Moritz Bartl mor...@torservers.net wrote:
On 12.01.2011 22:05, Fabian Keil wrote:
Some of my equipment got seized a few months ago.
Good luck on getting it back then!
Thanks.
I'm also not sure how the police would try to seize equipment
and fail (assuming the equipment is actually
Hi!
On Thu, Jan 13, 2011 at 3:01 AM, Roger Dingledine a...@mit.edu wrote:
This is related to the if you remove Tor from the world, you're not
really reducing the ability of bad guys to be anonymous on the Internet
idea.
This could be then analog argument as saying that if you remove one
Hi,:
What the hell are you talking about? The whole idea of Tor is anonymity,
and you want Tor to make it easy to identify its users?
Thomas Jefferson already answered your question: The man who would
choose security over freedom deserves neither.
If you want security over freedom, you're
Thus spake Mitar (mmi...@gmail.com):
This is related to the if you remove Tor from the world, you're not
really reducing the ability of bad guys to be anonymous on the Internet
idea.
This could be then analog argument as saying that if you remove one
weapon factory from the world, that
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
thus Mike Perry spake:
Some of us are also compiling abuse response templates. The goal for
abuse responses is to inform people about Tor, and to suggest
solutions for their security problems that involve improving their
computer security for the
Thus spake Timo Schoeler (timo.schoe...@riscworks.net):
Some of us are also compiling abuse response templates. The goal for
abuse responses is to inform people about Tor, and to suggest
solutions for their security problems that involve improving their
computer security for the Internet
Am 12.01.2011 09:32, schrieb Timo Schoeler:
thus Mike Perry spake:
Some of us are also compiling abuse response templates. The goal for
abuse responses is to inform people about Tor, and to suggest
solutions for their security problems that involve improving their
computer security for
Thus spake Mike Perry (mikepe...@fscked.org):
Is there any place (e.g. in a wiki) where one could find or even upload
his own 'response template', as I might assume that they will be very
specific to the country's law they're issued?
Here's the (freshly updated) set of abuse complaints
The BSI comment had me rolling on the floor. Could you imagine the
paperwork? If you're going to RSA, they'll be there.
On Tue, Jan 11, 2011 at 3:28 PM, Dirk noi...@gmx.net wrote:
ok... since this mailing list is not able to give at least some tips for
running a tor exit node except:
Do
Moritz Bartl mor...@torservers.net wrote:
ok... since this mailing list is not able to give at least some tips
for running a tor exit node except:
What do you want to know exactly? In many countries, running an
anonymizing service is definitely not illegal. Many exit operators run
into
Hi,
On 12.01.2011 22:05, Fabian Keil wrote:
Some of my equipment got seized a few months ago.
Good luck on getting it back then!
I'm also not sure how the police would try to seize equipment
and fail (assuming the equipment is actually there).
Explosives? ;-)
Did you run a Tor exit at
Am 12.01.2011 22:48, schrieb Moritz Bartl:
Did you run a Tor exit at home? I'm not sure if they come and seize your
home computer if the Tor server is hosted in a data center. Olaf seems
not to have run into big trouble yet (or maybe he was quick on replacing
the hardware).
running an exit
Hi!
On Wed, Jan 12, 2011 at 12:52 AM, Moritz Bartl mor...@torservers.net wrote:
Most complaints you will have to deal with can be easily solved by
telling them about Tor. In extreme cases, the police might come knocking
to your door or even try to seize your equipment, but I am only aware of
Hi!
But I wan't a legally binding statement from a lawyer or an official (BSI)
that running TOR exit nodes
in germany is legal.
In Slovenia there is a law (for Internet commerce) that persons just
passing data around, not changing it, choosing destination or source,
filter, etc, are not
Hi,
On top of this, it is *illegal* in Germany to keep user identifiable
data unless required for billing purposes.
Telemediengesetz §15 Nutzungsdaten
http://www.gesetze-im-internet.de/tmg/__15.html
Let me translate the first paragraph:
§15 Usage Data
(1) The service provider may collect
Hi!
On Thu, Jan 13, 2011 at 12:46 AM, Moritz Bartl mor...@torservers.net wrote:
On top of this, it is *illegal* in Germany to keep user identifiable
data unless required for billing purposes.
I think it is allowed but you have to clearly inform users of this
(register this data collection with
Hi!
On Wed, Jan 12, 2011 at 6:26 AM, Mike Perry mikepe...@fscked.org wrote:
and to suggest
solutions for their security problems that involve improving their
computer security for the Internet at large (open wifi, open proxies,
botnets),
I am not sure what you mean by that? That there should
On 13.01.2011 01:01, Mitar wrote:
On top of this, it is *illegal* in Germany to keep user identifiable
data unless required for billing purposes.
I think it is allowed but you have to clearly inform users of this
(register this data collection with data privacy agency) and reasons
for it and
On Thu, Jan 13, 2011 at 01:17:33AM +0100, Mitar wrote:
On Wed, Jan 12, 2011 at 6:26 AM, Mike Perry mikepe...@fscked.org wrote:
and to suggest
solutions for their security problems that involve improving their
computer security for the Internet at large (open wifi, open proxies,
botnets),
On Jan 12, 2011, at 9:01 PM, Roger Dingledine wrote:
On Thu, Jan 13, 2011 at 01:17:33AM +0100, Mitar wrote:
On Wed, Jan 12, 2011 at 6:26 AM, Mike Perry mikepe...@fscked.org wrote:
and to suggest
solutions for their security problems that involve improving their
computer security for the
ok... since this mailing list is not able to give at least some tips for
running a tor exit node except:
Do it. or We do have a lawyer (how is that supposed to help me?)
I will just ask the german Bundesamt für Sicherheit in der
Informationstechnik (https://www.bsi.bund.de) howto setup a TOR
Dirk,
I don't think anyone on this list is too cool to give instructions, it is
just that instructions already exist.
The Tor Project website has information on how to set up a relay.
http://www.torproject.org/docs/tor-doc-relay.html.en
http://www.torproject.org/docs/faq.html.en
Hi Dirk,
ok... since this mailing list is not able to give at least some tips
for running a tor exit node except:
What do you want to know exactly? In many countries, running an
anonymizing service is definitely not illegal. Many exit operators run
into trouble with their ISP, because they are
Moritz Bartl wrote:
Hi Dirk,
ok... since this mailing list is not able to give at least some tips
for running a tor exit node except:
What do you want to know exactly? In many countries, running an
anonymizing service is definitely not illegal.
This stuff:
On Tue, Jan 11, 2011 at 7:29 PM, Dirk noi...@gmx.net wrote:
Moritz Bartl wrote:
Hi Dirk,
ok... since this mailing list is not able to give at least some tips
for running a tor exit node except:
What do you want to know exactly? In many countries, running an
anonymizing service is
Dirk,
Considering I2P's German home I think you should go back to what others have
said, it's not a matter of Legal, it's a matter of reducing activity that
might raise the alarm of other people. So read the links sent, consider the
port limitations, and work up from there.
If you really need to
On Wed, 12 Jan 2011 02:29:49 +0100
Dirk noi...@gmx.net wrote:
But I wan't a legally binding statement from a lawyer or an official
(BSI) that running TOR exit nodes in germany is legal.
Ask the CCC for a start. They have defended many Germans already.
--
Andrew
pgp 0x74ED336B
Thus spake Dirk (noi...@gmx.net):
ok... since this mailing list is not able to give at least some tips
for running a tor exit node except:
What do you want to know exactly? In many countries, running an
anonymizing service is definitely not illegal.
This stuff:
28 matches
Mail list logo