In Case of Inquiries ...

From JonDonym Wiki
(Difference between revisions)
Jump to: navigation, search
 
(14 intermediate revisions by one user not shown)
Line 2: Line 2:
 
<iimg>[[In_Case_of_Inquiries_...]]![[Image:en2.png]]</iimg><iimg>[[Bearbeitung_von_Abuses]]![[Image:de2.png]]</iimg>&nbsp;&nbsp;&nbsp;[[Maintenance|<- prev]] | [[MixOperatorTutorials|Content]]
 
<iimg>[[In_Case_of_Inquiries_...]]![[Image:en2.png]]</iimg><iimg>[[Bearbeitung_von_Abuses]]![[Image:de2.png]]</iimg>&nbsp;&nbsp;&nbsp;[[Maintenance|<- prev]] | [[MixOperatorTutorials|Content]]
  
== Hinweise für Exit-Admins zur Bearbeitung von Abuses ==
+
== Advices for Exit Mix Administrators Regarding Abuses ==
Bei Missbrauch des Anonymisierungsdienstes wird die IP-Adresse des Exit-Mix ermittelt. Häufig wird der Server als ursächlich angenommen.  
+
If the anonymization service got abused the IP address of the exit mix is usually identified. Often it is the case that the server is assumed to cause the abuse.  
  
=== Vorbereitung ===
+
=== Preliminaries ===
Bereits im Vorfeld der ersten Abuses kan man einiges tun, um den Ärger gering zu halten:
+
Already before getting the first abuses there is something one can do to minimize the trouble later on:
* Klären sie mit ihrem ISP, was sie mit ihrem Server tun und welche Probleme zu erwarten sind. Am besten fragt man vor Vertragabschluss, ob und unter welchen Bedingungen der Betreib eines Anonymisierungsservers toleriert wird und welche Anforderungen an die Bearbeitung der Abuses gestellt werden. Einige ISPs sagen: "Wir leiten alles weiter und gehen davon aus, dass sie sich darum kümmern." Andere ISPs wünschen eine Rückmeldung über die Bearbeitung.
+
* Talk to your ISP and explain what you are doing with your server and what kind of problems may occur. The best thing is to ask before signing the contract whether and under which conditions it is tolerable to deploy an anonymization service at all and if there are requirements concerning the handling of abuses. Some ISPs say: "We are just relaying traffic and you are supposed to deal with abuses." Other ISPs want to get feedback regarding the processing of abuses.
* Mieten sie einen Server nicht in ihrem Heimatland. Das ist auf Grund der Gewährleistung einer hohen Anonymität von JonDonym empfohlen, dient aber auch der Vermeidung von Abuses. Häufig wird von einer Verfolgung unbedeutender Abuses abgesehen, wenn internationale Zusammenarbeit zur Identifizierung des Täters nötig wäre.
+
* Do not run the exit mix on a server in your home country. This is not only recommended by JonDos in order to provide high anonymity but serves avoiding abuses as well. Insignificant abuses are often not prosecuted if an international coordination is necessary to identify the offender.
* Ein "sprechender" '''Reverse-DNS''' Eintrag kann über die Funktion des Servers aufklären. IT-affine Opfer oder Strafverfolger nutzen auch ''host'' oder ''nslookup''.  
+
* A "talking" '''Reverse-DNS''' entry may clarify the function of the server: IT-savvy victims or prosecutors may use tools like ''host'' or ''nslookup''.  
* Das '''Whois-Record''' sollte entsprechende Informationen zum Server bieten. Der CCC liefert [http://whois.domaintools.com/78.47.147.120 ein gutes Beispiel] für die AnonBox.
+
* The '''Whois record''' should contain respective information about the server. The AnonBox of the Chaos Computer Club [http://whois.domaintools.com/78.47.147.120 is a good example].
* Ideal ist es, wenn der '''RIPE-Eintrag''' für die IP-Adresse des Servers direkt auf den Betreiber verweist. Dann gehen alle Abuses direkt an den Mix-Betreiber ohne Umweg über den ISP. Nicht alle ISPs bieten die Möglichkeit, den RIPE-Eintrag zu setzen. Wenn es möglich ist, sollten sie diese Option nutzen.
+
* Ideally, the '''RIPE entry''' of the server's IP should point to its operator directly. Then all abuses go directly to the mix operator without detour via the ISP. Not all ISPs are offering to set the RIPE entry but if it is possible you should use this option.
* Häufig testen Opfer oder Strafverfogungsbehörden die IP-Adresse des Servers mit einem Web-Browser, um sich über den Betreiber zu informieren. Es ist hilfreich, wenn auf Port 80 ein kleiner Webserver wie ''lighttpd'' eine Informationsseite bereitsstellt. Die JonDos GmbH stellt ein Beispiel für eine [https://secure-proxy-howto.anonymous-proxy-servers.net/exit-notice/index.html Exit Mix Information] bereit. Bei strafrechtlich relevantem Missbrauch des Dienstes kann diese Information darüber entscheiden, ob man als Beschuldigter oder als Zeuge behandelt wird.
+
* Victims or prosecutors are often checking the IP address of the exit mix server using a web browser in order to inform themselves about its operator. It is helpful if a small web server like ''lighttpd'' provides a information page on port 80. The JonDos GmbH offers an example of an [https://anonymous-proxy-servers.net/wiki/exit-notice/index.html Exit Mix Information]. If the anonymity service was abused in a criminally liable way this information page can influence whether one is treated as a suspect or a witness.
** Webbrowser installieren. (Debian: <code> # aptitude install lighttpd  </code>)
+
** Installing the web server. (Debian: <code> # aptitude install lighttpd  </code>)
** Das von der JonDos GmbH vorbereitete Beispiel finden sie in den Mix-Sourcen im Unterverzeichnis ''misc/exit-mix-notice''. Wenn sie die Debian Pakete für den Mix Server nutzen, installieren sie bitte das Paket ''mix-exit-notice''. Die vorbereitete Webseite finden sie im Verzeichnis ''/usr/share/mix-exit-notice''. Passen sie die Configuration für den installierten Webserver an.
+
** The example prepared by the JonDos GmbH do you find in the mix sources in the subdirectory ''misc/exit-mix-notice''. If you are using the mix server debian packages please install the package ''mix-exit-notice''. The prepared web page is available in the directory ''/usr/share/mix-exit-notice''. Do not forget to adjust the configuration for the installed web server.
 
  <code>SRC:  DocumentRoot /home/mix/stable/misc/exit-mix-notice
 
  <code>SRC:  DocumentRoot /home/mix/stable/misc/exit-mix-notice
 
  DEB:  DocumentRoot /usr/share/mix-exit-notice</code>
 
  DEB:  DocumentRoot /usr/share/mix-exit-notice</code>
  
=== Spam-Versendung via Webinterface ===
+
=== Spamming via Web Interface ===
Oft wird eine Serie von Spam-Mails über das Webinterface eines Mail-Providers versendet. Der Spammer möchte anonym bleiben und nutzt in der Regel kostenfreie Anonymisierungsdienste, um sich im Webinterface des Mailproviders anzumelden.
+
It is quite often the case that a bunch of spam mails is sent using the web interface of a mail provider. The spammer wants to stay anonymous and is usually using free anonymous services to log himself in to the web interface of a mail provider.
  
Die Empfänger der Spam-Mails können anhand des Headers der Spam-Mails den Ursprung bis zum Exit-Mix zurück verfolgen. Sie senden eine Abuse-Mail an den ISP des Exit-Mix. Der ISP leitet die Mail an den Mieter des Servers weiter und erwartet eine Bearbeitung und Rückmeldung. Ignorieren sie diese Abuses nicht, auch wenn sie nicht strafrechtlich relevant sind. Ein dauerhaftes ignorieren kann einen Verstoß gegen die AGB des ISP bedeuten und zur Kündiung des Servers führen.
+
The recipients of those spam mails are able to trace their origin to the exit mix looking at the sent headers. They send an abuse mail to the ISP of the exit mix and the ISP in turn forwards this mail to the one renting the server and expects feedback after it is processed. Do not ignore these abuse mails even if they are not relevant in a criminally liable way as this can lead to a violation of the ISP's terms and conditions and finally to a termination of the server.
  
In der Regel erhält man zusammen mir der Abuse-Meldung die komplette Spam-Mail inklusive der Header. Ein fiktives Beispiel
+
Generally, one is receiving the complete spam mail including its headers together with the abuse notice. A fictious example:
  
 
  Dear customer,
 
  Dear customer,
Line 43: Line 43:
 
  From: ........
 
  From: ........
  
Im letzten Abschnitt ''Received:'' finden sie die nötigen Informationen, um ihrerseits die Abuse-Meldung weiter zu leiten. Die Header sehen verschieden aus. Man muss sich mit jeder Abuse-meldung individuell befassen.
+
In the last section ''Received:'' may the necessary information be found to forward the abuse notice on your part. The headers are always different and every abuse notice has to be addressed individually.
  
* ''23.23.23.23'' ist ein Beispiel. Es sollte die IP-Adresse des Exit-Mix sein. Möglicherweise steht hier eine andere IP-Adresse, dann ist die Abuse-Meldung nur irrtümlich ihnen zugestellt worden. (Kommt auch vor, aber selten.)
+
* ''23.23.23.23'' is an example. It should be the IP address of the exit mix. But possibly it is an other one in which case the abuse notice was sent to you by mistake. (That happens but is quite seldom)
* ''user medium'' ist der User-Account auf dem Mailserver, der für die Versendung der Spam-Mails verwendet wurde.
+
* ''medium'' is the user account on the mail server which got used for spamming.
* ''mail.domain.tld'' ist der Mailserver, auf dem SquirrelMail (ein Web-Frontend) läuft.
+
* ''mail.domain.tld'' is the mail server on which SquirrelMail (a web frontend) is running.
  
Leiten sie die erhaltene Abuse-Meldung an den abuse Account des Mail-Providers weiter und bitten sie um Löschung des Spam-Account. Senden sie die Weiterleitung in Kopie an das Security Response Team ihres ISP, damit dort eine Rückmeldung vorliegt, dass und wie sie auf die Abuse-Meldung reagiert haben. Die meisten Provider sind damit zufrieden. Sie leiten ihre Rückmeldung ihrerseits an den Absender weiter.
+
Forward the abuse notice to the abuse account of the mail provider and ask for deleting the spam account. Furthermore, send the forwarding as a copy to the security response team of your ISP in order to give them feedback showing that and how you reacted to the abuse notice. Most providers are satisfied with that. They forward your response on their turn to the sender of the abuse notice.
  
=== Spam DNS-Blacklisten ===
+
=== Spam DNS Blacklists ===
Durch die Versendung von Spam-Mails oder Spam in Foren kommt es immer wieder vor, dass ein Exit-Mix von einer DNSBL als Spam-IP gelistet wird.  
+
By spamming via mail or in forums it happens on and off that an exit mix is listed as spam IP by a DNSBL.  
  
Für <u>kostenfreie Exits</u> ist das in der Regel kein Problem, solange der Server nicht auch für die Versendung von Mails genutzt wird. Die ISPs verteten meist die Meinung, das der Nutzer des Servers selbst dafür verantwortlich ist, ob die IP-Adresse auf einer DNS-Blackliste steht oder nicht. Da die meisten DNSBL auch Kommentare in Foren u.ä. auswerten, wäre es eine Sysiphos-Arbeit für den Admin, ständig und immer wieder den Server von allen DNSBL zu entfernen. Da es den Mix-Betrieb nicht beeinträchtigt, können kostenfreie Exits das Problem ignorieren. Eigene E-Mails sollte man standardmäßig über eine andere IP-Adresse versenden.
+
For <u>free exit mixes</u> this is usually no problem as long as the server is not used for spamming as well. Mostly, the ISPs hold the position that the user of the server is responsible herself whether the IP address is on a DNS blacklist or not. As the most DNSBL are analyzing comments in forums as well it were a Sysiphos job for an admin to remove the server from all DNSBL over and over again. As this is not affecting the normal mix operation, free exit mixes can ignore this problem. Own e-mails should be sent over an other IP address.
  
Für <u>Premium-Dienste</u> ist die Situation etwas anders. Da diese Dienste auch die anonyme Versendung von E-Mails via SMTP ermöglichen, sollten die Exit Mix Betreiber in dafür sorgen, dass ihre Server nicht auf DNSBL gelistet werden. Die Website [http://www.dnsbl.info/dnsbl-database-check.php Spam Database Lookup] bietet die Möglichkeit, eine Vielzahl von DNSBL zu prüfen.  
+
For <u>premium services</u> is the situation a bit different. As these services are allowing to send e-mails via SMTP anonymously as well the exit mix operators should make sure that their servers are no listed on a DNSBL. The webpage [http://www.dnsbl.info/dnsbl-database-check.php Spam Database Lookup] offers the opportunity to check a multitude of DNSBL.  
  
=== Stalking und Beleidigungen ===
+
=== Stalking and Offending ===
Wenn Opfer von Stalking und Beleidungen sich an Exit-Mix Betreiber wenden, kann man auf die [http://anonymous-proxy-servers.net/de/jondonym/resistenz_gegen_missbrauch Möglichkeit zur Blockierung der anonymen Nutzung] hinweisen. Webdienste (Blogs, Foren, Wikis oder andere Websites) können auf allen Exit-Mixen gesperrt werden, wenn der Betreiber der Website es wünscht.
+
If victims of stalking and offenses are addressing themselves to exit mix operators one can point to the [https://anonymous-proxy-servers.net/en/abuse_resistence.html opportunity to block anonymous usage]. Webservices (Blogs, Forums, Wikis or other webpages) can be banned on all exit mixes if the operator of a webpage does that want.
  
=== Urheberrechts-Verletzungen ===
+
=== Copyright Infringements ===
Urheberrechtsverletzungen sind bei JonDonym sehr selten. Die automatisiert erstellten Urheberrechts-Verletzungen sind bei den meisten Exit Mix Betreibern unbekannt. Die kostenfreien Kaskaden können nur für anonymes Surfen genutzt werden. BitTorrent über kommerzielle Kaskaden ist wenig lukrativ. Statt der Bezahlung des Traffic kann man sich das gewünschte Video auch kaufen.
+
Copyright infringements are very rare. The automatically generated copyright infringements are unknown to most exit mix operators. The free cascades can only be used for surfing anonymously and BitTorrent via premium services is not very profitable. Instead of paying for the traffic one can buy the desired video.
  
=== Kreditbetrug u.ä. ===
+
=== Obtaining Credit by False Pretences ===
Eine Bestellung bei einem Online-Shop erfolgt unter Angabe falscher Daten und mittels Anonymisierungsdiensten. Die Ware wird geliefert, aber die Rechnung wird nicht bezahlt. Der Online-Händler erstattet Anzeige und liefert als Beweismitteln die gespeicherte IP-Adresse. Es laufen Routine-Ermittlungen an und der Betreiber des Exit-Mix wird irgendwann als Beschuldigter oder Zeuge bei der örtlichen Kriminalpolizei vorgeladen.
+
An order on an online shop was made using wrong personal data and anonymization services. The goods are delivered but the bill is not being paid. The owner of the online shop Der Online-Händler makes a report and provides the saved IP address as evidence. A routine investigation is started and the operator of the exit mix in question is summoned sometime be it as a suspect or be it as a witness.
  
Das ist kein Grund zur Beunruhigung. Nehmen sie den Termin zur Vorladung an oder vereinbaren sie einen passenden Termin. Erklären sie den Ermittlern, was sie tun und dass anhand der IP-Adresse eine Ermittlung des Täters nicht möglich ist. Ein Protokoll wird aufgesetzt und die Ermittlungen gegen den Exit-Mix Betreiber werden eingestellt. Ein vorbereitetes Informationsblatt über JonDonym ist hilfreich. (Möglicherweise wird der Beamte in Zukunft selbst den Dienst nutzen, um Datenspuren im Internet zu vermeiden.)
+
This is no reason for concern. Accept the appointment of the summoning or arrange one that fits better. Explain to the prosecutors what you are doing and that an identification of the offender is not possible by means of the IP address. A protocol is written and the investigation against the exit mix operator is discontinued. A prepared fact sheet about JonDonym is helpful here. (Possibly, the prosecutor him/herself is going to use this service in the future to avoid data traces while surfing the Web.)
  
Mit etwas Routine können sie die Vorladung auch schriftlich beantworten und nachfragen, ob ihr persönliches Erscheinen zur Klärung weiterer Fragen nötig ist.
+
With some routine you may answer the summoning written and ask whether your personal appearance to clarify further questions is necessary.
  
=== Schwere Straftaten ===
+
=== Severe Criminal Offenses ===
Mix-Betreuber stehen nicht außerhalb des Gesetzes. Bei schweren Straftaten besteht die Möglichkeit, dass man durch einen rechtskräftigen Beschluss gezwungen wird, Daten über die Nutzung des Dienstes zwecks Deanonymisierung der Nutzer zu speichern.
+
Mix operator do not act independent of laws. Due to severe criminal offenses there is the possibility that a mix operator is forced by a legally binding enactment to log data with the aim to deanonymize users.
  
Spielen sie nicht "Katz und Maus" mit den Behörden. Erklären sie nicht ihr Einverständnis mit der Telekommunikationsüberwachnung, um später sinnlose Daten zu liefern, die ohne Kooperation der anderen Mixe nicht auswertbar sind. Erklären sie die Funktionsweise von JonDonym, die (hoffentlich) internationale Verteilung ihrer Kaskade und lassen sie sich von einem Anwalt beraten. Die JonDos GmbH wird sie unterstützen.
+
Do not play a cat-and-mouse game with officials. Do not say you are agreeing to this telecommunication surveillance to deliver later on meaningless data that are not analyzable without the cooperation of the other mixes within your cascade. Explain how JonDonym is working and that the cascade your mix is belonging to is (hopefully) an international one meaning the mixes are located in different countries and get advice from a lawyer.
  
Bei der Umsetzung der Überwachung sind folgende Punkte zu beachten:
+
If you have to log data remind the following points:
# Speichern sie nur die minimal nötigen Daten.
+
# Save only the absolute necessary data.
# Stellen sie sicher, dass niemand Zugriff auf die gespeicherten Daten hat.
+
# Make sure that nobody has access to this data.
# Geben sie Daten nur in dem Maße weiter, wie sie dazu gezwungen sind.
+
# Only forward the amount of data you are forced to.
# Erlauben sie keine willkürliche Datensammlung. Wenn sie sich dagegen nicht wehren können, schalten sie ihren Server ab.
+
# Do not allow an arbitrary data collection. If you cannot resist that shut your server down.
  
Ähnlich wie beim Kreditbetrug und ähnlichen kleinen Straftaten ist es auch bei schweren Straftaten möglich, dass der Betreiber des Mix Servers als tatverdächtig gilt. Man wird sie beim Verdacht auf Beteiligung an schweren Straftaten (z.B. in Zusammenhang mit Organisierter Kiminalität) nicht einfach vorladen und befragen. Die Ermittlungen gegen sie werden anfangs unbemerkt ablaufen und möglicherweise die Überwachung ihrer Telekommunikationsverbindungen einschließen, Überprüfung ihrer Bankkonten usw.
+
Similarly to the case of obtaining credit by false pretences and other minor offenses it is possible as well that the operator of a mix is treated as a suspect regarding severe offenses. But you probably won't get a summoning at once, though. Rather, the investigation against you is going to start unnoticed and is presumably including the surveillance of telecommunication connections and the observation of your money transfers among others.

Latest revision as of 10:19, 14 April 2011

En2.png De2.png    <- prev | Content

Contents

Advices for Exit Mix Administrators Regarding Abuses

If the anonymization service got abused the IP address of the exit mix is usually identified. Often it is the case that the server is assumed to cause the abuse.

Preliminaries

Already before getting the first abuses there is something one can do to minimize the trouble later on:

  • Talk to your ISP and explain what you are doing with your server and what kind of problems may occur. The best thing is to ask before signing the contract whether and under which conditions it is tolerable to deploy an anonymization service at all and if there are requirements concerning the handling of abuses. Some ISPs say: "We are just relaying traffic and you are supposed to deal with abuses." Other ISPs want to get feedback regarding the processing of abuses.
  • Do not run the exit mix on a server in your home country. This is not only recommended by JonDos in order to provide high anonymity but serves avoiding abuses as well. Insignificant abuses are often not prosecuted if an international coordination is necessary to identify the offender.
  • A "talking" Reverse-DNS entry may clarify the function of the server: IT-savvy victims or prosecutors may use tools like host or nslookup.
  • The Whois record should contain respective information about the server. The AnonBox of the Chaos Computer Club is a good example.
  • Ideally, the RIPE entry of the server's IP should point to its operator directly. Then all abuses go directly to the mix operator without detour via the ISP. Not all ISPs are offering to set the RIPE entry but if it is possible you should use this option.
  • Victims or prosecutors are often checking the IP address of the exit mix server using a web browser in order to inform themselves about its operator. It is helpful if a small web server like lighttpd provides a information page on port 80. The JonDos GmbH offers an example of an Exit Mix Information. If the anonymity service was abused in a criminally liable way this information page can influence whether one is treated as a suspect or a witness.
    • Installing the web server. (Debian: # aptitude install lighttpd )
    • The example prepared by the JonDos GmbH do you find in the mix sources in the subdirectory misc/exit-mix-notice. If you are using the mix server debian packages please install the package mix-exit-notice. The prepared web page is available in the directory /usr/share/mix-exit-notice. Do not forget to adjust the configuration for the installed web server.
SRC:   DocumentRoot /home/mix/stable/misc/exit-mix-notice
DEB:   DocumentRoot /usr/share/mix-exit-notice

Spamming via Web Interface

It is quite often the case that a bunch of spam mails is sent using the web interface of a mail provider. The spammer wants to stay anonymous and is usually using free anonymous services to log himself in to the web interface of a mail provider.

The recipients of those spam mails are able to trace their origin to the exit mix looking at the sent headers. They send an abuse mail to the ISP of the exit mix and the ISP in turn forwards this mail to the one renting the server and expects feedback after it is processed. Do not ignore these abuse mails even if they are not relevant in a criminally liable way as this can lead to a violation of the ISP's terms and conditions and finally to a termination of the server.

Generally, one is receiving the complete spam mail including its headers together with the abuse notice. A fictious example:

Dear customer,
.
We received a complaint regarding an IP assigned to you. Please see the complaint at the
bottom of this e-mail. We urge you to take appropriate ation to prevent future complaints.
.
Security Response Team
.
Return-path: <blabla@bla.bl>
Delivery-date: Fri, 14 Mar 2015 06:39:21 +0200
Received: from pra7.smp.wab.co.za ([196.28.77.217])
....
Received: from 23.23.23.23
       (SquirrelMail authenticated user medium)
       by mail.domain.tld with HTTP;
Date: Fri, 14 May 2010 07:37:04 +0300 (EAT)
Subject: HELLO!!
From: ........

In the last section Received: may the necessary information be found to forward the abuse notice on your part. The headers are always different and every abuse notice has to be addressed individually.

  • 23.23.23.23 is an example. It should be the IP address of the exit mix. But possibly it is an other one in which case the abuse notice was sent to you by mistake. (That happens but is quite seldom)
  • medium is the user account on the mail server which got used for spamming.
  • mail.domain.tld is the mail server on which SquirrelMail (a web frontend) is running.

Forward the abuse notice to the abuse account of the mail provider and ask for deleting the spam account. Furthermore, send the forwarding as a copy to the security response team of your ISP in order to give them feedback showing that and how you reacted to the abuse notice. Most providers are satisfied with that. They forward your response on their turn to the sender of the abuse notice.

Spam DNS Blacklists

By spamming via mail or in forums it happens on and off that an exit mix is listed as spam IP by a DNSBL.

For free exit mixes this is usually no problem as long as the server is not used for spamming as well. Mostly, the ISPs hold the position that the user of the server is responsible herself whether the IP address is on a DNS blacklist or not. As the most DNSBL are analyzing comments in forums as well it were a Sysiphos job for an admin to remove the server from all DNSBL over and over again. As this is not affecting the normal mix operation, free exit mixes can ignore this problem. Own e-mails should be sent over an other IP address.

For premium services is the situation a bit different. As these services are allowing to send e-mails via SMTP anonymously as well the exit mix operators should make sure that their servers are no listed on a DNSBL. The webpage Spam Database Lookup offers the opportunity to check a multitude of DNSBL.

Stalking and Offending

If victims of stalking and offenses are addressing themselves to exit mix operators one can point to the opportunity to block anonymous usage. Webservices (Blogs, Forums, Wikis or other webpages) can be banned on all exit mixes if the operator of a webpage does that want.

Copyright Infringements

Copyright infringements are very rare. The automatically generated copyright infringements are unknown to most exit mix operators. The free cascades can only be used for surfing anonymously and BitTorrent via premium services is not very profitable. Instead of paying for the traffic one can buy the desired video.

Obtaining Credit by False Pretences

An order on an online shop was made using wrong personal data and anonymization services. The goods are delivered but the bill is not being paid. The owner of the online shop Der Online-Händler makes a report and provides the saved IP address as evidence. A routine investigation is started and the operator of the exit mix in question is summoned sometime be it as a suspect or be it as a witness.

This is no reason for concern. Accept the appointment of the summoning or arrange one that fits better. Explain to the prosecutors what you are doing and that an identification of the offender is not possible by means of the IP address. A protocol is written and the investigation against the exit mix operator is discontinued. A prepared fact sheet about JonDonym is helpful here. (Possibly, the prosecutor him/herself is going to use this service in the future to avoid data traces while surfing the Web.)

With some routine you may answer the summoning written and ask whether your personal appearance to clarify further questions is necessary.

Severe Criminal Offenses

Mix operator do not act independent of laws. Due to severe criminal offenses there is the possibility that a mix operator is forced by a legally binding enactment to log data with the aim to deanonymize users.

Do not play a cat-and-mouse game with officials. Do not say you are agreeing to this telecommunication surveillance to deliver later on meaningless data that are not analyzable without the cooperation of the other mixes within your cascade. Explain how JonDonym is working and that the cascade your mix is belonging to is (hopefully) an international one meaning the mixes are located in different countries and get advice from a lawyer.

If you have to log data remind the following points:

  1. Save only the absolute necessary data.
  2. Make sure that nobody has access to this data.
  3. Only forward the amount of data you are forced to.
  4. Do not allow an arbitrary data collection. If you cannot resist that shut your server down.

Similarly to the case of obtaining credit by false pretences and other minor offenses it is possible as well that the operator of a mix is treated as a suspect regarding severe offenses. But you probably won't get a summoning at once, though. Rather, the investigation against you is going to start unnoticed and is presumably including the surveillance of telecommunication connections and the observation of your money transfers among others.

Personal tools