On 5/16/06, Michael Holstein <[EMAIL PROTECTED]> wrote:
I disagree though that allowing police worldwide to come up with a
"blacklist" .. first it's under the guise of "protecting children" .. so
first the porn goes there. What next? talk about drugs, sex, ?
We're supposed to be making it harder
OK, that covers the defendant, but what if the person in question is
not a defendant?
Simple .. they grant the person immunity from prosecution for the crime
in question, then compel their testimony. There goes the
"self-incrimination" argument, since the person can no longer be
prosecuted fo
On 5/15/06, User 165 <[EMAIL PROTECTED]> wrote:
There are other ways to get information about the connections,
but it would be nice to say that you cannot get that information or
perform any sort of censorship or compromising of the integrity of
data sent through or availability of any destinatio
n again so supposedly are Israel
and Zimbabwe...
From: [EMAIL PROTECTED] on behalf of Matej Kovacic
Sent: Tue 16/05/2006 09:17
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
Hi,
> They send you to prison if you don't give
Hi!
> The failure of other systems (networks etc) to be practical about child porn
> is one of the main reasons we have so much spying on us today.
That is great for justification. What is better for the government: to
say they are spying on you, because they want to control the political
oponent
Hi,
> They send you to prison if you don't give up the information.
> What about the priviledge of non self-accusation?
>
> It is expensive, but you can just piss 'em off and buy new hardware...
It is illegal because European Human Rights Convention prohibits it.
OK, you would go to jail, but
The British authorities.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kalevi Nyman
Sent: 16 May 2006 05:04
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
Who are those "they" and "them"?
/K
---
Ton
[EMAIL PROTECTED] wrote:
"Ringo Kamens" <[EMAIL PROTECTED]> wrote,
"I want to add my two cents about child porn. Censorship is censorship, it >doesn't matter what you
censor or by what logic you censor. Banning child >porn is censorship, copyright is censorship, and
stopping people from >s
06 07:57
> To: or-talk@freehaven.net
> Subject: Re: Some legal trouble with TOR in France
>
> Hi,
>
>> Under the British "Regulation of Investigatory Powers Act", they would
>> simply confiscate the entire machine, demand any authentication tokens
>>
I agree with you that LE is wasting way to much money watching
viewers. It's like chasing down people who use illegal drugs when
there's a concaine farm right next to the police station. They're
merely using it as a fear tactic "nobody who is involved in pedophilia
is safe" but it's just a joke. (
Thus spake Ringo Kamens ([EMAIL PROTECTED]):
> I want to add my two cents about child porn. Censorship is censorship, it
> doesn't matter what you censor or by what logic you censor. Banning child
> porn is censorship, copyright is censorship, and stopping people from
> speaking who have opposing
On May 15, 2006, at 6:17 PM, glymr wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
User 165 wrote:
On May 15, 2006, at 5:37 PM, Anthony DiPierro wrote:
Remember that by default Tor *does* censor. Port 25 is blocked
by default. Why is this?
I don't think that deciding which por
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
User 165 wrote:
> On May 15, 2006, at 5:37 PM, Anthony DiPierro wrote:
>
>>
>> Remember that by default Tor *does* censor. Port 25 is blocked
>> by default. Why is this?
>
> I don't think that deciding which ports to allow has anything to do
>
On May 15, 2006, at 5:37 PM, Anthony DiPierro wrote:
Remember that by default Tor *does* censor. Port 25 is blocked by
default. Why is this?
I don't think that deciding which ports to allow has anything to do
with censorship. Censorship refers to content, not method.
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Anthony DiPierro wrote:
> On 5/15/06, Mike Perry <[EMAIL PROTECTED]> wrote:
>> Thus spake Ringo Kamens ([EMAIL PROTECTED]):
>>
>> > Also, they can put you on grand jury and give you obstruction of
>> justice for
>> > refusing to talk.
>>
>> Accor
On 5/15/06, Ben Wilhelm <[EMAIL PROTECTED]> wrote:
The line is drawn. The line is that Tor does not censor. That's the only
line that makes sense, because everything else requires subjective
judgement that many would not be able to agree on.
There's always the possibility of letting each exit n
<$0.02>
On May 15, 2006, at 11:27 PM, [EMAIL PROTECTED] wrote:
We are paying with "fear" (if you run a Tor EXIT) of arrest and
prosecution, for many more mere accusation, just for even running a
Tor server or a Tor client is enough to keep many away from the Tor
network. Just take a look
[reformatted, snipped, and top-posting fixed.]
On 15 May 2006 23:59, Nick Mathewson wrote:
> > I typically argue this from the "can't" point of view, not the
> > "won't". If it were possible detect block evil activities through
> > programmatic means, I *would* be in favor of blocking them.
> > U
In addition, censoring child porn, death threats, etc. is impossible and you're dedicating yourself to a job that you will have to do 24/7 and never finish. You block a site, they make a new one. You block a file hash, they modify a file. You block a keyword, they use encryption. You block message
Please define 'evil activities'
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Nick Mathewson
Sent: 15 May 2006 23:59
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France +
On Mon, May 15, 2006 at 03:36:59PM -0700, B
On Mon, May 15, 2006 at 03:36:59PM -0700, Ben Wilhelm wrote:
[...]
> The line is drawn. The line is that Tor does not censor. That's the only
> line that makes sense, because everything else requires subjective
> judgement that many would not be able to agree on.
I typically argue this from the
[EMAIL PROTECTED] wrote:
Ok so they will come back with more than just child porn... thats when we have
to draw the line!
"Yeah, so we disabled child porn like you asked, but we're not willing
to do anything about piracy, death threats to government officials,
cybercrime, or that mob ring ru
5 May 2006 00:16
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
Thus spake Eric H. Jung ([EMAIL PROTECTED]):
> > Tony's point was that you could arrange not to have the
> authentication
> > tokens anymore. You better hope they believe you when you
On 5/15/06, Mike Perry <[EMAIL PROTECTED]> wrote:
Thus spake Ringo Kamens ([EMAIL PROTECTED]):
> Also, they can put you on grand jury and give you obstruction of justice for
> refusing to talk.
According to wikipedia (http://en.wikipedia.org/wiki/Grand_jury):
"In all U.S. jurisdictions retaini
"Ringo Kamens" <[EMAIL PROTECTED]> wrote,
>"I want to add my two cents about child porn. Censorship is censorship, it
>>doesn't matter what you censor or by what logic you censor. Banning child
>>porn is censorship, copyright is censorship, and stopping people from
>>speaking who have opposing
They send you to prison if you don't give up the information.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Matej Kovacic
Sent: 15 May 2006 07:57
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
Hi,
> Under the
@freehaven.net
Subject: Re: Some legal trouble
with TOR in France
+
I want to add my two
cents about child porn. Censorship is censorship, it doesn't matter what you
censor or by what logic you censor. Banning child porn is censorship, copyright
is censorship, and stopping people from speaking who
y 2006 22:52
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Tony wrote:
>
> Yes they could get code signed in theory, but it makes it that much
> harder - im sure Microsoft wouldn't be very keen on
I want to add my two cents about child porn. Censorship is censorship, it doesn't matter what you censor or by what logic you censor. Banning child porn is censorship, copyright is censorship, and stopping people from speaking who have opposing political views is censrorship. It seems to be a well
> On Sat, May 13, 2006 at 09:09:06AM -0700, Ringo Kamens wrote:
>
> > If it's the JAP I'm thinking of, you shouldn't trust it. The german
> > government ordered JAP top put in a backdoor to the program to catch one
> > solitary JAP user even though it was against german law. The backdoor was
> > r
On Sat, May 13, 2006 at 10:02:41AM -0700, Eric H. Jung wrote:
> Given the recent enlightenments about the US National Security Agency's
> illegal activities (gathering millions of telephone records from
> average citizens, etc), what is the technical feasibility of the NSA or
> other governmentt o
On Sat, May 13, 2006 at 09:09:06AM -0700, Ringo Kamens wrote:
> If it's the JAP I'm thinking of, you shouldn't trust it. The german
> government ordered JAP top put in a backdoor to the program to catch one
> solitary JAP user even though it was against german law. The backdoor was
> released as a
On Sat, May 13, 2006 at 05:03:53PM +0200, Joe Knall wrote:
> I clearly do not dare to run a tor server in Germany for reasons like
> these :(
The thought police has been notified. Expect them shortly.
> So my question is: does anyone know about or have experience with the
> implications when f
[EMAIL PROTECTED] wrote:
Child porn is a different matter, it threatens the Tor network!
It is best handled easier by a url/site/ip block list on the EXIT nodes. to
protect itself Torland should put a site uo tp create this block list and Tor
EXIt servers use it if they wish.
Eg <16+,<18+,<21+
Original message
>Date: Mon, 15 May 2006 18:52:38 +1000
>From: glymr <[EMAIL PROTECTED]>
>Subject: Re: Some legal trouble with TOR in France
>To: or-talk@freehaven.net
>
>-BEGIN PGP SIGNED MESSAGE-
>Hash: RIPEMD160
>
>Matej Kovacic wrote:
&
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
>
> 2.
>
> Well most people using Tor, aint running a server at ALL. They are just
the users, running Tor in Client only mode.
>
> And the "middlemen" are gonna be needed, if you want to have more hops!
maybe i am misinformed, but i was under th
On Mon, May 15, 2006 at 10:04:56AM +0100, [EMAIL PROTECTED] wrote 0.7K bytes in
18 lines about:
: The Tor documentation states that 20k/sec each way is the minimum
This is 20 KB/sec, aka 160 Kilobits per second.
--
Andrew
glymr wrote...
1.
>"I personally have stopped trying to use tor because latency has gone far
>beyond my patience. Something needs to be done about tor's bandwidth
>capability. Of course more bandwidth will mean more users...
2.
> and I have
>said this before and I will say it again - Tor needs t
On Mon, May 15, 2006 at 02:11:15PM +1000, glymr wrote:
> If you really care about your legal safety and the anonymity of the
> network, you should be contributing, even if only enough to permit
> half of a 56k dialup connection (ie 1-2kb/s) to relay traffic.
The Tor documentation states that 20k/
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Matej Kovacic wrote:
> Hi,
>
> this could also be a good idea:
> http://www.ubuntuforums.org/showthread.php?t=120097&highlight=cryptsetup
>
> encryption of harddrives from the scratch.
>
> However, I would create a small partition where there w
Thus spake Ringo Kamens ([EMAIL PROTECTED]):
> Also, they can put you on grand jury and give you obstruction of justice for
> refusing to talk.
According to wikipedia (http://en.wikipedia.org/wiki/Grand_jury):
"In all U.S. jurisdictions retaining the grand jury, the defendant has
the right under
Hi,
> Not that some powers haven't been known to first interrogate you as
> "unrelated witness" (neither you, nor your family, is accused), where
> remaining silent is obstruction of justice and punishable, and _then_
> charge you with the information thus gleaned.
Now I am talking only for Slove
--- Matej Kovacic <[EMAIL PROTECTED]> wrote:
> It is interesting, because we are talking about letters from/to
> prison
> and not letters of free innocent citizens. If Court found cenzorship
> of
> prisonner's writings (to his wife and international institutuions)
> illegal, then restrictions to
Hi,
> Under the British "Regulation of Investigatory Powers Act", they would
> simply confiscate the entire machine, demand any authentication tokens
> required to access it, and lock you up if you refused to surrender them.
> I believe similar laws exist in most EU jurisdictions now.
What about
Hi,
this could also be a good idea:
http://www.ubuntuforums.org/showthread.php?t=120097&highlight=cryptsetup
encryption of harddrives from the scratch.
However, I would create a small partition where there will be keys
(files) for decryptig root and home partitions. This small partition
would be
Hi,
> However I might get bad news about this in a few weeks/monthes,
> depending of what the justice wants to do with me. Unauthorised
> cryptographic programs are illegal in france, since the "len" law
> adopted two years ago but I believe there is not much precedent
> equivalent case so they m
On Sun, 14 May 2006 18:21:04 -0400
Adam Shostack <[EMAIL PROTECTED]> wrote:
> Nope. I think they'd be making different statements than they're
> making, and I think that they'd have avoided the subject in private.
Or they'd do everything in their power to make you believe as much
anyway. What be
On Mon, 15 May 2006 07:15:55 +0200
cesare VoltZ <[EMAIL PROTECTED]> wrote:
> What do you think about to start TOR with Knoppix Linux booted from a
> CD/Rom?
There's something similar to this (but better in my opinion) built
around OpenBSD. It routes all external TCP traffic through Tor, and
even
On Sun, May 14, 2006 at 08:29:06PM -0400, Michael Holstein wrote:
>> There are methods (and they are used) to read data from a overwritten
>> disk.
> Has anyone tried creating a (ro) flash-boot linux system for TOR
> with all the (rw) stuff mounted in RAM ?
Flash is writable, so can be tampered.
What do you think about to start TOR with Knoppix Linux booted from a CD/Rom?
CesareOn 5/15/06, Michael Holstein <[EMAIL PROTECTED]> wrote:
> There are methods (and they are used) to read data from a overwritten > disk.Has anyone tried creating a (ro) flash-boot linux system for TOR withall the (
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
I personally have stopped trying to use tor because latency has gone far
beyond my patience. Something needs to be done about tor's bandwidth
capability. Of course more bandwidth will mean more users... and I have
said this before and I will say i
Also, they can put you on grand jury and give you obstruction of justice for refusing to talk.
On 5/14/06, Eric H. Jung <[EMAIL PROTECTED]> wrote:
Mike,I don't have the time to respond to all the points of your email exceptthe first/
Federal Contempt of Courthttp://www.bafirm.com/articles/federalco
--- Michael Holstein <[EMAIL PROTECTED]> wrote:
> AFIK, there is no data remanence problem with DRAM
Not apparently. I sent one of these links earlier in this thread IIRC.
These papers are by Peter Gutman himself.
"7. Methods of Recovery for Data stored in Random-Access Memory"
"8. Erasure of Da
Mike,
I don't have the time to respond to all the points of your email except
the first/
Federal Contempt of Court
http://www.bafirm.com/articles/federalcontempt.html
"Although there is no statutory maximum limit regulating the amount of
time a contemnor can be ordered to spend in confinement (U
> There are methods (and they are used) to read data from a overwritten
> disk.
Has anyone tried creating a (ro) flash-boot linux system for TOR with
all the (rw) stuff mounted in RAM ?
Such a device would raise the bar quite a bit, no? (AFIK, there is no
data remanence problem with DRAM .. u
Not to mention that whereas a passphrase in your head requires your
cooperation to divulge (although torture can be used to provide that) ..
there's nothing stopping someone from knocking you unconscious and using
your finger/eye/whatever on the reader.
/mike.
glymr wrote:
Tony wrote:
just
On Mon, 15 May 2006, glymr wrote:
just wanted to suggest that biometrics are not wise for encryption
whatsoever. for one thing, they use a software mechanism to 'unlock'
and this lock can be bypassed. voiceprint, retina/iris scan,
fingerprints, dna, all of these things do not constitute a proper
| | To: or-talk@freehaven.net
| | Subject: Re: Some legal trouble with TOR in France
| |
| |
| |
| | There are a few key points that you are overlooking.
| |
| |
| |
| | 1. In support of the photocopying money scandal, most printers have
|
Thus spake Eric H. Jung ([EMAIL PROTECTED]):
> > Tony's point was that you could arrange not to have the
> authentication
> > tokens anymore. You better hope they believe you when you say you
> > don't have it, though.
>
> >Not having the authentication tokens counts as refusing to surrender
> >
freehaven.net| Subject: Re: Some legal trouble with TOR in France
There are a few key points that you are overlooking. 1. In support of the photocopying money scandal, most printers have yellow| dots imprinted on them that track date printed, serial number, etc.
it much
| harder. Not impossible.
|
|
|
|
---
|
| From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
| Behalf Of Ringo Kamens
| Sent: 14 May 2006 18:31
|
|
| To: or-talk@freehaven.net
| Subject: Re: Some legal trouble with TOR in France
|
|
|
| The
Some angry users aren't going to stop Microsoft from obeying the government. When the government orders something to be done, it gets done, regardless of how many people ask for it. I know the win2k source got leaked a while back, did anybody conduct a formal review of it?
On 5/14/06, glymr <[EMAI
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Tony wrote:
>
> Yes they could get code signed in theory, but it makes it that much
> harder - im sure Microsoft wouldn't be very keen on signing code
> for government organisations to spy on people - imagine the impact
> on their sales if it be
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
Tony wrote:
just wanted to suggest that biometrics are not wise for encryption
whatsoever. for one thing, they use a software mechanism to 'unlock'
and this lock can be bypassed. voiceprint, retina/iris scan,
fingerprints, dna, all of these thi
IL PROTECTED]
On Behalf Of Ringo Kamens
Sent: 14 May 2006 18:31
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
There are a few key points that you are overlooking.
1. In support of the photocopying money scandal, most printers have
yellow dots imprinted on them that t
/computing/9909/13/backdoor.idg/
From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ringo Kamens
Sent: 14 May 2006 18:43
To: or-talk@freehaven.net
Subject: Re: Some legal trouble
with TOR in France
I'm not saying the AES is
weak. I'm saying that Microsoft
or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
There are a few key points that you are overlooking.
