20090101

Alexander Bernhard bernhard at baracuda.tv
Sat Nov 10 13:04:37 UTC 2007


They will not just ask you for the logfiles. YOU will have to find out which
ip-address was routed on your server on a more-or-less specific timewindow
in the last 6 month and with which ip-address the data was forwarded to the
next router.

If you can not provide this information you will be charged by law. In my
opinion, as an tor-operator you will not be punished for the maximum years
of inprisonment or the highest money fee possible ... but it could be hard
enough if you have a previous conviction in your police file stating you to
be "involved in computer crime and a possible terrorist" :-(

And yes, they of cource put some terms into the TKG to whom the information
is available:

"Zur Erfüllung ihrer gesetzlichen Aufgaben haben eine Vielzahl von Stellen
Zugriff auf diese Bestandsdaten (§§ 112, 113 TKG): Gerichte,
Strafverfolgungsbehörden, Polizeivollzugsbehörden des Bundes und der Länder
für Zwecke der Gefahrenabwehr, Zollkriminalamt und Zollfahndungsämter für
Zwecke eines Strafverfahrens, Zollkriminalamt zur Vorbereitung und
Durchführung von Maßnahmen nach § 39 des Außenwirtschaftsgesetzes,
Verfassungsschutzbehörden des Bundes und der Länder, Militärischer
Abschirmdienst, Bundesnachrichtendienst, Notrufabfragestellen, Bundesanstalt
für Finanzdienstleistungsaufsicht, Zollverwaltung zur
Schwarzarbeitsbekämpfung."(found at
http://www.vorratsdatenspeicherung.de/content/view/78/86/lang,de/#Umsetzung_
in_Deutschland)

Sorry for not translating the german text, but perhaps you can see that it
is not only one institution and not only courts ...

There are really bad times coming up in Germany ...
regards,
Alexander Bernhard


-----Original Message-----
From: owner-or-talk at freehaven.net [mailto:owner-or-talk at freehaven.net] On
Behalf Of Jan Danielsson
Sent: Saturday, November 10, 2007 12:59 PM
To: or-talk at freehaven.net
Subject: Re: 20090101

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Max Berger wrote:
[---]
> As far as I see in the new §113a TKG [*] we don't have to log the whole
> circuit data. We just have to log, which nodes connect to our node and
> which IP-address we give this connection (that's the IP-address of our
> own node, so we have to log this only once). The IP-address of the next
> node is not required.

   I assume that they made sure to put one, or more, "make available to
the state" cause in there?

   If not, I'm just wondering how they'd react if I do log (as
required), and if they want the logs, I send them a
tor.20080101-20100101.logs.tar.bz.gpg.good_luck.

- --
Kind regards,
Jan Danielsson

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (NetBSD)

iD8DBQFHNZ0UuPlHKFfKXTYRCi17AKCJH5hLNUoQWfWaamuWtaCWRUR//ACeK6ii
8wipwCF4HDrIiutt6nJOOkw=
=i3p7
-----END PGP SIGNATURE-----




More information about the tor-talk mailing list