commit 8c859d5bd156eaa98fb7deb0b786e17167f7860f
Author: emma peel <[email protected]>
Date: Fri Mar 5 09:12:04 2021 +0100
better lines for localization.
---
.../tor-dmca-response/contents.lr | 23 +++++++++++++++++-----
.../tor-abuse-templates/contents.lr | 9 +++------
.../technical-setup/bridge/docker/contents.lr | 16 ++++-----------
3 files changed, 25 insertions(+), 23 deletions(-)
diff --git
a/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
b/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
index 847ce19..f782b29 100644
---
a/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
+++
b/content/relay-operations/community-resources/eff-tor-legal-faq/tor-dmca-response/contents.lr
@@ -30,15 +30,28 @@ Dear [ISP]:
Thank you for forwarding me the notice you received from [copyright claimant]
regarding [content]. I would like to assure you that I am not hosting the
claimed infringing materials, and furthermore, the Digital Millennium Copyright
Act's ("DMCA") safe harbors likely protect you from liability arising from this
complaint. The notice is likely based upon misunderstandings about the law and
about some of the software I run.
-As you know, the DMCA creates four "safe harbors" for service providers to
protect them from copyright liability for the acts of their users, when the
ISPs fulfill certain requirements. (17 U.S.C. 512) The DMCA's requirements vary
depending on the ISP's role. You may be familiar with the "notice and takedown"
provisions of section 512(c) of the DMCA; however, those do not apply when an
ISP merely acts as a conduit. Instead, the "conduit" safe harbor of section
512(a) of the DMCA has different and less burdensome eligibility requirements,
as the D.C. Circuit Court of Appeals held in RIAA v. Verizon (see
https://scholar.google.com/scholar_case?case=15815830240179540527) and the
Eighth Circuit Court of Appeals confirmed in RIAA v. Charter (see
https://scholar.google.com/scholar_case?case=11547531128234336420).
+As you know, the DMCA creates four "safe harbors" for service providers to
protect them from copyright liability for the acts of their users, when the
ISPs fulfill certain requirements. (17 U.S.C. 512)
+The DMCA's requirements vary depending on the ISP's role. You may be familiar
with the "notice and takedown" provisions of section 512(c) of the DMCA;
however, those do not apply when an ISP merely acts as a conduit.
+Instead, the "conduit" safe harbor of section 512(a) of the DMCA has different
and less burdensome eligibility requirements, as the D.C. Circuit Court of
Appeals held in RIAA v. Verizon (see
https://scholar.google.com/scholar_case?case=15815830240179540527) and the
Eighth Circuit Court of Appeals confirmed in RIAA v. Charter (see
https://scholar.google.com/scholar_case?case=11547531128234336420).
-Under DMCA 512(a), service providers like you are typically protected from
damages for copyright infringement claims if you also maintain "a policy that
provides for termination in appropriate circumstances of subscribers and
account holders of the service provider's system or network who are repeat
infringers." If you have and implement such a policy, and you otherwise qualify
for the safe harbor, you should be free from fear of copyright damages.
+Under DMCA 512(a), service providers like you are typically protected from
damages for copyright infringement claims if you also maintain "a policy that
provides for termination in appropriate circumstances of subscribers and
account holders of the service provider's system or network who are repeat
infringers."
+If you have and implement such a policy, and you otherwise qualify for the
safe harbor, you should be free from fear of copyright damages.
-The copyright notice you received was likely triggered by a program I run
called Tor. Tor is network software that helps users to enhance their privacy,
security, and safety online. It does not host any content. Rather, it is part
of a network of nodes on the Internet that simply pass packets among themselves
before sending them to their destinations, just as any Internet intermediary
does. The difference is that Tor tunnels the connections such that no hop can
learn both the source and destination of the packets, giving users protection
from nefarious snooping on network traffic. The result is that, unlike most
other Internet traffic, the final IP address that the recipient receives is not
the IP address of the sender. Tor protects users against hazards such as
harassment, spam, and identity theft. Initial development of Tor, including
deployment of a public-use Tor network, was a project of the U.S. Naval
Research Laboratory, with funding from ONR and DARPA. (For more on Tor, see
https://www.torproject.org/.) I hope, as an organization committed to
protecting the privacy of its customers, you'll agree that this is a valuable
technology.
+The copyright notice you received was likely triggered by a program I run
called Tor. Tor is network software that helps users to enhance their privacy,
security, and safety online.
+It does not host any content. Rather, it is part of a network of nodes on the
Internet that simply pass packets among themselves before sending them to their
destinations, just as any Internet intermediary does.
+The difference is that Tor tunnels the connections such that no hop can learn
both the source and destination of the packets, giving users protection from
nefarious snooping on network traffic.
+The result is that, unlike most other Internet traffic, the final IP address
that the recipient receives is not the IP address of the sender.
+Tor protects users against hazards such as harassment, spam, and identity
theft. Initial development of Tor, including deployment of a public-use Tor
network, was a project of the U.S. Naval Research Laboratory, with funding from
ONR and DARPA. (For more on Tor, see https://www.torproject.org/.)
+I hope, as an organization committed to protecting the privacy of its
customers, you'll agree that this is a valuable technology.
-While the Tor node that I run may appear to be the source of material that is
alleged to be copyright-infringing, I do not host that material. I do not
select the material transmitted through the Tor node that I run, and I have no
practical means of either identifying the source of such material or preventing
its transmission. I do nothing to encourage or promote the use of the Tor
network for copyright infringement. For these reasons, I am not an infringer of
copyright in any materials that are transmitted through the Tor node that I
run, either directly or under a theory of contributory or vicarious liability.
