Hacker News new | past | comments | ask | show | jobs | submit login

> Seriously, all they had to do was plug my IP into a browser or do a simple scan of it but I suppose that's asking too much from LE lol.

I mean, yes, I'm pretty sure "just take my word for it" is asking too much of LE.

We can always say "Come back with a warrant" but then sometimes they'll come back with a warrant.

> They should know what Tor is and know that any Tor server contains ZERO info

Unless, of course, one has misconfigured it... Which could be the case. Definitely the kind of thing LEO can figure out on the other side of a seize-and-strip of the hardware. Unfortunately, I think the only way to not be a part of the story here is to not be a part of the story here... Don't proxy anonymous traffic if you don't want law enforcement asking after the anonymous traffic you proxied. Otherwise, expect the responsibility imposed upon a service provider (since you're providing a service).

Other ISPs avoid this scrutiny by going out of their way to be helpful to law enforcement.




There is no way for police to know if the traffic came through tor, or was initiated by the owner of computer/server. It seems reasonable that the police have the right to investigate. If not, anyone could run a tor node to cover up their own criminal activities. Even if you did have logs suggesting it was tor activity, should we trust someone’s claim that the logs are proof that it was someone else?

It would in fact be negligent if the police did not properly investigate the server/computer/house of the device.


Yup that's the same conclusion that I've come to for now. I got a family and stuffs now so don't want to bring any stress to them.

One day I will resume but in the future :)




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: