[prev in list] [next in list] [prev in thread] [next in thread] 

List:       tor-talk
Subject:    Re: Europaen Cybercrime Convention
From:       "Michael Schmidt" <schmidtm524 () googlemail ! com>
Date:       2007-11-25 11:55:42
Message-ID: 5cc93d950711250355j1e4337dfq99ceba7de3318e24 () mail ! gmail ! com
[Download RAW message or body]

just run tor on a dedecated server, install a truecrypt.org container and
make if portable only in this container.
if the power is off, the tor installation has gone.
But I guess you mean a password protection while running?

2007/11/25, TOR Admin (gpfTOR1) <tor-admin@privacyfoundation.de>:
>
> Hi onion guys,
>
> we want to write about a few points of the European Cybercrime
> Convention, which became real by law in Germany last time.
>
> Sorry - we didnt read the or-talk very carefully last time. May be, it
> was always discussed here.
>
> By the European Cybercrime Convention anon servers are something like
> telephone providers. The following is important because of this fact:
>
> 1: data retention (was discussed here, in Germany real by =A7113 StPO)
>
> 2: Realtime surveillance by European Cybercrime Convention (article 20)
>     The traffic data (not the traffic itself) has to be provided for the
>     governments and secret services in REALTIME by a defined interface.
>     Anon servers have to provide all data, which have to be logged in
>     realtime too! Admins of anon servers have to cooperate.
>
>     (In Germany this is real by the new =A7 100g StPO, the realtime
>      surveillance can run for up to 3 days without asking a judge.)
>
> 3: Online-searching of servers by European Cybercrime Convention:
>     An online searching (Online-Durchsuchung) of an anon server may be
>     run before investigation to save relevant data, which may be not
>     accessible after investigation. This online searching depends not on
>     the cooperation of the admins and may be reached by repressions.
>
>     (In Germany this is real by the new =A7 110 (3) StPO.)
>
> Thanks to K. Raven for feature out this new laws.
>
> For point 3 we recommend to be prepared. It may be possible to create a
> high secured account with only read access to relevant data and no read
> access to any important key. If someone login with this account, it may
> be possible to run several actions.
>
> If the situation appears, you may decide, what you want to do (give them
> the account data or take the repressions). But you will not have the
> time to create such an account carefully.
>
> Can anyone write a shot tutorial for creation of a high secured
> only-read-account?
>
> Greetings
>
>

[Attachment #3 (text/html)]

just run tor on a dedecated server, install a <a \
href="http://truecrypt.org">truecrypt.org</a> container and make if portable only in \
this container.<br>if the power is off, the tor installation has gone.<br>But I guess \
you mean a password protection while running? <br><br><div><span \
class="gmail_quote">2007/11/25, TOR Admin (gpfTOR1) &lt;<a \
href="mailto:tor-admin@privacyfoundation.de">tor-admin@privacyfoundation.de</a>&gt;:</span><blockquote \
class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt \
0pt 0.8ex; padding-left: 1ex;"> Hi onion guys,<br><br>we want to write about a few \
points of the European Cybercrime<br>Convention, which became real by law in Germany \
last time.<br><br>Sorry - we didnt read the or-talk very carefully last time. May be, \
it <br>was always discussed here.<br><br>By the European Cybercrime Convention anon \
servers are something like<br>telephone providers. The following is important because \
of this fact:<br><br> 1: data retention (was discussed here, in Germany real by §113 \
StPO) <br><br> 2: Realtime surveillance by European Cybercrime Convention (article \
20)<br>&nbsp;&nbsp;&nbsp;&nbsp;The traffic data (not the traffic itself) has to be \
provided for the<br>&nbsp;&nbsp;&nbsp;&nbsp;governments and secret services in \
REALTIME by a defined interface. <br>&nbsp;&nbsp;&nbsp;&nbsp;Anon servers have to \
provide all data, which have to be logged in<br>&nbsp;&nbsp;&nbsp;&nbsp;realtime too! \
Admins of anon servers have to cooperate.<br><br>&nbsp;&nbsp;&nbsp;&nbsp;(In Germany \
this is real by the new § 100g StPO, the realtime<br>&nbsp;&nbsp;&nbsp;&nbsp; \
surveillance can run for up to 3 days without asking a judge.) <br><br> 3: \
Online-searching of servers by European Cybercrime \
Convention:<br>&nbsp;&nbsp;&nbsp;&nbsp;An online searching (Online-Durchsuchung) of \
an anon server may be<br>&nbsp;&nbsp;&nbsp;&nbsp;run before investigation to save \
relevant data, which may be not<br> &nbsp;&nbsp;&nbsp;&nbsp;accessible after \
investigation. This online searching depends not on<br>&nbsp;&nbsp;&nbsp;&nbsp;the \
cooperation of the admins and may be reached by \
repressions.<br><br>&nbsp;&nbsp;&nbsp;&nbsp;(In Germany this is real by the new § 110 \
(3) StPO.)<br><br>Thanks to K. Raven for feature out this new laws. <br><br>For point \
3 we recommend to be prepared. It may be possible to create a<br>high secured account \
with only read access to relevant data and no read<br>access to any important key. If \
someone login with this account, it may <br>be possible to run several \
actions.<br><br>If the situation appears, you may decide, what you want to do (give \
them<br>the account data or take the repressions). But you will not have the<br>time \
to create such an account carefully. <br><br>Can anyone write a shot tutorial for \
creation of a high secured<br>only-read-account?<br><br>Greetings<br><br></blockquote></div><br>




[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic