German TOR Servers Seized 427
mrogers writes "Servers participating in the TOR anonymizing network have been seized by public prosecutors during a child porn crackdown in Germany. TOR provides anonymity for clients and servers by redirecting traffic through a network of volunteer-operated relays; the German prosecutors may have been trying to locate an anonymous server by examining the logs of the captured relays."
Re:legal basis (Score:5, Informative)
Basically an open proxy (Score:3, Informative)
Tor can and does log data. (Score:3, Informative)
As far as I know and read the Tor documentation, Tor doesn't keep logs.
Read first [noreply.org], then post.
By default, Tor logs to the screen (it's called "standard out", or "stdout" for short) at log-level notice. However, some Tor packages (notably the ones for OS X, Debian, Red Hat, etc) change the default logging so it logs to a file, and then Tor runs in the background.
Re:Is the polica incompetent or harassing? (Score:4, Informative)
Re:Is the polica incompetent or harassing? (Score:3, Informative)
Re:Automatic computer crime... (Score:4, Informative)
Re:legal basis (Score:3, Informative)
Re:legal basis (Score:2, Informative)
Re:legal basis (Score:5, Informative)
Note that, due to the way Tor works, seizing the Tor exit nodes won't help track down the actual people responsible in any way. (Even if they had full access logs, which I somehow doubt, all each node knows is the previous step in the routing chain, not where the connection originated). It will, however, help scare people off running Tor nodes quite nicely.
Re:Automatic computer crime... (Score:3, Informative)
If "intentional act" equals "thoughtcrime", then all degrees of murder and manslaughter are equivalent. Law has a long basis of judging degree of guilt depending on intent, and for good reason: someone who did it intentionally is more likely do it again. This makes the most sense in the murder/manslaughter distinction, but also applies to e.g. 2nd degree murder (a crime of passion, unique to the situation) versus 1st degree murder (a planned murder, something that might become a pattern) versus 1st degree murder with a hate crime enhancement (a planned murder targeting an entire class of people, something that's clearly a pattern already). These details are specific to U.S. law and even then vary from state to state, but the principles apply broadly.
There is, of course, a key distinction between "intent" and "thoughtcrime": thoughtcrime is a thought that is illegal in itself; intent, while a thought, is only relevant if an actual physical crime has been committed beyond mere intent. (The line gets a bit blurry, of course, when you start dealing with charges like "Conspiracy to commit Foo", where the act of Foo was never actually carried out and might never have happened.)
Re:log(0) (Score:2, Informative)
Re:legal basis (Score:3, Informative)
I just don't live in a country where the Gendarmes can say that certain public meetings (for example, to protest a new labor law) are illegal.
Nor do I live in a country where people think "riot" and "legitimate protest" are synonyms.
Maybe you should get your own affairs in order before you start slinging horseshit across the pond.
Abuse? (Score:5, Informative)
What you are seeing is one abuse of the system. This abuse is not put into prospective. If it were we would have an idea of the amount of traffic the Tor network handles and compare that to the number of abuses we see. We can not condom the network or servers based on a soul abuse of the system!
Recently the president condemned Anonymous E-mail and pay as you go Cell phones and announced that we need to pass laws to stop it. This is just wrong! It is like saying that be for you can publish anything, you must ID your self. This is against everything that the founding Fathers stood for! The Federalist papers are a great example of that!
The Federalist Papers were a series of articles written under
the pen name of Publius by Alexander Hamilton, James Madison,
and John Jay. Madison, widely recognized as the Father of
the Constitution, would later go on to become President of
the United States. Jay would become the first Chief Justice
of the US Supreme Court. Hamilton would serve in the Cabinet
and become a major force in setting economic policy for the US.
Our founding Fathers hid there identity behind a pen name! So next time you condemn anonymity, remember that it is the way to have unwanted political views heard with out being persecuted for your ideas.
Re:legal basis (Score:3, Informative)
Police dogs loosed on recruitment protestors [objector.org]
Other protestors arrested [washingtonpost.com]
Veteran arrested on Veteran's day for reading an editorial out loud [commondreams.org]
Not arrested, just confined behind barbed wire [washingtonpost.com]
Military treating Quakers like terrorists [csmonitor.com]
Grandmother arrested over "Investigate Florida Votergate" sign [aclufl.org]
Re:legal basis (Score:1, Informative)
Sure thing. Child pornography is a picture or video of children involved in sexual activity. Well, anyone under 18 that is. Er.. of course they don't actually have to be having sex, but still, sexual or nude images of anyone under 18. (Cough) Hrm... of course, they don't technically have to be nude or having sex, as long as there is a "lavacious exhibition of genitals". Basically, child porn is a picture or video of someone under 18, either having sex or not having sex, naked or clothed, and lavaciously exhibiting genitals, or appearing sexual in any way*.
One easy definition for child porn: any picture or image of someone under 18.
*also remember, it doesn't have to be a real child if the virtual or drawn image is "indistinguishable" from a real child.
Use of Tor (Score:3, Informative)