William was raided for running a Tor exit node. Please help if you can.

Joakim Aronius joakim at aronius.se
Fri Nov 30 12:51:15 UTC 2012


* Will Hargrave (will at harg.net) wrote:
> 
> On 29 Nov 2012, at 20:53, George Herbert <george.herbert at gmail.com> wrote:
> 
> > The assertion being made here, that it's somehow illegal (or immoral,
> > or scary) for there to be not-completely-traceable internet access in
> > the US, is absurd.
> 
> The real issue here is *not* the legality of the act of providing a Tor exit node, or an open access point, or anything else. In sensible countries that is perfectly legal. The problem here is the reality of undergoing a criminal investigation. 

It could also be the case that they think the person running the Tor exit node is the actual perpetrator, i.e. its needed to seize all HW to get the kiddie pr0n. Is it even possible for a network sniffer to distinguish between Tor exit traffic and his own traffic?

Hopefully he will get it all back but it will most liklely cost both time and money to explain Tor to the Austrian judical system.

> 
> Think carefully about the impact of having everything in your life which runs an operating system taken away. Phones. Tablet. Laptop. Servers. All portable drives, data. If you rely on that hardware for your income (and who doesn't?) you're going to have to buy all of that again. And restore your data, if you are able. 

Fully agree.

/J




More information about the NANOG mailing list