[EMAIL PROTECTED] wrote:
Ringo Kamens [EMAIL PROTECTED] wrote,
I want to add my two cents about child porn. Censorship is censorship, it doesn't matter what you
censor or by what logic you censor. Banning child porn is censorship, copyright is censorship, and
stopping people from speaking
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
2.
Well most people using Tor, aint running a server at ALL. They are just
the users, running Tor in Client only mode.
And the middlemen are gonna be needed, if you want to have more hops!
maybe i am misinformed, but i was under the
[EMAIL PROTECTED] wrote:
Child porn is a different matter, it threatens the Tor network!
It is best handled easier by a url/site/ip block list on the EXIT nodes. to
protect itself Torland should put a site uo tp create this block list and Tor
EXIt servers use it if they wish.
Eg 16+,18+,21+
On Sat, May 13, 2006 at 05:03:53PM +0200, Joe Knall wrote:
I clearly do not dare to run a tor server in Germany for reasons like
these :(
The thought police has been notified. Expect them shortly.
So my question is: does anyone know about or have experience with the
implications when
On Sat, May 13, 2006 at 09:09:06AM -0700, Ringo Kamens wrote:
If it's the JAP I'm thinking of, you shouldn't trust it. The german
government ordered JAP top put in a backdoor to the program to catch one
solitary JAP user even though it was against german law. The backdoor was
released as an
They send you to prison if you don't give up the information.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Matej Kovacic
Sent: 15 May 2006 07:57
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
Hi,
Under the British
On 5/15/06, Mike Perry [EMAIL PROTECTED] wrote:
Thus spake Ringo Kamens ([EMAIL PROTECTED]):
Also, they can put you on grand jury and give you obstruction of justice for
refusing to talk.
According to wikipedia (http://en.wikipedia.org/wiki/Grand_jury):
In all U.S. jurisdictions retaining
: Re: Some legal trouble with TOR in France
Thus spake Eric H. Jung ([EMAIL PROTECTED]):
Tony's point was that you could arrange not to have the
authentication
tokens anymore. You better hope they believe you when you say you
don't have it, though.
Not having the authentication tokens
On Mon, May 15, 2006 at 03:36:59PM -0700, Ben Wilhelm wrote:
[...]
The line is drawn. The line is that Tor does not censor. That's the only
line that makes sense, because everything else requires subjective
judgement that many would not be able to agree on.
I typically argue this from the
Please define 'evil activities'
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Nick Mathewson
Sent: 15 May 2006 23:59
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France +
On Mon, May 15, 2006 at 03:36:59PM -0700, Ben Wilhelm
In addition, censoring child porn, death threats, etc. is impossible and you're dedicating yourself to a job that you will have to do 24/7 and never finish. You block a site, they make a new one. You block a file hash, they modify a file. You block a keyword, they use encryption. You block message
[reformatted, snipped, and top-posting fixed.]
On 15 May 2006 23:59, Nick Mathewson wrote:
I typically argue this from the can't point of view, not the
won't. If it were possible detect block evil activities through
programmatic means, I *would* be in favor of blocking them.
$0.02
On May 15, 2006, at 11:27 PM, [EMAIL PROTECTED] wrote:
We are paying with fear (if you run a Tor EXIT) of arrest and
prosecution, for many more mere accusation, just for even running a
Tor server or a Tor client is enough to keep many away from the Tor
network. Just take a look at
On 5/15/06, Ben Wilhelm [EMAIL PROTECTED] wrote:
The line is drawn. The line is that Tor does not censor. That's the only
line that makes sense, because everything else requires subjective
judgement that many would not be able to agree on.
There's always the possibility of letting each exit
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Anthony DiPierro wrote:
On 5/15/06, Mike Perry [EMAIL PROTECTED] wrote:
Thus spake Ringo Kamens ([EMAIL PROTECTED]):
Also, they can put you on grand jury and give you obstruction of
justice for
refusing to talk.
According to wikipedia
@freehaven.net
Subject: Re: Some legal trouble with TOR in France
--- Mike Perry [EMAIL PROTECTED] wrote:
A US judge exercising proper
dilligence should be able to realize that the search was not likely
to
produce relevant evidence to the case in question, or so one would
hope.
LOL. Where
01:45
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I'd say if you can register a server with the required data given you
can unregister it the same way imho. Just contact the adress for
registering.
Speaking of cloned
On Sun, May 14, 2006 at 01:34:51PM +0100, Tony wrote:
So if for instance they take your disks away as per the French TOR node,
then you could destroy your hardware key (wipe TPM module, destroy
motherboard chipset or USB dongle) and they are not going to be reading
anything, ever. Even if
On Sun, May 14, 2006 at 03:58:06PM +0200, Lionel Elie Mamane wrote:
On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
Under the British Regulation of Investigatory Powers Act, they
would simply confiscate the entire machine, demand any
authentication tokens required to access it,
]
On Behalf Of Lionel Elie Mamane
Sent: 14 May 2006 14:58
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
On Sun, May 14, 2006 at 01:34:51PM +0100, Tony wrote:
So if for instance they take your disks away
: Re: Some legal trouble with TOR in France
On Sun, May 14, 2006 at 03:58:06PM +0200, Lionel Elie Mamane wrote:
On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
Under the British Regulation of Investigatory Powers Act, they
would simply confiscate the entire machine, demand any
: 14 May 2006 15:00
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
On Sun, May 14, 2006 at 03:58:06PM +0200, Lionel Elie Mamane wrote:
On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
Under the British Regulation of Investigatory Powers Act, they
would
I am living in France and working for some French security agency. Please
understand that I may not identify myself. Working for a security agency does
not mean that I approve all their actions, even those that I MUST do.
Since about 5 years, French services are trying to control the anonymous
Before they realise that they need a key you can microwave the
token.
You can then surrender it when required and still meet your legal
obligations... 'It must have been static damage officer...you need
to
be more careful with my equipment'
Which in the UK at least could land you in
: Some legal trouble with TOR in France
Before they realise that they need a key you can microwave the
token.
You can then surrender it when required and still meet your legal
obligations... 'It must have been static damage officer...you need
to
be more careful with my equipment'
Which
On 14/5/06 15:10, Tony wrote:
Nb- failure to disclose keys is up to two years in prison. Not 10.
(5) A person guilty of an offence under this section shall be liable-
(a) on conviction on indictment, to imprisonment for a term not
exceeding two years or to a fine, or to both;
(b)
2006 18:31
To: or-talk@freehaven.net
Subject: Re: Some legal trouble
with TOR in France
There are a few key points that you are overlooking.
1. In support of the photocopying money scandal, most printers have
yellow dots imprinted on them that track date printed, serial number, etc
Subject: Re: Some legal trouble with TOR in France
There are a few key points that you are overlooking.
1. In support of the photocopying money scandal, most printers have yellow dots imprinted on them that track date printed, serial number, etc.
2. By US export law, US companies
/computing/9909/13/backdoor.idg/
From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ringo Kamens
Sent: 14 May 2006 18:43
To: or-talk@freehaven.net
Subject: Re: Some legal trouble
with TOR in France
I'm not saying the AES is
weak. I'm saying that Microsoft might have
Sent: 14 May 2006 18:31
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
There are a few key points that you are overlooking.
1. In support of the photocopying money scandal, most printers have
yellow dots imprinted on them that track date printed, serial number
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Tony wrote:
just wanted to suggest that biometrics are not wise for encryption
whatsoever. for one thing, they use a software mechanism to 'unlock'
and this lock can be bypassed. voiceprint, retina/iris scan,
fingerprints, dna, all of these
.
---|| From: [EMAIL PROTECTED] [mailto:
[EMAIL PROTECTED]] On| Behalf Of Ringo Kamens| Sent: 14 May 2006 18:31||| To: or-talk@freehaven.net| Subject: Re: Some legal trouble with TOR in France
There are a few key points that you are overlooking
Thus spake Eric H. Jung ([EMAIL PROTECTED]):
Tony's point was that you could arrange not to have the
authentication
tokens anymore. You better hope they believe you when you say you
don't have it, though.
Not having the authentication tokens counts as refusing to surrender
them.
: Some legal trouble with TOR in France
| |
| |
| |
| | There are a few key points that you are overlooking.
| |
| |
| |
| | 1. In support of the photocopying money scandal, most printers have
| yellow
| | dots imprinted on them that track date
Mike,
I don't have the time to respond to all the points of your email except
the first/
Federal Contempt of Court
http://www.bafirm.com/articles/federalcontempt.html
Although there is no statutory maximum limit regulating the amount of
time a contemnor can be ordered to spend in confinement
Also, they can put you on grand jury and give you obstruction of justice for refusing to talk.
