-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I've been lucky so far, both times police contacted me I just said it was a Tor
exit node and it was ok.
On Jun 1, 2011, at 11:32 PM, Jim wrote:
Nils Vogels wrote:
Took a bunch of envelopes to explain the onion rings, but it worked :)
Nils Vogels wrote:
Took a bunch of envelopes to explain the onion rings, but it worked :)
:) :) :)
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Mon, May 30, 2011 at 11:59:21PM -0400, grarp...@gmail.com wrote 1.2K bytes
in 32 lines about:
: you should seriously consider logging either:
: a) your own traffic (whether via internet or Tor)
: b) exit traffic
: c) both
: To cover your ass. At least this way you'll have some form of
: log
I'm not sure I understand the issue. If he is running a relay there is no way
for the police to link access to a site through an EXIT node back to his relay,
so they would be showing up at the address of some exit node, not a relay.
Other than that, the roomie either simply did login without
On 5/30/2011 2:46 PM, Clemens Eisserer wrote:
Hi,
Today police was here and took all my cohabitant's computer hardware
software with them, while I was alone at home.
Until a few minutes ago I didn't even know what happend, now he told
me he is accused of loggin into a porn site.
I ran a
Hi Mike,
Yes:
https://metrics.torproject.org/exonerator.html
On that particular day, my reley is listed active with high probability.
That should at least help a bit to back my claim.
What country did this happen in? What city?
Austria/Vienna.
Thanks again, Clemens
On Mon, May 30, 2011 at 09:46:29PM +0200, linuxhi...@gmail.com wrote 0.7K bytes
in 19 lines about:
: I ran a tor exit node at that time, and I am confident somebody
: mis-used our tor exit node,
: as our WLAN is WPA2 encrypted.
This is likely. You should talk to a lawyer first. Julius of the