1. MagusNet.com
  2. MagusNet.net
  3. MagusNet.org
  4. Torduckin.com
  5. Torduckin.net
  6. Torduckin.org

The MagusNet Anonymous Public Proxy (TORDUCKIN) FAQ

Q. How often do the MagusNet Anonymous Public Proxy Severs Software get updated?
A. Ferdinand 2.5 has been stable and nothing has needed to be done beyond normal operating system updates.

Q. How often do the MagusNet Anonymous Public Proxy Severs get updated?
A. All Servers are reloaded every hour from read-only media.
This is done for both system/user security and to enable rapid deployment of any number of identically configured servers.
The reload process automatically deletes all system data (configurations, password, logs, files, keys, etc.).

Q. How often do the OpenVPN 2048 bit SSL Certificates get updated?
A. OpenVPN acccess files are automatically deleted and generated every 6 hours.
Mon May 16 08:08:48 2011 us=140544 TLS_ERROR: BIO read tls_read_plaintext error:error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed

Q. What do you mean when you say "100% diskless"?
A. The MagusNet Anonymous Public Proxy servers are deleted from RAM/memory and rebuilt from scratch using a custom CDROM.
The entire environment runs in a set of distributed virtual machine images in less than 512MB of RAM
and includes the Tor Onion Site Service for Collaboration.
Nothing is ever written to or stored on any disks, read/write media, or in any databases.
If our systems ever get seized or have power removed, all existing data is lost forever.

Q. Does the MagusNet Public Proxy log IP addresses?
A. No.
There is no use for any permanent logging of any information. Usage statistics are analyzed to detect abuses and deleted when the systems are re-deployed. Logging of source and/or destination IP addresses is never attempted or built in to any of our servers for any reason and that policy is in place to preserve anonymity. There is no data rentention because we don't need any.

Q. Is the Collaboration Server Safe?
A. The new policy as of January 2013 is to delete the entire virtual machine that houses the Collaboration Server and deploy a new system from scratch. I do not backup any data that runs in the Torduckin virtual environment. I do not maintain any access to any data stored on any of my servers that can be used in any way, shape, or form, to trace or otherwise attempt to identify any of my users. The only way I can provide some level of safety is to delete everything on a regular basis using automation. When in doubt, always use some form of encryption whenever you are communicating with anyone.

Q. What do you know about securing data?
A. Every server we build is created as a Virtual Machine(VM). Every VM virtual disk is encrypted with 128-bit AES-CBC and stored on a physical volume that is also encrypted using Twofish. The decryption keys for each VM are randomly generated by creating a random number, encrypting that number with Gnu Privacy Guard ( GnuPG ) and using a SHA-256 hash of that output. Each of these hashes are then encrypted before being stored in a database. This is designed so that no human being ever knows what the encryption/decryption keys are for any VM in use. When a VM is decomissioned, all of its information is wiped from all databases and filesystems using two rounds of Bruce Schneier's Algorithm. This isn't perfect and may change over time as we discover better protection mechanisms. For now, it is a sound method to protect MagusNet, LLC. and our users in the event of a warrant, data breach, or any type of system seizure.

Q. Where are the systems that provide these services located?
A. All MagusNet, LLC. privacy related servers have been placed based on the criteria:
1. MagusNet, LLC. Virtual Machines must be outside the borders and jurisdiction of the United States of America.
2. MagusNet, LLC. Virtual Machines must not be located in any MLAT [mutual legal assistance treaty] or Intelligence Sharing agreement countries.
3. MagusNet, LLC. Virtual Machines must be deployed at pseudo-random intervals and locations for reliability in the event of unrelated seizures.
These criteria are subject to change/update as geopolitical changes take place.
REFERENCE ONLINE: Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations(PDF)
REFERENCE LOCAL: Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations(PDF)

Copyright 1997-2017 MagusNet, LLC. All Rights Reserved.
Domain Family: