I was curious for Monero dev's rationale to pick I2P over Tor, and then even
forking I2P as Kovri.
Whatever I've seen online doesn't strike me as particularly convincing.
Is there published research in regards to deanonymization attacks against both
Tor
and I2P, and given the design changes o
On Sun, Dec 25, 2016 at 12:32:33AM +0100, torphone 5x wrote:
> Hi,
>
> copperheados user here.
While speaking about CopperheadOS. The last supported tablet is Nexus 9.
Except, it's no longer supported by Google after October this year.
So actually not supported by anybody, really.
Pixel C coul
https://pay.reddit.com/r/Bitcoin/comments/2bwds2/what_does_the_worlds_fastest_tor_node_have_to_do/
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
http://blog.exodusintel.com/2014/07/23/silverbullets_and_fairytails/
SILVER BULLETS AND FAIRY TAILS
Introduction
This week we made mention on Twitter of a zero-day vulnerability we’ve
unearthed that affects the popular Tails operating system. As the Tails website
states:
Tails is a live opera
http://arstechnica.com/security/2014/07/tor-developers-vow-to-fix-bug-that-can-uncloak-users/
Tor developers vow to fix bug that can uncloak users
Weakness was topic of talk abruptly pulled from security conference.
by Dan Goodin - July 22 2014, 8:15pm CEST
Developers of the Tor privacy serv
https://www.techdirt.com/articles/20140721/11362227955/carnegie-mellon-kills-black-hat-talk-about-identifying-tor-users.shtml
Carnegie Mellon Kills Black Hat Talk About Identifying Tor Users -- Perhaps
Because It Broke Wiretapping Laws
from the questionable-legality dept
There's some buzz in
https://pay.reddit.com/r/TOR/comments/2b8oq3/please_read_if_you_usedepend_on_tor_never_before/
Please read if you use/depend on Tor. Never before seen FH information.
(self.TOR)
submitted 16 hours ago * by Deepthroat2 [+1]
Hello everyone, I have some information that I have been dying to share
Of potential interest to some Tor users here.
- Forwarded message from coderman -
Date: Thu, 10 Jul 2014 17:29:42 -0700
From: coderman
To: John Young , cpunks ,
liberationtech , grarpamp
Subject: Re: [liberationtech] data mine the snowden files [was: open the
snowden files]
Message
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1
Errata Security
Advanced persistent cybersecurity
Friday, July 04, 2014
Jamming XKeyScore
Back in the day there was talk about "jamming echelon" by adding keywords to
email that the echelon system was supposedly looking for. We
On Fri, Jul 04, 2014 at 07:21:07AM -0500, ba...@clovermail.net wrote:
> Does the NSA barter this database of suspicious extremists with
> foreign services?
They do, according to Drake.
> Certainly there are some friendly services eager to get their hands
> on IP addresses
> of NSA selected suspi
http://www.heise.de/newsticker/meldung/XKeyscore-Quellcode-Tor-Nutzer-werden-von-der-NSA-als-Extremisten-markiert-und-ueberwacht-2248328.html
All accesses (several 100 k/day) to Tor directory authorities (at least some
IPs
hardcoded, Sebastian Hahn one of the targets) intercepted and logged, T
Apologies, not sure this has been posted already in the thread, I'm
backlogged.
https://rdns.im/court-official-statement-part-1
Court – Official statement part #1
Posted on July 2, 2014 by Will
As seen possibly here, or here i lost the Tor case and was sentenced to 3
years probation (instead
http://www.technologyreview.com/news/521856/group-thinks-anonymity-should-be-baked-into-the-internet-itself/
Group Thinks Anonymity Should Be Baked Into the Internet Itself
Following NSA surveillance revelations, talks advance on making the
privacy-protecting tool Tor an Internet standard.
By D
On Tue, Oct 22, 2013 at 10:09:52PM +0600, Roman Mamedov wrote:
> > 1).I think Cody Wilson is working on a bitcoin wallet in a browser.
>
> Please stop trying to make people build buttcoin wallets into everything. Not
> everyone may be a fan of your "satoshi"-shitoshi pyramid scheme, shocked eh?
On Sun, Oct 20, 2013 at 08:54:12PM +0200, Antispam 06 wrote:
> My own. Never published as the spammers seem hungry for addresses.
