- Forwarded message from Jay Ashworth -
From: Jay Ashworth
Date: Thu, 29 Nov 2012 14:42:11 -0500 (EST)
To: NANOG
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
X-Mailer: Zimbra 6.0.9_GA_2686 (ZimbraWebClient - FF3.0 (Linux)/6.0.9_GA_2686)
-
- Forwarded message from Jay Ashworth -
From: Jay Ashworth
Date: Thu, 29 Nov 2012 14:44:16 -0500 (EST)
To: NANOG
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
X-Mailer: Zimbra 6.0.9_GA_2686 (ZimbraWebClient - FF3.0 (Linux)/6.0.9_GA_2686)
-
- Forwarded message from George Herbert -
From: George Herbert
Date: Thu, 29 Nov 2012 11:50:57 -0800
To: Tom Beecher , NANOG
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
On Thu, Nov 29, 2012 at 11:18 AM, Tom Beecher wrote:
> Assuming it'
- Forwarded message from Tom Beecher -
From: Tom Beecher
Date: Thu, 29 Nov 2012 14:58:25 -0500
To: George Herbert
Cc: NANOG
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
User-Agent: Mozilla/5.0 (Windows NT 5.1;
rv:16.0) Gecko/20121
- Forwarded message from "Naslund, Steve" -
From: "Naslund, Steve"
Date: Thu, 29 Nov 2012 14:00:50 -0600
To: NANOG
Subject: RE: William was raided for running a Tor exit node. Please help if
you can.
I think service providers are afforded special protections because the
law rec
- Forwarded message from George Herbert -
From: George Herbert
Date: Thu, 29 Nov 2012 12:06:28 -0800
To: Tom Beecher
Cc: NANOG
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
On Thu, Nov 29, 2012 at 11:58 AM, Tom Beecher wrote:
> Not reall
- Forwarded message from George Herbert -
From: George Herbert
Date: Thu, 29 Nov 2012 12:14:10 -0800
To: "Naslund, Steve"
Cc: NANOG
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
On Thu, Nov 29, 2012 at 12:00 PM, Naslund, Steve wrote:
> I
On Thu, 29 Nov 2012 18:48:35 +, Jon wrote:
...
> Running a exit node on DSL or Cable from home, is just as safe, I believe,
Remember, people also take fire insurances. That is on about the same
risk/paranoia level as is a raid for a tor exit at home.
Andreas
--
"Totally trivial. Famous last
- Forwarded message from "Naslund, Steve" -
From: "Naslund, Steve"
Date: Thu, 29 Nov 2012 14:42:47 -0600
To: George Herbert
Cc: NANOG
Subject: RE: William was raided for running a Tor exit node. Please help if
you can.
The entire point of Tor is to be untraceable back to the s
- Forwarded message from "Naslund, Steve" -
From: "Naslund, Steve"
Date: Thu, 29 Nov 2012 14:59:18 -0600
To: George Herbert
Cc: NANOG
Subject: RE: William was raided for running a Tor exit node. Please help if
you can.
1. Running open access wireless does not make you legally
- Forwarded message from George Herbert -
From: George Herbert
Date: Thu, 29 Nov 2012 13:17:46 -0800
To: "Naslund, Steve"
Cc: NANOG
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
The entire question here is whether CALEA's covered entities
Hi all,
i would like to measure how much Bandwidth a Tor Client Usage (via
Socks) use over time.
The goal is to have the same data of the Tor Relay bandwidth stats, that
can i can graph, but to collect and save Tor Client traffic (Not Tor
Relay/Tor Exit).
Is it easily possible?
I'm trying to fi
- Forwarded message from Julian Yon -
From: Julian Yon
Date: Thu, 29 Nov 2012 21:08:51 +
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] William was raided for running a Tor exit node.
Please help if you can.
X-Mailer: Claws Mail 3.8.1 (GTK+ 2.24.13; x86_64-pc-linux
On Fri, 30 Nov 2012 08:24:42 +, Eugen Leitl wrote:
...
> On Thu, Nov 29, 2012 at 11:18 AM, Tom Beecher wrote:
> > Assuming it's true, it was bound to happen. Running anything , TOR or
> > otherwise, that allows strangers to do whatever they want is just folly.
>
> Such as, say, an Internet Se
- Forwarded message from "Michael Froomkin - U.Miami School of Law"
-
From: "Michael Froomkin - U.Miami School of Law"
Date: Thu, 29 Nov 2012 18:07:48 -0500 (EST)
To: "Naslund, Steve"
Cc: NANOG
Subject: RE: William was raided for running a Tor exit node. Please help if
you can
- Forwarded message from "Naslund, Steve" -
From: "Naslund, Steve"
Date: Thu, 29 Nov 2012 17:39:21 -0600
To: NANOG
Subject: RE: William was raided for running a Tor exit node. Please help if
you can.
