[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Exit node connection statistics



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

mplsfox02@xxxxxxxxxxxxxx @ 2008/07/17 09:03:
> Dominik Schaefer:
> 
>> mplsfox02@xxxxxxxxxxxxxx schrieb:
>>
>>> Can you explain what the threat scenario is for what I'm doing?
>> One possible issue comes to my mind here. You mentioned, you delete
>> your logs after 24h (after evaluation). I don't know what exactly you
>> are logging for this interval, but one reason why it is usually
>> useless to search Tor nodes is because they don't keep any (usable)
>> logs. If this changes for some nodes and is known e.g. to law
>> enforcement agencies, that might encourage searching/confiscating of
>> Tor nodes in general and increase risk for any node operator.
> 
> I just log the exit connections (standard info log of Tor), which is not
> of much use for investigators, as they have this information already if
> they found the exit node.
> 

how do investigators know that?  my guess is they will see that you are
providing these statistics and then also assume that you are logging the
incoming connections and now have (more) reasonable cause to seize your
equipment in order to facilitate coordinating the full tor-circuit....
or something.


-----BEGIN PGP SIGNATURE-----

iD8DBQFIf8ptXhfCJNu98qARCDoEAKCEYXYGEH3wotoaJiXomB7SfKr/lACZAaTE
6jxIqrg3Fg/uSLnh5gilE+k=
=EReq
-----END PGP SIGNATURE-----