[prev in list] [next in list] [prev in thread] [next in thread] 

List:       tor-talk
Subject:    Re: Europaen Cybercrime Convention
From:       "Michael Schmidt" <schmidtm524 () googlemail ! com>
Date:       2007-11-25 11:55:42
Message-ID: 5cc93d950711250355j1e4337dfq99ceba7de3318e24 () mail ! gmail ! com
[Download RAW message or body]

just run tor on a dedecated server, install a truecrypt.org container and
make if portable only in this container.
if the power is off, the tor installation has gone.
But I guess you mean a password protection while running?

2007/11/25, TOR Admin (gpfTOR1) <tor-admin@privacyfoundation.de>:
>
> Hi onion guys,
>
> we want to write about a few points of the European Cybercrime
> Convention, which became real by law in Germany last time.
>
> Sorry - we didnt read the or-talk very carefully last time. May be, it
> was always discussed here.
>
> By the European Cybercrime Convention anon servers are something like
> telephone providers. The following is important because of this fact:
>
> 1: data retention (was discussed here, in Germany real by =A7113 StPO)
>
> 2: Realtime surveillance by European Cybercrime Convention (article 20)
>     The traffic data (not the traffic itself) has to be provided for the
>     governments and secret services in REALTIME by a defined interface.
>     Anon servers have to provide all data, which have to be logged in
>     realtime too! Admins of anon servers have to cooperate.
>
>     (In Germany this is real by the new =A7 100g StPO, the realtime
>      surveillance can run for up to 3 days without asking a judge.)
>
> 3: Online-searching of servers by European Cybercrime Convention:
>     An online searching (Online-Durchsuchung) of an anon server may be
>     run before investigation to save relevant data, which may be not
>     accessible after investigation. This online searching depends not on
>     the cooperation of the admins and may be reached by repressions.
>
>     (In Germany this is real by the new =A7 110 (3) StPO.)
>
> Thanks to K. Raven for feature out this new laws.
>
> For point 3 we recommend to be prepared. It may be possible to create a
> high secured account with only read access to relevant data and no read
> access to any important key. If someone login with this account, it may
> be possible to run several actions.
>
> If the situation appears, you may decide, what you want to do (give them
> the account data or take the repressions). But you will not have the
> time to create such an account carefully.
>
> Can anyone write a shot tutorial for creation of a high secured
> only-read-account?
>
> Greetings
>
>

[Attachment #3 (text/html)]

just run tor on a dedecated server, install a <a href="http://truecrypt.org">truecrypt.org</a> container \
and make if portable only in this container.<br>if the power is off, the tor installation has \
gone.<br>But I guess you mean a password protection while running? <br><br><div><span \
class="gmail_quote">2007/11/25, TOR Admin (gpfTOR1) &lt;<a \
href="mailto:tor-admin@privacyfoundation.de">tor-admin@privacyfoundation.de</a>&gt;:</span><blockquote \
class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; \
padding-left: 1ex;"> Hi onion guys,<br><br>we want to write about a few points of the European \
Cybercrime<br>Convention, which became real by law in Germany last time.<br><br>Sorry - we didnt read the \
or-talk very carefully last time. May be, it <br>was always discussed here.<br><br>By the European \
Cybercrime Convention anon servers are something like<br>telephone providers. The following is important \
because of this fact:<br><br> 1: data retention (was discussed here, in Germany real by §113 StPO) \
<br><br> 2: Realtime surveillance by European Cybercrime Convention (article \
20)<br>&nbsp;&nbsp;&nbsp;&nbsp;The traffic data (not the traffic itself) has to be provided for \
the<br>&nbsp;&nbsp;&nbsp;&nbsp;governments and secret services in REALTIME by a defined interface. \
<br>&nbsp;&nbsp;&nbsp;&nbsp;Anon servers have to provide all data, which have to be logged \
in<br>&nbsp;&nbsp;&nbsp;&nbsp;realtime too! Admins of anon servers have to \
cooperate.<br><br>&nbsp;&nbsp;&nbsp;&nbsp;(In Germany this is real by the new § 100g StPO, the \
realtime<br>&nbsp;&nbsp;&nbsp;&nbsp; surveillance can run for up to 3 days without asking a judge.) \
<br><br> 3: Online-searching of servers by European Cybercrime Convention:<br>&nbsp;&nbsp;&nbsp;&nbsp;An \
online searching (Online-Durchsuchung) of an anon server may be<br>&nbsp;&nbsp;&nbsp;&nbsp;run before \
investigation to save relevant data, which may be not<br> &nbsp;&nbsp;&nbsp;&nbsp;accessible after \
investigation. This online searching depends not on<br>&nbsp;&nbsp;&nbsp;&nbsp;the cooperation of the \
admins and may be reached by repressions.<br><br>&nbsp;&nbsp;&nbsp;&nbsp;(In Germany this is real by the \
new § 110 (3) StPO.)<br><br>Thanks to K. Raven for feature out this new laws. <br><br>For point 3 we \
recommend to be prepared. It may be possible to create a<br>high secured account with only read access to \
relevant data and no read<br>access to any important key. If someone login with this account, it may \
<br>be possible to run several actions.<br><br>If the situation appears, you may decide, what you want to \
do (give them<br>the account data or take the repressions). But you will not have the<br>time to create \
such an account carefully. <br><br>Can anyone write a shot tutorial for creation of a high \
secured<br>only-read-account?<br><br>Greetings<br><br></blockquote></div><br>



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic