The particular legal representatives at the Regulation Place of work
connected with Yan Katsnelson stand for men and women within DUI/DWI
circumstances within equally Brand-new
York and Nj. The particular regulations regarding driving intoxicated within
these types of Expresses, and in certai
number of men during the Civil War, that they asked all mothers, angry come
and protest the war. Howe privately paid Louis Vuitton Bags the bill for
various cities and towns to fund louis vuitton outlet the away place and
dream of a pair fo them one day. You do not like it now. And posses
Then a smart consumer would vote with their wallet. I'm fairly certain the
major ones will.
Tor being a honeypot is hard to be true (and even if it was, it would still
be a good solution to use for some "small scale privacy attacks" anyway). As
for the exit nodes, we should just assume that ALL of them are malicious
(many are not, there are many good honest people running exit relay
Hey everyone.
Great, a Tor discussion =D my favorite topic lol.
So, I will jump the basic stuff, you probably know about that already and if
you don't you can take a look at the tor project homepage (or just send me an
email and I will help if needed).
Fisrt, you are FINE running the tor brow
While streaming video from the BBC web site might not seem like a great use
of the networks bandwidth I'd be hesitant to put much criticism in it. We
need people using the network in uncontroversial ways to ensure its continued
legality and make unusual use cases (streaming controversial cont
More hidden services would definitely help, but I don't see it as a final
solution because there is just too much information for the tor network
contributors/devs to incorporate to make it remotely comparable to the whole
internet.
Another approach:
The I2P network (a similar concept to to
As far as #2 go you need to look up what an accomplice is. There are legal
definitions at play there and I doubt someone would be an accomplice when
they are not a party to the crime. Providing the service itself is not a
crime. Providing a getaway car is significantly different. You knew wha
That wouldn't work because ThinkPenguin does not run an exit node. However we
have no problem doing so and our reputation would only be enhanced by a
competitor taking such actions. It would bring out the fact we are supporting
the Tor project. Something that almost nobody knows right now. Th
I know they don't do it now, but do you worry in the future that ISPs will
not allow you to run a Tor node or any other software that shares your IP or
provides routing software? I know many won't let you run a webserver and its
honestly a matter of time that they work it into their service t
On 17/07/13 00:04, t3g wrote:
> At the end of the day, the sites you visit under that "borrowed" IP
> address may keep a record of that IP's visit and if they were forced
> to share visitors with the government for any reason, they tie that
> IP to the activity at that time. The user that was pr
That's not the same. You are simply transmitting the information when it
comes to Tor. It is hard to prove that you didn't know you were sharing a
file when it is necessary to add the torrent or magnet. Anyway, like I
mentioned previously a judge in the United States found before that an IP
If you say that you cannot be held liable for traffic on your IP address, why
is it that so many people get notices from their ISPs and media companies for
sharing files on BitTorrent? The IP address is tied to an activity whether it
is file sharing or a web server storing your visit through
Your reading comprehension must not be great or you are simply ignoring
viewpoints that aren't yours:
1.) I don't use Tor everyday
2.) I've only used it for streaming BBC content maybe 3-4 times total
3.) An exit node is a risk because you cannot trust the user who uses your
node and you are
I clicked on the wrong reply link. That reply was meant for t3g not you.
Sorry for any confusion. As to your original question, there's no risk as far
as I know. I believe it is possible to tell that one is on Tor, but I don't
think that would be a problem.
> If that's too high a price to pay, then don't participate but don't spread
misinformation so no one else is willing too either.
Where did I spread misinformation?
I _asked_ in this thread whether it is a problem or not. And by the way, I
thought about tor running as a client, though the who
Just like Chris stated there really aren't known cases of people running an
exit node going to jail. Chris was very thorough in his post, but t3g is just
ignoring this. No, you cannot, I repeat cannot, be held liable for the
traffic that comes from your IP address. The worst that could happen
> Tor is free software and an open network that helps you defend against a
form of network surveillance that threatens personal freedom and privacy
This doesn't mean tor is only for anti-government activists or censored
chinese people.
We don't want the gouvernment to know: everyone who downl
1. Yes, it is true that more nodes equals more people being able to use it.
That is obvious.
2. What you are describing as legitimate is very subjective. I do understand
that people need an outlet sometimes to discuss information, but like I said
a handful of times, the owner of the IP beco
If people are using Tor for activism, bypassing censorship, and getting
around monitoring in their country, they are using your IP to do it. If they
are saying stuff that is extreme enough to warrant the use of Tor, my IP is
held liable for the content posted and they are proteced.
Tor is o
Can you point to a single person who has ever served prison time because they
ran an exit node? The government generally needs more than an IP address to
convict somebody of downloading illegal pornographic images. They may not
need that to raid a persons house however.
So the risk is that
"media piracy on BitTorrent."
Piracy? I thought that was a smear term to avoid.
http://www.gnu.org/philosophy/words-to-avoid.html#Piracy
That's true, but there are enough countries and organizations in this
countries which are much safer than I am.
Don't know if we really need private people running an exit node.
Another problem with Tor is that if more and more people move to just being a
client instead of a relay or exit node like yourself, then there is no Tor
network. It reminds me of BitTorrent where the ratio of leechers to seeders
is greater and it becomes harder to get the file.
I think you misunderstood; I don't use it as an exit note, just the default
configuration as a client;
The whole question was about this being secure or not.
I think very few people are running exit nodes;
Since all my ports are closed, this wouldn't work either.
When you use the Tor Browser, the home page tells you that you are connected
to the Tor network and are using a specific IP address. Many times when I use
Tor, I get curious and do an IP lookup and it tells me the the country and
state (if in the US) of the IP I am "borrowing" for that sessio
> If someone sits between me (the client) and the first node, and he
> captures the traffic, can't he see both the content and my ip?
> Or the first node himself; he knows my ip and can easily capture my
> traffic, can't he?
Connections between nodes and you are encrypted using TLS, others cannot
On 16/07/13 21:22, shiretoko wrote:
> Is this only true for using https or is this a different issue? Some
> sites don't provide https
If you aren't using end-to-end encryption, such as TLS, then the
communications between the exit node and the destination can be INTERCEPTED.
However, if you are
Is this only true for using https or is this a different issue?
Some sites don't provide https
No. The first node is passed an IP address where to forward your data (which
is encrypted), the node doesn't forward your IP though, the 2nd node does the
same thing, but the first node doesn't get what the final exit nodes IP is.
The final exit node can decrypt your data because you have use
Ahh but he can't be sure whether the traffic is really from me or if i'm just
another node; am I wrong?
I don't quite get it.
If someone sits between me (the client) and the first node, and he captures
the traffic, can't he see both the content and my ip?
Or the first node himself; he knows my ip and can easily capture my traffic,
can't he?
Running an exit node puts you at a huge risk if someone is doing something
illegal like viewing child porn, making threats towards an elected official,
or huge amounts of software and media piracy on BitTorrent.
It is safe to run the software as a relay or client.
There is some risk of police busting down your door if you run it as an exit
node. Generally it is not illegal to run it as an exit node although law
enforcement in many countries are technically incompetent-or near so. They
don't underst
Thank you two!
After a bit of reading I conclude that no traffic gets directed through my pc
in case of using tor simply as a client.
one has to configure explicitly as a relay;
can't imagine how a client could be sued in any way.
On Mon, Jul 15, 2013 at 4:36 PM, wrote:
> Maybe it's completely absurd, but I wondered whether I can get in trouble
> for using tor, since traffic is directed to my pc and maybe this traffic
> contains illegal material.
> So are there any justifiable worries about using tor?
> Did anyone get sued
I don't understand too much about tor but I think if you provide an exit node
and somebody does something illegal, it appears you're to blame. This makes
it less likely people provide exit nodes.
And the network is useless without exits.
On the other hand, the government can provide exit nod
Maybe it's completely absurd, but I wondered whether I can get in trouble for
using tor, since traffic is directed to my pc and maybe this traffic contains
illegal material.
So are there any justifiable worries about using tor?
Did anyone get sued / is it technically possibel?
I would like to
38 matches
Mail list logo