> Compiled by spending time around privacy or security lists. Somehow
> like the /ignore in IRC.
I went exactly the other way. I've been doing about
zero filtering for
On Fri, Oct 18, 2013 at 04:05:58PM +0600, Roman Mamedov wrote:
> Several years down the road, when the fashionable shortener service of the day
> is long dead in the water, to a future reader there is no way to tell where
> this URL used to go, and not knowing the URL they can't even use the Inter
On Thu, Oct 17, 2013 at 01:40:43PM +, Marcos Eugenio Kehl wrote:
> 1. Wich version of Linux do you recomend to use with Tor in a virtual
> machine? Ubuntu? Linux Mint? Other? Why?Wich is the most recomended site to
> download Linux?
> Best regards!
> Marcos Kehl (Brasil)
I would look into T
On Thu, Oct 17, 2013 at 08:18:59AM +0200, Felix Eckhofer wrote:
> tried very hard to find any suggestion on how this might work in
> your mail to no avail. Are you actually suggesting "extensive
> personal interviews, background checks, giving polygraph tests,
> injecting sodium pentathol to those
On Mon, Oct 14, 2013 at 11:35:05AM -0400, jake.tar...@gmail.com wrote:
> What do you guys think of riseup.net?
Not playing in the same league as own-hosted software.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.or
On Mon, Oct 14, 2013 at 12:40:16PM +0100, mick wrote:
> Not strictly on topic, but why do you think you need a groupware
> application? Why not simply install postfix/exim and dovecot/courier (or
> whatever your MTA and IMAP/POP3 server of choice).
Zimbra might be another option, if you need more
On Thu, Oct 10, 2013 at 06:40:22PM -0300, Juan Garofalo wrote:
> The staged release may be a good idea, but have they got the timing
> right?
Probably not, but processing that pile of information is hard work.
> this article is dated June 6
>
>
> http://www.theguardian.co
On Wed, Oct 09, 2013 at 07:32:35PM -0300, Juan Garofalo wrote:
> Why hasn't Snowden published all the stuff he got from the NSA
> nazis? Why hasn't he uploaded it to wikileaks for instance? Or
> torrented it?
He seems to believe in responsive disclosure (Cablegate set a few
ops in the field
On Mon, Oct 07, 2013 at 11:59:42AM -0700, Blibbet wrote:
> BTW, UEFI-based systems have a full IPv4/IPV6 network stack, with
> PXE remote boot and WS-Management remote admin/control, and tools
> like Perl and Telnet baked-in, so make sure your firmware isn't
> spewing packets before Linux and Tor
uch
point from an anonymity point of view.
--
Tim Retout
___
Freedombox-discuss mailing list
freedombox-disc...@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss
----- End forwarded message -
On Fri, Oct 04, 2013 at 08:57:04AM -0700, Gordon Morehouse wrote:
> I *think* people are mistaking VPN for VPS here - I can't find the
> source, but there was some well distributed speculation that the FBI
> was easily able to obtain a server image without disrupting the site
> itself by having a
On Thu, Sep 26, 2013 at 10:29:14AM -0400, David Green wrote:
> Upgrading to Leopard (10.5) has always been an option for myself, but I
> invariably find, with minor work, upgrading is never required -- and yes,
> IMHO, I have never been insecure or threatened in any IT way.
I run the system headl
On Thu, Sep 26, 2013 at 08:32:39AM -0400, David Green wrote:
> Red Hat or Centos and or Debian; yes they do and have appealed, alas I have
> a perfectly good and secure OS X Tiger -- which I have no reason to
> upgrade... Oops, I have wasted time defending myself before, so I
> will not.
Hey, I
On Thu, Sep 12, 2013 at 05:40:57PM -0400, Nathan Suchy wrote:
> I like that idea. We need processer companies to stop owning their products
> and to just let them go after we buy the product. It sucks being locked
> into one solution...
Parallella Epiphany is soon shipping with a 85 kGate FPGA (Zy
sts.nycbug.org/mailman/listinfo/tor-bsd
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8
http://www.reddit.com/r/TOR/comments/1m3jum/gchq_tor_events_capture/
GCHQ 'Tor Events' Capture... (scribd.com)
submitted 3 hours ago by kant_go_on
6 commentssharesavehidereport
all 6 comments
sorted by: best
formatting helpreddiquette
save
[–]kant_go_on[S] 3 points 3 hours ago
Anyone seen this?
On Mon, Sep 09, 2013 at 05:24:31PM -0400, Nathan Suchy wrote:
> Well, why don't you write your own bios?
Even coreboot helps you very little, as there is simply too much
proprietary crap in a typical PC platform where you can drop
undetectable (out of band) malware.
You need completely open hardw
s set for
maximum one recipient.
linux-elitists mailing list
linux-eliti...@zgp.org
http://zgp.org/cgi-bin/mailman/listinfo/linux-elitists
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
I
aphy
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
On Fri, Sep 06, 2013 at 02:46:06PM +0200, Andreas Krey wrote:
> On Fri, 06 Sep 2013 14:04:58 +0000, Eugen Leitl wrote:
> ...
> >
> > I wouldn't use TrueCrypt. Use open source tools (this includes the OS).
>
> Is there a connection between the two sentences? TrueC
On Fri, Sep 06, 2013 at 08:00:21AM -0400, Nathan Suchy wrote:
> If your so paranoid then encrypt your Tor Browser Bundle with TrueCrypt
I wouldn't use TrueCrypt. Use open source tools (this includes the OS).
> then wipe the hard drive and destroy the computer when your done. Traffic
> Correlation
mmies.
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org
AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
--
tor
On Thu, Sep 05, 2013 at 12:45:42PM +0200, Lunar wrote:
> Eugen Leitl:
> > http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf
> >
> > Content and popularity analysis of Tor hidden services
>
> Watch out for dead horses [1] and see the previous discussion
http://cryptome.org/2013/09/tor-analysis-hidden-services.pdf
Content and popularity analysis of Tor hidden services
July 29, 2013
Alex Biryukov
University of Luxembourg alex.biryu...@uni.lu
Ivan Pustogarov University of Luxembourg ivan.pustoga...@uni.lu
Ralf-Philipp Weinmann University of Lu
On Tue, Sep 03, 2013 at 10:06:36PM +, mirimir wrote:
> How would one identify new, and suddenly very popular, hidden services?
Ask the NSA? ;)
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/
On Mon, Sep 02, 2013 at 05:30:27PM +0200, Lunar wrote:
> Eugen Leitl:
> > I can verify signatures on Tor source packages, using key fingerprint given
> > out of band. How do I do that for https://www.torproject.org/docs/debian
> > "Building from source" (BT
I can verify signatures on Tor source packages, using key fingerprint given
out of band. How do I do that for https://www.torproject.org/docs/debian
"Building from source" (BTW, amd64 deps are missing quilt)?
These would be weasel's signature, not Roger's, right? Thanks.
--
tor-talk mailing list
On Fri, Aug 30, 2013 at 01:03:49PM +0400, mamoeb mamoeb wrote:
>
>
>
> Четверг, 29 августа 2013, 23:21 UTC от mirimir :
> >On 08/29/2013 10:04 PM, mamoeb mamoeb wrote:
> >
> >> Поднял onion сайт получил доменное имя onion. Вопрос как его изменить?
> >> вместо рандомных знаков в начале добавить
I've managed to lay my hands onb a couple of Lenovo X60's that are
in pretty good shape and would like to use them as a moderately secure
communication/development system. (I'm not trusting my desktops,
servers or mobile devices for obvious reasons). I'm loath to modify
the hardware at this po
https://blog.torproject.org/blog/join-us-tor-hack-day-munich-germany
JOIN US - Tor Hack Day, Munich, Germany
Posted July 8th, 2013 by kelley in dev meeting hack day
Join us for a public hack day on Friday, July 26, 2013 in Munich, Germany.
Thank you to our hosts at the Technische Universität Mü
On Sat, Jul 20, 2013 at 03:43:55PM -0400, Nathan Suchy wrote:
> The NSA cannot always know who is behind Tor. This is due to the fast that
Tor is not designed to resist a global passive adversary.
> tor uses a circut guard - middle - exit and unless the NSA can get access
> to the guard's isp, th
On Thu, Jul 18, 2013 at 10:45:27AM +, Andrew F wrote:
> What are the issues with Hardware cypto?
Hardware is not inspectable, unless open, and
verified to function by an audit.
The sad reality of USB drive encryption:
http://www.h-online.com/security/news/item/NIST-certified-USB-Flash-drives
On Thu, Jul 04, 2013 at 11:39:43PM +, adrelanos wrote:
> > One can run Tor relays through VPNs with port forwarding.
>
> That just pushes the risk one step further. If Tor gets banned, VPN
> services get banned all in one go.
Great -- they should just pass a law than bans shipping software
w
On Thu, Jul 04, 2013 at 09:01:27PM +, adrelanos wrote:
> Also keep in mind, that there are no Tor servers in China. When the US
> starts banning Tor, it will be almost the end of the Tor network. The
The moment they ban Tor it will be the moment the network will
start growing beyond your wild
On Tue, Jun 18, 2013 at 05:22:26PM +, adrelanos wrote:
> At the moment most techies just don't believe or can't imagine that
> anyone has more difficulties using a mailing list compared to a forum.
I very much doubt that.
It's just that mailing lists/IRC work well for us, and browser-based
On Tue, Jun 18, 2013 at 07:24:58PM +0600, Roman Mamedov wrote:
> On Tue, 18 Jun 2013 14:36:50 +0200
> Eugen Leitl wrote:
>
> > Why not FB or G+, or whatever.
>
> Well for one, because it will be kind of hilarious when you won't be able
> to use the Tor forum/gr
On Tue, Jun 18, 2013 at 10:14:24AM +0600, Roman Mamedov wrote:
> That said however I don't see a 10 minute delay as a terrible problem, E-Mail
> is
> not a real-time medium anyway.
It can be. If it's set up right.
___
tor-talk mailing list
tor-talk@lis
On Mon, Jun 17, 2013 at 06:51:05PM -0700, Cat S wrote:
> 2. This e-mail you wrote only very recently appeared in my Yahoo! inbox, and
> I refresh every couple of minutes. Your second e-mail that's up on Tor Talk
> hasn't even arrived in my inbox yet. That's why I'm so pissed that Tor deiced
> t
specifically on VOIP traffic, but the latency/jitter
seems to me to do a pretty good job of making timing attacks
unreliable for now.
-RRB
--
Too many emails? Unsubscribe, change to digest, or change password by emailing
moderator at compa...@stanford.edu or changing your settings at
https://mailm
On Fri, May 31, 2013 at 05:07:47PM -0300, Juan Garofalo wrote:
>
> >
> >Agreed, although the privacy policy for their Public DNS service seems
> >decent:
> >https://developers.google.com/speed/public-dns/privacy
> >
> >TL;DR They wipe requesting IP addresses from their logs after 48 hours,
>
>
On Thu, May 23, 2013 at 09:54:23AM -0700, Seth David Schoen wrote:
> krishna e bera writes:
>
> > Would it be advisable to setup a small pool of random logins that Tor users
> > could share?
>
> In the late 1990s people upset with the trend of requiring accounts on
> Internet sites started a con
On Sat, Apr 13, 2013 at 01:14:16PM -0400, grarpamp wrote:
> > Sure, i2P exists, but who wants to spin up a huge honking java virtual
> > machine just to participate in that relay pool?
>
> It's actually pretty easy and can run on modest hardware as a node.
I disagree about modest hardware. Anyth
On Thu, Apr 04, 2013 at 01:55:40PM -0400, Gregory Disney wrote:
> Just saying TOR was created by the Naval Research Laboratory a part of
The name's Tor, not TOR.
> DARPA. Since it's inception they could index, spider and track the dark
> net.
___
tor-ta
On Wed, Feb 06, 2013 at 09:02:35PM -0500, Andrew Lewman wrote:
> The Tor Project doesn't officially endorse anything. We use 1984.is for
> hosting some of our infrastructure. And they are made up of fine
> individuals willing to support us. We don't have, nor give out,
Thanks, that's good enough
I take https://blog.torproject.org/category/tags/iceland
as an official endorsement of 1984.is for freedom-minded
hosting.
Is that a correct interpretation?
Thanks.
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cg
On Fri, Jan 25, 2013 at 02:38:11AM -0800, Linux Foundation wrote:
> I do recommend you one cool hosting provider - http://hosting.wedos.com
> His offer is very comfortable, good prices and if your offer on the page
> doesn't suit you exactly, you can settle more details individually. They're
>
Hi -- I'm shopping around for a virtual server in a privacy-minded
jurisdiction, for a low-budget organization.