1. In support of the photocopying money scandal, most printers have yellow dots imprinted on them that track date printed, serial number, etc.
2. By US exp
May 2006 18:31
To: or-talk@freehaven.net
Subject: Re: Some legal trouble
with TOR in France
There are a few key points that you are overlooking.
1. In support of the photocopying money scandal, most printers have
yellow dots imprinted on them that track date printed, serial
There are a few key points that you are overlooking.
1. In support of the photocopying money scandal, most printers have yellow dots imprinted on them that track date printed, serial number, etc.
2. By US export law, US companies are not allowed to export encryption larger than 56 bit (althoug
On 14/5/06 15:10, Tony wrote:
> Nb- failure to disclose keys is up to two years in prison. Not 10.
>
> (5) A person guilty of an offence under this section shall be liable-
>
> (a) on conviction on indictment, to imprisonment for a term not
> exceeding two years or to a fine, or to both;
>
On Sun, May 14, 2006 at 02:59:52PM +0100, Dave Page wrote:
> On Sun, May 14, 2006 at 03:58:06PM +0200, Lionel Elie Mamane wrote:
>> On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
>>> Under the British "Regulation of Investigatory Powers Act", they
>>> would simply confiscate the entire
ubject: Re: Some legal trouble with TOR in France
> > Before they realise that they need a key you can microwave the
> token.
> > You can then surrender it when required and still meet your legal
> > obligations... 'It must have been static damage officer...you need
> t
> > Before they realise that they need a key you can microwave the
> token.
> > You can then surrender it when required and still meet your legal
> > obligations... 'It must have been static damage officer...you need
> to
> > be more careful with my equipment'
>
> Which in the UK at least could l
Sounds like a format and key replacement is required as discussed then.
Thanks for the info.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of [EMAIL PROTECTED]
Sent: 14 May 2006 16:11
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in
I am living in France and working for some French security agency. Please
understand that I may not identify myself. Working for a security agency does
not mean that I approve all their actions, even those that I MUST do.
Since about 5 years, French services are trying to control the "anonymous"
: 14 May 2006 15:00
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
On Sun, May 14, 2006 at 03:58:06PM +0200, Lionel Elie Mamane wrote:
> On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
> > Under the British "Regulation of Investigatory Pow
reehaven.net
Subject: Re: Some legal trouble with TOR in France
On Sun, May 14, 2006 at 03:58:06PM +0200, Lionel Elie Mamane wrote:
> On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
> > Under the British "Regulation of Investigatory Powers Act", they
> > would sim
]
On Behalf Of Lionel Elie Mamane
Sent: 14 May 2006 14:58
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
> On Sun, May 14, 2006 at 01:34:51PM +0100, Tony wrote:
>> So if for instance they take your d
imprisonment for a term not exceeding
six months or to a fine not exceeding the statutory maximum, or to both.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Dave Page
Sent: 14 May 2006 14:51
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in
will just make it easier for Joe Public.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Dave Page
Sent: 14 May 2006 14:51
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
On Sun, May 14, 2006 at 02:45:01PM +0100, Tony
On Sun, May 14, 2006 at 03:58:06PM +0200, Lionel Elie Mamane wrote:
> On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
> > Under the British "Regulation of Investigatory Powers Act", they
> > would simply confiscate the entire machine, demand any
> > authentication tokens required to acc
On Sun, May 14, 2006 at 02:32:50PM +0100, Dave Page wrote:
> On Sun, May 14, 2006 at 01:34:51PM +0100, Tony wrote:
>> So if for instance they take your disks away as per the French TOR
>> node, then you could destroy your hardware key (wipe TPM module,
>> destroy motherboard chipset or USB dongle)
On Sun, May 14, 2006 at 02:45:01PM +0100, Tony wrote:
> Before they realise that they need a key you can microwave the token.
> You can then surrender it when required and still meet your legal
> obligations... 'It must have been static damage officer...you need to
> be more careful with my equipm
e Page
Sent: 14 May 2006 14:33
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
On Sun, May 14, 2006 at 01:34:51PM +0100, Tony wrote:
> So if for instance they take your disks away as per the French TOR
node,
> then you could destroy your hardware key (wip
On Sun, May 14, 2006 at 01:34:51PM +0100, Tony wrote:
> So if for instance they take your disks away as per the French TOR node,
> then you could destroy your hardware key (wipe TPM module, destroy
> motherboard chipset or USB dongle) and they are not going to be reading
> anything, ever. Even if
Of Landorin
Sent: 14 May 2006 01:45
To: or-talk@freehaven.net
Subject: Re: Some legal trouble with TOR in France
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I'd say if you can register a server with the required data given you
can unregister it the same way imho. Just contact the adress
@freehaven.net
Subject: Re: Some legal trouble with TOR in France
--- Mike Perry <[EMAIL PROTECTED]> wrote:
> A US judge exercising proper
> dilligence should be able to realize that the search was not likely
> to
> produce relevant evidence to the case in question, or so one
-BEGIN PGP SIGNED MESSAGE-
Hash: RIPEMD160
yeah, i think if i were you, i'd sell all of the hardware they had
their hands on for that time asap and get new hardware. there's way
too many routes that could be used to compromise the server once it's
been in the hands of untrusted people. A
On Sat, May 13, 2006 at 10:22:33PM -0500, [EMAIL PROTECTED] wrote 1.3K bytes in
30 lines about:
: this sort of search? In the US they should require a warrant, and some
: judge would have to approve that. A US judge exercising proper
: dilligence should be able to realize that the search was not l
--- Mike Perry <[EMAIL PROTECTED]> wrote:
> A US judge exercising proper
> dilligence should be able to realize that the search was not likely
> to
> produce relevant evidence to the case in question, or so one would
> hope.
LOL. Where have you been for the past 6 months with regards to the Bush
Thus spake Olivier Barbut ([EMAIL PROTECTED]):
> Hello dear tor talkers,
>
> I'm running the tor router "mini", located in paris, france, and I
> believe I have to share with you what happened to me last wednesday,the
> 10th of May. My router was an outside gateway, doing request for tor
> ano
Agreed, any data on the disk will have been compromised and any
private keys for example cannot be trusted. The install can't be
trusted as some sort of rootkit could be trivially installed by
forensics types.
Other than wiping the drives and starting with a fresh install and
fresh keys, I would
FWIW, I've bought a number of hard drives from ebay. It's pretty
amazing the sensitive data I could recover from them with the simplest
of freeware. Luckily for them, I'm a good person. A simple wipe with
DBAN would have prevented all that. Oh well.
--- Landorin <[EMAIL PROTECTED]> wrote:
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I'd say if you can register a server with the required data given you
can unregister it the same way imho. Just contact the adress for
registering.
Speaking of cloned hard drives and having his keys... that's where
"Truecrypt" kicks in. ;) Nicely encr
On 5/13/06, Ringo Kamens <[EMAIL PROTECTED]> wrote:
He has a good point. They surely have a clone of your drive which means they
have the private keys to the server which could destroy the user's
anonymity.
If I understand things correctly then the name of the node should be
told to someone who
He has a good point. They surely have a clone of your drive which means they have the private keys to the server which could destroy the user's anonymity.
On 5/13/06, Joe Knall <[EMAIL PROTECTED]> wrote:
On Sonntag, 14. Mai 2006 00:03 Ringo Kamens wrote:> Well burning it doesn't do is completely (u
On Sonntag, 14. Mai 2006 00:03 Ringo Kamens wrote:
> Well burning it doesn't do is completely (unless it's molten and then
> mixed with other stuff). You should securely wipe it with a magnet
> and then melt it. In this case, just wipe it about 100 times and then
> sell it.
Hey people... why not c
Wiping with a magnet is absolutely useless unless you own a
professional degausser (which are large and expensive--we have one
where I work).
For some more reading on the matter:
http://en.wikipedia.org/wiki/Degauss
http://en.wikipedia.org/wiki/Data_remanence
--- Ringo Kamens <[EMAIL PROTECTED]>
I will admit that I'm not quite sure what the fear is with this -
reformatting it makes sense in case they installed evil software, but
there's no reason to burn it or securely wipe it or whatever if you
think that's all that's wrong with it.
I suppose they could technically have installed a
Ringo,
Everything I've read about the Guttman method suggests your statement
isn't accurate. For example, this is from the DBAN FAQ:
http://dban.sourceforge.net/faq/index.html
[start quote]
Q: Is the Gutmann method the best method [for wiping magnetic hard
drives]?
A: No.
Most of the passes i
1 - 100 of 118 matches
Mail list logo