Arado p2p Websearch: Bookmark Organize and Synchronize released

2010-11-01 Thread Michael Schmidt
Hi

anyone with c++/Qt skills interested to build in Qt proxy for Tor for the
released new app
http://arado.sf.net   Bookmark Database to Sync with your Devices.
It can contain as well .tor adresses for websites and services in tor.
Please test it and try to run it on your webserver 24/7
Use it for your Websites.. Rss support should follow..

Thanks

Quoting the release Info:


ARADO is an open source Bookmark-Database for Websearch. You easily can save
and organize your
favourite URLs (Bookmarks). The database can be networked with your further
devices like laptop,
mobile phone, home or work PC, so that all added URLs are synchronized with
your connected devices.
The Arado websearch experience provides to search the web within all your
networked devices.
Website:
http://arado.sf.net
Download Win:
http://kent.dl.sourceforge.net/project/arado/Arado-0.1.0/Arado-Websearch-0.1.0-Win-Setup.exe
Download Linux/Mac:
https://sourceforge.net/projects/arado/files/

ED2k:
ed2k://|file|Arado-Websearch-0.1.0-Win-Setup.[contentdb.emule-project.net
].exe|12923284|
911819E92B0FB496A268B9C44A9895CC|
p=6CBA12CE62F0B8D52BAFD28A5D0F8C11:94D336C072EF6B914B5A4FEA1B92C28B|
h=TOGAJYNDJ3FQ2BW5XHJ7UJCD6APWY6CT|s=
http://kent.dl.sourceforge.net/project/arado/Arado-
0.1.0/Arado-Websearch-0.1.0-Win-Setup.exe|/

Release v.0.1.0


Re: getting more exit nodes

2008-04-20 Thread Michael Schmidt
Hello Alexander, and list,

that is an essential idea, which is now discussed, and that start of that
development is still missing. So good to hear.

First, I agree (as posted earlier), that we need a tit-for-tat Tor:
Everyone who wants to surf with the IP of another peer, needs to give his IP
as well, so that others can surf.

That was the idea of peek-a-booty software, which stalled in development.

We raised the question to have a special browser with this exit-node tor
implemented to jap and roger and torpark.
But noone ever came up with any solution.
So I appreciate the new tit-for-tat paragdim and development start:
everyone who uses tor, must be with his IP an exit node.

Similar archtectures were discussed for friends of friends, e.g. over
http://retroshare.sf.net - there is already code (i can send or see the
feature request postings with the patch) where a friend is a proxy for all
his friends..

You now mention the firewall problem...
here i might be allowed to suggest as well this kind of architecture, which
helps in three ways:

a) surfing of all friends through my IP: psiphon or retroshare patch
b) installing on certain retroshare nodes a tor node, so that both are in a
superpeer modus:
friends can surf over rs friends and select the ip of the friend, or the tor
circuit. that is a limited design, as only friends can choose that server
and for the peers from the tor network choosing this exit node, it makes no
difference. so for the friends it is just a normal proxy, they share with
the option to step into a tor circuit. Though--- that way one RS friend in
the USA would allow many friends to choose that exit-ip. or that tor-entry
ip. (without the ISP logging, as RS is encrypted transfer)

an now the interesting thing c) Breaking through a firewall:


RS has implemented openDHT and other RS nodes work as a STUN server, so the
connection can break through every firewall.

The idea is now, to use any retroshare node to make the firewall
breakthrough for the TOR-Client-Firefox node.
That design uses not the f2f-connections, but the network only for the
firewall breakthrough (initial Stun).
Of course you can install as well any central STUN server.


The problem with this design is, if the (central or public known) stun
server is killed (or the forwarding tor server), then many client-exit-nodes
(the firefoxusers) are killed.

(and of course the users doing evil things to them with the ip of the
client-exit node... so here is the real problem, not showing the IP of the
pseudo-exit node not in the tor-server list).

