[tor-relays] exit node experience: abuse over HTTP, stealrat infection

Rejo Zenger rejo at zenger.nl
Wed Oct 22 06:41:35 UTC 2014

++ 21/10/14 22:29 +0200 - Manuel Gebauer:
>> > Although, the greater risk in my opinion, comes from the question
>> > if tor operators can be seen as service providers who would be
>> > exempt from responsibility for transmitted information under the
>> > term of this law. There's no precedence to my knowledge, but
>> > private wireless APs are in fact not exempt from responsibility.
>> Citation needed.
>"Für ein schlecht gesichertes WLAN besteht Störerhaftung." BGH,
>Urteil v. 12.05.2010, Az. I ZR 121/08, Link:

A "schlecht gesichertes WLAN" is, of course, something else than a 
deliberately opened router. The intentions of the owner a different, for 
a starter. Anyway, I am not sure whether this is worth a discussion or 
debate on this list.

Rejo Zenger
E rejo at zenger.nl | P +31(0)639642738 | W https://rejo.zenger.nl  
T @rejozenger | J rejo at zenger.nl
OpenPGP   1FBF 7B37 6537 68B1 2532  A4CB 0994 0946 21DB EFD4
XMPP OTR  271A 9186 AFBC 8124 18CF  4BE2 E000 E708 F811 5ACF
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 931 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20141022/4723646c/attachment.sig>

More information about the tor-relays mailing list