• @Wilzax@lemmy.world
      link
      fedilink
      English
      939 months ago

      If you distribute encrypted materials you also need to distribute a means of decryption. I’m willing to bet a honeypot was used to trick him into distributing his csam right to the government hinself.

        • Cakey
          link
          fedilink
          English
          1
          edit-2
          9 months ago

          Hey, could I get some info on the

          Full running browser in his SIM card

          Thing?

          I’m quite curious and haven’t been able of finding anything on the internet about it

    • mox
      link
      fedilink
      English
      79
      edit-2
      9 months ago

      Neither Tor nor end-to-end encrypted messengers will cover the endpoints. It’s possible that they caught him using good old fashioned detective work. You don’t need a software back door for that.

      • @mkwt@lemmy.world
        link
        fedilink
        English
        109 months ago

        Well it probably wasn’t a Vic Mackey-style rubber hose attack, because it sounds like this chump is getting hauled into court.

      • @Vilian@lemmy.ca
        link
        fedilink
        English
        -69 months ago

        Tor was created by NSA, half of Tor servers are run by NSA, not that secure

        • @psmgx@lemmy.world
          link
          fedilink
          English
          59 months ago

          Tor was created by the Naval Research Labs, and was released to the public because it is secure.

          The problem is that if it’s only the CIA or DIA using it, it’s easy figure out who is using it and where. Make it global and now there is a lot of noise to separate out.

          • @Vilian@lemmy.ca
            link
            fedilink
            English
            19 months ago

            Yeah, the security of tor relies on the nodes being different, but when most of them are owned by the same person/government body the security go downhill, sadly i2p isn’t that popular, because every person is a node

      • @Lost_My_Mind@lemmy.world
        link
        fedilink
        English
        -519 months ago

        Please don’t talk about child predators, and use the term “back door” in the same sentence. It ain’t right…

        • @yoshisaur@lemm.ee
          link
          fedilink
          English
          329 months ago

          we’re talking about encryption here, not…that. please get your mind out of the gutter

    • @CrazyLikeGollum@lemmy.world
      link
      fedilink
      English
      719 months ago

      He didn’t use encrypted everything. He had a public telegram group chat in which he stored a lot of his material. Which, as many people in the comments on the article pointed out, is not encrypted, but is presented by telegram as if it is. That’s likely how they caught him.

    • Angry_Autist (he/him)
      link
      fedilink
      English
      29 months ago

      It’s better they don’t disclose it and catch more people doing the same.

      I’m all for transparency but if that means less caught child molesters, I’m ok with a little obfuscation, even from the fucking pigs.