[tor-relays] exit node experience: abuse over HTTP, stealrat infection
subkeys at riseup.net
Sun Oct 19 20:24:25 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
>> That is not a sound approach:
> I think it is.
>> ii) in some legal systems this may mean you can be held
>> responsible for the traffic that is routed via your node.
> Example? In Germany you might (or might not) be responsible for
> traffic you relay. But not relaying part of the traffic doesn't
> change a thing, legally.
i remember reading somewhere  that if you run a server that carries
mail and you don't choose where it goes or who it comes from, the server
is protected from some DMCA complaints by the DMCA "safe harbor" terms (us
code title 17 Chapter 5 § 512).
this might only apply in the US and it may not be entirely correct, but it
does lay out that if you censor where the traffic goes to or comes from,
you surrender some rights.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----
More information about the tor-relays