You are correct about most people not falling under CALEA. That also
means th
- Forwarded message from "Michael Froomkin - U.Miami School of Law"
-
From: "Michael Froomkin - U.Miami School of Law"
Date: Thu, 29 Nov 2012 19:29:09 -0500 (EST)
To: Miles Fidelman
Cc: NANOG
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
- Forwarded message from "Michael Froomkin - U.Miami School of Law"
-
From: "Michael Froomkin - U.Miami School of Law"
Date: Thu, 29 Nov 2012 19:29:46 -0500 (EST)
To: "Naslund, Steve"
Cc: NANOG
Subject: RE: William was raided for running a Tor exit node. Please help if
you can
- Forwarded message from Kyle Creyts -
From: Kyle Creyts
Date: Thu, 29 Nov 2012 17:40:25 -0800
To: Jim Mercer
Cc: na...@nanog.org
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
On Thu, Nov 29, 2012 at 2:00 PM, Jim Mercer wrote:
> On Thu, N
- Forwarded message from Owen DeLong -
From: Owen DeLong
Date: Thu, 29 Nov 2012 19:22:48 -0800
To: Tom Beecher
Cc: NANOG
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
X-Mailer: Apple Mail (2.1499)
Yes, but if you are operating a TOR node,
Just thought I'd Add my 2c here. Limiting my response Only regarding
home Wireless access in the US. I was involved in a case with just
this situation.
According to my lawyer there is no consensus on who is responsible for
wifi. Every State has different laws each one is just a vague.
In N
Julian Yon wrote:
> This story has now hit Ars Technica:
> http://arstechnica.com/tech-policy/2012/11/tor-operator-charged-for-child-porn-transmitted-over-his-servers/
There doesn't seem to be any indication that he has been
charged with anything.
Usually raids happen to collect evidence that m
iirc in the Netherlands you're not responsible for illegal actions
commited through your Wifi.
In fact if you're a household and illegal activities are made through
your own internet by one of the household members the state has to prove
wich member it was to prosecute. It is not possbile to j
Asad Haider wrote:
> You can find the full interview and more information at
> http://raided4tor.cryto.net/
| I was handed the interrogation transcript, which I agreed to sign
| after reading it. I was free to go, but again they failed to inform
| me of something of critical importance – that I
- Forwarded message from Rich Kulawiec -
From: Rich Kulawiec
Date: Fri, 30 Nov 2012 07:58:53 -0500
To: na...@nanog.org
Subject: Re: William was raided for running a Tor exit node. Please help if
you can.
User-Agent: Mutt/1.5.20 (2009-06-14)
On Thu, Nov 29, 2012 at 08:04:02AM -05
Hi everyone,
If you are a Tor (exit) relay operator, read
https://lists.torproject.org/pipermail/tor-relays/2012-November/001776.html
(and subscribe to the tor-relays list as well).
--
Runa A. Sandvik
___
tor-talk mailing list
tor-talk@lists.torproject
On Wed, Nov 28, 2012 at 11:37:29PM -, te...@tormail.org wrote:
> > Running a non-exit Tor relay on Linux and have iptables set up to block
> > inbound and outbound RFC1918 addresses on the outside interface. Notice in
> > the firewall logs several seemingly random private IP addresses connectio
On Fri, 30 Nov 2012 10:07:49 -0500
Paul Syverson wrote:
> Could you say more about why you would want to do that? I ask because
> this increases those clients' risk from an AS-level attacker by
> mandating an increase in the number of ASes that must be traversed
> between client and entry node.
On November 30, 2012 at 08:18 joa...@aronius.se (Joakim Aronius) wrote:
>
> I am all for being anonymous on the net but I seriously believe that we
> still need to enforce the law when it comes to serious felonies like child
> pr0n, organized crime etc, we can't give them a free pass just b
>> > Running a non-exit Tor relay on Linux and have iptables set up to block
>> > inbound and outbound RFC1918 addresses on the outside interface. Notice in
>> > the firewall logs several seemingly random private IP addresses connection
>> > attempts to my relay port getting dropped on the outside
> i would like to measure how much Bandwidth a Tor Client Usage (via
> Socks) use over time.
>
> The goal is to have the same data of the Tor Relay bandwidth stats, that
> can i can graph, but to collect and save Tor Client traffic (Not Tor
> Relay/Tor Exit).
Whether or not Tor itself has a knob f
I downloaded the tbb again and I noticed there is only one version for
Linux, UNIX and BSD. I thought these were all totally different operating
systems. I just started with Ubuntu a few months ago so maybe I am
wrong. Does the tbb really work everywhere or is the comment on that
download dead wron
>-Original Message-
>From: Rich Kulawiec [mailto:r...@gsp.org]
>Sent: Friday, November 30, 2012 6:59 AM
>To: na...@nanog.org
>Subject: Re: William was raided for running a Tor exit node. Please
help if you can.
> On Thu, Nov 29, 2012 at 08:04:02AM -0500, Chris quoted (William):
> Yes, i
>>> > Running a non-exit Tor relay on Linux and have iptables set up to
>>> block
>>> > inbound and outbound RFC1918 addresses on the outside interface.
>>> Notice in
>>> > the firewall logs several seemingly random private IP addresses
>>> connection
>>> > attempts to my relay port getting dropped
WAIT A SECOND HERE!?!?
I just read below that this guy runs a large ISP in Austria. I thought
his Tor node was hosted with an external provider. If he runs the ISP,
why would he not host his own server in house? I suppose there are
reasons but I can't think of one, especially if you feel so str
On 11/30/2012 04:01 PM, Naslund, Steve wrote:
I am a little concerned that this guy keeps a safe deposit box with a burner
phone and cash around. Is he a CIA agent? :)
Anyone who DOESN'T have such things stashed away somewhere is, IMHO,
incredibly naive and taking on quite a large amount of
As a network professional do I not have a duty to protect my companies
network from unauthorized access within my ability to do so? I think I
do. If you lost all of your credit card and identity data because I
left an open wifi hotspot on my network would you have a liability case?
I sure think s
OK, there must be a lot more paranoid people out there than I thought
there were. I personally don't have a "runaway kit" stashed away. I
will get right on that. So when that "mouth breather cop" won't believe
you are innocent, your answer is to grab your stuff and go on the lamb
for awhile? I a
>From: Jimmy Hess [mailto:mysi...@gmail.com]
>Sent: Friday, November 30, 2012 3:47 PM
>To: William Herrin
>Cc: NANOG list
>Subject: Re: William was raided for running a Tor exit node. Please
help if you can.
>On 11/29/12, William Herrin wrote:
>> If the computer at IP:port:timestamp transmitt
When is the last time you were arrested, or even in a legal situation
which required your attention as a defendant? It seems pretty straight
forward, but I can assure you this guy is getting very little sleep and
his heart is beating out of his chest. Granted this entire situation is
taking place i
I didn't say anything about trying to run away. That probably won't
accomplish a whole lot in the long run. But when all of your bank
accounts and credit cards are frozen, and your house is a crime scene,
at least you have the means to rent a hotel room, contact
family/lawyers, etc.
And no
On Fri, Nov 30, 2012 at 4:46 PM, Jimmy Hess wrote:
> On 11/29/12, William Herrin wrote:
>> If the computer at IP:port:timestamp transmitted child porn, a warrant
>> for "all computers" is also too broad. "Computers which use said IP
>
> As you know, there may always be some uncertainty about whic
Guess who has power over the networks and Internet. We do and power corrupts
us too. There are some bad guy ISPs and engineers out there too. Just because
you are running a Tor server to allow for "privacy protection" does not mean
you were never doing anything illegal through it. I know thi
On 1/12/2012 9:02 AM, Naslund, Steve wrote:
OK, there must be a lot more paranoid people out there than I thought
there were. I personally don't have a "runaway kit" stashed away. I
will get right on that. So when that "mouth breather cop" won't believe
you are innocent, your answer is to grab
> The cops don't have to present evidence until there is a court case.
> Since this guy was not arrested, they have apparently not decided to
> charge him yet.
You clearly do not understand the general procedure stated in European
crime laws. In most EU countries, the police cannot arrest you, aft
On Fri, 2012-11-30 at 16:31 -0600, Naslund, Steve wrote:
> Guess who has power over the networks and Internet. We do and power
> corrupts us too. There are some bad guy ISPs and engineers out there
> too. Just because you are running a Tor server to allow for "privacy
> protection" does not mean
I forgot - did someone say they keep cash & extra phone in a safe
deposit box (pre paid or contract? Contract phone is no use in a police
crack down)?
If a deposit box, judge could freeze that too, so better hide it in
someone else's house. And what are they gonna say about that? "I need
to
tarb...@mixnym.net wrote:
>I downloaded the tbb again and I noticed there is only one version for
>Linux, UNIX and BSD. I thought these were all totally different
>operating
>systems. I just started with Ubuntu a few months ago so maybe I am
>wrong. Does the tbb really work everywhere or is the co
On 2012-11-30, tarb...@mixnym.net wrote:
> I downloaded the tbb again and I noticed there is only one version for
> Linux, UNIX and BSD. I thought these were all totally different operating
> systems. I just started with Ubuntu a few months ago so maybe I am
> wrong. Does the tbb really work ever
Hello,
I have seen tails sync the clock with UTC just after a network
connection and start browser. How does it do so. It is the ntpupdate ?
How can it sense the net connection ?
Thanks
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lis
50 matches
Mail list logo