this post was submitted on 24 Jul 2023
325 points (99.7% liked)

Technology

58431 readers
4252 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Man Found Guilty of Child Porn, Because He Ran a Tor Exit Node::undefined

you are viewing a single comment's thread
view the rest of the comments
[–] BadRS@lemmy.world 80 points 1 year ago (4 children)

It’s encrypted, encrypted many times over, it’s completely anonymous… as long as you’re staying inside the network. An exit node connects to the regular internet and that’s what’s going to start showing up on logs. This was completely secure for the people actually dealing in cp.

I can’t believe this stuck, it’s the equivalent of arresting a business owner because someone distributed cp while connected to their Wi-Fi.

[–] wackster_fapster@lemmynsfw.com 26 points 1 year ago* (last edited 1 year ago) (2 children)

CP laws (in the US and probably other places) fall under a doctrine called strict liability, which basically means that you're guilty regardless of intent or even knowledge of an offense.

It's fucked.

[–] BadRS@lemmy.world 4 points 1 year ago (2 children)

There isn't a crime worse than hurting children. Does that mean we should allow law enforcement infinity leeway to punish these crimes and persue the offenders? I hate to ever give law enforcement any leeway as abuse is so common, but if someone is hurting children I don't care how you stop it.

Is hosting a tor exit nods with the knowledge that doing so might help pedophiles hurting children? That feels like too many layers to me. Too esoteric.

[–] TechnoBabble@lemm.ee 8 points 1 year ago (1 children)

I hate to ever give law enforcement any leeway as abuse is so common, but if someone is hurting children I don't care how you stop it.

Is this satire? Because that's exactly the excuse government has been giving for hundreds of years, to take your freedoms away.

It's never about the children. The Catholic church operating with near total immunity, after all these millennia of abuse, is proof of that.

[–] BadRS@lemmy.world 2 points 1 year ago

You're right and I agree completely. My ACAB hat slips when they bring up kinds. Which is, of course, their intent.

[–] abraxas@sh.itjust.works 1 points 8 months ago

Every person and business that has any wifi or server on the internet "might help pedophiles hurting children". Amazon S3? Could hypothetically be used in CP (actually almost definitely is used for CP by somebody).

Your email address? Could be used by somebody malicious for CP. Which means if you think it's that important to stop pedophiles hurting children, you should shut it down.

And in fact, Lemmy is decentralized and can absolutely be used (let's be honest, somebody probably already is somewhere) to distribute CP. We should be openly opposing Lemmy now, right?

...boiling down to the real problem. There are so many uses for Tor that have nothing to do with CP and so few Tor users that deal in CP. Privacy is a valuable thing and we should not be murdering privacy for all people in hope it might stop 1 or 2% of child predators.

[–] ryannathans@lemmy.world 2 points 1 year ago

Yet isps aren't affected

It's quite possible he had either a public defender or a poor attorney. I am friends with an attorney who works with the poor, indigent, and people otherwise unable to fight for themselves. I help him out for free when he has questions related to technology and IT. I really need to read up on Tor because there might come a time when I'll need to assist my friend in a similar matter. It's quite chilling that the state could potentially punish a business owner for providing a free service like WiFi. I have another friend who runs a the neighborhood sports bar and she offers WiFi to her customers. I think I need to implement some content filtration for her so as to prevent her from potentially getting blamed for a crime she did not commit.

[–] db2@lemmy.one 9 points 1 year ago* (last edited 1 year ago) (1 children)

Which has probably happened. It's (shady uses, not necessarily this use) one of the reasons there was a big push to get consumers to put a password on their wifi back in the day.

[–] Motavader@lemmy.world 11 points 1 year ago (1 children)
[–] db2@lemmy.one 6 points 1 year ago (2 children)

Yep. Routers used to come wide open out of the box, you had to actively secure them. They come with reasonable initial security now probably because of things like that.

[–] FoxBJK@midwest.social 9 points 1 year ago

In this context (running a tor exit node) none of that would matter. You can't choose to run an exit node and then try to feign innocence or ignorance. It's why I have deep respect for anyone willing to run an exit node because you're taking on MASSIVE risk for absolutely no reward.

[–] abraxas@sh.itjust.works 2 points 8 months ago

"used to". Xfinity includes a public access point on my router that I'm not able to turn off. They used to lie about it and deny it until too many people caught on.

[–] sloppy_diffuser@sh.itjust.works 8 points 1 year ago (1 children)

Not completely secure. If the same entity controls the entry and exit nodes (any maybe also relay?), it is my understanding that traffic can be traced back. Low probability, yes, but not completey.

[–] TechnoBabble@lemm.ee 3 points 1 year ago

And guess who's got a lot of funding to run honey pot nodes?