Re: P2P revisited.

2006-05-20 Thread Ringo Kamens
Well, free speech does clash with copyright so I'm not going to argue that they are abusing the network. I know I've just seen it floating around places like zeropaid, pg forums, and a few others. Can't point you directly, but do this google query: inurl:p2psitehere.com "tor"  On 5/20/06, Watson L

Re: P2P revisited.

2006-05-20 Thread Watson Ladd
On May 20, 2006, at 2:39 PM, Ringo Kamens wrote: I'm not sure if you all know this, but on most of the large filesharing forums, they are reccomending people use tor for filesharing (gnutella,ed2k, etc.) in order to increase anonymity which creates a HUGE network load. Any urls? we could probab

Re: Disclaimer Update

2006-05-20 Thread Mike Perry
Thus spake Mike Perry ([EMAIL PROTECTED]): > It would seem that they could not in good faith make the claim that > their search would yield evidence sought against a Tor node, even > (or especially) after the fact. So it occurred to me that the government could just begin claiming that they belie

Re: Disclaimer Update

2006-05-20 Thread Mike Perry
Thus spake Watson Ladd ([EMAIL PROTECTED]): > Thus Spake Mike Perry > >I suppose they probably will try to claim in EFF v AT&T that they > >DO have probable cause to tap the Internet traffic of the entire > >west coast... But of course that claim is classified, so none of us > >(nor even EFF) will

Re: Disclaimer Update

2006-05-20 Thread Ringo Kamens
Perhaps you should look into the Secret Service v Jackson case and FBI/SS/Swiss SS v Indymedia Case as well as FBI? v Rackspace. On 5/20/06, Watson Ladd <[EMAIL PROTECTED]> wrote: Civil cases can be discarded if the government gets the judge to agree that secrecy requirements are hampering the g

Re: P2P revisited.

2006-05-20 Thread Ringo Kamens
I'm not sure if you all know this, but on most of the large filesharing forums, they are reccomending people use tor for filesharing (gnutella,ed2k, etc.) in order to increase anonymity which creates a HUGE network load. Can an exit node owner please tell us approx. how much traffic he gets on the

Re: Threats to anonymity set at and above the application layer; HTTP headers

2006-05-20 Thread Ringo Kamens
I have a few points to add. For one, if you choose a user-agent that is a linux build every time you start firefox (as opposed to having it default) then that could be used as court evidence to say: Well, I couldn't be xxx because he used a linux browser and I'm obviously on windows and my user-ag

Re: Disclaimer Update

2006-05-20 Thread Watson Ladd
Civil cases can be discarded if the government gets the judge to agree that secrecy requirements are hampering the government's case. If they didn't have probable cause, they will say "Oh, its classified" and get the case dismissed. I am not a lawyer, but it looks like you are screwed out

Re: P2P revisited.

2006-05-20 Thread Watson Ladd
Good point. Consider the idea abandoned. On May 20, 2006, at 8:29 AM, Fabian Keil wrote: Watson Ladd <[EMAIL PROTECTED]> top posted: Watson Ladd <[EMAIL PROTECTED]> wrote: If we created a P2P client using Tor that acted as an exit node we could get a lot more users, a lot more traffic, and a

Re: P2P revisited.

2006-05-20 Thread Fabian Keil
Watson Ladd <[EMAIL PROTECTED]> top posted: > > Watson Ladd <[EMAIL PROTECTED]> wrote: > > > >> If we created a P2P client using Tor that acted as an exit node we > >> could get a lot more users, a lot more traffic, and a lot more > >> capacity, all adding to the anonymity Tor provides. Any downs

Re: Threats to anonymity set at and above the application layer; HTTP headers

2006-05-20 Thread Fabian Keil
Kai Raven <[EMAIL PROTECTED]> wrote: > On 20.05.2006/09:13, you wrote: > > > I think a low-hanging target is the uniqueness of HTTP headers sent > > by particular users of HTTP and HTTPS over Tor. Accept-Language, > > User-Agent, and a few browser-specific features are likely to reveal > > lo

Disclaimer Update

2006-05-20 Thread Mike Perry
So I was doing some research into the EFF vs. AT&T case because it's happening right in my backyard and it's fascinating as all get-out, and I came across 18 USC 2707 (of the ECPA): http://www4.law.cornell.edu/uscode/html/uscode18/usc_sec_18_2707000-.html This seems to state that if a ser

Re: Threats to anonymity set at and above the application layer; HTTP headers

2006-05-20 Thread Kai Raven
Hi Seth, On 20.05.2006/09:13, you wrote: > I think a low-hanging target is the uniqueness of HTTP headers sent > by particular users of HTTP and HTTPS over Tor. Accept-Language, > User-Agent, and a few browser-specific features are likely to reveal > locale and OS and browser version -- somet