c2ddd533f723bafc645443281af963b75cb7145e
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html       1) <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
abuse.html       2) "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
abuse.html       3) 
abuse.html       4) <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en">
abuse.html       5) <head>
Andrew Lewman Updated faq-abuse.html to m...

Andrew Lewman authored 19 years ago

faq-abuse.html   6)  <title>Abuse FAQ for Tor Server Operators</title>
faq-abuse.html   7)  <meta name="Author" content="Roger Dingledine" />
Andrew Lewman Renamed to faq-abuse, set i...

Andrew Lewman authored 19 years ago

faq-abuse.html   8)  <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
Andrew Lewman Updated faq-abuse.html to m...

Andrew Lewman authored 19 years ago

faq-abuse.html   9)  <link rel="stylesheet" type="text/css" href="stylesheet.css" />
Andrew Lewman Renamed to faq-abuse, set i...

Andrew Lewman authored 19 years ago

faq-abuse.html  10)  <link rel="shortcut icon" type="image/x-icon" href="/favicon.ico" />
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html      11) </head>
abuse.html      12) <body>
abuse.html      13) 
abuse.html      14) <!-- TITLE BAR & NAVIGATION -->
abuse.html      15) 
abuse.html      16) <table class="banner" border="0" cellpadding="0" cellspacing="0">
abuse.html      17)     <tr>
abuse.html      18)         <td class="banner-left"></td>
abuse.html      19)         <td class="banner-middle">
Andrew Lewman Updated faq-abuse.html to m...

Andrew Lewman authored 19 years ago

faq-abuse.html  20)             <a href="index.html">Home</a>
faq-abuse.html  21)           | <a href="howitworks.html">How It Works</a>
faq-abuse.html  22)           | <a href="download.html">Download</a>
faq-abuse.html  23)           | <a href="documentation.html">Docs</a>
faq-abuse.html  24)           | <a href="users.html">Users</a>
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html  25)           | <a href="faq.html">FAQs</a>
Andrew Lewman Updated faq-abuse.html to m...

Andrew Lewman authored 19 years ago

faq-abuse.html  26)           | <a href="contribute.html">Contribute</a>
faq-abuse.html  27)           | <a href="developers.html">Developers</a>
faq-abuse.html  28)           | <a href="research.html">Research</a>
faq-abuse.html  29)           | <a href="people.html">People</a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html      30)         </td>
abuse.html      31)         <td class="banner-right"></td>
abuse.html      32)     </tr>
abuse.html      33) </table>
abuse.html      34) 
abuse.html      35) <!-- END TITLE BAR & NAVIGATION -->
abuse.html      36) 
Andrew Lewman Removed all invalid classes...

Andrew Lewman authored 19 years ago

faq-abuse.html  37) <div class="center">
faq-abuse.html  38) 
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html      39) <div class="main-column">
abuse.html      40) 
Andrew Lewman Renamed to faq-abuse, set i...

Andrew Lewman authored 19 years ago

faq-abuse.html  41) <!-- PUT CONTENT AFTER THIS TAG -->
faq-abuse.html  42) 
faq-abuse.html  43) <h2>Abuse FAQ for Tor Server Operators</h2>
faq-abuse.html  44) <hr />
faq-abuse.html  45) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html  46) <a name="WhatAboutCriminals"></a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html      47) <h3>Doesn't Tor enable criminals to do bad things?</h3>
abuse.html      48) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html  49) <p>Criminals can already do bad things. Since they're willing to
faq-abuse.html  50) break laws, they already have lots of options available that provide
faq-abuse.html  51) <em>better</em> privacy than Tor provides. They can steal cell phones,
faq-abuse.html  52) use them, and throw them in a ditch; they can crack into computers
faq-abuse.html  53) in Korea or Brazil and use them to launch abusive activities; they
faq-abuse.html  54) can spread viruses that take control of literally millions of Windows
faq-abuse.html  55) machines around the world. </p>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html      56) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html  57) <p>Tor aims to provide protection for ordinary people who want to follow
faq-abuse.html  58) the law. Only criminals have privacy right now; we need to fix that. </p>
faq-abuse.html  59) 
faq-abuse.html  60) <a name="Tradeoff"></a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html      61) <h3>Isn't it just a tradeoff: accepting the bad uses for the good ones?</h3>
abuse.html      62) 
abuse.html      63) <p>No, we don't think that's how it works in the case of Tor. </p>
abuse.html      64) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html  65) <p>There are lots of ways to get anonymity on the net, some legal and
faq-abuse.html  66) some illegal. As we explained above, many of the illegal approaches
faq-abuse.html  67) can provide stronger anonymity than Tor can provide, because they can
faq-abuse.html  68) control literally millions of computers via spyware, viruses, and other
faq-abuse.html  69) techniques. </p>
faq-abuse.html  70) 
faq-abuse.html  71) <p>Criminals and other bad people have the motivation to learn how to
faq-abuse.html  72) get good anonymity, and many have the motivation to pay well to achieve
faq-abuse.html  73) it. Being able to steal and reuse the identities of innocent victims
faq-abuse.html  74) (identify theft) makes it even easier. Normal people, on the other hand,
faq-abuse.html  75) don't typically have the time or money to spend figuring out how to get
faq-abuse.html  76) privacy online. This is the worst of all possible worlds. </p>
faq-abuse.html  77) 
faq-abuse.html  78) <p>So yes, criminals could in theory use Tor, but they already have
faq-abuse.html  79) better options, and it seems unlikely that taking Tor away from the
faq-abuse.html  80) world will stop them from doing their bad things. At the same time, Tor
faq-abuse.html  81) and other privacy measures can <em>fight</em> identity theft, physical
faq-abuse.html  82) crimes like stalking, and so on. </p>
faq-abuse.html  83) 
faq-abuse.html  84) <a name="DDoS"></a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html      85) <h3>What about distributed denial of service attacks?</h3>
abuse.html      86) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html  87) <p>Distributed denial of service attacks typically rely on having a group
faq-abuse.html  88) of thousands of computers all sending floods of traffic to a victim. Since
faq-abuse.html  89) the goal is to overpower the bandwidth of the victim, they typically send
faq-abuse.html  90) UDP packets since those don't require handshakes or coordination. </p>
faq-abuse.html  91) 
faq-abuse.html  92) <p>But because Tor only transports correctly-formed TCP streams, not
faq-abuse.html  93) all IP packets, you cannot send UDP packets over Tor. (You can't do
faq-abuse.html  94) specialized forms of this attack like SYN flooding either.) So ordinary
faq-abuse.html  95) DDoS attacks are not possible over Tor. Tor also doesn't allow bandwidth
faq-abuse.html  96) amplification attacks against external sites: you need to send in a byte
faq-abuse.html  97) for every byte which the Tor network will send to your destination. So
faq-abuse.html  98) in general, attackers who control enough bandwidth to launch an effective
faq-abuse.html  99) DDoS attack can do it just fine without Tor. </p>
faq-abuse.html 100) 
faq-abuse.html 101) <p>And if this argument doesn't convince you, go try Tor and see how
faq-abuse.html 102) much aggregate throughput you can eke out of it, then come back to us
faq-abuse.html 103) if you're still worried. </p>
faq-abuse.html 104) 
faq-abuse.html 105) <a name="WhatAboutSpammers"></a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     106) <h3>What about spammers?</h3>
abuse.html     107) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 108) <p>The default Tor exit policy rejects all outgoing port 25 (SMTP)
faq-abuse.html 109) traffic. So sending spam mail through Tor isn't going to work. It's
faq-abuse.html 110) possible that some server operators will enable port 25 on their
faq-abuse.html 111) particular exit node, in which case only that computer will allow outgoing
faq-abuse.html 112) mails; but that individual could just set up an open mail relay too,
faq-abuse.html 113) independent of Tor. </p>
faq-abuse.html 114) 
faq-abuse.html 115) <p>So far, no Tor server has enabled outgoing port 25 in his exit
faq-abuse.html 116) policy. </p>
faq-abuse.html 117) 
Andrew Lewman Renamed to faq-abuse, set i...

Andrew Lewman authored 19 years ago

faq-abuse.html 118) <p>In short, Tor isn't useful for spammers. </p>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     119) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 120) <a name="ExitPolicies"></a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     121) <h3>How do Tor exit policies work?</h3>
abuse.html     122) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 123) <p>Each Tor server has an exit policy that specifies what sort of
faq-abuse.html 124) outbound connections are allowed or refused from that server. The exit
faq-abuse.html 125) policies are propagated to the client via the directory, so clients
faq-abuse.html 126) will automatically avoid picking exit nodes that would refuse to exit
faq-abuse.html 127) to their intended destination. </p>
faq-abuse.html 128) 
faq-abuse.html 129) <p>This way each server can decide the services he wants to allow
faq-abuse.html 130) connections to, based on abuse potential and his own situation. </p>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     131) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 132) <a name="HowMuchAbuse"></a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     133) <h3>Does Tor get much abuse?</h3>
abuse.html     134) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 135) <p>Not much, in the grand scheme of things. We've been running the network
faq-abuse.html 136) since October 2003, and it's only generated a handful of complaints. Of
faq-abuse.html 137) course, like all privacy-oriented networks on the net, we attract our
faq-abuse.html 138) share of jerks. Tor's exit policies help separate the role of "willing
faq-abuse.html 139) to donate resources to the network" from the role of "willing to deal
faq-abuse.html 140) with exit abuse complaints", so we hope our network is more sustainable
faq-abuse.html 141) than past attempts at anonymity networks. </p>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     142) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 143) <p>Since Tor has <a
faq-abuse.html 144) href="http://tor.eff.org/cvs/tor/doc/tor-doc.html">many good uses as
faq-abuse.html 145) well</a>, we feel that we're doing pretty well at striking a balance
faq-abuse.html 146) currently. </p>
faq-abuse.html 147) 
faq-abuse.html 148) <a name="TypicalAbuses"></a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     149) <h3>So what should I expect if I run a server?</h3>
abuse.html     150) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 151) <p>If you run a Tor server that allows exit connections (such as the
faq-abuse.html 152) default exit policy), it's probably safe to say that you will eventually
faq-abuse.html 153) hear from somebody. Abuse complaints can come in a variety of forms. The
faq-abuse.html 154) main ones so far have taken the following form: </p>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     155) <ul>
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 156) <li>Somebody connects to hotmail, and sends a criminal mail somewhere. The
faq-abuse.html 157) FBI sends you a polite email, you explain that you run a Tor server,
faq-abuse.html 158) and they say 'oh well' and leave you alone. [Port 80]</li>
faq-abuse.html 159) <li>Somebody tries to get you shut down by using Tor to connect to google
faq-abuse.html 160) groups and posting spam to usenet, and then sending an angry mail to
faq-abuse.html 161) your ISP about how you're destroying the world. [Port 80]</li>
faq-abuse.html 162) <li>Somebody connects to an irc network and makes a nuisance of
faq-abuse.html 163) himself. Your ISP gets polite mail about how your computer has been
faq-abuse.html 164) compromised; and/or your computer gets ddosed. [Port 6667]</li>
faq-abuse.html 165) <li>Somebody uses Tor to download a Vin Diesel movie, and
faq-abuse.html 166) your ISP gets a DMCA takedown notice. According to our lawyers
faq-abuse.html 167) (and this convinced the Harvard general counsel), your ISP can
faq-abuse.html 168) totally ignore this notice with no liability problems. See EFF's <a
faq-abuse.html 169) href="http://tor.eff.org/eff/tor-dmca-response.html">Tor DMCA
faq-abuse.html 170) Response Template</a>. [Arbitrary ports]</li>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     171) </ul>
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 172) 
faq-abuse.html 173) <p>You might also find that your Tor server's IP is blocked from accessing
faq-abuse.html 174) some Internet sites/services. This might happen regardless of your exit
faq-abuse.html 175) policy, because some groups don't seem to know or care that Tor has
faq-abuse.html 176) exit policies. (If you have a spare IP not used for other activities,
faq-abuse.html 177) you might consider running your Tor server on it.) For example, </p>
faq-abuse.html 178) 
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     179) <ul>