I'm currently looking at Iceland, and hosters like 1984.is
Are there countries and hosters with comparable attitudes to
privacy? I'm looking for a virtual servers in 20-30 EUR/month
On Mon, Jan 07, 2013 at 11:29:06PM -0500, grarpamp wrote:
> > It is an interesting questions, if with a modern user interface, can they
> > get to new life?
>
> I see no reason the state of the art from the legacy remailer types
> can't be combined and updated into a new service running on some
>
http://www.reddit.com/r/darknetplan/comments/15sxwv/i_have_made_a_tor_bridge_available_over/c7pwd89
[–]HyperGrundy[S] 2 points 29 minutes ago*
Sure! First a warning: Tor will leak your IPv4 internet address to clients
using your bridge even if they are connecting only through cjdns, so don't se
On Fri, Dec 07, 2012 at 09:50:32PM +, Aaron Brouard wrote:
> I'm trying to make my hidden service more secure. It runs on a server
> running Ubuntu 12.04.1 LTS server version. I have set up full disk
If you can't place the service on physically distinct machines,
private (RFC1918) address spac
On Thu, Dec 06, 2012 at 03:11:20AM -0800, Edwin Farnworth wrote:
> I want to know how to purchase merchandise on silk road using tor-talk
Tor-talk is a mailing list. I doubt the Silk Road accepts
mailing lists as currency. Pro tip: try Google.
___
tor-t
ftware Tool & Die| Public Access Internet | SINCE 1989 *oo*
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://po
, I'm
notoriously bad with names.
OTOH, I have met, remember, and greatly respect the Tor engineers.
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820
node
you should familiarise yourself with the Electronic Frontier
Foundation's Legal FAQ on the topic at
https://www.eff.org/torchallenge/legal-faq/]
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
_
e chance [and] then I
won't contact you again." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl
al
> offering", then Comcast is doing exactly the same thing...
No they are not. See previous.
- Brian
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100,
have overstepped here
if the only reason was the TOR exit point, but having a TOR exit point
to me, seems to be condoning the actions/statements/packets used through
the exit point. You are knowingly hiding information that your local
government may require you to disclose.
Short answer... don
ned by law, this
is less simple. Is a Tor node covered by the law ? If so, then it is non
compliant of it fails to colect the law mandated logs.
If the Tor node is not covered by the law, then law enforcment cannot
complain if there are no logs to analyse.
- End forwarded message -
--
Eu
.
(Also, feel free to cite actual statute or case law that says TOR is by
*definition* or finding of fact, a "knowingly illegal offering" in and
of itself - distinct from what uses the user thereof may do with it.
Absent that, it's not a "knowingly illegal offering" the
ou
never had.
>
> Short answer... don't use TOR. It's not a bad thing, but it's not a good
> thing either.
I strongly disagree. TOR is a tool. It's a very good thing in its ability to
enable democratizat
." - Direct Marketing Ass'n position on e-mail spam(CNN)
With 24 million small businesses in the US alone, that's way too many apples.
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
On Sat, Dec 01, 2012 at 04:20:38PM +0200, Maxim Kammerer wrote:
> On Sat, Dec 1, 2012 at 3:00 PM, Eugen Leitl wrote:
> > I was chewed out for losing the threading info when I forwarded,
> > now Maxim dislikes bounces. You just can't make it right for
> > some people.
&g
On Sat, Dec 01, 2012 at 02:37:30PM +0200, Maxim Kammerer wrote:
> Is it possible to configure the tor-talk mailing list to discard
> messages not explicitly addressed to it? Like this nanog discussion.
I was chewed out for losing the threading info when I forwarded,
now Maxim dislikes bounces. You
ws us to clearly
discern that this is what it purports to be and not simply an attempt
to shut down a Tor node (and intimidate the operators of others)
by using a plausible excuse based on a universal hot-button issue?
---rsk
- End forwarded message -
--
Eugen* Leitl http://leitl.org";&g
it was bound to happen. Running anything , TOR or
>>> otherwise, that allows strangers to do whatever they want is just folly.
>> Such as, say, an Internet Service Provider business?
>>
>> ...
>>
>
- End forwarded message -
--
Eugen* Leitl http://
mate, applicable and realistic take on
appropriate cases for desiring anonymity in such a transaction
>
> --
> Jim Mercer Reptilian Research j...@reptiles.org+1 416 410-5633
> "He who dies with the most toys is nonethe
Things We Like (Lots), jotwell.com
U. Miami School of Law, P.O. Box 248087, Coral Gables, FL 33124 USA
+1 (305) 284-4285 |+1 (305) 284-6506 (fax) | froom...@law.tm
-->It's warm here.<--
- End fo
one that results in termination of
the service rather than an obligation to pay).
>
> Miles Fidelman
--
A. Michael Froomkin, http://www.law.tm Blog: http://www.discourse.net
Laurie Silvers & Mitchell Rubenstein Distinguished Professor of Law
Editor, Jotwell: The Journal of Things
net access service, including but not limited to
wireline, cable modem, satellite, wireless, fixed wireless, and
broadband access via powerline are subject to CALEA" (
http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-05-153A1.pdf )
If you're not a facilities-based provider, you
The Journal of Things We Like (Lots), jotwell.com
U. Miami School of Law, P.O. Box 248087, Coral Gables, FL 33124 USA
+1 (305) 284-4285 |+1 (305) 284-6506 (fax) | froom...@law.tm
-->It's warm here.<--
- End forwarded message -
--
Eugen* Leitl http://leitl.org
__
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
_
h as blogging sites, Wikis, etc; where the site is
> "publishing" content but not creating it or exerting control over it,
> etc.
>
> This is US specific, and the case of a user in Austria is entirely
> unrelated to US law, but I don't know that this type of response would
&
don't know that this type of response would
hold up in US court for these reasons. I am going to ping my internet
law contacts in the US and see what they think, as IANAL.
--
-george william herbert
george.herb...@gmail.com
- End forwarded message -
--
Eugen* Leitl http://leitl.org&
t I know of.
--
-george william herbert
george.herb...@gmail.com
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE:
of what Tor is in the US and be generally reasonable in
responding to issues with it, that I know of.
--
-george william herbert
george.herb...@gmail.com
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
r these reasons. I am going to ping my internet
law contacts in the US and see what they think, as IANAL.
--
-george william herbert
george.herb...@gmail.com
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
william herbert
george.herb...@gmail.com
----- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
__
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 0
it's true, it was bound to happen. Running anything , TOR or
>> otherwise, that allows strangers to do whatever they want is just folly.
> Such as, say, an Internet Service Provider business?
>
> ...
>
----- End forwarded message -
--
Eugen*
ing it's true, it was bound to happen. Running anything , TOR or
> otherwise, that allows strangers to do whatever they want is just folly.
Such as, say, an Internet Service Provider business?
...
--
-george william herbert
george.herb...@gmail.com
- End forwarded message -
--
E
j...@baylink.com
Designer The Things I Think RFC 2100
Ashworth & Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA #natog +1 727 647 1274
- End forwarde
p; Associates http://baylink.pitas.com 2000 Land Rover DII
St Petersburg FL USA #natog +1 727 647 1274
- End forwarded message -
--
Eugen* Leitl http://leitl.org";>leitl http://leitl.org
___
- Forwarded message from elijah wright -
From: elijah wright
Date: Thu, 29 Nov 2012 13:38:51 -0600
To: Eugen Leitl
Cc: na...@nanog.org
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
We had a guy (aka potential customer) inquire the other
our nose out and say you're specifically offering anon
> accts and watch out I guess.
Do you think if the police found out child pr0n was being served from a
starbux they wouldn't confiscate the equipment from that store?
--
TTFN,
patrick
- End forwarded message --
y offering anon accts and
watch out I guess.
--
-Barry Shein
The World | b...@theworld.com |
http://www.TheWorld.com
Purveyors to the Trade | Voice: 800-THE-WRLD| Dial-Up: US, PR,
Canada
Software Tool & Die| Public Access Interne
tcoin, Liberty Reserve, Neteller) feel free
> to send me a mail (will...@william.si) or a PM, or contact me in LET
> IRC.
>
> Thanks!
> William
>
>
>
>
> --
> --C
>
> "The dumber people think you are, the more surprised they're going to
> be wh
coin, Liberty Reserve, Neteller) feel free
> to send me a mail (will...@william.si) or a PM, or contact me in LET
> IRC.
>
> Thanks!
> William
>
>
>
>
> --
> --C
>
> "The dumber people think you are, the more surprised they're going to
> be when
1 - 100 of 196 matches
Mail list logo