![]() I'm not saying that everyone who gets a federal subpoena for running a Tor exit node will have this outcome, but the only Tor legal stories that rise to the public's attention are the horrific ones. Not sure what went down with the grand jury. The FBI agent did his homework, realized we had no logs to give him, and no one had to go to New Jersey. ![]() I would be happy to discuss this further with you if you have any questions. ![]() As such, Boing Boing does not have any subscriber records, user information, or any records at all related to the use of that IP address at that time, and thus cannot produce any responsive records. The IP address you cite is a TOR exit node hosted by Boing Boing (please see: ). The Subpoena requests subscriber records and user information related to an IP address. I just received a Grand Jury Subpoena to Boing Boing dated J(see attached). We contacted our lawyer, the hard-fightin' cyber-lawyer Lauren Gelman, and she cooled us out. So we were a little freaked out in June when an FBI agent sent us a subpoena ordering us to testify before a federal grand jury in New Jersey, with all our logs for our Tor exit node. In Germany and Austria, prosecutors have actually brought criminal action against Tor exit-node operators. The nightmare scenario for Tor exit-node operators is that you'll get blamed for the stuff that people do using your node. ![]() We wanted to do our bit for allowing, for example, Bahranian and Chinese dissidents to communicate out of view of their domestic spy agencies, so we turned some of our resources over to Tor in 2012, including access to our blazing-fast Internet connection. Having a lot of exit nodes, with high-speed connections, is critical to keeping Tor users safe and secure. Many people run Tor nodes, but only a few run "exit nodes" through which traffic exits the Tor network and goes out to the public, normal Internet. It's especially hated by the NSA and GCHQ. Tor, The Onion Router, is a privacy and anonymity network that bounces traffic around the Internet in nested cryptographic wrappers that make it much harder to tell who its users are and what they're doing. In June, we got the nightmare Tor operator scenario: a federal subpoena (don't worry, it ended surprisingly well!)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |