Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Moritz Bartl
On 07/05/2014 07:30 AM, Zenaan Harkness wrote: > I'm not sure the TorExitGuidelines provide an adequate > Behaviour FAQ, in the hindsight of recent events. Again: There is no "hindsight of recent events". There just can't be, because the court opinion has not been released yet. It has always been

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Zenaan Harkness
On 7/5/14, Moritz Bartl wrote: > The legal FAQ is a legal FAQ. It is still completely legal in all > countries we know of. It is not the "how you should behave and what is > the worst case scenario" FAQ: That is > https://trac.torproject.org/projects/tor/wiki/doc/TorExitGuidelines . I'm not sure

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Moritz Bartl
On 07/04/2014 10:56 PM, Joe Btfsplk wrote: > *>"No*, we aren't aware of anyone being sued or prosecuted in the United > States just for running a Tor relay. Further, we believe that running a > Tor relay --- including an exit relay that allows people to anonymously > send and >receive traffic --- i

Re: [tor-talk] messing with XKeyScore

2014-07-04 Thread Matthew Finkel
On Fri, Jul 04, 2014 at 09:36:23PM +, isis wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA512 > > Eugen Leitl transcribed 5.8K bytes: > > > > http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1 > > > > Errata Security > > > > Advanced persistent cybersecurity > > > > Fr

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Joe Btfsplk
On 7/4/2014 3:02 PM, no.thing_to-h...@cryptopathie.eu wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello Tor! Running an internal relay in Graz since 7/2013, where William Weber's appartment was raided in 2012, when some idiot misused his exit for illegal stuff, I became interested in h

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Zenaan Harkness
On 7/5/14, no.thing_to-h...@cryptopathie.eu wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > Hello Tor! > > Running an internal relay in Graz since 7/2013, where William Weber's > appartment was raided in 2012, when some idiot misused his exit for > illegal stuff, I became interested i

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-04 Thread grarpamp
On Fri, Jul 4, 2014 at 6:02 PM, Paweł Zegartowski wrote: > I2P (aka Invisible Internet Protocol) is designed to be "a real undernet" > Using I2P to acces a "standard" Internet but in anonymous way is much less Right, in the likely context of the subject exploit, I referred only to the similar .on

Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
Do a Whois lookup of the addreses I gave u before and check that all of this resolve to markmonitor. s3-us-west-2-w.amazonaws.com > ec2-174-129-247-121.compute-1.amazonaws.com > edge-star-shv-04-gru1.facebook.com st just when I was visiting www.lemonde

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread no . thing_to-hide
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I fully agree with Joe! Running an exit can get you in serious legal trouble, because Tor /and all other anonymity services/ will always be misused for illegal activities. Every interested operator must make his personal moral trade-off and come to a

Re: [tor-talk] messing with XKeyScore

2014-07-04 Thread isis
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Eugen Leitl transcribed 5.8K bytes: > > http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1 > > Errata Security > > Advanced persistent cybersecurity > > Friday, July 04, 2014 > > Jamming XKeyScore > > Back in the day there was talk

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-04 Thread grarpamp
On 7/4/14, grarpamp wrote: > https://www.blackhat.com/us-14/briefings.html#you-dont-have-to-be-the-nsa-to-break-tor-deanonymizing-users-on-a-budget I2P is a tool that likely presents the nearest analog to Tor's hidden services (.i2p) to the user. Usable in much the same way. Always good to be fam

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Joe Btfsplk
On 7/3/2014 2:23 PM, C B wrote: "I agree that collecting stories about "why/how I use Tor" is useful, but I disagree that any special education or warning should be needed before setting up an exit node. Setting up an exit node is simply providing another IP that can be used for traffic and not

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread no . thing_to-hide
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello Tor! Running an internal relay in Graz since 7/2013, where William Weber's appartment was raided in 2012, when some idiot misused his exit for illegal stuff, I became interested in his case. But I know it only from the newspapers. The raid took

Re: [tor-talk] BlackHat2014: Deanonymize Tor for $3000

2014-07-04 Thread grarpamp
On Fri, Jul 4, 2014 at 8:15 AM, Nathan Andrew Fain wrote: > "Trawling for Tor Hidden Services: Detection, Measurement, > Deanonymization" > Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann > http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf > > the two seem very similar. in the case

Re: [tor-talk] XKeyscore-Quellcode: more english details requested

2014-07-04 Thread elrippo
Am Freitag, 4. Juli 2014, 20:48:09 schrieb Jens Kubieziel: > * elrippo schrieb am 2014-07-04 um 20:30 Uhr: > > Missed it, but watched it in the ARD Mediathek [1]. Could someone advise, > > how a copy could be downloaded as mp4, divx, ogg or some other format? > You can use http://zdfmediathk.source

Re: [tor-talk] XKeyscore-Quellcode: more english details requested

2014-07-04 Thread Jens Kubieziel
* elrippo schrieb am 2014-07-04 um 20:30 Uhr: > Missed it, but watched it in the ARD Mediathek [1]. Could someone advise, how > a copy could be downloaded as mp4, divx, ogg or some other format? You can use http://zdfmediathk.sourceforge.net/>. -- Jens Kubieziel

Re: [tor-talk] messing with XKeyScore

2014-07-04 Thread grarpamp
On Fri, Jul 4, 2014 at 10:56 AM, Eugen Leitl wrote: > http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1 Good work, glad someone had time to really dig in, perhaps even drawing on some comments from others in the early buzz such as https://lists.torproject.org/pipermail/tor-talk/2014-

Re: [tor-talk] XKeyscore-Quellcode: more english details requested

2014-07-04 Thread elrippo
Am Donnerstag, 3. Juli 2014, 16:48:46 schrieb Jens Kubieziel: > * Elrippo schrieb am 2014-07-03 um 16:22 Uhr: > > On which station can we watch the story on German TV today? > > Will be broadcasted on ARD at 21:45 (9:45 pm, 20:45 UTC). > http://daserste.ndr.de/panorama/archiv/2014/Quellcode-entsch

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread MacLemon
Hi! On 04 Jul 2014, at 15:31, Moritz Bartl wrote: > I have talked to multiple lawyers, and this case would be very easy to > defend against. William was sadly unable or unwilling to communicate > properly, and he's not willing/able to put it to a fight. It is a sad > situation overall, but it doe

Re: [tor-talk] (no subject)

2014-07-04 Thread Geoff Down
On Fri, Jul 4, 2014, at 04:51 PM, ideas buenas wrote: > Visiting the same website with Tor or normal Firefox its gave me the same So this is nothing to do with Tor. > Remote Address: > s3-us-west-2-w.amazonaws.com > ec2-174-129-247-121.compute-1.amazonaws.com > edge-star-shv-04-gru1.facebook.c

Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
Visiting the same website with Tor or normal Firefox its gave me the same Remote Address: s3-us-west-2-w.amazonaws.com ec2-174-129-247-121.compute-1.amazonaws.com edge-star-shv-04-gru1.facebook.com as an example. While ones repeat themselves in both browsers, others not. One class of unidentifies

Re: [tor-talk] (no subject)

2014-07-04 Thread Geoff Down
I don't have any unidentified servers - I don't know what you mean by that. Which webpage are you visiting? Have you compared what happens when visiting with Torbrowser and visiting with normal Firefox over the normal internet? On Fri, Jul 4, 2014, at 02:06 PM, ideas buenas wrote: > I don think is

[tor-talk] messing with XKeyScore

2014-07-04 Thread Eugen Leitl
http://blog.erratasec.com/2014/07/jamming-xkeyscore_4.html?m=1 Errata Security Advanced persistent cybersecurity Friday, July 04, 2014 Jamming XKeyScore Back in the day there was talk about "jamming echelon" by adding keywords to email that the echelon system was supposedly looking for. We

Re: [tor-talk] Tor Exit Operator convicted in Austrian lower court

2014-07-04 Thread Moritz Bartl
On 07/03/2014 07:14 PM, Joe Btfsplk wrote: > Perhaps out of fear of legal liability, Tor Project doesn't seem to have > what would be very helpful for relay operators - guides, documents - > even access to basic legal advice, of how to best avoid legal issues to > begin with. https://www.torproje

Re: [tor-talk] Fwd: according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-04 Thread Eugen Leitl
On Fri, Jul 04, 2014 at 07:21:07AM -0500, ba...@clovermail.net wrote: > Does the NSA barter this database of suspicious extremists with > foreign services? They do, according to Drake. > Certainly there are some friendly services eager to get their hands > on IP addresses > of NSA selected suspi

Re: [tor-talk] (no subject)

2014-07-04 Thread ideas buenas
I don think is chatbeat. How many inindetifed servers do u have? On Thu, Jul 3, 2014 at 11:19 PM, Geoff Down wrote: > See https://chartbeat.com/faq/what-is-ping-chartbeat-net > for what I think you are seeing - website analytics. > > On Thu, Jul 3, 2014, at 11:56 PM, ideas buenas wrote: > > Ano

Re: [tor-talk] Fwd: according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-04 Thread bauta
So this is an official extremists database at a government organisation? Are we now in a category close to animal rights "terrorists"? Are there any anti defamation, anti abusive profiling, anti discrimination laws the EFF could use against the targeting of a large group of privacy minded onli

Re: [tor-talk] High-latency hidden services

2014-07-04 Thread Aymeric Vitte
If I understand correctly the question here is not about browsing but fetching something that you don't need immediately for offline reading and that you download with high latency using different circuits. That's easy to do, if you take Peersm again, it's easy to send several random requests

Re: [tor-talk] according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-04 Thread Andreas Krey
On Fri, 04 Jul 2014 02:36:22 +, grarpamp wrote: > On Thu, Jul 3, 2014 at 4:12 PM, coderman wrote: > > On Thu, Jul 3, 2014 at 10:47 AM, Seth David Schoen wrote: > >> http://daserste.ndr.de/panorama/xkeyscorerules100.txt ... > 2) rules100... this thing likely has more N00 rulesets as well. Er,

Re: [tor-talk] according to leaked XKeyScore source NSA marks all Tor users as extremists, puts them on a surveillance list

2014-07-04 Thread grarpamp
On Thu, Jul 3, 2014 at 4:12 PM, coderman wrote: > On Thu, Jul 3, 2014 at 10:47 AM, Seth David Schoen wrote: >> http://daserste.ndr.de/panorama/xkeyscorerules100.txt >> Does anyone have theories about this part right at the bottom? .. >>/** >> * Placeholder fingerprint for Tor hidden servi

Re: [tor-talk] OTFC IRC issues - new Tor friendly IRC network?

2014-07-04 Thread Asa Rossoff
Hi Patrick, I reported that issue to OFTC on their support channel and was told by an operator that they believed they had a temporary Tor block in -place at the moment, however, I was able to reconnect with a new ciruit (and before identifying to services, got a Tor cloak, oddly enough). I hit th