FYI, I received a subpoena from a US based court to produce information about individual(s) who were using one of our exit nodes at a specific date/time. In the nearly 3 months that these exits have been in operation, this is the first subpoena and only the second complaint received. For purposes of documenting the approximate ratio of "complaints / traffic processed", these nodes have handled ~515TB and are using the recommended reduced exit policy. https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy
Yes, the relays are US-based.
On Thu, Jun 7, 2018 at 23:10, I beatthebastards@inbox.com wrote:
Are and or the relay in USA?
FYI, I received a subpoena from a US based court to produce information about individual(s) who were using one of our exit nodes at a specific date/time. In the nearly 3 months that these exits have been in operation, this is the first subpoena and only the second complaint received. For purposes of documenting the approximate ratio of "complaints / traffic processed", these nodes have handled ~515TB and are using the recommended reduced exit policy. https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy
On 06/08/2018 01:42 AM, "IPfail (Tor Admin)" wrote:
FYI, I received a subpoena from a US based court to produce information about individual(s) who were using one of our exit nodes at a specific date/time. In the nearly 3 months that these exits have been in operation, this is the first subpoena and only the second complaint received. For purposes of documenting the approximate ratio of "complaints / traffic processed", these nodes have handled ~515TB and are using the recommended reduced exit policy. https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy
I did too. Perhaps even from the same source...? Not sure if that can be shared so I just won't.
My exit isn't in the US, but I am.
Matt
Hello everyone,
I just wanted to let people know that I have seen this thread and am looking into what may be going on.
If anyone else received these but does not feel comfortable posting about them on the list, please do not hesitate to reach out to me directly with anything you feel comfortable sharing. I am not able to provide legal advice, but if this looks like a situation where legal advice will be required, I have some contacts who may be able to provide assistance.
Thank you for running exit relays.
On Jun 8, 2018, at 5:43 AM, Matt Traudt pastly@torproject.org wrote:
On 06/08/2018 01:42 AM, "IPfail (Tor Admin)" wrote:
FYI, I received a subpoena from a US based court to produce information about individual(s) who were using one of our exit nodes at a specific date/time. In the nearly 3 months that these exits have been in operation, this is the first subpoena and only the second complaint received. For purposes of documenting the approximate ratio of "complaints / traffic processed", these nodes have handled ~515TB and are using the recommended reduced exit policy. https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy
I did too. Perhaps even from the same source...? Not sure if that can be shared so I just won't.
My exit isn't in the US, but I am.
Matt _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Thanks, Colin.
The one I received seemed very reasonable in language and scope, and came with contact information for someone with a title that implied that they work specifically on "cyber crimes". I am currently anticipating that this will be a non-event.
Either way, I wanted to share this event with the relay community since one of the questions that I had when first starting out was how much "administrative overhead" could be expected as a result of operating relays.
Sent from ProtonMail Mobile
On Fri, Jun 8, 2018 at 05:02, Colin Childs colin@torproject.org wrote:
Hello everyone, I just wanted to let people know that I have seen this thread and am looking into what may be going on. If anyone else received these but does not feel comfortable posting about them on the list, please do not hesitate to reach out to me directly with anything you feel comfortable sharing. I am not able to provide legal advice, but if this looks like a situation where legal advice will be required, I have some contacts who may be able to provide assistance. Thank you for running exit relays. > On Jun 8, 2018, at 5:43 AM, Matt Traudt wrote: > > > > On 06/08/2018 01:42 AM, "IPfail (Tor Admin)" wrote: >> FYI, I received a subpoena from a US based court to produce information >> about individual(s) who were using one of our exit nodes at a specific >> date/time. In the nearly 3 months that these exits have been in >> operation, this is the first subpoena and only the second complaint >> received. For purposes of documenting the approximate ratio of >> "complaints / traffic processed", these nodes have handled ~515TB and >> are using the recommended reduced exit policy. >> https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy >> > > I did too. Perhaps even from the same source...? Not sure if that can be > shared so I just won't. > > My exit isn't in the US, but I am. > > Matt > _______________________________________________ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays @torproject.org>
Hi IPfail,
"IPfail (Tor Admin)":
The one I received seemed very reasonable in language and scope, and came with contact information for someone with a title that implied that they work specifically on "cyber crimes". I am currently anticipating that this will be a non-event.
Either way, I wanted to share this event with the relay community since one of the questions that I had when first starting out was how much "administrative overhead" could be expected as a result of operating relays.
Thank you for reporting this to the mailing list.
In case there is a resolution that you can publicly share it may be useful for current or upcoming relay operators/servers in US.
Cheers, ~Vasilis
Vasilis,
It turned out to be a pretty "non-event". The jurisdiction was a relatively small one on the east coast of the US. The staff of the prosecutor's office were all very professional and pleasant to work with. Phoul coordinated the production of a letter from the Tor Project in record time that I was able to attach to my subpoena response.
In the end, the whole incident took ~4 hours to handle, and I suspect that any future ones would be much quicker now that I have all of the contacts in place and the attorneys up to speed.
In hindsight: * Having a supportive and Tor-savvy ISP (Hurricane Electric) was a big plus. * Having an attorney designated who is familiar with Tor /in advance/ would have saved time.
Your mileage may vary.
On Mon, Jul 23, 2018 at 08:42, Vasilis andz@torproject.org wrote:
Hi IPfail,
"IPfail (Tor Admin)":
The one I received seemed very reasonable in language and scope, and came with contact information for someone with a title that implied that they work specifically on "cyber crimes". I am currently anticipating that this will be a non-event.
Either way, I wanted to share this event with the relay community since one of the questions that I had when first starting out was how much "administrative overhead" could be expected as a result of operating relays.
Thank you for reporting this to the mailing list.
In case there is a resolution that you can publicly share it may be useful for current or upcoming relay operators/servers in US.
Cheers, ~Vasilis -- Fingerprint: 8FD5 CF5F 39FC 03EB B382 7470 5FBF 70B1 D126 0162 Pubkey: https://pgp.mit.edu/pks/lookup?op=get&search=0x5FBF70B1D1260162
If you were required to hand over your relay keys be sure to switch over to new ones to avoid future traffic from being affected by MITMs.
On Mon, Jul 23, 2018 at 12:26 PM IPfail (Tor Admin) tor-admin@ip.fail wrote:
Vasilis,
It turned out to be a pretty "non-event". The jurisdiction was a relatively small one on the east coast of the US. The staff of the prosecutor's office were all very professional and pleasant to work with. Phoul coordinated the production of a letter from the Tor Project in record time that I was able to attach to my subpoena response.
In the end, the whole incident took ~4 hours to handle, and I suspect that any future ones would be much quicker now that I have all of the contacts in place and the attorneys up to speed.
In hindsight:
- Having a supportive and Tor-savvy ISP (Hurricane Electric) was a big
plus.
- Having an attorney designated who is familiar with Tor /in
advance/ would have saved time.
Your mileage may vary.
On Mon, Jul 23, 2018 at 08:42, Vasilis andz@torproject.org wrote:
Hi IPfail,
"IPfail (Tor Admin)":
The one I received seemed very reasonable in language and scope, and
came with contact information for someone with a title that implied that they work specifically on "cyber crimes". I am currently anticipating that this will be a non-event.
Either way, I wanted to share this event with the relay community since
one of the questions that I had when first starting out was how much "administrative overhead" could be expected as a result of operating relays.
Thank you for reporting this to the mailing list.
In case there is a resolution that you can publicly share it may be useful for current or upcoming relay operators/servers in US.
Cheers, ~Vasilis -- Fingerprint: 8FD5 CF5F 39FC 03EB B382 7470 5FBF 70B1 D126 0162 Pubkey: https://pgp.mit.edu/pks/lookup?op=get&search=0x5FBF70B1D1260162
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays@lists.torproject.org