[tor-relays] Running exit-node in Germany

Andy Isaacson adi at hexapodia.org
Thu Aug 1 15:23:09 UTC 2013


On Thu, Aug 01, 2013 at 10:25:15PM +0800, Sanjeev Gupta wrote:
> I received, about 3 months ago, an email from a Police Officer.  It was
> addressed to my address in the whois, and seemed to be written assuming I
> was an ISP.  It cited a date and time range, an IP address, and asked which
> customer was using the IP address at that time.  This was in connection
> with "unathorised fund transfers".
> 
> I replied back explaining that the IP was in my control, and ran TOR.  I
> provided a link to the TOR website, and that I did not have any logs.
> 
> I got back a prompt response thanking me, and have heard nothing since.
> 
> So it is possible that, as law enforcement gets better clued in to Tor,
> they would be willing to let you go with dirty looks for making their life
> harder, but not call down the SWAT team.

Similarly, the FBI agents who talked to Noisebridge representatives said
effectively, "I have 10 leads in this case.  If you can tell me straight
away that the IP address lead is a dead end, I can cross it off my list
and not waste any time pursuing it."

-andy


More information about the tor-relays mailing list