[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Kitten1 and kitten2 compromised (guard/hs/fallback directory)



Hey,
A random website (French speaking) about this unplug...
https://www.nextinpact.com/news/104302-wannacrypt-nuds-tor-saisis-par-autorites-francaises.htm

What will they find ?
A Debian who ask a password to unlock the system, or it will stop booting ?
Yeah, if police can read the system entirely, it looks like impossible
to find something about the guyz behind the wannacry software ?
Tor is not logging anything else than informations about uptimes/nb
connections... what can be interesting for police by unpluging those
guards relays ?

@aeris, do they ask you to uncrypt the volume ? (good luck to you...)
What can be the best ? Uncrypt the relay to help police when asking,
when this relay is only a relay and storing nothing else ?



I :
> Did he not mean that it is well run yet did dopey things such as giving outgoing ip address to the police which made no sense?
>
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-- 
Petrusko
C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays