Tor operator raided in Finland
tor at kleinhirn.org
Sun Jan 27 14:21:34 UTC 2008
-----BEGIN PGP SIGNED MESSAGE-----
Florian Reitmeir wrote:
|> And i'm using two dozens of IP numbers in the headers of my
transparent proxy, so
|> it's neither easy nor sure to find the IP number of my internet
|> Another point is that logging has several flaws: The provider proxies
|> thousands of connections per second, but the clocks of the computers
|> accuracy of about one minute. So without connection tracking, e. g.
|> digging in the log data yields unsure results, especially with
| i'm really not sure what kind of gras you are smoking, but nearly all
| you send just do not contain the truth.
| people alread told you, that _all_ your
| - many ip addresses
| - ip address changes
| - proxies ..
| are _useless_, and will not hide your account from your provider or the
Hey, let's try not to tear each other to shreds here, we're all on the
And btw, noone ever claimed that a provider proxy would hide your
identity from anyone. It's just one more step law enforcement has to go
to get to you, or at least a little more money they have to spend.
Digging through logs can be very time- and ressource-consuming.
And I disagree on your view about the use of (non-provider) proxies in
general to route your tor exit traffic through. As "dr no" pointed out,
many sites log only the IP address, not any Forwarded-For or similar
headers. So while those proxies cannot be *trusted* to provide any level
of obscurity or anonymity, they *might* with luck proove to be a dead
end (or at least a serious obstacle) for investigations. Especially if
they are in another country.
Again, just to make sure noone misunderstands it: none of this provides
any security (for the tor node operator) for certain. But it decreases
your chances to get harrassed by law enforcement. Maybe just slightly,
but it does.
Correct me if I'm wrong.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (MingW32)
-----END PGP SIGNATURE-----
More information about the tor-talk