[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] exit node experience: abuse over HTTP, stealrat infection
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
>> That is not a sound approach:
>
> I think it is.
>
>> ii) in some legal systems this may mean you can be held
>> responsible for the traffic that is routed via your node.
>
> Example? In Germany you might (or might not) be responsible for
> traffic you relay. But not relaying part of the traffic doesn't
> change a thing, legally.
i remember reading somewhere [1] that if you run a server that carries
mail and you don't choose where it goes or who it comes from, the server
is protected from some DMCA complaints by the DMCA "safe harbor" terms (us
code title 17 Chapter 5 Â 512).
this might only apply in the US and it may not be entirely correct, but it
does lay out that if you censor where the traffic goes to or comes from,
you surrender some rights.
mikael ball
-----BEGIN PGP SIGNATURE-----
iQIcBAEBCgAGBQJURB3OAAoJELGRAnGuhYf0RlwP/AuZMpcdoe6ZCUciBFjWJzf5
fpny8iB0ttxNGpn2LVwksBS/IjF7iTIkMruvp2MNkwCRvD/OiWXqoFJcy0hSDac2
0B1T5PvseDB9h1NX0FJDENOr+dkByzgrRWdmfgwJt2RIWLvqx/MHuM810a/ppqOm
meEPZaMnCC2gD9lcMPTJpKBbsznryZFjqXciQyLDaGJ8/vOMUhipJsJcCcOCV2qe
zEX/lmgtNi0oRIvXArTuAMeCx+HICyhg6owpbv2RTGUUby9+ynXiXb5upk0rUiTd
/uTKJUhVky0oe8wZO7B9hvySlhYeG1Mu2CWFOY0wIQNiVSklLT/FEWL3Gwzrc8Qs
U3TssC2ZQIiGdj/0oyueVJtUpNZgtWEJ2naWU91pgyNkNnmc5q6FY/R9MARBE2Kw
0jZHlm98KADSn3+DOJCk1AnLG15ZnYZAuxqpAPRZH9FzGCzIvXmFVFAbYN55uHBS
c9WrrOUQc6VamVpOI9Jp3PV3hApfSF1M1JQSazNhy3kewPo5w+ixl6Vwyb24WnH/
6JMImlpnqVyR7gDMfJVyVX7FXbPevpNFBcr8tcAuiG802REV4P2hoY9khtqyPg4C
qOe9J5ZQhh5joypyaktrkp5MSaB7E33RghSCf8Lz66GqNDAPjgzDuHDgp/IuYCkk
wIXk81Gxr6E4ZPWpbkfP
=hJrU
-----END PGP SIGNATURE-----
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays