Re: [tor-talk] High-latency hidden services

2014-07-04 Thread Aymeric Vitte
If I understand correctly the question here is not about browsing but 
fetching something that you don't need immediately for offline reading 
and that you download with high latency using different circuits.


That's easy to do, if you take Peersm again, it's easy to send several 
random requests to different circuits requesting part of the resource to 
the website and then store them asynchronously, you can request the 
pieces in the order you like and when you like, you can retrieve them 
from the website or the peers if they have it.


Le 04/07/2014 03:31, Mirimir a écrit :

On 07/03/2014 04:16 PM, Seth David Schoen wrote:

The Doctor writes:


On 07/02/2014 04:18 PM, Helder Ribeiro wrote:


Apps like Pocket (http://getpocket.com/) work as a read it later
queue, downloading things for offline reading. While you're reading
an offline article, you can also follow links and click to add them
to your queue. They'll be fetched when you're online so you can
read them later.

I've been using the Firefox extension called Scrapbook
(https://addons.mozilla.org/en-US/firefox/addon/scrapbook/) for this
for a while now.  I've done some experiments with it (packet sniffing
at the firewall and on the machine in question), and from observation
it seems sufficiently proxy-compliant that it routes all traffic in
question through Tor when it downloads and stores a local copy of a
page.  Secondary opinions are, of course, welcome and encouraged.

That's great, but in the context of this thread I would want to imagine
a future-generation version that does a much better job of hiding who
is downloading which pages -- by high-latency mixing, like an
anonymous remailer chain.

One can imagine a browser extension that introduced random delay at each
step of getting a page. Webservers tend to drop very slow clients, as
defense against slow-loris DoS, so the extension would need to learn the
limits for each site.


The existing Tor network can't directly support this use case very
well, except by acting as a transport.

The ability to switch circuits during the process of getting a page
would help greatly.


Right now, people who are using toolks like Pocket or Scrapbook over Tor
_aren't_ really getting the privacy benefits that in principle their
not-needing-to-read-it-right-this-second could be offering.  That is,
a global-enough adversary can sometimes notice that person X has just
downloaded item Y for offline reading.  There's no reason that the
adversary has to be able to do that.



--
Peersm : http://www.peersm.com
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
I don think is chatbeat. How many inindetifed servers do u have?


On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down geoffd...@fastmail.net wrote:

 See https://chartbeat.com/faq/what-is-ping-chartbeat-net
 for what I think you are seeing - website analytics.

 On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote:
  Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
  this,please. Nor in Whois
 
 
  On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com
  wrote:
 
   Another example is this   s3-website-eu-west-1.amazonaws.comOR
   edge-star-shv-08-gru1.facebook.com  OR
   ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
   markmonitor.com
  
  
   On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com
   wrote:
  
   I'm not referring to this.I'm talking of a lot of URI that appears
 when I
   try to link to any site. Every one of those Remote Address start with
 a
   couple o letters followed by numbers like this:
   server-54-230-83-145.mia50.r.cloudfront.net  .
  
  
  
  
   On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org
 wrote:
  
   ideas buenas writes:
  
Why is markmonitor.com and its derivates in my TBB? How can I do
 to
   delete
this ? Are they watching me?
  
   Hi,
  
   Are you talking about seeing a markmonitor.com rule in the HTTPS
   Everywhere
   Enable/Disable Rules menu?
  
  
 https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
  
   If so, this is one of thousands of HTTPS Everywhere rewrite rules
 that
   are included with HTTPS Everywhere, which is included with the Tor
   Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
   is to automatically access as many sites as possible with secure
 HTTPS
   connections.
  
   HTTPS Everywhere typically does not make your browser access sites or
   services that it would not otherwise have accessed, so it shouldn't
 help
   sites monitor your web browsing if they would otherwise not have been
   able to.  There are definitely lots of sites that can monitor some
   aspects
   of your web browsing because the site operator has included content
   loaded
   from those sites in their web page (so your browser automatically
   retrieves
   that content when you visit the page that embedded the content).  For
   example, there are ad networks whose ads are embedded in thousands or
   millions of different sites, and if you visit any of those sites
 without
   blocking those ads, the ad network operator will get some information
   about your visit when your browser loads the embedded content from
 those
   servers.
  
   The monitor in the name of markmonitor is not a reference to
 monitoring
   users' web browsing.  Instead, it's part of the name of the company
   MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
   Internet services mostly to very large companies.
  
   https://www.markmonitor.com/
  
   Their name is supposed to suggest that they can monitor their
 clients'
   trademarks, but not specifically by spying on Internet (or Tor)
 users'
   web browsing.  It seems that one of their original lines of business
 was
   letting companies know about trademark infringement on web sites, so
 that
   MarkMonitor's customers could threaten to sue those web sites'
 operators.
   They subsequently went into other more infrastructural lines of
 business.
  
   There was an article a few years ago criticizing the large amount of
   power that MarkMonitor has, but most of that power seems to have
 arisen
   mainly because it's an infrastructure provider that some very popular
   sites decided to sign up with for various purposes (primarily to
 register
   Internet domain names, because MarkMonitor's domain name registration
   services make it extremely difficult for somebody else to take over
   control of a domain name illicitly).
  
   The markmonitor.com HTTPS Everywhere rule is one of thousands of
 HTTPS
   Everywhere rules, and its goal is solely to make sure that if you're
   visiting a web page hosted at (or loading content from)
 markmonitor.com
   itself, that your browser's connection to markmonitor.com's servers
 will
   be a secure HTTPS connection instead of an insecure HTTP connection.
  It
   is not trying to give any additional information to those servers or
 to
   cause your browser to connect to those servers when it would not
   otherwise have done so.
  
   (You can see the rule itself in the atlas link toward the beginning
 of
   my message, and see that its effect is to rewrite some http:// links
   into
   corresponding https:// links, just like other HTTPS Everywhere rules
   do.)
  
   Having HTTPS Everywhere rules that relate to a site does not
 necessarily
   mean that your browser has ever visited that site or will ever visit
   that site.  We've tried to make this clear because many of the rules
   do relate to controversial or unpopular sites, or sites that somebody
   could 

Re: [tor-talk] Fwd: according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-04 Thread Eugen Leitl
On Fri, Jul 04, 2014 at 07:21:07AM -0500, ba...@clovermail.net wrote:

 Does the NSA barter this database of suspicious extremists with
 foreign services?

They do, according to Drake.

 Certainly there are some friendly services eager to get their hands
 on IP addresses
 of NSA selected suspicious extremists located in their country.

As some day it may happen that a victim must be found,
I've got a little list — I've got a little list
Of society offenders who might well be underground,
And who never would be missed — who never would be missed!
 
 In a few years after joining, splitting, mining this subprime database hardly
 no one will know the insufficient origins of the shiny new AAA+
 suspects database.
 
 The new witch-hunters fabricate the witches.

They have to justify their budget, just as security services fabricate
(adaptive increase in number of privacy advocates after each disclosed
abuse is predictable) rabbits from their magic hat.