You request a total change to a p2p network, away from the client-server
approach. That was peek-a-booty.

so your idea has two main impacts:
- firewall breakthrough
- hidden client-exit-nodes (covered by the IP of the proxy-forwarding
(stun)server)


As said: the p2p network needs no serverlist, just any user as an outproxy
and every user testing TOR can accuse any IP - the one with which he surfs -
to shut down the exit node. Indifferent, if it is a pseudo or normal or
client exit node.

I would speak then of a professional server exit node and an
at-home-Firefox-private-exit-node, and because of the firewall, the
private exit nodes need a stun server or reflector (term from cucme) or a
proxy or a forwarding server - however you want to call it.

professional exit node = Tor servers (appear in the list)
refelctors = Pseudeo-exit nodes
Private exit nodes = Firefox users, connecting to reflectors, getting the
requests forwarded from them.


So the hiding of the IP of the private exit node is not the issue..
(though with your design they do not appear in the list of the (normal tor)
client, but every user can surf, see the exit-ip and take it down (= test if
there is a log, if not - accuse )).
That is the same problem with the emule clients.. which show the IP
downloading a file.

Using the STUN/proxy servers or reflectors to hide them, helps, but then the
target are these STUN pseudo-server. If one is down, many private or
client-exit nodes are down.

And how do clients find the list of refelctors? so you have the same problem
in the Firefox client, which you have now in the tor client serverlist.
(Note that currently, any relay must be able to connect to any other
relay.)
That idea is simple:

1. I agree not to make a browser plugin, but to stick it to any other always
running software.
Then because of the revealing cockies while switching tor on and off in the
browser, it would be good to have an own browser, with different gui
colours, so that users know, with that browser: I surf with a different ip.

2. Make Tor tit-for tat for that deamon.

3. Stun the deamon with retroshare (as it is a p2p stun network and not a
cental stun server) and then users need to install both.

(btw. the Qt gui of RS has as well a browser widget, so you can implement as
well a small browser there, or link to localhost for your normal browser.)


What is then the function?:
e.g. all private-exits could 

Re: New Tor distribution for testing: Tor Browser Bundle

2008-02-03 Thread Michael Schmidt
Steven, i suggest to make it hardcoded default and a Must, that each user,
using this browser, is as well running an tor **exit** node,
tit for tat. like emule partials: upload is a MUST.
That would help a lot to have more tor-exit nodes.
Thanks.

On Jan 30, 2008 1:52 AM, Steven J. Murdoch 
[EMAIL PROTECTED] wrote:

 Recently I have been working on creating a distribution of Tor which
 includes a pre-configured browser -- the Tor Browser Bundle. It is
 intended for being run off an USB flash drive, but will probably also
 be helpful to users who want an easy-to-setup packaging of Tor.

 More information and download links can be found here:

  http://torbrowser.torproject.org/

 The bundle contains Firefox, Tor, Vidalia, Polipo and Torbutton. No
 installation is needed (just unpack the contents). All the components
 are automatically started by one double-click.

 The bundle is new, and contains development versions of Tor, Vidalia
 and Torbutton, so should be considered a testing release. I do hope it
 will be useful, and I'd appreciate comments, suggestions, and bug
 reports.

 Thanks,
 Steven.

 --
 w: http://www.cl.cam.ac.uk/users/sjm217/



Re: filesharing with tor and offsystem online storage

2008-01-21 Thread Michael Schmidt
Hi Robert, see the update with source and (first) makefile-description here:
http://offsystem.sourceforge.net/download.html

On Jan 20, 2008 8:05 PM, Robert Hogan [EMAIL PROTECTED] wrote:

 On Sunday 20 January 2008 18:19:30 Michael Schmidt wrote:
  Hi Robert,
 
  source is here:
  http://offsystem.cvs.sourceforge.net/offsystem/?sortdir=down
 
  On Jan 20, 2008 7:05 PM, Robert Hogan [EMAIL PROTECTED] wrote:
   There don't appear to be any source tarballs and looking at the cvs
   repository
   only the project members could possibly know how to put the many
 modules
   together.

