[tor-talk] Innocent Seattle Exit Operators And Privacy Advocates Raided
krishna e bera
keb at cyblings.on.ca
Mon Apr 4 04:04:44 UTC 2016
On 04/03/2016 10:06 PM, grarpamp wrote:
> https://www.thestranger.com/slog/2016/03/30/23885710/police-go-on-fishing-expedition-search-the-home-of-seattle-privacy-activists-who-maintain-tor-network
> https://twitter.com/seattleprivacy
>
quote:
> Robinson said the authorities should have known better than to target
> them. One of the officers praised Tor as a useful tool and clearly
> understood how it works, he said.
Actually, the police had it right. The only way police could know
whether the exit node operators were the source of the CP traffic was to
search their computer. An exit node is indistinguishable from the
computers that it is acting the proxy for (barring ip leaks), from the
destination site's point of view. Their own traffic would be mixed in
with exit node traffic.
Somewhere is a piece of advice from TorProject recommending people not
to run an exit node from home for the above and other reasons.
(I was going to link to
https://www.torproject.org/docs/faq-abuse.html.en#TypicalAbuses
but the link on that page to
https://blog.torproject.org/blog/tips-running-exit-node-minimal-harassment
leads nowhere. )
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 465 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20160404/8eb95190/attachment.sig>
More information about the tor-talk
mailing list