Just fyi, security through obscurity is a derogatory term in most security circles. You want to have security through correctness, security in depth, security via strong cryptographic primitives, security by whatever, but security through obscurity is not something to aim for at all. Unless you are Microsoft and don't want to reveal your source code while still pretending that you are increasing security by keeping it secret . Secondly, running as an exit is bad because you might be raided over it, but running as a relay decreases your anonymity significantly as well and should also be avoided. if you want to contribute to Tor, buy a VPS and run it as an exit or relay. I would avoid running as an exit or relay on a computer on a network that I use for anything I want to remain anonymized, and I would certainly avoid running an exit if I didn't want to chance being raided over someone elses bullshit. In some cases LE ignore Tor exit IPs entirely because they know they can't trace them and don't want to harass the exit node operator, in other cases they kick in the door and haul your ass off to jail on CP charges and it takes a few days to sort things out plus they keep your PC for a long time for evidence, in some cases people have even been raided by CIA type agencies (not in USA so not actually CIA). Police forces of the world are widely different in their understanding of Tor and their standard procedures, do you want to risk that the police agency that saw your tor exits IP downloading CP + your own local police force have no fucking clue about Tor? If they are not checking Tor exit lists and filtering those off of the lists of IPs they see downloading CP, you will be treated as anyone else who they suspect of downloading CP or sending bomb threats or whatever, and that means you could wake up with a bunch of thugs pointing guns at your face and ripping your house apart.