pull down to refresh
related posts
10 sats \ 0 replies \ @02b2d85ce4 15 Jan 2023 freebie
good reason to switch tor connections relays every few minutes to reduce risk of them being able to do this. Or have a proxy computer in a seperate location as you that you connect to as well
reply
68 sats \ 6 replies \ @jp 14 Jan 2023
TLDR: article gives no answer. There is an active, anti-terrorism case going on and the defendant asked for evidence about how the IP & traffic was confirmed to be host and the FBI doesn't want to release it's methods to the courts/public
reply
11 sats \ 3 replies \ @orthzar 15 Jan 2023
This should kill the FBI's case, since illegally-obtained evidence is automatically inadmissable in court (cf. fruit of the poisonous tree). If the only way to obtain evidence is through illegal means (e.g. unconstitutional wiretapping), then the evidence is inadmissible. But as we saw in the Ross Ulbright case, judges can arbitrarily overrule that protection against illegally-obtained evidence.
reply
10 sats \ 0 replies \ @crypt0cranium 15 Jan 2023 freebie
A "CALEA" warrant approved by a judge makes it legal for US citizens. Federal intelligence have abused the secret FISA process established by the Patriot Act after 9/11. Foreign subjects do not require a warrant under FISA.
reply
0 sats \ 1 reply \ @gandlaf21 15 Jan 2023
in a banana republic the fed can overrule everything
reply
0 sats \ 0 replies \ @satdeck OP 15 Jan 2023
Add even with the weakest cases the Feds get a 99% convection rate. It is ridiculous.
reply
1 sat \ 1 reply \ @crawdaddy 14 Jan 2023 freebie
Well if the guy is lucky they will drop charges instead of having to disclose
3 sats \ 1 reply \ @arcanox 14 Jan 2023
The only thing that springs to mind is a Sybil attack, which is a major vulnerability of Tor. Basically, if your message is encrypted by 3 separate computers (relays), then feds could simply pose as independent relays themselves. By relaying your message between each other, they could effectively deanonymize you.
reply
10 sats \ 0 replies \ @l0k18 15 Jan 2023
This is a very expensive attack, it would require 3000 routers to be set up to get a 1/3 chance of catching timing data. Some believe this is how they got Silk road. The tiny number of nodes compared to users makes it a lot cheaper than it could be if there was any incentive to run relays.
reply
0 sats \ 0 replies \ @l0k18 15 Jan 2023
A sybil attack to catch a terrorist would still be one hell of a case budget. I think he just used an app that leaked data. Every other day I'm sure the Tor browser is patching more and more of these. Browser technology is a dense thicket of privacy leaks.
There's been too many such cases altogether (this is the second I hear) to not be of the opinion that privacy technology needs a reboot. Roger has failed us.
reply