 Yes, that's the cvs repository I was referring to above - there are no
 tags
 there and no source tarballs anywhere else. This means that there is no
 source distribution for any of their releases. That's annoying.

 I'm guessing that off_network is the main module there but why should I
 bother
 reverse-engineering their build process just to install a possibly broken
 cvs
 version? I want the latest release. It's their funeral at the end of the
 day
 but an open-source project that doesn't release source tarballs is just
 being
 silly.



Re: filesharing with tor and offsystem online storage

2008-01-20 Thread Michael Schmidt
Hi Robert,

source is here:
http://offsystem.cvs.sourceforge.net/offsystem/?sortdir=down

On Jan 20, 2008 7:05 PM, Robert Hogan [EMAIL PROTECTED] wrote:



 There don't appear to be any source tarballs and looking at the cvs
 repository
 only the project members could possibly know how to put the many modules
 together.


Re: Please run a bridge relay! (was Re: Tor 0.2.0.13-alpha is out)

2007-12-23 Thread Michael Schmidt
2007/12/22, Roger Dingledine [EMAIL PROTECTED]:


  - is there a log, so that I see, if someone is entering the url?

 Not really. You could run Vidalia's 'bandwidth graph' and see, but Tor
 does its own activity too, so it would probably be hard to tell.

 What sort of interface did you have in mind?


Like this one:
http://psiphon.civisec.org/

 - and no the most important thing:  what must the censored user do with
 the
  url ?

 Quoting from https://bridges.torproject.org/ :
 To use the above lines, go to Vidalia's Network settings page, and
 click My ISP blocks connections to the Tor network. Then add each
 bridge address one at a time.

 You can read more in Vidalia's Network settings page, in the svn version
 of Vidalia, if you click on How do I find a bridge? We'll aim to get
 a new snapshot of Vidalia out soon.



Thx, overead it.


 Is it ok if we send this thread to the or-talk list?


no. ;-) Happy Christmas.

Having Invisible Tor Entry Points  (ITEPs) in several other applications
would be great, so an Itep c++ library would be good.
Though we need to rise the exit nodes too. From 1200, 500 are dead or  not
stable. from 700,  400 are in the EU under logging, and from 300 nodes only
60 are exit points... how can this be rised?

Last Question: is a Bridge or an ITEP only forwarding traffic or as well
routing in both directions? so it could be the case, that one logging exit
node got data from me and I am caught because of being neighbour, so this
could be changed, if ITEPs get a modus, in which they do not route, but only
forward incoming traffic, and this not to exit nodes, but only to forwarding
routers. then the bridge is safe from data retention law, as they are one
hop behind the routing to an exit node. Could that be an option, that ITEPs
are free from exit nodes contacts?


Re: torbutton webpage comments

2007-12-10 Thread Michael Schmidt
hi eric,
you make the ff-torbutton?
it is not seczure, as cookiees trac you and referal pages as well and so on,
if you switch off the tor button

is there any solution for this ? is xerbank-browser not better?

Regards Mike

PS: haven´t you interest to build a FF plugin for mozilla and thunderbird of
http://retroshare.sf.net or this PGP messenger into sameplace.cc ?

Thanks for a feedback

2007/12/10, Eric H. Jung [EMAIL PROTECTED]:

 Hello,

 I am the FoxyProxy Firefox extension author.

 At https://torbutton.torproject.org/dev/, Scott Squires  Mike Perry
 write:

 FoxyProxy
 [...] So far the author has expressed no interest in implementing
 [proxy-per-tab] ability.