They need as many extremists as they can possibly fabricate, and then some.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Moritz Bartl
On 07/03/2014 07:14 PM, Joe Btfsplk wrote:
 Perhaps out of fear of legal liability, Tor Project doesn't seem to have
 what would be very helpful for relay operators - guides, documents -
 even access to basic legal advice,  of how to best avoid legal issues to
 begin with.

https://www.torproject.org/eff/tor-legal-faq.html.en
https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines#Legal

 I know nothing of legalities surrounding that, but people starting a
 relay w/o proper guidance on how to avoid legal problems as much as
 possible, *doesn't quite seem right.*

If you have any specific ideas on how to improve the material, please
contribute!

We do whatever possible to support relay operators, both in regard to
organizing a lawyer as well as funding the legal battle. A generic Tor
relay operator legal fund is not simple to set up, especially if the
case involves other allegations than just running a relay. We have to be
careful.

I have talked to multiple lawyers, and this case would be very easy to
defend against. William was sadly unable or unwilling to communicate
properly, and he's not willing/able to put it to a fight. It is a sad
situation overall, but it does not change the clear legal status of
relay operation. All lawyers I talked to expect this case to be more
complicated than it looks, and it makes no sense to discuss this purely
based on what we have right now, which is some lawman's blog post.

-- 
Moritz Bartl
https://www.torservers.net/
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


[tor-talk] messing with XKeyScore

2014-07-04 Thread Eugen Leitl

http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1 

Errata Security

Advanced persistent cybersecurity

Friday, July 04, 2014

Jamming XKeyScore

Back in the day there was talk about jamming echelon by adding keywords to 
email that the echelon system was supposedly looking for. We can do the same 
thing for XKeyScore: jam the system with more information than it can handle. 
(I enumerate the bugs I find in the code as xks-00xx).


For example, when sending emails, just send from the address 
brid...@torproject.org and in the email body include:

https://bridges.torproject.org/
bridge = 0.0.0.1:443
bridge = 0.0.0.2:443
bridge = 0.0.0.3:443
...

Continue this for megabytes worth of bridges (xks-0001), and it'll totally mess 
up XKeyScore. It has no defense against getting flooded with information like 
this, as far as I can see.


Note that the regex only cares about 1 to 3 digit numbers, that means the 
following will be accepted by the system (xks-0002):

bridge = 75.748.86.91:80

The port number matches on 2 to 4 digits ([0-9]{2,4}). Therefore, bridges with 
port numbers below 10 and above  will be safe. I don't know if this code 
reflect a limitation in Tor, or but assuming high/low ports are possible, this 
can be used to evade detection (xks-0011).

Strangely, when the port number is parsed, it'll capture the first non-digit 
character after the port number (xks-0012). This is normally whitespace, but we 
could generate an email with 256 entries, trying every possible character. A 
character like  or ' might cause various problems in rendering on an HTML page 
or generating SQL queries.


You can also jam the system with too many Onion addresses (xks-0003), but there 
are additional ways to screw with those. When looking for Onion addresses, the 
code uses a regex that contains the following capture clause:

([a-z]+):\/\/)

This is looking for a string like http://; or https://;, but the regex has no 
upper bounds (xks-0004) and there is no validation. Thus, you can include 
goscrewyourself://o987asgia7gsdfoi.onion:443/ in network traffic, and it'll 
happily insert this into the database. But remember that no upper bounds 
means just that: the prefix can be kilobytes long, megabytes long, or even 
gigabytes long. You can open a TCP connection to a system you feel the NSA is 
monitoring, send 5 gigabytes of lower-case letters, followed by the rest of the 
Onion address, and see what happens. I mean, there is some practical upper 
bound somewhere in the system,, and when you hit it, there's a good chance bad 
things will happen.

Likewise, the port number for Onion address is captured by the regex (d+), 
meaning any number of digits (xks-0005). Thus, we could get numbers that 
overflow 16-bits, 32-bits, 64-bits, or 982745987-bits. Very long strings of 
digits (megabytes) at this point might cause bad things to happen within the 
system.

There is an extra-special thing that happens when the schema part of the Onion 
address is exactly 16-bytes long (xks-0006). This will cause the address and 
the scheme to reverse themselves when inserted into the database. Thus, we can 
insert digits into the scheme field. This might foul up later code that assumes 
schemes only contain letters, because only letters match in the regex.


In some protocol fields, the regexes appear to be partial matches. The system 
appears to match on HTTP servers with mixminion anywhere in the name. Thus, 
we start causing lots of traffic to go to our domains, such as 
mixminion.robertgraham.com, that will cause their servers to fill up with 
long term storage of sessions they don't care about (xks-0007)


Let's talk X.509, and the following code:

fingerprint('anonymizer/tor/bridge/tls') =
  ssl_x509_subject('bridges.torproject.org') or
  ssl_dns_name('bridges.torproject.org');

Code that parses X.509 certificates is known to be flaky as all get out. The 
simplest thing to do is find a data center you feel the NSA can monitor, and 
then setup a hostile server that can do generic fuzzing of X.509 certificates, 
trying to crash them.

It's likely that whatever code is parsing X.509 certificates is not validating 
them. Thus, anybody can put certificates on their servers claiming to be 
'bridges.torproject.org' (xks-0008). It's likely that the NSA is parsing SSL on 
all ports, so just pick a random port on your server not being used for 
anything else, create a self-signed CERT claiming to be 
bridges.torproject.org', then create incoming links to that port from other 
places so at least search-engines will follow that link and generate traffic. 
This will cause the NSA database of bridges to fill up with bad information -- 
assuming it's not already full from people screwing with the emails as noted 
above :).


img src=http://www.google.com/?q=tails+usb; /

Putting the above code in a web page like this one will cause every visitor to 
trigger a search for TAILS in the XKeyScore rules. The more people who do this, 

Re: [tor-talk] (no subject)

2014-07-04 Thread Geoff Down
I don't have any unidentified servers - I don't know what you mean by
that. Which webpage are you visiting? Have you compared what happens
when visiting with Torbrowser and visiting with normal Firefox over the
normal internet?

On Fri, Jul 4, 2014, at 02:06 PM, ideas buenas wrote:
 I don think is chatbeat. How many inindetifed servers do u have?
 
 
 On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down geoffd...@fastmail.net
 wrote:
 
  See https://chartbeat.com/faq/what-is-ping-chartbeat-net
  for what I think you are seeing - website analytics.
 
  On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote:
   Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
   this,please. Nor in Whois
  
  
   On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com
   wrote:
  
Another example is this   s3-website-eu-west-1.amazonaws.comOR
edge-star-shv-08-gru1.facebook.com  OR
ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
markmonitor.com
   
   
On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas ideasbue...@gmail.com
wrote:
   
I'm not referring to this.I'm talking of a lot of URI that appears
  when I
try to link to any site. Every one of those Remote Address start with
  a
couple o letters followed by numbers like this:
server-54-230-83-145.mia50.r.cloudfront.net  .
   
   
   
   
On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org
  wrote:
   
ideas buenas writes:
   
 Why is markmonitor.com and its derivates in my TBB? How can I do
  to
delete
 this ? Are they watching me?
   
Hi,
   
Are you talking about seeing a markmonitor.com rule in the HTTPS
Everywhere
Enable/Disable Rules menu?
   
   
  https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html
   
If so, this is one of thousands of HTTPS Everywhere rewrite rules
  that
are included with HTTPS Everywhere, which is included with the Tor
Browser Bundle.  The goal of HTTPS Everywhere and its rewrite rules
is to automatically access as many sites as possible with secure
  HTTPS
connections.
   
HTTPS Everywhere typically does not make your browser access sites or
services that it would not otherwise have accessed, so it shouldn't
  help
sites monitor your web browsing if they would otherwise not have been
able to.  There are definitely lots of sites that can monitor some
aspects
of your web browsing because the site operator has included content
loaded
from those sites in their web page (so your browser automatically
retrieves
that content when you visit the page that embedded the content).  For
example, there are ad networks whose ads are embedded in thousands or
millions of different sites, and if you visit any of those sites
  without
blocking those ads, the ad network operator will get some information
about your visit when your browser loads the embedded content from
  those
servers.
   
The monitor in the name of markmonitor is not a reference to
  monitoring
users' web browsing.  Instead, it's part of the name of the company
MarkMonitor, a subsidiary of Thomson Reuters, that provides certain
Internet services mostly to very large companies.
   
https://www.markmonitor.com/
   
Their name is supposed to suggest that they can monitor their
  clients'
trademarks, but not specifically by spying on Internet (or Tor)
  users'
web browsing.  It seems that one of their original lines of business
  was
letting companies know about trademark infringement on web sites, so
  that
MarkMonitor's customers could threaten to sue those web sites'
  operators.
They subsequently went into other more infrastructural lines of
  business.
   
There was an article a few years ago criticizing the large amount of
power that MarkMonitor has, but most of that power seems to have
  arisen
mainly because it's an infrastructure provider that some very popular
sites decided to sign up with for various purposes (primarily to
  register
Internet domain names, because MarkMonitor's domain name registration
services make it extremely difficult for somebody else to take over
control of a domain name illicitly).
   
The markmonitor.com HTTPS Everywhere rule is one of thousands of
  HTTPS
Everywhere rules, and its goal is solely to make sure that if you're
visiting a web page hosted at (or loading content from)
  markmonitor.com
itself, that your browser's connection to markmonitor.com's servers
  will
be a secure HTTPS connection instead of an insecure HTTP connection.
   It
is not trying to give any additional information to those servers or
  to
cause your browser to connect to those servers when it would not
otherwise have done so.
   
(You can see the rule itself in the atlas link toward the beginning
  of
my message, and see that its effect is to rewrite 

Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
Visiting the same website with Tor or normal Firefox its gave me the same
Remote Address:
s3-us-west-2-w.amazonaws.com
ec2-174-129-247-121.compute-1.amazonaws.com
edge-star-shv-04-gru1.facebook.com
as an example. While ones repeat themselves in both browsers, others not.

One class of unidentifies servers are the ones that not respond to a whois
lookup. Other class use an address that not resolve in whois with that
address and instead belongs to other




On Fri, Jul 4, 2014 at 2:47 PM, Geoff Down geoffd...@fastmail.net wrote:

 I don't have any unidentified servers - I don't know what you mean by
 that. Which webpage are you visiting? Have you compared what happens
 when visiting with Torbrowser and visiting with normal Firefox over the
 normal internet?

 On Fri, Jul 4, 2014, at 02:06 PM, ideas buenas wrote:
  I don think is chatbeat. How many inindetifed servers do u have?
 
 
  On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down geoffd...@fastmail.net
  wrote:
 
   See https://chartbeat.com/faq/what-is-ping-chartbeat-net
   for what I think you are seeing - website analytics.
  
   On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote:
Another inidentified URI in TBB: rev-213.189.48.245.atman.pl . Check
this,please. Nor in Whois
   
   
On Thu, Jul 3, 2014 at 9:27 PM, ideas buenas ideasbue...@gmail.com
wrote:
   
 Another example is this   s3-website-eu-west-1.amazonaws.comOR
 edge-star-shv-08-gru1.facebook.com  OR
 ec2-54-225-215-244.compute-1.amazonaws.com   everyone resolving to
 markmonitor.com


 On Thu, Jul 3, 2014 at 9:19 PM, ideas buenas 
 ideasbue...@gmail.com
 wrote:

 I'm not referring to this.I'm talking of a lot of URI that appears
   when I
 try to link to any site. Every one of those Remote Address start
 with
   a
 couple o letters followed by numbers like this:
 server-54-230-83-145.mia50.r.cloudfront.net  .




 On Thu, Jul 3, 2014 at 2:59 AM, Seth David Schoen sch...@eff.org
 
   wrote:

 ideas buenas writes:

  Why is markmonitor.com and its derivates in my TBB? How can I
 do
   to
 delete
  this ? Are they watching me?

 Hi,

 Are you talking about seeing a markmonitor.com rule in the HTTPS
 Everywhere
 Enable/Disable Rules menu?


  
 https://www.eff.org/https-everywhere/atlas/domains/markmonitor.com.html

 If so, this is one of thousands of HTTPS Everywhere rewrite rules
   that
 are included with HTTPS Everywhere, which is included with the
 Tor
 Browser Bundle.  The goal of HTTPS Everywhere and its rewrite
 rules
 is to automatically access as many sites as possible with secure
   HTTPS
 connections.

 HTTPS Everywhere typically does not make your browser access
 sites or
 services that it would not otherwise have accessed, so it
 shouldn't
   help
 sites monitor your web browsing if they would otherwise not have
 been
 able to.  There are definitely lots of sites that can monitor
 some
 aspects
 of your web browsing because the site operator has included
 content
 loaded
 from those sites in their web page (so your browser automatically
 retrieves
 that content when you visit the page that embedded the content).
  For
 example, there are ad networks whose ads are embedded in
 thousands or
 millions of different sites, and if you visit any of those sites
   without
 blocking those ads, the ad network operator will get some
 information
 about your visit when your browser loads the embedded content
 from
   those
 servers.

 The monitor in the name of markmonitor is not a reference to
   monitoring
 users' web browsing.  Instead, it's part of the name of the
 company
 MarkMonitor, a subsidiary of Thomson Reuters, that provides
 certain
 Internet services mostly to very large companies.

 https://www.markmonitor.com/

 Their name is supposed to suggest that they can monitor their
   clients'
 trademarks, but not specifically by spying on Internet (or Tor)
   users'
 web browsing.  It seems that one of their original lines of
 business
   was
 letting companies know about trademark infringement on web
 sites, so
   that
 MarkMonitor's customers could threaten to sue those web sites'
   operators.
 They subsequently went into other more infrastructural lines of
   business.