On 5/14/06, Eric H. Jung [EMAIL PROTECTED] wrote:
Mike,I don't have the time to respond to all the points of your email exceptthe first/
Federal Contempt of
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
I personally have stopped trying to use tor because latency has gone far
beyond my patience. Something needs to be done about tor's bandwidth
capability. Of course more bandwidth will mean more users... and I have
said this before and I will say
On Samstag, 13. Mai 2006 12:53 Olivier Barbut wrote:
Hello dear tor talkers,
I'm running the tor router mini, located in paris, france, and I
believe I have to share with you what happened to me last
wednesday,the 10th of May. My router was an outside gateway, doing
request for tor anonymous
with TOR. http://anon.inf.tu-dresden.de/index_en.html
Sherman
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Behalf Of Landorin
Sent: Saturday, May 13, 2006 5:29 AM
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
-BEGIN PGP SIGNED MESSAGE
On Sat, May 13, 2006 at 10:02:41AM -0700, [EMAIL PROTECTED] wrote 6.6K bytes in
186 lines about:
: average citizens, etc), what is the technical feasibility of the NSA or
: other governmentt organizations establishing modified tor nodes/servers
: which track activity and use?
I feel sorry for the inconvenience that caused for you.
However, this might have a good part, too: at least now you know that
you can run an exit node without getting accused or so (it caused
inconvenience the most, but no accusation or so right?). If that
happened to me then at least I'd know
On Sat, May 13, 2006 at 09:04:22PM +0200, Landorin wrote:
Personally, I believe a Verein is usually regarded as one person
(actually juristische Person) of its own so they don't accuse a
private person but the organisation itself as a person (that's not
guaranteed, it's just what I guess so
thanks for the advice. I will for shure reformat everything and
reinstall linux when I get time for this. Changing hard drives would be
nice but I have not enough money for this right now.
Do you know what a hard drive tap could look like ?
As for the tor server, I suggest that you completely
Chances are it would be internal and couldn't hold much data. I really think you should sell your rig and buy a used one that's comprable and cut the losses. It's too risky to keep it.
On 5/13/06, Olivier Barbut [EMAIL PROTECTED] wrote:
thanks for the advice. I will for shure reformat everything
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I don't get it. Why buy a new one anyway? From what I know, any and
every data will be lost if you format your hardisk with a safe method
(can't remember the name right now but that method keeps writing
random data to your entire hardisk to overwrite
There are methods (and they are used) to read data from a overwritten
disk.
It has to do with the age of data that has been written in a single
place on the disk . The process, of what i remember , involves some more
hardware methods like taking of a very small layer of the disks surface
and
Well burning it doesn't do is completely (unless it's molten and then mixed with other stuff). You should securely wipe it with a magnet and then melt it. In this case, just wipe it about 100 times and then sell it.
On 5/13/06, Alexandru ARMEAN [EMAIL PROTECTED] wrote:
There are methods (and they
Wiping with a magnet is absolutely useless unless you own a
professional degausser (which are large and expensive--we have one
where I work).
For some more reading on the matter:
http://en.wikipedia.org/wiki/Degauss
http://en.wikipedia.org/wiki/Data_remanence
--- Ringo Kamens [EMAIL PROTECTED]
On Sonntag, 14. Mai 2006 00:03 Ringo Kamens wrote:
Well burning it doesn't do is completely (unless it's molten and then
mixed with other stuff). You should securely wipe it with a magnet
and then melt it. In this case, just wipe it about 100 times and then
sell it.
Hey people... why not
He has a good point. They surely have a clone of your drive which means they have the private keys to the server which could destroy the user's anonymity.
On 5/13/06, Joe Knall [EMAIL PROTECTED] wrote:
On Sonntag, 14. Mai 2006 00:03 Ringo Kamens wrote: Well burning it doesn't do is completely
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
yeah, i think if i were you, i'd sell all of the hardware they had
their hands on for that time asap and get new hardware. there's way
too many routes that could be used to compromise the server once it's
been in the hands of untrusted people. A
51 matches
Mail list logo