 This statement is patently false. I have repeatedly gone on record as
 saying proxy-per-tab is a
 goal of FoxyProxy. I've made this at irc.mozilla.org (#extdev and various
 other channels), the
 FoxyProxy forums (http://z9.invisionfree.com/foxyproxy), and even show it
 as a goal for version
 2.8 at the FoxyProxy proxy road map at
 http://foxyproxy.mozdev.org/roadmap.html.

 I would have added this feature a very long time ago if I knew *how* to do
 it. Unfortunately, it's
 unlikely to happen even for 2.8 (as shown in the road map) because I'm no
 closer to getting it to
 work than I was a year ago... even after much research.

 If you have any pointers on how to achieve proxy-per-tab, I'd be grateful
 to hear them. I've asked
 in mozilla.dev.extensions, mozilla.dev.tech.network, IRC, as well as some
 prominent Firefox and
 SeaMonkey developers (Christian Biesinger, Benjamin Smedberg, Philip Chee,
 Michael Vincent Van
 Rantwijk, etc.) Christian Biesinger and Michael Vincent Van Rantwijk had
 some ideas which
 eventually panned out.

 One of the problems with FoxyProxy as it relates to Tor have been
 documented here for a very long
 time (linked prominently from the front FoxyProxy web page):
 http://foxyproxy.mozdev.org/faq.html#privacy-01

 Note that FoxyProxy has a broader audience than people wishing pure
 anonymity and so this problem
 is not an issue for all FoxyProxy users.

 At the least, I'd appreciate if Scott and Mike change the torbutton
 webpage. Moreover, I welcome
 you to contribute to FoxyProxy and/or help me solve the proxy-per-tab
 difficulties.

 Best regards,
 Eric Jung




Re: Possible to have favorites?

2007-12-09 Thread Michael Schmidt
good idea, but why not trusted friends as stable connections for an entry
point of the tor network?
- Tor as a plugin of http://retroshare.sf.net
please evaluate it.

2007/12/9, Christian Westlund [EMAIL PROTECTED]:

 While it feels like it kinda defeats the purpose with tor, is it
 possible to have favorites to connect through?

 Sometimes I need a US ip, sometimes another country. And it feels
 redundant to click the new identity till I get one that is.
 I just started using tor, together with foxy proxy, havent used anything
 else before. windows user.

 - Christian



Re: Possible to have favorites?

2007-12-09 Thread Michael Schmidt
not default, but as an option to choose that tunnel to/of a friend,
connect if you like to favourites = or trusted friends
if not, then choose a random peer.


2007/12/9, Marco Bonetti [EMAIL PROTECTED]:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Michael Schmidt wrote:
  good idea, but why not trusted friends as stable connections for an
 entry
  point of the tor network?
 For what I know (I'm not a developer) limiting the possibilities of
 entry/middleman/exit nodes is always a bad thing(tm) for your
 anonimity. However I've to admit that tor can be really handy when it
 comes down to choosing another geolocation for your visit to a certain
 web page.

 - --
 Marco Bonetti
 Slackintosh Linux Project Developer: http://workaround.ch
 Linux-live for powerpc: http://workaround.ch/pub/rsync/mb/linux-live
 My webstuff: http://sidbox.homelinux.org

 My GnuPG key id: 0x86A91047
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.6 (GNU/Linux)
 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

 iD8DBQFHXHBlE3eWALCzdGwRAiiEAJ4+Pl+Y37EIVktMtw6tdMthAGfQ9wCeImjw
 AGLjALHwvY7nfenZUbAfEHU=
 =ntlD
 -END PGP SIGNATURE-



Re: storage privacy (was: Nice quiet, private, anonymous life??)

2007-12-02 Thread Michael Schmidt
privacy back-up storage concept:

http://sourceforge.net/tracker/index.php?func=detailaid=1833093group_id=178712atid=886242
http://forums.truecrypt.org/viewtopic.php?t=8000


2007/12/3, F. Fox [EMAIL PROTECTED]:

 -BEGIN PGP SIGNED MESSAGE-




Re: Europaen Cybercrime Convention

2007-11-25 Thread Michael Schmidt
just run tor on a dedecated server, install a truecrypt.org container and
make if portable only in this container.
if the power is off, the tor installation has gone.
But I guess you mean a password protection while running?