 There was an article a few years ago criticizing the large
 amount of
 power that MarkMonitor has, but most of that power seems to have
   arisen
 mainly because it's an infrastructure provider that some very
 popular
 sites decided to sign up with for various purposes (primarily to
   register
 Internet domain names, because MarkMonitor's domain name
 registration
 services make it extremely difficult for somebody else to take
 over
 control of a domain name illicitly).

 The markmonitor.com 

Re: [tor-talk] (no subject)

2014-07-04 Thread Geoff Down


On Fri, Jul 4, 2014, at 04:51 PM, ideas buenas wrote:
 Visiting the same website with Tor or normal Firefox its gave me the same

 So this is nothing to do with Tor.

 Remote Address:
 s3-us-west-2-w.amazonaws.com
 ec2-174-129-247-121.compute-1.amazonaws.com
 edge-star-shv-04-gru1.facebook.com
 as an example. 

While ones repeat themselves in both browsers, others not.

That's not particularly unusual - the website you are visiting is seeing
accesses from different countries, and so may be serving slightly
different content to suit those countries.
It may also server slightly different content at different times.

 
 One class of unidentifies servers are the ones that not respond to a
 whois lookup. 
 If you mean that there is no Whois entry for
 s3-us-west-2-w.amazonaws.com , for example, that is normal: Whois only
 provides data for second-level domains (in this case amazonaws.com),
 not subdomains of those. Also of course some Top-Level-Domains (.eu,.au
 for example) provided only limited information - which they are
 entitled to do. 

 Other class use an address that not resolve in whois with that
 address and instead belongs to other
 
 I don't understand this, sorry. Can you give an example?
GD

-- 
http://www.fastmail.fm - Choose from over 50 domains or use your own

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread MacLemon
Hi!

On 04 Jul 2014, at 15:31, Moritz Bartl mor...@torservers.net wrote:
 I have talked to multiple lawyers, and this case would be very easy to
 defend against. William was sadly unable or unwilling to communicate
 properly, and he's not willing/able to put it to a fight. It is a sad
 situation overall, but it does not change the clear legal status of
 relay operation. All lawyers I talked to expect this case to be more
 complicated than it looks, and it makes no sense to discuss this purely
 based on what we have right now, which is some lawman's blog post.

I've talked to William's lawyer in person as well as the ISPA jurist (Austrian 
Inter Service Provider's Association) who both joined our Tor-ops meeting in 
Vienna yesterday (2014-07-03).

What I can sum up:
It is not illegal to run a Tor relay/exit/bridge in Austria.
We can not take William's case any further.
Doing so would neither help William nor help to clear up the legal 
status of running relays in Austria.
William's lawyer said he personally considers the court judgement to be wrong.

The Austrian Tor-Community is working to form an official association (Verein) 
to get a better standing. Goals shall be education about anonymity, better 
communication with law enforcement, better communication with ISPs as well as 
the usual technical mumble to build secure and high bandwidth relays.
Building up a legal defense fund and getting a clear statement on whether 
Tor-networks fall under the legal term of „communications network“ as defined 
in ECG §13 is also part of that.


So if you're in Austria and run a relay/exit/bridge, please get in touch, join 
our Mailinglist (yes another one) at torservers.at to see if you can help and 
to stay in the loop.

Best regards
MacLemon
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] XKeyscore-Quellcode: more english details requested

2014-07-04 Thread Jens Kubieziel
* elrippo schrieb am 2014-07-04 um 20:30 Uhr:
 Missed it, but watched it in the ARD Mediathek [1]. Could someone advise, how 
 a copy could be downloaded as mp4, divx, ogg or some other format?

You can use URL:http://zdfmediathk.sourceforge.net/.

-- 
Jens Kubieziel   http://www.kubieziel.de
Perl – The only language that looks the same before and after RSA encryption.
- Keith Bostic


signature.asc
Description: Digital signature
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] messing with XKeyScore

2014-07-04 Thread grarpamp
On Fri, Jul 4, 2014 at 10:56 AM, Eugen Leitl eu...@leitl.org wrote:
 http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1

Good work, glad someone had time to really dig in, perhaps even
drawing on some comments from others in the early buzz such as
https://lists.torproject.org/pipermail/tor-talk/2014-July/033695.html

 Andreas Krey
 grarpamp
 http://daserste.ndr.de/panorama/xkeyscorerules100.txt
 2) rules100... this thing likely has more N00 rulesets as well.
 Er, no. ndr.de always uses URLs with 100 or similar in them.
 (No idea why.) That is not the original file name.

Ahh, good to know, thanks.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] XKeyscore-Quellcode: more english details requested

2014-07-04 Thread elrippo
Am Freitag, 4. Juli 2014, 20:48:09 schrieb Jens Kubieziel:
 * elrippo schrieb am 2014-07-04 um 20:30 Uhr:
  Missed it, but watched it in the ARD Mediathek [1]. Could someone advise,
  how a copy could be downloaded as mp4, divx, ogg or some other format?
 You can use URL:http://zdfmediathk.sourceforge.net/.

Thank you, works like a charm!!!

-- 
We don't bubble you, we don't spoof you ;)
Keep your data encrypted!
Log you soon,
your Admin
elri...@elrippoisland.net

Encrypted messages are welcome.
0x84DF1F7E6AE03644

-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1.4.11 (GNU/Linux)
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=otlL
-END PGP PUBLIC KEY BLOCK-


signature.asc
Description: This is a digitally signed message part.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-04 Thread grarpamp
On Fri, Jul 4, 2014 at 8:15 AM, Nathan Andrew Fain nat...@squimp.com wrote:
 Trawling for Tor Hidden Services: Detection, Measurement,
 Deanonymization
 Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
 http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf

 the two seem very similar. in the case of the paper linked amazon
 services were utilized. or perhaps someone can explain where the two
 research groups differ?

Yes, clearly an extension, optimization, or new work along the lines
of the above paper.


Perhaps more interesting is this dilemma...

 https://lists.torproject.org/pipermail/tor-talk/2014-July/033693.html
 They wanted a NDA, so most Tor Project's core contributors don't know
 what's in the air.

So we have at least one core person who knows. Now assuming this
presentation [1] is in fact 'Really Bad News' for, at minimum,
Hidden Services... will the details of it be leaked in order to
'save' HS operators/users before CERTs/GOVs/LEAs/Vigilantes/Spies
and the thought police have time to get at them (or what unexposed
elements still remain of them)?

This is premised upon CERT's typical cozy relationships with LEA's,
naturally leading to sharing with them what are potentially ...

'tested ... in the wild ... dozens of successful real-world
de-anonymization case studies, ranging from attribution of'

... really diskliked things. Particularly cases of human harm
where it is only natural to seek intervention.

Then there are the cases worthy of every possible protection outlined
here...
https://www.torproject.org/about/torusers.html.en

Therein lies the dilemma. What do you do?


[Note that even if the above relationships, or desire to intervene,
do not exist... said spies and their actors are likely to monitor
the full research details, and know who in the public knows as well.
This could lead to shorter time constraints on all sides.]

[1] Which I forgot to link in the OP, thanks Matthew.
https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread no . thing_to-hide
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello Tor!

Running an internal relay in Graz since 7/2013, where William Weber's
appartment was raided in 2012, when some idiot misused his exit for
illegal stuff, I became interested in his case. But I know it only
from the newspapers.

The raid took place on Wed, 2012-11-28 (1). William did intensive
blogging afterwards (2)(3), the legal process started, and ended this
week Mon, 2014-06-30, with 3 y probation. I found a German article
which provides a good summary (4, Google Translate).
He was not convicted for operating an exit (!!), what is legal in
Austria. But, according to the opinion of the judges, for
contribution to delinquency ('Beitragstaeterschaft' in German):
(...) that he answered in an interview to the question whether he was
aware that Tor could be used for distribution of child pornography,
responded at a conference: I do not give a fuck.(...)
(...) that the prosecutor quoted from chat logs in which he for
anonymous hosting of everything, including child pornography,
recommended Tor (...) (4)
- -- The proofs for such an attitude are not really helpful when
getting to court.

Anyway, if you would like to help him with his lawyer costs, he takes
Bitcoin donations (5).

Perhaps next time it's you, or me, or ...

Best regards

Anton

1)
http://arstechnica.com/tech-policy/2012/11/tor-operator-charged-for-child-porn-transmitted-over-his-servers
2) http://raided4tor.cryto.net
3) http://rdns.im
4)
https://translate.google.com/translate?sl=detl=enjs=yprev=_thl=enie=UTF-8u=http%3A%2F%2Ffuturezone.at%2Fnetzpolitik%2Fstrafe-fuer-tor-betreiber-grazer-urteil-wirft-fragen-auf%2F73.173.618%2Fprintedit-text=
5) http://raided4tor.cryto.net/donate

- -- 
no.thing_to-hide at cryptopathie dot eu
0x30C3CDF0, RSA 2048, 24 Mar 2014
0FF8 A811 8857 1B7E 195B 649E CC26 E1A5 30C3 CDF0
Bitmessage (no metadata): BM-2cXixKZaqzJmTfz6ojiyLzmKg2JbzDnApC



On 04/07/14 19:11, MacLemon wrote:
 Hi!
 
 On 04 Jul 2014, at 15:31, Moritz Bartl mor...@torservers.net
 wrote:
 I have talked to multiple lawyers, and this case would be very
 easy to defend against. William was sadly unable or unwilling to
 communicate properly, and he's not willing/able to put it to a
 fight. It is a sad situation overall, but it does not change the
 clear legal status of relay operation. All lawyers I talked to
 expect this case to be more complicated than it looks, and it
 makes no sense to discuss this purely based on what we have right
 now, which is some lawman's blog post.
 
 I've talked to William's lawyer in person as well as the ISPA
 jurist (Austrian Inter Service Provider's Association) who both
 joined our Tor-ops meeting in Vienna yesterday (2014-07-03).
 
 What I can sum up: It is not illegal to run a Tor relay/exit/bridge
 in Austria. We can not take William's case any further. Doing so
 would neither help William nor help to clear up the legal status of
 running relays in Austria. William's lawyer said he personally
 considers the court judgement to be wrong.
 
 The Austrian Tor-Community is working to form an official
 association (Verein) to get a better standing. Goals shall be
 education about anonymity, better communication with law
 enforcement, better communication with ISPs as well as the usual
 technical mumble to build secure and high bandwidth relays. 
 Building up a legal defense fund and getting a clear statement on
 whether Tor-networks fall under the legal term of „communications
 network“ as defined in ECG §13 is also part of that.
 
 
 So if you're in Austria and run a relay/exit/bridge, please get in
 touch, join our Mailinglist (yes another one) at torservers.at to
 see if you can help and to stay in the loop.
 
 Best regards MacLemon
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJTtwhVAAoJEMwm4aUww83w+1oIAI80jAQj4mOpwsiYdnJGstA4
A25lb+2wDpI/zgKhttkJk1t6I1Ff3/+F5lmU7Eh6nO1RlgcPUVzZJtex1pAZ0P+z
AIo9FnsF2UJbkPU/CR2hC96yfb8cw0lEyo+zUVCi5YcrZyDbKpgiJvFB2uIuM98P
3/8XP5NteqhmBQ+WPSWAo9A7EoCuzFpSpGRhfj+osgjRWIwR75CGJErLLmSYZqP0
unSji6zJycbb6u3NOtUlVijLBGBdoXt+oQBKf8tttB3yK+WTBpMZ8P9qVb5IuKCW
/hJeqX1a2MmPG+jSjpunY/W1oBVHeDooYp4qdNIYAeVsZDVm8LSbD1g7r4aFk/o=
=0Zsp
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Joe Btfsplk

On 7/3/2014 2:23 PM, C B wrote:

I agree that collecting stories about why/how I use Tor is useful, but I disagree 
that any special education or warning should be needed before setting up an exit node. Setting up 
an exit node is simply providing another IP that can be used for traffic and nothing else.


Holy... they may not have a clue what danger lies ahead, Batman.
We're going to have to agree to disagree, that at least some basic info 
on potential dangers be supplied, if only links.
We've all seen several people conversing on tor-talk now, that were run 
through the ringer, for running Tor relays.


I don't think any of them thought they'd be fighting for their freedom; 
spending a huge part of savings to defend themselves or going through 
extended, true mental anguish of wondering if they'd lose their freedom 
 family.


Maybe Tor Project itself isn't the one that should be doing the 
educating in this case - dunno.
Though I don't like the thought of people going through hell on Earth, 
because they didn't understand the dangers, I also understand it's not 
in Tor Project's best interest to scare off relay operators.


One issue is, every Tor user is encouraged to run a relay.  Kind of like 
the US Army commercials promoting adventure  visiting foreign lands, 
instead of bullets  grenades coming at you.


Moritz,
I'm not sure if the 1st FAQ at the link 
https://www.torproject.org/eff/tor-legal-faq.html.en

portrays an accurate picture of potential dangers:


  Has anyone ever been sued or prosecuted for running Tor?

*No*, we aren't aware of anyone being sued or prosecuted in the United 
States just for running a Tor relay. Further, we believe that running a 
Tor relay --- including an exit relay that allows people to anonymously 
send and receive traffic --- is legal under U.S. law.


That may need a bit of revision. :D  Maybe no one has been prosecuted in 
the US (I don't know), but people in other countries sure have.
And being investigated or going through court hearings  trials - maybe 
for months or yrs, can destroy a person.

It can be devastating, even if you're never formally charged.

Many people who've never gone through something like that can't fully 
understand the incredible stress of being investigated  threatened.


The concept of, No one's been *prosecuted* in the US, therefore running 
Tor relays has no potentially serious legal ramifications, is glossing 
over the dangers.


