- ID de l'analyse :
- b24f5399-a92b-4373-8627-8c53ef094d35Terminée
- URL soumise :
- https://lv2.encryptedconnection.info/
- Fin du rapport :
Liens : 10 trouvé(s)
Liens sortants identifiés à partir de la page
Lien | texte |
---|---|
https://multivpn.to | |
https://web.archive.org/web/20200131013910/http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_tools.html | create, sell, and trade |
https://web.archive.org/web/20200131013908/http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_distributing_your.html | more powerful networks |
https://www.law.cornell.edu/uscode/text/18/2707 | 18 USC 2707 |
https://www.law.cornell.edu/uscode/text/17/512 | DMCA "safe harbor" provisions |
https://community.torproject.org/relay/community-resources/eff-tor-legal-faq/tor-dmca-response/ | EFF's prepared response |
https://multivpn.to/ips.txt | web-page |
https://www.torproject.org | Tor Project |
https://www.eff.org | Electronic Frontier Foundation |
https://chat.openai.com | ChatGPT |
Variables JavaScript : 3 trouvée(s)
Les variables JavaScript globales chargées dans l'objet fenêtre d'une page sont des variables déclarées en dehors des fonctions et accessibles depuis n'importe quel endroit du code au sein du champ d'application actuel
Nom | Type |
---|---|
onbeforetoggle | object |
documentPictureInPicture | object |
onscrollend | object |
Messages de journal de console : 1 trouvé(s)
Messages consignés dans la console web
Type | Catégorie | Enregistrement |
---|---|---|
warning | other |
|
HTML
Le corps HTML de la page en données brutes
<!DOCTYPE html><html lang="ru"><head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="robots" content="noindex,nofollow">
<link href="/style.css" type="text/css" rel="stylesheet">
<link rel="shortcut icon" href="/favicon.ico" type="image/x-icon">
<link href="/fonts/fonts.css" rel="stylesheet" type="text/css">
<title>This is a VPN Exit Router</title>
<style>
body {
text-align: center;
}
.container {
margin: 0 auto;
max-width: 800px;
}
</style>
</head>
<body>
<div class="container">
<br>
<table style="width:100%;">
<tbody><tr>
<td style="background:url('bg.png'); padding:10px; text-align:center; vertical-align:middle;">
<h1>This is a VPN Exit Router</h1>
<br>
<p><a href="https://multivpn.to" target="_blank" title=""><img src="/logo.jpg" alt=""></a></p>
<br>
<p>You are most likely accessing this website because you've had some issues with the traffic coming from this IP address. This router is part of the MultiVPN Anonymity Network, which is dedicated to providing privacy to people who need it the most: average computer users. This router's IP address should be generating no other traffic, unless it has been compromised.</p>
<p>MultiVPN works by running user traffic through a chain of encrypted servers and then letting the traffic exit the MultiVPN network through an exit node, like this one. This design makes it very hard for a service to know which user is connecting to it, since it can only see the IP address of the MultiVPN exit node.</p>
<br>
<p><img src="/vpn.jpg" alt=""></p>
<br>
<p>MultiVPN is used by many important segments of the population, including whistleblowers, journalists, Chinese dissidents circumventing the Great Firewall and repressive censorship, victims of abuse, persecutors, military and law enforcement agencies, to name a few. Although MultiVPN is not intended for malicious computer users, it is true that they can use the network for malicious purposes. However, in reality, the actual number of abuses is quite small. This is largely due to the fact that criminals and hackers have significantly better access to privacy and anonymity than regular users, whom they are targeting. Criminals can and do <a href="https://web.archive.org/web/20200131013910/http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_tools.html" target="_blank" title="">create, sell, and trade</a> much larger and <a href="https://web.archive.org/web/20200131013908/http://voices.washingtonpost.com/securityfix/2008/08/web_fraud_20_distributing_your.html" target="_blank" title="">more powerful networks</a> every day. Thus, according to the MultiVPN service administration, the public need for easily accessible, censorship-resistant, private, and anonymous communication outweighs the risk of unqualified wrongdoers, who are almost always easier to detect through traditional police work than through extensive monitoring and surveillance.</p>
<br>
<p>In terms of applicable law, the best way to understand MultiVPN is to consider it a network of routers operating as common carriers, much like the Internet backbone. However, unlike the Internet backbone routers, MultiVPN routers explicitly do not contain identifiable routing information about the source of a packet, and no single MultiVPN node can determine both the origin and destination of a given transmission.</p>
<br>
<p>As such, there is little the operator of this router can do to help you track the connection further. This router maintains no logs of any of the traffic, so there is little that can be done to trace either legitimate or illegitimate traffic (or to filter one from the other). Attempts to seize this router will accomplish nothing.</p>
<br>
<p>Furthermore, this machine also serves as a carrier of email, which means that its contents are further protected under the ECPA. <a href="https://www.law.cornell.edu/uscode/text/18/2707" target="_blank" title="">18 USC 2707</a> explicitly allows for civil remedies ($1000/account plus legal fees) in the event of a seizure executed without good faith or probable cause (it should be clear at this point that traffic with an originating IP address of 185.72.86.85 / lv2.encryptedconnection.info should not constitute probable cause to seize the machine). Similar considerations exist for 1st amendment content on this machine.</p>
<br>
<p>If you are a representative of a company who feels that this router is being used to violate the DMCA, please be aware that this machine does not host or contain any illegal content. Also be aware that network infrastructure maintainers are not liable for the type of content that passes over their equipment, in accordance with <a href="https://www.law.cornell.edu/uscode/text/17/512" target="_blank" title="">DMCA "safe harbor" provisions</a>. In other words, you will have just as much luck sending a takedown notice to the Internet backbone providers. Please consult <a href="https://community.torproject.org/relay/community-resources/eff-tor-legal-faq/tor-dmca-response/" target="_blank" title="">EFF's prepared response</a> for more information on this matter.</p>
<br>
<p>That being said, if you still have a complaint about the router, you may email the <a href="mailto:[email protected]" target="_top" title="">maintainer</a>. If complaints are related to a particular service that is being abused, I will consider removing that service from my exit policy, which would prevent my router from allowing that traffic to exit through it. I can only do this on an IP+destination port basis, however.</p>
<br>
<p>You also have the option of blocking this IP address and others on the MultiVPN network if you so desire. The MultiVPN provides a <a href="https://multivpn.to/ips.txt" target="_blank" title="">web-page</a> to fetch a list of all IP addresses of VPN exit nodes that allow exiting to a specified IP:port. Please be considerate when using these options. It would be unfortunate to deny all MultiVPN users access to your site indefinitely simply because of a few bad apples.</p>
<br>
<p>© The text is based on materials from the <a href="https://www.torproject.org" target="_blank" title="">Tor Project</a> and the <a href="https://www.eff.org" target="_blank" title="">Electronic Frontier Foundation</a>.<br>The page was edited using <a href="https://chat.openai.com" target="_blank" title="">ChatGPT</a>.</p>
</td>
</tr>
</tbody></table>
<br>
</div>
</body></html>