2007/11/25, TOR Admin (gpfTOR1) [EMAIL PROTECTED]:

 Hi onion guys,

 we want to write about a few points of the European Cybercrime
 Convention, which became real by law in Germany last time.

 Sorry - we didnt read the or-talk very carefully last time. May be, it
 was always discussed here.

 By the European Cybercrime Convention anon servers are something like
 telephone providers. The following is important because of this fact:

 1: data retention (was discussed here, in Germany real by §113 StPO)

 2: Realtime surveillance by European Cybercrime Convention (article 20)
 The traffic data (not the traffic itself) has to be provided for the
 governments and secret services in REALTIME by a defined interface.
 Anon servers have to provide all data, which have to be logged in
 realtime too! Admins of anon servers have to cooperate.

 (In Germany this is real by the new § 100g StPO, the realtime
  surveillance can run for up to 3 days without asking a judge.)

 3: Online-searching of servers by European Cybercrime Convention:
 An online searching (Online-Durchsuchung) of an anon server may be
 run before investigation to save relevant data, which may be not
 accessible after investigation. This online searching depends not on
 the cooperation of the admins and may be reached by repressions.

 (In Germany this is real by the new § 110 (3) StPO.)

 Thanks to K. Raven for feature out this new laws.

 For point 3 we recommend to be prepared. It may be possible to create a
 high secured account with only read access to relevant data and no read
 access to any important key. If someone login with this account, it may
 be possible to run several actions.

 If the situation appears, you may decide, what you want to do (give them
 the account data or take the repressions). But you will not have the
 time to create such an account carefully.

 Can anyone write a shot tutorial for creation of a high secured
 only-read-account?

 Greetings




Re: Surveillance rules, feature suggestion

2007-11-25 Thread Michael Schmidt
this is a good idea, see the thread to do this over f2f,
in your model this is done as well, but you need to make sure, that a
middelman-only node NEVER connects to another node, which is any other node
in the same law-country,
So the middleman-only-node connecting to another middleman-only-node  in
germany is redundant, as if one is analyzed, the logs offer as well the
other in the same law zone, so the hop is redundant and waste in the point
of security.
A german middlenode-only to an german-exit-node is a dead thing !
Only german middlenode-only-peer connecting to ANY kind of node Outside the
law area is useful.

the idea to use F2F would allow to have the waste of 2 german middlenodes
broken, which means this is helpful to have both or more hops, even as well
for using a different law-Exit node from the law-zone (do not mix up with
the web-exit node) in the chain.

So this means: Middelnodes in the law aerea are only useful with ONE hop and
ONLY connections to law-outside-nodes. But who will determine that all in a
p2p way if a node is outside, then the analyzers just need to set up a
dedicated server in the USA or India and the middle-node is as well
analyzed.

Third, to prevent this, you then need as well several middle nodes in the
law zone, which is not really a prevention, as both or all three need to
log, So if the middle-node is contacting a malicious law-outside node, your
are done.

Here as well only F2F helps to connect to stable trusted prooved firiends in
the outside-law aerea.
If there is a random peer is choosen, then the middlenode as well is
analyzed in the case of a trap.

2007/11/25, Smuggler [EMAIL PROTECTED]:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Hello,

 I wonder if it would be a good thing to define Middleman-Only nodes.
 Those nodes would ONLY talk to other Tor-Nodes. They will not accept
 connections from non-Tor-nodes and not relay to non-Tor-nodes.
 While the latter is currently configurable via the exit-policy the
 former is not directly supported and thus quick hacks (like firewalling)
 reduce the speed and reliability of the network.

