Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-07 Thread tor
t...@bitmessage.ch: I appreciate your perspective but still think the community may still be better off--including those who take the time to RTFM--by taking a harm reduction approach to the RTFM-related problems you've mentioned. the fundamental problem here is that this is not a

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-07 Thread Mirimir
On 01/07/2014 09:12 AM, t...@bitmessage.ch wrote: SNIP But I still hope that we can try to do better helping the users we do want to support--even the people who might not be smart enough right now. Well, starting Tor in a terminal, one sees: This is experimental software. Do not rely on it

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-04 Thread Bobby Brewster
Three points about this story. First, if the student had used a VPN then the network would only have seen his VPN IP not the entry node IP.  Right? Second, who is to say that the 'real' perp was not using a different non-University network?  The fact that the e-mail was sent from a Tor exit

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-04 Thread Tempest
Bobby Brewster: Three points about this story. First, if the student had used a VPN then the network would only have seen his VPN IP not the entry node IP. Right? right. Second, who is to say that the 'real' perp was not using a different non-University network? the perp confessed

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-04 Thread Bobby Brewster
the perp confessed to guilt during interview. not sure if there's been any further action since then. My point was that presumably the authorities assumed that the perp would be using the university network to make the threats and hence checked to see who had connected to a known Tor IP entry

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-04 Thread Runa A. Sandvik
On Sat, Jan 4, 2014 at 9:42 PM, Bobby Brewster bobbybrewster...@yahoo.com wrote: Also, am I right to think that if he had used a bridge then the IP logged would have been the bridge IP rather than the Tor entry node IP? Is this traceable? Are bridge addresses public? Correct. Bridge

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-04 Thread Greg Norcie
Had the perp not invoked his right to remain silent, I'm pretty sure he wouldn't have been convicted. - Greg On 1/4/14, 4:42 PM, Bobby Brewster wrote: the perp confessed to guilt during interview. not sure if there's been any further action since then. My point was that presumably the

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-04 Thread Runa A. Sandvik
On Sat, Jan 4, 2014 at 10:53 PM, Bobby Brewster bobbybrewster...@yahoo.com wrote: Correct. Bridge addresses are not public, but it's easy to check if an IP address is a Tor bridge. How? Do you just request constant bridges until the IP address the target used shows up? You can try to

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-04 Thread Bobby Brewster
Correct. Bridge addresses are not public, but it's easy to check if an IP address is a Tor bridge. How? Do you just request constant bridges until the IP address the target used shows up? On Saturday, January 4, 2014 10:26 PM, Runa A. Sandvik runa.sand...@gmail.com wrote: On Sat, Jan 4,

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-04 Thread dhanlin
Greg Norcie: Had the perp not invoked his right to remain silent, I'm pretty sure he wouldn't have been convicted. You mean the opposite, right: if he *had* invoked his right to remain silent? As a hypothetical, how should law enforcement have handled it if the perpetrator had not confessed?

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-04 Thread C B
How I would have handled it, is that it does not matter whether they are caught or not. The disruption to the campus by how the threat was handled was the only actual crime committed, not the threat itself. If you choose to investigate it at all you can interview the students affected. There

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2014-01-03 Thread Tempest
t...@bitmessage.ch: I appreciate your perspective but still think the community may still be better off--including those who take the time to RTFM--by taking a harm reduction approach to the RTFM-related problems you've mentioned. the fundamental problem here is that this is not a

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2013-12-20 Thread Tempest
DeveloperChris: I haven't been following this conversation so please excuse me if I am covering old stuff here, but this situation is something I have been very concerned about since the silk road was busted. I found the excuses given as to how the silk road was busted as far far too flimsy.

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2013-12-19 Thread Jim
spaceman wrote: From what I got they simply used timings: 1. They knew when the email arrived give or take (from headers). 2. They knew who connected to Tor at that particular time (from network logs). Even on college campus there might be a couple of Tor users. I would have used SSH to get to

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2013-12-19 Thread DeveloperChris
On 20/12/2013 2:05 PM, David wrote: The way that we know that Tor is relatively safe is that it is open source and transparent. The government isn't monolithic. There are different branches of government that have different interests. It is in the interest of certain branches of US

[tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2013-12-18 Thread Nils Kunze
Hi! I stumbeled upon this on facebook [1] where Nicolas Kristof wrote: A Harvard student has been charged with using an anonymous email address and Tor to disguise his identity, and then sending a bomb threat to get out of a final exam. What's remarkable to me that he was caught despite taking

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2013-12-18 Thread Adrian Crenshaw
Not a lot of real details (and in case someone stumbles on this email outside of the list, I'm not trying to explain how he could have gotten away with it). I assume Harvard: 1. Either tracks folks that connect to Tor entry nodes, or Tor's download website. or 2. The looked at the

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2013-12-18 Thread Ted Smith
On Wed, 2013-12-18 at 11:13 -0500, Adrian Crenshaw wrote: The guy apparently confessed, but they may not have really had anything on him besides using Tor. The cops may have said Tell the truth and we will go easy on you, which was not in his best interest. This is a third-hand anecdote, but

Re: [tor-talk] Harvard student used Tor to send bomb threats, gets caught by old-fashioned policework

2013-12-18 Thread Mirimir
On 12/18/2013 06:38 AM, Nils Kunze wrote: Hi! I stumbeled upon this on facebook [1] where Nicolas Kristof wrote: A Harvard student has been charged with using an anonymous email address and Tor to disguise his identity, and then sending a bomb threat to get out of a final exam. What's