Russian FOSS activist arrested in Russia for his Tor exit-node
Dmitry Bogatov, 25 years old, teaches maths in MFUA (Moscow Finance and Law University) was a free and open source software activist (https://sinsekvu.github.io/pages/about.html). Dmitry was administrating a Tor exit node (https://atlas.torproject.org/#details/2402CD5A0D848D1DCA61EB708CC1FBD4364AB8AE) from his house. In fact, the author of "incendiary messages" (called "Airat Bashirov") was using Tor, and, by lack of chance, he used the ip adress of Dmitry's exit node.
Dmitry's lawyer, Alexei Teptsov, presented videos from surveillance cameras, that proved that, during the moments when the "incendiary messages" were posted, Dmitry was away from his computer. He was coming back from a fitness center with his wife, Tatiana, a genetician, and then went to a supermarket, where cameras were also working. Moreover, "Airat Bashirov", the author of the provocative messages, continues to post on sysadmin.ru, while Dmitry is under arrest. The last post was seen on the forum on April 11.
Dmitry will stay in pre-trial detention center until June 8 at least. Now the Investigation is examining all his seized devices.
[+] [-] dublinben|9 years ago|reply
You are much less likely to be raided and arrested if a cloud server in a datacenter somewhere, leased by an anonymous LLC you control, is the subject of an investigation.
[0] https://blog.torproject.org/blog/tips-running-exit-node
[+] [-] radarsat1|9 years ago|reply
Admittedly, I guess data centers run this risk automatically by the fact of providing data storage/transfer services.
[+] [-] unknown|9 years ago|reply
[deleted]
[+] [-] elastic_church|9 years ago|reply
so now you can email him anonymously over TOR, and pay his bitcoin invoices Shapeshifting some Monero
I also checked the Panama Papers and none of those entities they filed for me appeared in the leak, but even in the off chance they did, you wouldn't be associated.
GreenCloudVPS also takes cryptocurrency.
and finally, there is at least one jurisdiction in the world that still offers legit bearer share companies which require no registration. And your entity no longer needs a banking relationship to acquire goods and services.
[+] [-] r721|9 years ago|reply
https://meduza.io/en/feature/2017/04/10/mathematics-teacher-... (English, Tor is not mentioned yet)
https://geektimes.ru/post/287944/ (Russian)
https://zona.media/news/2017/11/04/home (Russian)
Liveblogs from the court (Russian):
https://zona.media/online/2017/07/04/2april (Day 1)
https://zona.media/online/2017/08/04/bogatov-2 (Day 2)
https://zona.media/online/2017/10/04/bogatov-3 (Day 3)
[+] [-] unholythree|9 years ago|reply
Just like in the Wikileaks threads when people go on about the abuses in other countries, and how unfair it is that JUST America's/ the DNC's/ the CIA/ the NAS's dirty laundry gets aired.
Repression and abuses of power should concern us all. One evil does not negate an other.
[+] [-] quirkafleeg|9 years ago|reply
The other posts that refer the US are in response to comments stating/implying that it's a specifically Russian thing, pointing out that no, similar things occur in the US.
They're not trying to say one evil (Russian) is negated by another (American), but that both sides do evil.
[+] [-] steveracer|9 years ago|reply
[+] [-] abiox|9 years ago|reply
[+] [-] unknown|9 years ago|reply
[deleted]
[+] [-] sstradling|9 years ago|reply
This may be a little far-fetched - there's likely easier ways to generate pretext - but it might be something for owners of Tor exit nodes to be aware of.
[+] [-] saint_fiasco|9 years ago|reply
From that perspective, your theory is not so far-fetched because it's not like the Russian government went through a lot of effort to frame this activist in particular. Any other Tor user would do.
[+] [-] holtalanm|9 years ago|reply
[+] [-] 086421357909764|9 years ago|reply
[+] [-] bluehazed|9 years ago|reply
[+] [-] maxlybbert|9 years ago|reply
[+] [-] paulddraper|9 years ago|reply
And I'm not so sure that is true.
[+] [-] golergka|9 years ago|reply
[+] [-] mattbee|9 years ago|reply
The same thing happened to someone I know in the UK, a few years back. He was arrested at dawn and put in a cell for a whole day after an offence was committed from the IP address under his control.
He said the officer interviewing him admitted he understood that the offender and node owner were probably different people, but it was close enough to justify an arrest.
This was a high-profile case where they did actually find and arrest the actual offender, so they had real leads - could only conclude this was intimidation.
[+] [-] smsm42|9 years ago|reply
[+] [-] Dolores12|9 years ago|reply
2) If someone using your TOR node posts a message threatening to kill someone, YOU will be SWAT-ed first and only then police will find out you run TOR exit-node and maybe you are not the one who posted it. You implicitly accept risks associated with your operation.
[+] [-] x1798DE|9 years ago|reply
And if you're a cop, why would you dispatch a SWAT team to a Tor exit node at all? You can see if the IP is on the list and if so you'll have a hell of a time proving that the traffic came from the person running it even if they did (after all, why would they even use their own IP address when you could have used Tor?). At that point, you're basically punishing a random, innocent person for the (legal) act of running an exit node.
[+] [-] fuzzybeard|9 years ago|reply
[+] [-] abiox|9 years ago|reply
do internet threats generally hold any credibility? what's the actualization rate?
[+] [-] mirimir|9 years ago|reply
[+] [-] unknown|9 years ago|reply
[deleted]
[+] [-] foobarer|9 years ago|reply
[+] [-] darpa_escapee|9 years ago|reply
[+] [-] spacemanmatt|9 years ago|reply
[+] [-] grindal|9 years ago|reply
[deleted]
[+] [-] andoon|9 years ago|reply
I also don't believe the "an IP address doesn't identify a person" mantra that's so widely used in the privacy-aware circles. Your ISP gives you an IP address for yourself, and if you let others use it, you know you can get yourself in trouble, the same you'd get yourself in trouble if you let anybody who asked you use a rifle of yours, or a car. Would you let someone you don't know at all drive your car? What if he runs over someone? Would you be responsible of it for letting him use your car? Would you risk going to prison?
The alternative is worse: I could be looking at pedophilia or terrorism sites all day and if they catch me say "well I also run a Tor exit node so how do you prove it was me!". Your IP identifies you, so be responsible!
[+] [-] zzzcpan|9 years ago|reply
Why would that be a problem, looking at things on the internet?
But advocating to sacrifice anonymity is a problem. It makes those fighting governments very vulnerable and easily silenced. And gives a way for governments to take action against anonymity.
[+] [-] humanrebar|9 years ago|reply
You lost me here. This is more like letting someone make a call with your phone. Rifles are inherently dangerous, even gun enthusiasts agree on that. We're talking about information more broadly here.
[+] [-] wruza|9 years ago|reply
In practice though, these clinical cretins can throw you into russian jail for two months without taking counter-evidence into account. Just because.
[+] [-] wyager|9 years ago|reply
If someone borrows my car and crashes into someone else, I'm not legally responsible. Same goes for companies that let anyone use their cars, like rental services.
[+] [-] maxlybbert|9 years ago|reply
[+] [-] unknown|9 years ago|reply
[deleted]
[+] [-] hilyen|9 years ago|reply