 The reason why to do this is that those nodes would not provide relaying
 to the public and thus imho not fall under the various EU Data
 retention rules.

 Comments welcome.

 Regards,
 smuggler
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.6 (GNU/Linux)

 iD8DBQFHSa56OMmnRrmEoQkRAkMAAJ9iwIMcKY5unSpRXaRqasFzL5nByACfVeh/
 21anvrJOq/M/ODR6zQGEeGg=
 =Rqur
 -END PGP SIGNATURE-




Re: Tor blocking german nodes

2007-11-22 Thread Michael Schmidt
please do not attach germany to fascism, this shows only our broen view.
blocking nodes in the EU from ourside EU is nonsense and does not help the
network, e.g. you are destroying the network by itself, i tis only a risk,
if someone is in the EU an Exitnode.
Forwarding nodes are needed and if there is no logging, this is the own risk
of the mantainer.
regards Mike
PS: from which country are you?

2007/11/22, kazaam [EMAIL PROTECTED]:

 Hi,
 because in germany fascist laws will force tor-nodes to log their
 connections I'm looking for a way to blog german tor-nodes. Is there any way
 to do this with Tor?
 I found ExcludeNodes just taking nicknames and no IP-ranges which is
 pretty bad. Couldn't this be implemented? I mean Tor knows the IP of the
 nodes so why not making it possible to blog IP-ranges with wildcards like
 145.253.*.* ?
 Then I found this old post:
 http://archives.seul.org/or/talk/Jul-2006/msg00079.html which has a script
 which grabbs the nicks of nodes from a website and puts it into ExclueNodes.
 But first the website it takes this info from is down:
 http://serifos.eecs.harvard.edu/ and second this is just a messy solution
 to the problem.

 So why not implementing an IP-based ExcludeNodes? Much would be won with
 it and nothing loosed..

 Is there any other workaround known at the moment to block german IP's?

 greets

 kazaam [EMAIL PROTECTED]





Re: new perspektive for tor

2007-11-17 Thread Michael Schmidt
2007/11/17, Robert Hogan [EMAIL PROTECTED]:

 On Friday 16 November 2007 17:04:18 Michael Schmidt wrote:
  Due to data retention logg needs/law in the EU, there will be no
  outproxy and no forwarding-nodes in the EU anymore, if they do not
  logg all traffic.

 Can someone point me to the EU directive on this? I thought this was just
 a
 German initiative.



in the total EU there will be NO TOR-Outproxy from begin of 1.1.2008:

So the idea is to have only forwarders in the EU - based on a security
friend to friend layer with trusted friends only (tor retroshare-plugin).
The hybrid nodes (tor plugins connecting AS WELL to the normal tor network
layer) though must be then Outside this law aerea. And: every forwarder
inside needs to know a hybrid outside the law aerea.
If this is given, he can forward the packet many time on the f2f layer of
his trusted friends, until any of the f2f-friends know ANY PORT to go
outside to a hybrid again. So this is Matrix Reloaded with Neo, needing a
Port.

- World outside: routing and routing
- HYBRID: World outside, slides the packet over to F2F
- World inside begin:
ping pong  Germany
pong ping  Germany
ping pong  Germany
pong ping  Germany
... and many hops forwarded
- World inside end
- HYBRID: World outside, a friend from inside is giving the packet to a
hybrid node outside
- Worldoutside: routing and routing to the destination.

So the new approach is to have a world outside with tor routing, and a World
inside with forwarding nodes.
The World inside is based on the secure trusted friend encrypted layer of
http://retroshare.sf.net .
Each node inside the World needs friends either forwarding or a
HYBRID-friend from Outside the law.

We need a board for that, to bring people from inside and outside together,
as the f2f chain may be broken quick, as not every f2f user is installing
the tor-plugin. But three or four routing ways in the middle is enough for a
start to haver the MIXER. Then different Ports or Hybrids outside the World
start the routing, some ping pong inside over f2f layer and then back
outside, ideally over a different hybrid node.

So the goal for nodes inside is a) to have friends forwarding for free, and
b) to have at least one or two hybrid- friends to mix here the
Inside-World-Entry and Inside-World-Exit Nodes. (remember the exit node is
the tor node to fetch the website and the iside-world-exit-node is the node
in a country without data retention law and hybrid with F2F).

Here are the laws: EU, Germany and some laywer discussions, UK and Ireland
and some other already have, as well USA will step into this .. so.. Russia
and India is the last resort for Tor, China as well of course not.

So a protocol change is needed, or a mixer, which is based on acting against
the law, but this will no one do.
So the trusted friend inside and the trusted friend hybrid outside will help
to get a mix chain inside the law-area.

Regards

Richtlinie 2006/24/EG:
http://europa.eu.int/eur-lex/lex/LexUriServ/site/en/oj/2006/l_105/l_10520060413en00540063.pdf;
Umgesetzt im deutschen Gesetzesentwurf:
http://dip.bundestag.de/btd/16/058/1605846.pdf

 http://www.vorratsdatenspeicherung.de

 http://www.heise.de/newsticker/meldung/91627 vom 23.06.2007


http://www.bundestag.de/bic/analysen/2006/zulaessigkeit_der_vorratsdatenspeicherung_nach_europaeischem_und_deutschem_recht.pdf,


 dagegen:
https://www.datenschutzzentrum.de/polizei/20070627-vorratsdatenspeicherung.pdf
sowie das Bundesverfassungsgericht:
http://www.bundesverfassungsgericht.de/pressemitteilungen/bvg07-082.html

 Bundesverfassungsgericht - Pressestelle - Pressemitteilung Nr. 82/2007 vom
27. Juli 2007 - 1 BvR 370/07; 1BvR 595/07 -

http://www.bundesverfassungsgericht.de/pressemitteilungen/bvg07-082.html


Re: new perspektive for tor

2007-11-17 Thread Michael Schmidt
2007/11/17, Olaf Selke [EMAIL PROTECTED]:


 
  in the total EU there will be NO TOR-Outproxy from begin of 1.1.2008:

 really? I don't intend to shut down my exit gateway located in Germany.
 Is there any reason I'm supposed to do so?

 Olaf



You need to logg the traffic, you have time to get the log tools till.
1.1.2009, so one year from beginning in 2008.
If you do not log, then you are aginst the law. Dunno, what the punsihment
is...

But as the german plice has raided several Tor servers, I would not run one,
and as you are in  law conflict, if you do not logg, then this is as well a
problem.. so I guess in the next year more and more servers will vanish...

Mike


Re: new perspektive for tor

2007-11-17 Thread Michael Schmidt
„§ 113a Speicherungspflichten für Daten

(6) Wer Telekommunikationsdienste erbringt und hierbei die nach Maßgabe
dieser Vorschrift zu speichernden Angaben verändert, ist zur Speicherung der
ursprünglichen und der neuen Angabe sowie des Zeitpunktes der Umschreibung
dieser Angaben nach Datum und Uhrzeit unter Angabe der zugrunde liegenden
Zeitzone verpflichtet.


http://dip.bundestag.de/btd/16/058/1605846.pdf


2007/11/17, Olaf Selke [EMAIL PROTECTED]:


 
  You need to logg the traffic, you have time to get the log tools till.
  1.1.2009, so one year from beginning in 2008.

 do I? According the law one has to store (speichern) collected
 (erzeugte) or processed (verarbeitete) data for six months. From my
 understanding there's no obligation to collect any data. Obviously data
 not collected can't be stored.

 I've just asked a friend working for the BSI about his opinion. He
 promised to check and provide me with feedback regarding Dark Side's
 perspective of the terms collect and store.

 Did any of my German colleagues on this list really bothered with
 reading the law?

 regards, Olaf