I'm not even sure how safe that is.
You don't have to run an exit node to help. Just run a guard / middle node. I have been running nodes at home and in data centers since at least 2014 and the only problems i had was one site that redirected me to their .onion site because it thought i was using Tor and once I couldn't access a website because it was hosted in China which blocks all IPs that host Tor nodes.
For Exit nodes it's more complicated. You should read at least [0][1][2] before thinking about running one.
Better question. Why aren't organisations like Amnesty International, Médecins Sans Frontières, Reporters Without Borders, and even the UN hosting Tor exit nodes? Why do humanitarian organisations not put their speech into practice but leave it to unknown "volunteers" to put up exit nodes?
Ignoring that those orgs will probably have high ranks if you asked a random sample of people about trust, what's the actual difference between them and anyone else?
As long as you are using tls and avoiding packet injection there's little difference. I'm sure plenty of governments own exit nodes themselves. Good on them for contributing to the network.
I have been running a relay node from my home network for 5 months now.
Aside from sometimes melting my cheap router with concurrent connections I did not notice anything out of ordinary.
Relay nodes are unobjectionable. Nothing interesting happens as far as your neighbours are concerned, traffic passes in and out of your node, but that's true for any number of application protocols of no interest.
However the comment you're replying to talks about exit nodes, these are potentially obnoxious for your neighbours, as from them of course emerges traffic that somebody else didn't want to admit to sending.
Now, perhaps it's a young gay guy in a country where homosexuality is illegal, reading an essay by someone who has been in a similar situation.
Or a fourteen year old looking at pornography bypassing a "family filter"
But more likely it's vandals trying to replace every mention of a pop star they don't like on Wikipedia with the words "Jerk Poop-head", a spammer sending piles of unsolicited commercial email, or a botnet operator trying to send C&C packets to direct a DDoS.
For this you will of course get blocked by various services, and explaining it isn't actually you might prevent getting arrested in many jurisdictions, but won't mean everybody lets you use their services from this obviously tainted connection.
So, doing that on your personal ISP connection is probably a bad idea.
I'd like to highlight the point you made about running a non-exit node from your home network: they're unobjectionable.
Running any node strengthens the TOR network as it provides more anonymous paths for users to connect through. Since running a middle node from home doesn't cause any issues for you, doing so is a great way to contribute to the network.
If you have a machine that's always on, has slightly higher specs, and you have slightly higher network speeds too, you might consider running an entry node instead.
What's the difference between a relay and entry node (shouldn't these be indistinguishable, I thought that was part of the point of Tor)? Unless by "entry node" you mean bridge?
I'm running the apx exit node family since about 2015.
For the first few years I've been a regular visitor to the local police (my ISP Hetzner at that time gave my name and address out), but eventually Hetzner banned me for generating too many abuse-tickets for them, which is unfortunate but clearly understandable.
I moved all the servers to a colocated rack in a datacenter in Amsterdam (Netherlands) and haven't had a problem since. But I guess that's only possible because I'm able to deal with the abuse messages directly now.
That said, the servers are handling a few terabytes per day each but I still have only received two abuse messages in the last 2 years. I don't know if that's related to the fact that people complain less now than they did in 2015 and 2016, or that the exit nodes now clearly indicate they are exit nodes (when opening their IP or hostname with a browser).
TL;DR: "most of these exits are set up by volunteers, or 'operators.' A few organizations maintain the larger exits, a number of universities have their own, and individual activists run some too."
If you want to support Tor you could rent a cheap 3$/month VPS and start a non-exit Tor relay there. Many providers will allow you to host a non-exit relay. I do so for years without any issues. Just check that you stay within your traffic limits.
I run an IPv6 enabled exit node and sniff the traffic for research purposes. The vast majority of the traffic is end-to-end encrypted and what's not has not been particularly revealing or illegal.
One thing that is missing with IPv6 is an official list of all IPv6 exit nodes, which means those exits cannot be automatically allowed/denied unless that happens on the basis of behaviour instead of address.