Search Mailing List Archives

Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] JonDonym (was: Security Focused Live Linux Distros)

Fabian Keil freebsd-listen at
Fri Sep 13 03:55:44 PDT 2013

Eugen Leitl <eugen at> wrote:

> On Thu, Sep 12, 2013 at 05:08:10PM -0400, John Love wrote:
> > I'm researching security, privacy, and anonymity focused live Linux
> > environments like Liberté Linux, TAILS, JonDoNYM, and Whonix. There's
> JonDoNYM is backdoored, and hence not playing in the same league.
> In July 2003, the German BKA[8][9] obtained a warrant to force the Dresden
> Mix operators to log access to a specific web address, which had been
> associated with child pornography. AN.ON then decided to introduce a
> crime detection function in the server software in order to make this
> possible.

I don't think so.

According to:
the backdoor was implemented after being politely asked by the
LKA Hessen without any legal obligation to do so.

The warrant came afterwards and apparently didn't even require the
mix operators to enable the already implemented backdoor (due to being
based on StPO §§ 100 g and h) but the operators decided to do it anyway.

Later on the logged data was handed over to the officials "under protest"
because it was more convenient than potentially getting equipment seized:

| To prevent further damage (through searching of institute rooms and
| confiscation of institute computers) to the TU Dresden and the project
| partners, the logged data was relinquished under protest to the officials.

Given that the court decision was already overruled in September,
it's unlikely that the seized computers would have been analysed in
time (that is, if they were actually seized in the first place).


More information about the liberationtech mailing list