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 180) <li>Wikipedia is currently blocking many Tor server IPs from writing
faq-abuse.html 181) (reading still works), because they haven't figured out internally how
faq-abuse.html 182) to deal with the fact that they want to provide open access but they
faq-abuse.html 183) also have no ways to control abuse to their website. We're working with
faq-abuse.html 184) them to resolve this.</li>
faq-abuse.html 185) <li>It seems that SORBS is putting some Tor server IPs on their email
faq-abuse.html 186) blacklist as well. They do this because they passively detect whether your
faq-abuse.html 187) server connects to certain IRC networks, and they conclude from this that
faq-abuse.html 188) your server is capable of spamming. We're working with them to teach them
faq-abuse.html 189) that not all software works this way. Until then, we recommend you avoid
faq-abuse.html 190) them, and teach your friends (if they use them) to avoid them too.</li>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     191) </ul>
abuse.html     192) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 193) <a name="IrcBans"></a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     194) <h3>Tor is banned from the IRC network I want to use.</h3>
abuse.html     195) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 196) <p>Sometimes jerks make use of Tor to troll IRC channels. This abuse
faq-abuse.html 197) results in IP-specific temporary bans ("klines" in IRC lingo), as the
faq-abuse.html 198) network operators try to keep the troll off of their network. </p>
faq-abuse.html 199) 
faq-abuse.html 200) <p>This response underscores a fundamental flaw in IRC's security model:
faq-abuse.html 201) they assume that IP addresses equate to humans, and by banning the
faq-abuse.html 202) IP address they can ban the human. In reality this is not the case --
faq-abuse.html 203) many such trolls routinely make use of the literally millions of open
faq-abuse.html 204) proxies and compromised computers around the Internet. The IRC networks
faq-abuse.html 205) are fighting a losing battle of trying to block all these nodes,
faq-abuse.html 206) and an entire cottage industry of blacklists and counter-trolls has
faq-abuse.html 207) sprung up based on this flawed security model (not unlike the antivirus
faq-abuse.html 208) industry). The Tor network is just a drop in the bucket here. </p>
faq-abuse.html 209) 
faq-abuse.html 210) <p>On the other hand, from the viewpoint of IRC server operators, security
faq-abuse.html 211) is not an all-or-nothing thing.  By responding quickly to trolls or
faq-abuse.html 212) any other social attack, it may be possible to make the attack scenario
faq-abuse.html 213) less attractive to the attacker.  And most individual IP addresses do
faq-abuse.html 214) equate to individual humans, on any given IRC network at any given time.
faq-abuse.html 215) The exceptions include NAT gateways which may be allocated access as
faq-abuse.html 216) special cases. While it's a losing battle to try to stop the use of open
faq-abuse.html 217) proxies, it's not generally a losing battle to keep klining a single
faq-abuse.html 218) ill-behaved IRC user until that user gets bored and goes away. </p>
faq-abuse.html 219) 
faq-abuse.html 220) <p>But the real answer is to implement application-level auth systems,
faq-abuse.html 221) to let in well-behaving users and keep out badly-behaving users. This
faq-abuse.html 222) needs to be based on some property of the human (such as a password he
faq-abuse.html 223) knows), not some property of the way his packets are transported. </p>
faq-abuse.html 224) 
faq-abuse.html 225) <p>Of course, not all IRC networks are trying to ban Tor nodes. After
faq-abuse.html 226) all, quite a few people use Tor to IRC in privacy in order to carry
faq-abuse.html 227) on legitimate communications without tying them to their real-world
faq-abuse.html 228) identity. Each IRC network needs to decide for itself if blocking a few
faq-abuse.html 229) more of the millions of IPs that bad people can use is worth losing the
faq-abuse.html 230) contributions from the well-behaved Tor users. </p>
faq-abuse.html 231) 
faq-abuse.html 232) <p>If you're being blocked, have a discussion with the network operators
faq-abuse.html 233) and explain the issues to them. They may not be aware of the existence of
faq-abuse.html 234) Tor at all, or they may not be aware that the hostnames they're klining
faq-abuse.html 235) are Tor exit nodes.  If you explain the problem, and they conclude that
faq-abuse.html 236) Tor ought to be blocked, you may want to consider moving to a network that
faq-abuse.html 237) is more open to free speech.  Maybe inviting them to #tor on irc.oftc.net
faq-abuse.html 238) helps them show that we are not all evil people. </p>
faq-abuse.html 239) 
Andrew Lewman Updated faq-abuse.html to m...

Andrew Lewman authored 19 years ago

faq-abuse.html 240) <p>Finally, if you become aware of an IRC network which seems to be
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 241) blocking Tor, or a single Tor exit node, please put that information on <a
faq-abuse.html 242) href="http://wiki.noreply.org/wiki/TheOnionRouter/BlockingIrc">BlockingIrc</a>
faq-abuse.html 243) so that others can share.  At least one IRC network consults that page
faq-abuse.html 244) to unblock exit nodes which have been blocked inadvertently. </p>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     245) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 246) <a name="SMTPBans"></a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     247) <h3>Your nodes are banned from the mail server I want to use.</h3>
abuse.html     248) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 249) <p>Even though <a href="#WhatAboutSpammers">Tor isn't useful for
faq-abuse.html 250) spamming</a>, some over-zealous blacklisters seem to think that all
faq-abuse.html 251) open networks like Tor should be boycotted. They don't understand how
faq-abuse.html 252) Tor works (e.g. that it has exit policies), and don't seem to care to
faq-abuse.html 253) understand it. If your server administrators decide to make use of these
faq-abuse.html 254) blacklists to refuse incoming mail, you should have a conversation with
faq-abuse.html 255) them and explain how Tor works. </p>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     256) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 257) <a name="Bans"></a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     258) <h3>I want to ban the Tor network from my service.</h3>
abuse.html     259) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 260) <p>First, ask yourself if there's a way to do application-level decisions
faq-abuse.html 261) to separate the legitimate users from the jerks. For example, you might
faq-abuse.html 262) have certain areas of the site, or certain privileges like posting,
faq-abuse.html 263) available only to people who are registered. You could set up this
faq-abuse.html 264) distinction only for certain IP addresses such as Tor exit nodes. This
faq-abuse.html 265) way you can have multi-tiered access and not have to ban everything. </p>
faq-abuse.html 266) 
faq-abuse.html 267) <p>Second, consider that thousands of people use Tor every day to protect
faq-abuse.html 268) against data-gathering corporations like Doubleclick while going about
faq-abuse.html 269) their normal  activities. Some Tor users may be legitimately connecting
faq-abuse.html 270) to your service right now to carry on normal activities. You need to
faq-abuse.html 271) decide whether banning the Tor network is worth losing the contributions
faq-abuse.html 272) of these users, as well as potential future such users. </p>
faq-abuse.html 273) 
faq-abuse.html 274) <p>Lastly, please remember that Tor servers have individual exit
faq-abuse.html 275) policies. Many Tor servers do not allow exiting connections at
faq-abuse.html 276) all. Many of those that do, probably already disallow connections to
faq-abuse.html 277) your service. When you go about banning nodes, you should parse the
faq-abuse.html 278) exit policies and only block the ones that allow these connections;
faq-abuse.html 279) and you should keep in mind that exit policies can change (as well as
faq-abuse.html 280) the overall list of nodes in the network). </p>
faq-abuse.html 281) 
faq-abuse.html 282) <p>If you really want to do this, there is a
faq-abuse.html 283) python script to parse the Tor directory <a
faq-abuse.html 284) href="http://tor.eff.org/cvs/tor/contrib/exitlist">here</a>. </p>
faq-abuse.html 285) 
faq-abuse.html 286) <a name="LegalQuestions"></a>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     287) <h3>I have legal questions about Tor abuse.</h3>
abuse.html     288) 
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 289) <p>We're only the developers. We can answer technical questions, but
faq-abuse.html 290) we're not the ones to talk to about legal questions or concerns. </p>
faq-abuse.html 291) 
faq-abuse.html 292) <p>Please take a look at the <a
faq-abuse.html 293) href="http://tor.eff.org//eff/tor-legal-faq.html">Tor Legal FAQ</a>,
faq-abuse.html 294) and contact EFF directly if you have any further questions. </p>
Andrew Lewman First draft of an abuse page.

Andrew Lewman authored 19 years ago

abuse.html     295) 
Andrew Lewman Updated faq-abuse.html to m...

Andrew Lewman authored 19 years ago

faq-abuse.html 296)   </div><!-- #main -->
faq-abuse.html 297)   </div>
faq-abuse.html 298)     <div class="bottom" id="bottom">
Roger Dingledine clean up faq-abuse page; ad...

Roger Dingledine authored 19 years ago

faq-abuse.html 299)       <i><a href="mailto:tor-webmaster@freehaven.net" class="smalllink">Webmaster</a></i> - $Id$
Andrew Lewman Updated faq-abuse.html to m...

Andrew Lewman authored 19 years ago

faq-abuse.html 300)     </div>