Running a relay may not be *the* most dangerous activity, but it sure 
carries significant risk.  Many that get tor-talk regularly have read that.
But some potential relay operators might not read tor-talk every day for 
months, to read about someone that got in serious legal trouble, before 
they decide to / not to run a relay.


--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-04 Thread grarpamp
On 7/4/14, grarpamp grarp...@gmail.com wrote:
 https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget

I2P is a tool that likely presents the nearest analog to Tor's hidden
services (.i2p) to the user. Usable in much the same way.
Always good to be familiar with and have other options out there.
And see that they receive community research and review efforts too.

http://geti2p.net/en/comparison/tor
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread no . thing_to-hide
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

I fully agree with Joe!

Running an exit can get you in serious legal trouble, because Tor /and
all other anonymity services/ will always be misused for illegal
activities. Every interested operator must make his personal moral
trade-off and come to a decision.
Sartre described such a discussion in a more extreme scenario in Les
mains sales (= Dirty hands)

Anyway, I decided not to run an exit but only an internal relay. And
to join German CCC and Zwiebelfreunde (Hello to the colleagues by the
way!). We operate really big relays, secured by professional admins.
Much better than I could setup at home as hobbyist w/o IT-education.
So you are an association and the legal risk and potential lawyer
costs are distributed.

Even the simple use of Tor is not w/o risk for everyday use:
https://translate.google.com/translate?hl=enie=UTF8prev=_tsl=detl=enu=http://www.heise.de/ct/heft/2013-20--2248651.html%3Fview%3Dprint

I think one should have at least some basic knowledge about what the
Internet, SSL certificates, browsers, scripting and plugins are and
how they work.

Best regards

Anton
- -- 
no.thing_to-hide at cryptopathie dot eu
0x30C3CDF0, RSA 2048, 24 Mar 2014
0FF8 A811 8857 1B7E 195B 649E CC26 E1A5 30C3 CDF0
Bitmessage (no metadata): BM-2cXixKZaqzJmTfz6ojiyLzmKg2JbzDnApC



On 04/07/14 22:56, Joe Btfsplk wrote:
 On 7/3/2014 2:23 PM, C B wrote:
 I agree that collecting stories about why/how I use Tor is
 useful, but I disagree that any special education or warning
 should be needed before setting up an exit node. Setting up an
 exit node is simply providing another IP that can be used for
 traffic and nothing else.
 
 Holy... they may not have a clue what danger lies ahead, Batman. 
 We're going to have to agree to disagree, that at least some basic
 info on potential dangers be supplied, if only links. We've all
 seen several people conversing on tor-talk now, that were run 
 through the ringer, for running Tor relays.
 
 I don't think any of them thought they'd be fighting for their
 freedom; spending a huge part of savings to defend themselves or
 going through extended, true mental anguish of wondering if they'd
 lose their freedom  family.
 
 Maybe Tor Project itself isn't the one that should be doing the 
 educating in this case - dunno. Though I don't like the thought of
 people going through hell on Earth, because they didn't understand
 the dangers, I also understand it's not in Tor Project's best
 interest to scare off relay operators.
 
 One issue is, every Tor user is encouraged to run a relay.  Kind of
 like the US Army commercials promoting adventure  visiting foreign
 lands, instead of bullets  grenades coming at you.
 
 Moritz, I'm not sure if the 1st FAQ at the link 
 https://www.torproject.org/eff/tor-legal-faq.html.en portrays an
 accurate picture of potential dangers:
 
 
 Has anyone ever been sued or prosecuted for running Tor?
 
 *No*, we aren't aware of anyone being sued or prosecuted in the
 United States just for running a Tor relay. Further, we believe
 that running a Tor relay --- including an exit relay that allows
 people to anonymously send and receive traffic --- is legal under
 U.S. law.
 
 That may need a bit of revision. :D  Maybe no one has been
 prosecuted in the US (I don't know), but people in other countries
 sure have. And being investigated or going through court hearings 
 trials - maybe for months or yrs, can destroy a person. It can be
 devastating, even if you're never formally charged.
 
 Many people who've never gone through something like that can't
 fully understand the incredible stress of being investigated 
 threatened.
 
 The concept of, No one's been *prosecuted* in the US, therefore
 running Tor relays has no potentially serious legal ramifications,
 is glossing over the dangers.
 
 Running a relay may not be *the* most dangerous activity, but it
 sure carries significant risk.  Many that get tor-talk regularly
 have read that. But some potential relay operators might not read
 tor-talk every day for months, to read about someone that got in
 serious legal trouble, before they decide to / not to run a relay.
 
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJTtyMGAAoJEMwm4aUww83wBsgH/iymnTz9KSoiy4XqlXDpRjTD
ki08BxScRcx1JPbGe/QXFAO0Nu4dmnr6qC5chti8qjsmupvsiNqr4+8pxTRh3yWH
FToWon/Qt6TiSBAqAvxUGc5UrEK4vhzHfaXcY5H/vnIJazjeYZKXo00ca3jV1e7o
Qeo8Algk/9Vp5So5aIkD+p706vQa564s6lpBrFZ0ULB+gHlvvZe29AudkuvGYIPh
SJSAnAVs9LjBmx5H64S/Wqk4S2WFRlT+UgwfgSLEoO3rGgJdwtv50bUkKxXBk3MW
nhXc48ujJHcChhqmf2I6sh96zDiImT/E4PQrHvs2IHvCNIPrgN/rtvQejd8e3Qw=
=MlMt
-END PGP SIGNATURE-
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
Do a Whois lookup of  the addreses I gave u before  and check that all of
this resolve to markmonitor.  s3-us-west-2-w.amazonaws.com
 ec2-174-129-247-121.compute-1.amazonaws.com
 edge-star-shv-04-gru1.facebook.com st
http://edge-star-shv-04-gru1.facebook.com
just when I was visiting www.lemonde.fr ?
http://edge-star-shv-04-gru1.facebook.com


On Fri, Jul 4, 2014 at 4:51 PM, Geoff Down geoffd...@fastmail.net wrote:



 On Fri, Jul 4, 2014, at 04:51 PM, ideas buenas wrote:
  Visiting the same website with Tor or normal Firefox its gave me the same

  So this is nothing to do with Tor.

  Remote Address:
  s3-us-west-2-w.amazonaws.com
  ec2-174-129-247-121.compute-1.amazonaws.com
  edge-star-shv-04-gru1.facebook.com
  as an example.

 While ones repeat themselves in both browsers, others not.

 That's not particularly unusual - the website you are visiting is seeing
 accesses from different countries, and so may be serving slightly
 different content to suit those countries.
 It may also server slightly different content at different times.

 
  One class of unidentifies servers are the ones that not respond to a
  whois lookup.
  If you mean that there is no Whois entry for
  s3-us-west-2-w.amazonaws.com , for example, that is normal: Whois only
  provides data for second-level domains (in this case amazonaws.com),
  not subdomains of those. Also of course some Top-Level-Domains (.eu,.au
  for example) provided only limited information - which they are
  entitled to do.

  Other class use an address that not resolve in whois with that
  address and instead belongs to other
 
  I don't understand this, sorry. Can you give an example?
 GD

 --
 http://www.fastmail.fm - Choose from over 50 domains or use your own

 --
 tor-talk mailing list - tor-talk@lists.torproject.org
 To unsubscribe or change other settings go to
 https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-04 Thread grarpamp
On Fri, Jul 4, 2014 at 6:02 PM, Paweł Zegartowski pze...@gmail.com wrote:
 I2P (aka Invisible Internet Protocol) is designed to be a real undernet
 Using I2P to acces a standard Internet but in anonymous way is much less

Right, in the likely context of the subject exploit, I referred only to
the similar .onion/.i2p hidden constructs that available for users.
Binding to and using them is a bit different of course but it all works.
And the .i2p's are generally as 'efficient' (speedy) in use regarding
initial connect, latency and bandwidth, if not better. (A lot of filesharing
is on i2p.) Bootstrapping into the net does take a while though. And
of course as with any other darknet you should run a 'non-exit' relay
to help out.

i2p does have 'exits' you can compare to tor as well.
Anyone can run an exit. But users have first find one
on a wiki list or somesuch, and then manually configure
their i2p to use it. Consider it like a bolt on proxy. Last
I checked one comes preconfigured but as such expect
it to be far overloaded. No reason there can't be many,
there just aren't.

 http://geti2p.net/en/comparison/tor
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Zenaan Harkness
On 7/5/14, no.thing_to-h...@cryptopathie.eu
no.thing_to-h...@cryptopathie.eu wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 Hello Tor!

 Running an internal relay in Graz since 7/2013, where William Weber's
 appartment was raided in 2012, when some idiot misused his exit for
 illegal stuff, I became interested in his case. But I know it only
 from the newspapers.

 The raid took place on Wed, 2012-11-28 (1). William did intensive
 blogging afterwards (2)(3), the legal process started, and ended this
 week Mon, 2014-06-30, with 3 y probation. I found a German article
 which provides a good summary (4, Google Translate).
 He was not convicted for operating an exit (!!), what is legal in
 Austria. But, according to the opinion of the judges, for
 contribution to delinquency ('Beitragstaeterschaft' in German):
 (...) that he answered in an interview to the question whether he was
 aware that Tor could be used for distribution of child pornography,
 responded at a conference: I do not give a fuck.(...)
 (...) that the prosecutor quoted from chat logs in which he for
 anonymous hosting of everything, including child pornography,
 recommended Tor (...) (4)

Contribution to delinquency it seems he was charged with.

Evidently one must demonstrate one _does_ indeed
give a fuck (care for), at least for the law.


 - -- The proofs for such an attitude are not really helpful when
 getting to court.

Undoubtedly.


 Anyway, if you would like to help him with his lawyer costs, he takes
 Bitcoin donations (5).

 Perhaps next time it's you, or me, or ...

 Best regards

 Anton

 1)
 http://arstechnica.com/tech-policy/2012/11/tor-operator-charged-for-child-porn-transmitted-over-his-servers
 2) http://raided4tor.cryto.net
 3) http://rdns.im
 4)
 https://translate.google.com/translate?sl=detl=enjs=yprev=_thl=enie=UTF-8u=http%3A%2F%2Ffuturezone.at%2Fnetzpolitik%2Fstrafe-fuer-tor-betreiber-grazer-urteil-wirft-fragen-auf%2F73.173.618%2Fprintedit-text=
 5) http://raided4tor.cryto.net/donate

 - --
 no.thing_to-hide at cryptopathie dot eu
 0x30C3CDF0, RSA 2048, 24 Mar 2014
 0FF8 A811 8857 1B7E 195B 649E CC26 E1A5 30C3 CDF0
 Bitmessage (no metadata): BM-2cXixKZaqzJmTfz6ojiyLzmKg2JbzDnApC



 On 04/07/14 19:11, MacLemon wrote:
 Hi!

 On 04 Jul 2014, at 15:31, Moritz Bartl mor...@torservers.net
 wrote:
 I have talked to multiple lawyers, and this case would be very
 easy to defend against. William was sadly unable or unwilling to
 communicate properly, and he's not willing/able to put it to a
 fight. It is a sad situation overall, but it does not change the
 clear legal status of relay operation. All lawyers I talked to
 expect this case to be more complicated than it looks, and it
 makes no sense to discuss this purely based on what we have right
 now, which is some lawman's blog post.

 I've talked to William's lawyer in person as well as the ISPA
 jurist (Austrian Inter Service Provider's Association) who both
 joined our Tor-ops meeting in Vienna yesterday (2014-07-03).

 What I can sum up: It is not illegal to run a Tor relay/exit/bridge
 in Austria. We can not take William's case any further. Doing so
 would neither help William nor help to clear up the legal status of
 running relays in Austria. William's lawyer said he personally
 considers the court judgement to be wrong.

 The Austrian Tor-Community is working to form an official
 association (Verein) to get a better standing. Goals shall be
 education about anonymity, better communication with law
 enforcement, better communication with ISPs as well as the usual
 technical mumble to build secure and high bandwidth relays.
 Building up a legal defense fund and getting a clear statement on
 whether Tor-networks fall under the legal term of „communications
 network“ as defined in ECG §13 is also part of that.


 So if you're in Austria and run a relay/exit/bridge, please get in
 touch, join our Mailinglist (yes another one) at torservers.at to
 see if you can help and to stay in the loop.

 Best regards MacLemon
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Joe Btfsplk

On 7/4/2014 3:02 PM, no.thing_to-h...@cryptopathie.eu wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello Tor!

Running an internal relay in Graz since 7/2013, where William Weber's
appartment was raided in 2012, when some idiot misused his exit for
illegal stuff, I became interested in his case. But I know it only
from the newspapers.

The raid took place on Wed, 2012-11-28 (1). William did intensive
blogging afterwards (2)(3), the legal process started, and ended this
week Mon, 2014-06-30, with 3 y probation. I found a German article
which provides a good summary (4, Google Translate).
He was not convicted for operating an exit (!!), what is legal in
Austria. But, according to the opinion of the judges, for
contribution to delinquency ('Beitragstaeterschaft' in German):
(...) that he answered in an interview to the question whether he was
aware that Tor could be used for distribution of child pornography,
responded at a conference: I do not give a fuck.(...)
(...) that the prosecutor quoted from chat logs in which he for
anonymous hosting of everything, including child pornography,
recommended Tor (...) (4)
- -- The proofs for such an attitude are not really helpful when
getting to court.

Interesting.  Taking that account at face value, then apparently at 
times, the rule of law is as subjective in Austria as it is in many 
countries.


