Is Shaw a Tor friendly ISP? What is Shaw's position on its customers running Tor relays and/or Tor exit relays?
I only have basic knowledge of Tor, but from what I know that means setting up a server, and doing so is against the Shaw ToS.
Your not setting up a server in the traditionally understood definition of a server, instead, the better definition would be that you are setting up a router.
It would be nice to get an official position on this topic so that Shaw may be added to the list of "Tor unfriendly ISP's". Just so that the community understands Shaw's opinion of internet anonymity and freedom of speech =P.
My understanding of Tor is like creating an anonymous relay network.
Could be similar to Proxying, or similar to an Anonymizer (having one person connect to you to spoof who they really are).
Is this correct?
To even accomplish this, I would think you would need a system with services running accepting connection on ports and forwarding. I would still suggest reading the TOC as was mentioned above, as it seems that may be a grey area.
This is not an official statement from shaw, just giving you my opinion on it, which may be incorrect anyway if my understanding is wrong.
Bandwidth, Data Storage and Other Limitation:
UNDER NO CIRCUMSTANCES WHATSOEVER ARE YOU PERMITTED TO RESELL, SHARE, OR OTHERWISE DISTRIBUTE THE SERVICES OR ANY PORTION THEREOF TO ANY THIRD PARTY WITHOUT THE WRITTEN CONSENT OF SHAW AND PAYMENT OF APPLICABLE FEES.
This would be sharing your connection, the 2nd business WiFi modem service, since it is sold/marketed as an internet sharing service, wouldn't be violation of this - Is my understanding.
Some other parts that might apply,
Multiple Users You acknowledge that you are executing this Agreement on behalf of all persons who use the Services through your computer. You assume all liability for such use of the Services and are responsible for ensuring that all such other users understand and comply with the terms and conditions of this Agreement.
You are responsible for any misuse of the Services that originate from your account, even activities committed by any friend, family, co-worker, employee, guest or anyone with access to the account. You must ensure that others not gain unauthorized access to the Services.
Retrieving data ...