Therefore, you should continue to be protected under the DMCA 512(a) safe
harbor without taking any further action.
+While the Tor node that I run may appear to be the source of material that is
alleged to be copyright-infringing, I do not host that material.
+I do not select the material transmitted through the Tor node that I run, and
I have no practical means of either identifying the source of such material or
preventing its transmission.
+I do nothing to encourage or promote the use of the Tor network for copyright
infringement.
+For these reasons, I am not an infringer of copyright in any materials that
are transmitted through the Tor node that I run, either directly or under a
theory of contributory or vicarious liability.
+Therefore, you should continue to be protected under the DMCA 512(a) safe
harbor without taking any further action.
-Thank you for working with me on this matter. As a loyal subscriber, I
appreciate your notifying me of this issue and hope that the protections of
DMCA 512 put any concerns you may have to rest. If not, please contact me with
any further questions.
+Thank you for working with me on this matter. As a loyal subscriber, I
appreciate your notifying me of this issue and hope that the protections of
DMCA 512 put any concerns you may have to rest.
+If not, please contact me with any further questions.
Very truly yours,
Your customer, [User]
diff --git
a/content/relay-operations/community-resources/tor-abuse-templates/contents.lr
b/content/relay-operations/community-resources/tor-abuse-templates/contents.lr
index 1cd12f9..3d2f00c 100644
---
a/content/relay-operations/community-resources/tor-abuse-templates/contents.lr
+++
b/content/relay-operations/community-resources/tor-abuse-templates/contents.lr
@@ -92,8 +92,7 @@ We're sorry your site is experiencing this heavy load from
Tor.
However, it is possible that your rate limiting alarms simply experienced a
false positive due to the amount of traffic that flows through the router.
We provide service to almost a gigabit of traffic per second, 98% of which is
web traffic.
-If the attack is real and ongoing, however, the Tor project provides an
automated DNSRBL for you to query to block login attempts coming
-from Tor nodes: https://www.torproject.org/projects/tordnsel.html.en
+If the attack is real and ongoing, however, the Tor project provides an
automated DNSRBL for you to query to block login attempts coming from Tor
nodes: https://www.torproject.org/projects/tordnsel.html.en
It is also possible to download a list of all Tor exit IPs that will connect
to your server port:
https://check.torproject.org/cgi-bin/TorBulkExitList.py?ip=YOUR_IP&port=80
@@ -175,11 +174,9 @@ Additionally, the Tor project provides an automated DNSRBL
for you to query to f
It also provides a Bulk Exit List service for retrieving the entire list:
https://check.torproject.org/cgi-bin/TorBulkExitList.py
-You can use this list to help you take a closer look at Tor orders, or to hold
them temporarily for additional verification, without losing
-legitimate customers.
+You can use this list to help you take a closer look at Tor orders, or to hold
them temporarily for additional verification, without losing legitimate
customers.
-In fact, in my experience, the fraud processing teams contracted by many ISPs
simply mark all requests from Tor nodes as fraud using that
-very list.
+In fact, in my experience, the fraud processing teams contracted by many ISPs
simply mark all requests from Tor nodes as fraud using that very list.
So it is even possible this is a legitimate order, but was flagged as fraud
solely based on IP, especially if you contract out fraud detection to a third
party.
```
diff --git a/content/relay-operations/technical-setup/bridge/docker/contents.lr
b/content/relay-operations/technical-setup/bridge/docker/contents.lr
index eb449a8..00e26a1 100644
--- a/content/relay-operations/technical-setup/bridge/docker/contents.lr
+++ b/content/relay-operations/technical-setup/bridge/docker/contents.lr
@@ -9,11 +9,7 @@ body:
### 1. Deploy a container
We provide a docker-compose file that helps you deploy the container.
-First,
-[download
docker-compose.yml](https://dip.torproject.org/torproject/anti-censorship/docker-obfs4-bridge/raw/master/docker-compose.yml),
-and then write your bridge configuration to a new file, `.env`, which is in the
-same directory as `docker-compose.yml`. Here's a
-template:
+First, [download
docker-compose.yml](https://dip.torproject.org/torproject/anti-censorship/docker-obfs4-bridge/raw/master/docker-compose.yml),
and then write your bridge configuration to a new file, `.env`, which is in
the same directory as `docker-compose.yml`. Here's a template:
```
# Your bridge's Tor port.
@@ -24,18 +20,14 @@ PT_PORT=Y
EMAIL=Z
```
-Replace `X` with your desired OR port, `Y` with your obfs4 port (make sure that
-**both** ports are forwarded in your firewall), and `Z` with your email
address,
-which allows us to get in touch with you if there are problems with your
bridge.
-With your bridge configuration in place, you can now deploy the container by
-running:
+Replace `X` with your desired OR port, `Y` with your obfs4 port (make sure
that **both** ports are forwarded in your firewall), and `Z` with your email
address, which allows us to get in touch with you if there are problems with
your bridge.
+With your bridge configuration in place, you can now deploy the container by
running:
```
docker-compose up -d obfs4-bridge
```
-This command will automatically load your `docker-compose.yml` file while
-considering the environment variables in `.env`.
+This command will automatically load your `docker-compose.yml` file while
considering the environment variables in `.env`.
You should now see output similar to the following:
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits