[tor-relays] Kitten1 and kitten2 compromised (guard/hs/fallback directory)

Petrusko petrusko at riseup.net
Sun May 21 07:12:39 UTC 2017


Hey,
A random website (French speaking) about this unplug...
https://www.nextinpact.com/news/104302-wannacrypt-nuds-tor-saisis-par-autorites-francaises.htm

What will they find ?
A Debian who ask a password to unlock the system, or it will stop booting ?
Yeah, if police can read the system entirely, it looks like impossible
to find something about the guyz behind the wannacry software ?
Tor is not logging anything else than informations about uptimes/nb
connections... what can be interesting for police by unpluging those
guards relays ?

@aeris, do they ask you to uncrypt the volume ? (good luck to you...)
What can be the best ? Uncrypt the relay to help police when asking,
when this relay is only a relay and storing nothing else ?



I :
> Did he not mean that it is well run yet did dopey things such as giving outgoing ip address to the police which made no sense?
>
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-- 
Petrusko
C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20170521/8404d4de/attachment.sig>


More information about the tor-relays mailing list