t...@bitmessage.ch:
I appreciate your perspective but still think the community may still be
better off--including those who take the time to RTFM--by taking a harm
reduction approach to the RTFM-related problems you've mentioned.
the fundamental problem here is that this is not a
On 01/07/2014 09:12 AM, t...@bitmessage.ch wrote:
SNIP
But I still hope that we can try to do better helping the users we do want
to support--even the people who might not be smart enough right now.
Well, starting Tor in a terminal, one sees:
This is experimental software. Do not rely on it
Three points about this story.
First, if the student had used a VPN then the network would only have seen his
VPN IP not the entry node IP. Right?
Second, who is to say that the 'real' perp was not using a different
non-University network? The fact that the e-mail was sent from a Tor exit
Bobby Brewster:
Three points about this story.
First, if the student had used a VPN then the network would only have seen
his VPN IP not the entry node IP. Right?
right.
Second, who is to say that the 'real' perp was not using a different
non-University network?
the perp confessed
the perp confessed to guilt during interview. not sure if there's been
any further action since then.
My point was that presumably the authorities assumed that the perp would be
using the university network to make the threats and hence checked to see who
had connected to a known Tor IP entry
On Sat, Jan 4, 2014 at 9:42 PM, Bobby Brewster
bobbybrewster...@yahoo.com wrote:
Also, am I right to think that if he had used a bridge then the IP logged
would have been the bridge IP rather than the Tor entry node IP? Is this
traceable? Are bridge addresses public?
Correct. Bridge
Had the perp not invoked his right to remain silent, I'm pretty sure he
wouldn't have been convicted.
- Greg
On 1/4/14, 4:42 PM, Bobby Brewster wrote:
the perp confessed to guilt during interview. not sure if there's been
any further action since then.
My point was that presumably the
On Sat, Jan 4, 2014 at 10:53 PM, Bobby Brewster
bobbybrewster...@yahoo.com wrote:
Correct. Bridge addresses are not public, but it's easy to check if an
IP address is a Tor bridge.
How? Do you just request constant bridges until the IP address the target
used shows up?
You can try to
Correct. Bridge addresses are not public, but it's easy to check if an
IP address is a Tor bridge.
How? Do you just request constant bridges until the IP address the target used
shows up?
On Saturday, January 4, 2014 10:26 PM, Runa A. Sandvik runa.sand...@gmail.com
wrote:
On Sat, Jan 4,
Greg Norcie:
Had the perp not invoked his right to remain silent, I'm pretty sure he
wouldn't have been convicted.
You mean the opposite, right: if he *had* invoked his right to remain
silent?
As a hypothetical, how should law enforcement have handled it if the
perpetrator had not confessed?
How I would have handled it, is that it does not matter whether they are caught
or not. The disruption to the campus by how the threat was handled was the only
actual crime committed, not the threat itself. If you choose to investigate it
at all you can interview the students affected. There
t...@bitmessage.ch:
I appreciate your perspective but still think the community may still be
better off--including those who take the time to RTFM--by taking a harm
reduction approach to the RTFM-related problems you've mentioned.
the fundamental problem here is that this is not a
DeveloperChris:
I haven't been following this conversation so please excuse me if I am
covering old stuff here, but this situation is something I have been
very concerned about since the silk road was busted. I found the excuses
given as to how the silk road was busted as far far too flimsy.
spaceman wrote:
From what I got they simply used timings:
1. They knew when the email arrived give or take (from headers).
2. They knew who connected to Tor at that particular time (from
network logs).
Even on college campus there might be a couple of Tor users. I would
have used SSH to get to
On 20/12/2013 2:05 PM, David wrote:
The way that we know that Tor is relatively safe is that it is open
source and transparent. The government isn't monolithic. There are
different branches of government that have different interests. It is in
the interest of certain branches of US
Hi!
I stumbeled upon this on facebook [1] where Nicolas Kristof wrote:
A Harvard student has been charged with using an anonymous email address
and Tor to disguise his identity, and then sending a bomb threat to get out
of a final exam. What's remarkable to me that he was caught despite taking
Not a lot of real details (and in case someone stumbles on this email
outside of the list, I'm not trying to explain how he could have gotten
away with it).
I assume Harvard:
1. Either tracks folks that connect to Tor entry nodes, or Tor's download
website.
or
2. The looked at the
On Wed, 2013-12-18 at 11:13 -0500, Adrian Crenshaw wrote:
The guy apparently confessed, but they may not have really had
anything on
him besides using Tor. The cops may have said Tell the truth and we
will
go easy on you, which was not in his best interest.
This is a third-hand anecdote, but
On 12/18/2013 06:38 AM, Nils Kunze wrote:
Hi!
I stumbeled upon this on facebook [1] where Nicolas Kristof wrote:
A Harvard student has been charged with using an anonymous email address
and Tor to disguise his identity, and then sending a bomb threat to get out
of a final exam. What's
19 matches
Mail list logo