[prev in list] [next in list] [prev in thread] [next in thread]
List: tor-talk
Subject: Re: Europaen Cybercrime Convention
From: "Michael Schmidt" <schmidtm524 () googlemail ! com>
Date: 2007-11-25 11:55:42
Message-ID: 5cc93d950711250355j1e4337dfq99ceba7de3318e24 () mail ! gmail ! com
[Download RAW message or body]
just run tor on a dedecated server, install a truecrypt.org container and
make if portable only in this container.
if the power is off, the tor installation has gone.
But I guess you mean a password protection while running?
2007/11/25, TOR Admin (gpfTOR1) <tor-admin@privacyfoundation.de>:
>
> Hi onion guys,
>
> we want to write about a few points of the European Cybercrime
> Convention, which became real by law in Germany last time.
>
> Sorry - we didnt read the or-talk very carefully last time. May be, it
> was always discussed here.
>
> By the European Cybercrime Convention anon servers are something like
> telephone providers. The following is important because of this fact:
>
> 1: data retention (was discussed here, in Germany real by =A7113 StPO)
>
> 2: Realtime surveillance by European Cybercrime Convention (article 20)
> The traffic data (not the traffic itself) has to be provided for the
> governments and secret services in REALTIME by a defined interface.
> Anon servers have to provide all data, which have to be logged in
> realtime too! Admins of anon servers have to cooperate.
>
> (In Germany this is real by the new =A7 100g StPO, the realtime
> surveillance can run for up to 3 days without asking a judge.)
>
> 3: Online-searching of servers by European Cybercrime Convention:
> An online searching (Online-Durchsuchung) of an anon server may be
> run before investigation to save relevant data, which may be not
> accessible after investigation. This online searching depends not on
> the cooperation of the admins and may be reached by repressions.
>
> (In Germany this is real by the new =A7 110 (3) StPO.)
>
> Thanks to K. Raven for feature out this new laws.
>
> For point 3 we recommend to be prepared. It may be possible to create a
> high secured account with only read access to relevant data and no read
> access to any important key. If someone login with this account, it may
> be possible to run several actions.
>
> If the situation appears, you may decide, what you want to do (give them
> the account data or take the repressions). But you will not have the
> time to create such an account carefully.
>
> Can anyone write a shot tutorial for creation of a high secured
> only-read-account?
>
> Greetings
>
>
[Attachment #3 (text/html)]
just run tor on a dedecated server, install a <a \
href="http://truecrypt.org">truecrypt.org</a> container and make if portable only in \
this container.<br>if the power is off, the tor installation has gone.<br>But I guess \
you mean a password protection while running? <br><br><div><span \
class="gmail_quote">2007/11/25, TOR Admin (gpfTOR1) <<a \
href="mailto:tor-admin@privacyfoundation.de">tor-admin@privacyfoundation.de</a>>:</span><blockquote \
class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt \
0pt 0.8ex; padding-left: 1ex;"> Hi onion guys,<br><br>we want to write about a few \
points of the European Cybercrime<br>Convention, which became real by law in Germany \
last time.<br><br>Sorry - we didnt read the or-talk very carefully last time. May be, \
it <br>was always discussed here.<br><br>By the European Cybercrime Convention anon \
servers are something like<br>telephone providers. The following is important because \
of this fact:<br><br> 1: data retention (was discussed here, in Germany real by §113 \
StPO) <br><br> 2: Realtime surveillance by European Cybercrime Convention (article \
20)<br> The traffic data (not the traffic itself) has to be \
provided for the<br> governments and secret services in \
REALTIME by a defined interface. <br> Anon servers have to \
provide all data, which have to be logged in<br> realtime too! \
Admins of anon servers have to cooperate.<br><br> (In Germany \
this is real by the new § 100g StPO, the realtime<br> \
surveillance can run for up to 3 days without asking a judge.) <br><br> 3: \
Online-searching of servers by European Cybercrime \
Convention:<br> An online searching (Online-Durchsuchung) of \
an anon server may be<br> run before investigation to save \
relevant data, which may be not<br> accessible after \
investigation. This online searching depends not on<br> the \
cooperation of the admins and may be reached by \
repressions.<br><br> (In Germany this is real by the new § 110 \
(3) StPO.)<br><br>Thanks to K. Raven for feature out this new laws. <br><br>For point \
3 we recommend to be prepared. It may be possible to create a<br>high secured account \
with only read access to relevant data and no read<br>access to any important key. If \
someone login with this account, it may <br>be possible to run several \
actions.<br><br>If the situation appears, you may decide, what you want to do (give \
them<br>the account data or take the repressions). But you will not have the<br>time \
to create such an account carefully. <br><br>Can anyone write a shot tutorial for \
creation of a high secured<br>only-read-account?<br><br>Greetings<br><br></blockquote></div><br>
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic