William was raided for running a Tor exit node. Please help if you can.

Jeroen Massar jeroen at unfix.org
Fri Nov 30 13:04:07 UTC 2012


On 2012-11-30 13:51 , Joakim Aronius wrote:
> * Will Hargrave (will at harg.net) wrote:
>> 
>> On 29 Nov 2012, at 20:53, George Herbert <george.herbert at gmail.com>
>> wrote:
>> 
>>> The assertion being made here, that it's somehow illegal (or
>>> immoral, or scary) for there to be not-completely-traceable
>>> internet access in the US, is absurd.
>> 
>> The real issue here is *not* the legality of the act of providing a
>> Tor exit node, or an open access point, or anything else. In
>> sensible countries that is perfectly legal. The problem here is the
>> reality of undergoing a criminal investigation.
> 
> It could also be the case that they think the person running the Tor
> exit node is the actual perpetrator, i.e. its needed to seize all HW
> to get the kiddie pr0n. Is it even possible for a network sniffer to
> distinguish between Tor exit traffic and his own traffic?

Not easily, this as TCP connections originate from the box itself.

> Hopefully he will get it all back but it will most liklely cost both
> time and money to explain Tor to the Austrian judical system.

According to http://raided4tor.cryto.net/ he at least got a full list of
what was confiscated including the various weapons in his possession,
that in combo with the owning of a safe deposit box (which was not
searched) with amongst others cash is an interesting part in personal
security IMHO though ;)

>> Think carefully about the impact of having everything in your life
>> which runs an operating system taken away. Phones. Tablet. Laptop.
>> Servers. All portable drives, data. If you rely on that hardware
>> for your income (and who doesn't?) you're going to have to buy all
>> of that again. And restore your data, if you are able.

Actually they did not take anything away that was really related to the
what was detected.

The IP that the connection to the (apparently monitored or owned by the
$investigators) CP website came from was a rented server in Poland.
He apparently was notified that that exit node was being used for abuse
and thus 'closed it because of the hacking through it' (which really is
not helping when you still run others and looks a lot like you have
something to hide to me...)

All the other servers he apparently runs in the US and Hong Kong etc are
still up and running too.

Thus the computer things confiscated where effectively unrelated to the
IP that triggered them to look at it.

On 2012-11-30 13:58 , Rich Kulawiec wrote:> On Thu, Nov 29, 2012 at
08:04:02AM -0500, Chris quoted (William):
>> Yes, it happened to me now as well - Yesterday i got raided for
>> someone sharing child pornography over one of my Tor exits.
>
> Question: what evidence has been published -- that is, placed somewhere
> that we can all see it -- that substantiates the claim that child porn
> traversed the node in question?

The moment you can see that it is real CP you have seen CP.

Do not ask for that. There are special people who have legally signed
documents and agreements that investigate this.


> Followup question 1: if no such evidence has been produced, then
> why should we believe that it exists?  Extraordinary claims require
> extraordinary proof.

What likely is the case, from what I understand, is that the server
hosting the CP was being either monitored or operated by $investigators.

> Followup question 2: if the goal is to identify and apprehend the
> perpetrators of child porn (and that's a good goal) then why would
> the police raid this operation?

Because they maybe think he originated it, see also the note above of
closing the Tor exit that (allegedly) sourced the request(s).

> Would it not make far more sense to
> take advantage of the operator's knowledge and experience and quietly
> ask for his/her cooperation *while leaving the node running*?

He already closed the node, apparently due to hacking happening through it.

But that would not help anyway, as it is Tor, thus unless you are really
really good there is nothing to see there as you'll never find out who
originated the connection through Tor.

> Followup question 3: what evidence in front of us allows us to clearly
> discern that this is what it purports to be and not simply an attempt
> to shut down a Tor node (and intimidate the operators of others)
> by using a plausible excuse based on a universal hot-button issue?

The owner (the William person this is about) shut it down himself.

See the blog mentioned above for more details from his side.

Greets,
 Jeroen




More information about the NANOG mailing list