[158445] in North American Network Operators' Group
Re: William was raided for running a Tor exit node. Please help if
daemon@ATHENA.MIT.EDU (Joakim Aronius)
Fri Nov 30 07:51:27 2012
Date: Fri, 30 Nov 2012 13:51:15 +0100
From: Joakim Aronius <joakim@aronius.se>
To: Will Hargrave <will@harg.net>
In-Reply-To: <254DF54D-5A5C-4DB4-9C23-642A1F7DB27A@harg.net>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
* Will Hargrave (will@harg.net) wrote:
>=20
> On 29 Nov 2012, at 20:53, George Herbert <george.herbert@gmail.com> wrote:
>=20
> > The assertion being made here, that it's somehow illegal (or immoral,
> > or scary) for there to be not-completely-traceable internet access in
> > the US, is absurd.
>=20
> The real issue here is *not* the legality of the act of providing a Tor e=
xit node, or an open access point, or anything else. In sensible countries =
that is perfectly legal. The problem here is the reality of undergoing a cr=
iminal investigation.=20
It could also be the case that they think the person running the Tor exit n=
ode is the actual perpetrator, i.e. its needed to seize all HW to get the k=
iddie pr0n. Is it even possible for a network sniffer to distinguish betwee=
n Tor exit traffic and his own traffic?
Hopefully he will get it all back but it will most liklely cost both time a=
nd money to explain Tor to the Austrian judical system.
>=20
> Think carefully about the impact of having everything in your life which =
runs an operating system taken away. Phones. Tablet. Laptop. Servers. All p=
ortable drives, data. If you rely on that hardware for your income =10(and =
who doesn't?) you're going to have to buy all of that again. And restore yo=
ur data, if you are able.=20
Fully agree.
/J