Thoughts on the proposal for a mandatory valid email address in the ContactInfo field

If I write that I am alone you can believe me, or look in the RIPE db. Torservers.net or Zwiebelfreunde is now just LIR. Moritz gave the IP’s to various Relay operators. In the Ripe Whois database you can see that we share 185.220.101.0/24 for 4 relay operators. We did this split because one operator with a /24 subnet easily had 25% exit traffic and we wanted more diversity.

Even an e.V. did not protect Torservers.net = Zwiebelfreunde from a search. It doesn’t matter whether you have a lawyer. If the police drive up with a truck and clear out your server racks, your neighbors will see you as a criminal.
If the police in my city visit me again, I will transfer the IP’s to an LLC. LKA, BKA, NSA and co. know what we are doing (or know Tor) and leave us alone. :smiley:

There are many mail providers with hidden services.

1 Like

No, why sarcasm.
First of all, it is not forbidden to operate Tor relays in Germany. Many providers support the Tor network, why should I bother hiding it?

So that you can operate servers anonymously you need:

  • In-depth network knowledge.
  • Bought a workstation anonymously with cash. (No traceable MAC)
  • Monero and the knowledge of how to buy it anonymously.
  • And surprise. An anonymous email address. :sweat_smile:
  • An anonymously ordered server. (Is usually expensive or has little bandwidth)
  • Every connection to the customer interface, SSH and IPMI must be anonymous.
  • Years of discipline to always use the anonymous workstation and access.

And all of this + encrypted HD doesn’t help you (if you have data on the server that leads to you) and the entire hoster is taken down by the LKA during operation. Just like it happened at the Bulletproof-hoster ‘CyberBunker 2.0’ near me. :scream:

People should just use Skiff e-mail if they want contact abilities with zero credentials. It is end to end encrypted, free, requires no card/mobile/email to create and you can have multiple aliases under one account. All you do is choose your address and set your password.

Can’t you just spoof the MAC like you can with TAILS

I also thought that Monero is private enough for anonymous purchase to not matter?

If all seven of those things have to be happening flawlessly all together then I see why so many people mess up, there are probably less than 100 people currenty sucessfully running such an operation.

1 Like

You can, but better safe than sorry. See my 1st and last point above. Do you think about this every time the next years if you upgrade or do you check whether a bug might occur? Remember, wired eth has one MAC, wifi has another, and dogging station has one too.

You know the sentence: “tor can’t help you if you use it wrong”? Same aplies for other things. But that’s getting off topic here. Read the books “Mastering Monero” & DNM bible, watch “Breaking Monero”. Start here
One hint: If you buy Monero on Kraken or Binance and send it to your wallet, don’t transfer it to your hoster few minutes later. Wait a few blocks. :sweat_smile: I trade Monero on bisq (Tor hidden service).

Vort via Tor Project Forum:

Can Tor team confirm or disprove this story?
Refusal to do so I will treat as confirmation.

We had some comments around that back then in
Reddit - Dive into anything.

That said, no, we did not require a face to face video call. We wanted
to chat with the operator after a bunch of backs and forths via voice as
a bunch of things get resolved (faster/at all) that way than via lengthy
email threads. But they were not up to that.

2 Likes

Do you mean comments made by Tor team?

So in case when operator do not want to do voice and video calls, is it still possible to continue discussing relay operation via text messages?

1 Like

Vort via Tor Project Forum:

Do you mean comments made by Tor team?

Actually, I meant our forum topic not the Reddit link, sorry:

So in case when operator do not want to do voice and video calls, is it still possible to continue discussing relay operation via text messages?

That depends on the circumstances. Sometimes it’s part of our bad-relay
work and therefore needed.

2 Likes

I have a few more points to add to this thread’s topic.

My main issue is that the proposal is a mandatory email address within the ContactInfo field, while refusing all other inputs, including a blank field; I am still firmly against this. However, I am fine with the idea of a blank field or a valid email address being the only possible entries in the ContactInfo field. This allows Tor relay operators to choose between being contacted via email address or not being contacted at all, which complements my prior post.

Secondly, another additional suggestion is for the Tor Project to operate as a webmail provider, either on a limited-extent for providing email alias to Tor relay operators (similar to the FSF), or as a full-on service. This way, Tor relay operators can compartmentalize their Tor work while protecting their “real” email address. Both approaches are scalable, but the latter will require an excellent legal team to deal with all of the subpeonas, gag orders, and other legal entanglements that come with the territory, plus a warrant canary with an appropriate frequency. I largely assume that such legal experience has already been acquired by the Tor Project.

If this second suggestion is well received, I highly recommend a separate domain name that reflects this explicit purpose.

I don’t agree with the proposal that the contact field to contain just an email address.
If I want to complete my contact datails as xxx@yyy.com powered by NASA or xxx@yyy.com and my blog or other variants i should be able to do it.

I still don’t like that are a lots of relays with no contact adress, maybe the start is to make them use an email address to contact them and also do something with the relays that don’t respect MyFamily settings but no with others that have different things completed to contact field

1 Like

If you’re in the US, Canada or Europe, you can obtain XMR against cash directly.

Then, you head over to providers who accept XMR. Only access their website over TOR and tunnel SSH over TOR when logging into their servers.

This is about a month-long process depending on how long it takes you to get the XMR amount you want.

Since I’ve been looking for providers who accept XMR and allow TOR on their infrastructure, I’ll list a few I’ve found here (hopefully this will help someone who has been looking for them like me):

  1. 1984
  2. flokinet
  3. buyvm
  4. layer7
  5. hazi
  6. iHostART
  7. RDP sh
  8. alex host

I didn’t put in the links in case there are rules against it (I’m new here). If you can’t figure it out you can DM me.

In Europe, Kraken was the last CEX where you could buy XMR against fiat.

But:
We have had the Tor HiddenService non-KYC DEX Haveno (bisq fork) online for over 4 months. :wink:
Mainly created as a decentralized & unstoppable fiat<->XMR gateway.
And currently: XMR<->BTC, LTC, ETH, BCH
I have already made some trades on reto and also have seed nodes running.
And helped that PoW can be used for clients and seedsnode HiddenService.

bisq has XMR<->BTC

First of all, you need an anonymous email address. Which is the main reason for this thread.
You must have this permanently, because of provider and log messages.
In the case of exits, also because of abuse.

Note: The first SSH connection is always Clearnet.
SSH over Tor must first be configured on the server.

  1. servers.guru
  2. kyun.host
  3. cockbox.org
  4. cryptostorm.is

more on: kycnot.me
OPSEC & Plausible Deniability Guides