What do we take away from Weber's conviction?  That it's illegal (or at 
least punishable) to speak your mind in Austria?
Unless there's more to the story, I would think that judge believed he 
pulled a fast one, by giving Mr. Weber probation for something that's 
not against the law.


Answered in an interview ... that he didn't give a ...?  Was that an 
interview with the Pope or something?
There's no freedom of speech in Austria?  Or is cursing during 
interviews a possible felony?
If attitude or personal opinion were against the law, half the people in 
the world would be in jail.


I understand (completely) Mr. Weber's decision - right now - not to want 
to go through an appeal, but I'm concerned that after he's had some much 
needed rest  time to reflect, that he may regret accepting a guilty 
plea for something that apparently isn't against the law, even in 
Austria.  But it is his decision.

--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] messing with XKeyScore

2014-07-04 Thread Matthew Finkel
On Fri, Jul 04, 2014 at 09:36:23PM +, isis wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA512
 
 Eugen Leitl transcribed 5.8K bytes:
  
  http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1 
  
  Errata Security
  
  Advanced persistent cybersecurity
  
  Friday, July 04, 2014
  
  Jamming XKeyScore
  
  Back in the day there was talk about jamming echelon by adding keywords 
  to email that the echelon system was supposedly looking for. We can do the 
  same thing for XKeyScore: jam the system with more information than it can 
  handle. (I enumerate the bugs I find in the code as xks-00xx).
  
  
  For example, when sending emails, just send from the address 
  brid...@torproject.org and in the email body include:
  
  https://bridges.torproject.org/
  bridge = 0.0.0.1:443
  bridge = 0.0.0.2:443
  bridge = 0.0.0.3:443
  ...
  
  Continue this for megabytes worth of bridges (xks-0001), and it'll totally 
  mess up XKeyScore. It has no defense against getting flooded with 
  information like this, as far as I can see.
  
 
 
 Hi. I maintain and develop BridgeDB.
 
 For what it's worth, the released XKS rules would not have worked against
 BridgeDB for over a year now. I have no knowledge of what regexes are
 currently in use in XKS deployments, nor if the apparent typos are errors in
 the original documents, or rather typos in one of the various levels of
 transcriptions which may have occurred in the editing process. If these typos
 were at some point in the original rules running on XKS systems, then *no*
 bridges would have been harvested due to various faults. None.
 
 Ergo, as Jacob has pointed out to me, the regexes which are released should be
 assumed to be several years out of date, and also shouldn't be assumed to be
 representative of the entire ruleset of any deployed XKS system.
 
 I am willing to implement tricks against specific problems with them, mostly
 for the lulz, because fuck the NSA. But it should be assumed that the actual
 regexes have perhaps been updated, and that highly specific tricks are not
 likely to land.
 
 The ticket for this, by the way, was created by Andrea this afternoon, it's
 #12537: https://trac.torproject.org/projects/tor/ticket/12537

In reality it's a bit silly to try to mess with these rules if they are
n-years old. Based on the pics, simply requesting that all users use
brid...@bridges.torproject.org instead of brid...@torproject.org is the
easiest change that by-passes this specific set of rules. But, I
think it is more realistic that these minor points are moot and the
regexes were fixed long ago and that the ruleset more fully covers
Tor's distributors now.

This problem makes me sad on many levels, and I'm not opposed to
implementing mitigation techniques (within reason) based on the
rulesets, however we shouldn't do anything that will hurt our users nor
should be do anything that makes tor more difficult to use
(unfortunately this includes sending users bogus bridge addresses).

For the use-case of bridges, where a user tries to circumvent local
network interference and implicitly expects they're not fingerprinted
by NSA, we are mostly failing right now.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Moritz Bartl
On 07/04/2014 10:56 PM, Joe Btfsplk wrote:
 *No*, we aren't aware of anyone being sued or prosecuted in the United
 States just for running a Tor relay. Further, we believe that running a
 Tor relay --- including an exit relay that allows people to anonymously
 send and receive traffic --- is legal under U.S. law.
 That may need a bit of revision. :D  Maybe no one has been prosecuted in
 the US (I don't know)

Not that I know of. We also can't simply edit that page, since it was
produced as is by the EFF. We can revise the pages, yes, but we need
help with that. You can't possibly expect a magic somebody to do it.
Everyone is free to submit a patch!

, but people in other countries sure have.

sure have? I know of no other case that got not immediately dropped.
With the exception of William, whose, sorry I must say this, behavior
and combining circumstances didn't exactly help. We could have easily
fought this, and we would have organized and paid a lawyer, if he didn't
overall act as bad as he did. And that something like a raid, seizure
and potential _prosecution_ (not: conviction) that happen, yes, that is
something every exit operator should be aware of.

The legal FAQ is a legal FAQ. It is still completely legal in all
countries we know of. It is not the how you should behave and what is
the worst case scenario FAQ: That is
https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines . A
legal FAQ in my eyes should mention that a lot of cases already proved
the legality of Tor exit relays. You can't expect this document to be up
to date by the minute. It also clearly states that it is something
written by the EFF for United States only: Tor cannot give legal advice,
US entities seem to have to be very careful about that.

Sorry for sounding a bit rude, but yes, to say it frankly, I am pissed
off because of this case. There was no reason for making this public
before the written statement other to scare away other Tor relay
operators. As if Tor didn't already have enough bad press, some fuckup
THAT HAS NO LEGAL CONSEQUENCES FOR OTHER TOR RELAYS WHATSOEVER and WHERE
THERE IS NOT EVEN A WRITTEN STATEMENT YET TO BASE ANY CONSTRUCTIVE
DISCUSSION ON is not helpful. Pleaaase, everyone, you don't have to jump
on everything on the Internet that some dude posted to a blog and waste
your time discussing THINGS THAT NOBODY KNOWS ANYTHING ABOUT YET. If you
want to be constructive, think about how we can properly design a legal
fund. WE DO HAVE MONEY FOR THIS.

No, I do NOT plan on throwing 3 Euro to waste just because the
operator didn't want our help and handled the whole case completely
wrong. YES, I feel bad about this and we wanted to help him all this
time. I understand it is not his fault, but sadly there is nothing we
can do if the accused does not want our help.

Please, understand that we have an active interest in updating the
website, providing a legal fund, organizing lawyers and all that.
Several of you make it sound like it's the Tor project's fault, and
demand that magically someone writes elaborate and brilliant guides
for the website and from one day to another sets up an international
legal fund. You're all invited to investigate options and write guides,
but just ranting on a mailinglist is not getting us anywhere.

I will pick up this thread only after we have seen a written statement
by the court. Please start separate threads if you have good and
well-thought ideas about how we can organize a legal fund, send a patch
for the website if you have good writing skills, and edit the Tor Exit
Guidelines page if you think it is wrong. It is a wiki, wikis are there
to be edited.

 The concept of, No one's been *prosecuted* in the US, therefore running
 Tor relays has no potentially serious legal ramifications, is glossing
 over the dangers.

I agree.

-- 
Moritz Bartl
https://www.torservers.net/
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk