There are projects that scan exit nodes for various heuristics; if they find very bad behavior, they report it to the Tor Project to request a BadExit flag. However, there's no kind of continuum of rankings, just BadExit or not.
My impression from talking to people working on this a few years ago was that they wanted to be a little bit secretive about exactly what they scan for, in order to make it harder for malicious exit operators to anticipate the scans or to distinguish the scans from end-user traffic. There was a suggestion this is an activity that anybody can engage in: if you can think of an attack against Tor users that you know how to detect, you can write your own client that tests for that thing (modifying the path selection algorithm to ensure that you test every exit node!) and then start running your tests. People will be interested in your results.
Let's take Paris case: if you use Ryanair as stipulated, you'll end up in Beauvais which is about 80kms from Paris. You'll need to add a 20€ mandatory bus fare or find a car sharing in order to arrive in the city.
The idea is cool and definitely doable if you are highly organized. But you'll need way more preparation than this vague travel roadmap...
yeah... I've landed in Stansted a few times myself and spent nights at the airport waiting for my 7am flight with Ryanair. London, Brussels and Paris are a bit of a pain.
Feature request: it would be nice to be able to communicate with the indie developer within your website. Maybe though a comment section at the bottom of the page or a community FAQ.
Anyways, nice website I will come back!
Looking forward the rss feed ;)
Does something prevents us from rating tor exit nodes according to their "transparency" and add this rating in the consensus file?
Does anybody already worked on that? I cannot find anything on the internet…