• @Wilzax@lemmy.world
      link
      fedilink
      English
      939 months ago

      If you distribute encrypted materials you also need to distribute a means of decryption. I’m willing to bet a honeypot was used to trick him into distributing his csam right to the government hinself.

        • Cakey
          link
          fedilink
          English
          1
          edit-2
          9 months ago

          Hey, could I get some info on the

          Full running browser in his SIM card

          Thing?

          I’m quite curious and haven’t been able of finding anything on the internet about it

    • mox
      link
      fedilink
      English
      79
      edit-2
      9 months ago

      Neither Tor nor end-to-end encrypted messengers will cover the endpoints. It’s possible that they caught him using good old fashioned detective work. You don’t need a software back door for that.

      • @mkwt@lemmy.world
        link
        fedilink
        English
        109 months ago

        Well it probably wasn’t a Vic Mackey-style rubber hose attack, because it sounds like this chump is getting hauled into court.

      • @Vilian@lemmy.ca
        link
        fedilink
        English
        -69 months ago

        Tor was created by NSA, half of Tor servers are run by NSA, not that secure

        • @psmgx@lemmy.world
          link
          fedilink
          English
          59 months ago

          Tor was created by the Naval Research Labs, and was released to the public because it is secure.

          The problem is that if it’s only the CIA or DIA using it, it’s easy figure out who is using it and where. Make it global and now there is a lot of noise to separate out.

          • @Vilian@lemmy.ca
            link
            fedilink
            English
            19 months ago

            Yeah, the security of tor relies on the nodes being different, but when most of them are owned by the same person/government body the security go downhill, sadly i2p isn’t that popular, because every person is a node

      • @Lost_My_Mind@lemmy.world
        link
        fedilink
        English
        -519 months ago

        Please don’t talk about child predators, and use the term “back door” in the same sentence. It ain’t right…

        • @yoshisaur@lemm.ee
          link
          fedilink
          English
          329 months ago

          we’re talking about encryption here, not…that. please get your mind out of the gutter

    • @CrazyLikeGollum@lemmy.world
      link
      fedilink
      English
      719 months ago

      He didn’t use encrypted everything. He had a public telegram group chat in which he stored a lot of his material. Which, as many people in the comments on the article pointed out, is not encrypted, but is presented by telegram as if it is. That’s likely how they caught him.

    • Angry_Autist (he/him)
      link
      fedilink
      English
      29 months ago

      It’s better they don’t disclose it and catch more people doing the same.

      I’m all for transparency but if that means less caught child molesters, I’m ok with a little obfuscation, even from the fucking pigs.

  • @jqubed@lemmy.world
    link
    fedilink
    English
    939 months ago

    This whole thing is horrifying, but the last paragraph is especially disturbing:

    Since Herrera himself has a young daughter, and since there are “six children living within his fourplex alone” on Joint Base Elmendorf-Richardson, the government has asked a judge not to release Herrera on bail before his trial.

    Even more disturbing is it said he was also producing content.

  • @catloaf@lemm.ee
    link
    fedilink
    English
    54
    edit-2
    9 months ago

    The Ars article seems to suggest that they were able to crack his phones pretty easily, which is a bit scary. I don’t see anything about a computer.

    Although it doesn’t appear he was actually using any encryption apps to store material; rather, he used a fake calculator app as password protection. Obviously not the brightest bulb in the drawer.

    • Snot Flickerman
      link
      fedilink
      English
      519 months ago

      The material was allegedly stored behind password protection on his phone(s) but also on Mega and on Telegram, where Herrera is said to have “created his own public Telegram group to store his CSAM.” He also joined “multiple CSAM-related Enigma groups” and frequented dark websites with taglines like “The Only Child Porn Site you need!”

      My guess would honestly be Telegram. For starters, they aren’t end-to-end encrypted by default, you have to turn it on. The only end-to-end encryption that Telegram offers is their “secret chats” which are only available between two users. Groups are not encrypted.

      • Terrasque
        link
        fedilink
        English
        159 months ago

        So telegram’s delusional propaganda did something good for once?

        • @BearOfaTime@lemm.ee
          link
          fedilink
          English
          29 months ago

          What propaganda?

          That groups aren’t encrypted is documented. If you don’t know that, it’s because you didn’t bother to see how it works.

    • @chimera@lemm.ee
      link
      fedilink
      English
      159 months ago

      I honestly don’t think he really had any opsec apart from those few applications, look at what tools he was using, what a joke. Fake calculator app to store files are great to protect from your parents, not the FBI.

      He was clearly using Android and I bet he was using the stock rom, kyc sim card, and not even a vpn behind tor.

      Don’t get me wrong, I’m very happy and relieved he was caught, but if he had done serious research and did a better opsec, it wouldn’t have been so easy for the authorities to get him

    • RVGamer06
      link
      fedilink
      English
      5
      edit-2
      9 months ago

      Phones are horseshit for OPSec, always. Every darknet admin and their dog know that.

  • @tatterdemalion@programming.dev
    link
    fedilink
    English
    46
    edit-2
    9 months ago

    It seems irrelevant whether this person is using encrypted channels if they failed to maintain anonymity. If they distributed material and leaked any identifying info (e.g. IP address), then it would be trivial for investigators or CIs to track them down.

    • @ours@lemmy.world
      link
      fedilink
      English
      169 months ago

      Likely, data may have been encrypted but he may have leaked compromising metadata. Even more likely it was bad operation security linking a personal identity to his anonymous persona.

      I’m always thankful for incompetent criminals.

    • @Trainguyrom@reddthat.com
      link
      fedilink
      English
      149 months ago

      In the list of apps he was using I don’t see any mention of a VPN. How much you want to bet he raw dogged it with encrypted apps over the clearnet so it was trivial to leak his real IP address

      • @Baalial@lemm.ee
        link
        fedilink
        English
        59 months ago

        He posted the AI filth to a “public server”, so I’m willing to bet his plan was just full of holes. I don’t mind pedos getting taken down, buy I do mind encrypted software being owned by the government - any government.

    • @Clent@lemmy.world
      link
      fedilink
      English
      119 months ago

      It sounds like he created material, not only AI but actual children then distributed it. The tools to track down the creators of CASM is only getting better.

      A single legal image of any of those children posted to social media is going to allow algorithms to make the match and its routine detective work from there.

      It only takes one child to talk. No amount of encryption is going to stop that.

    • @addictedtochaos@lemm.ee
      link
      fedilink
      English
      69 months ago

      i watched some documatnary about hackers, and usually, they catch them because they talk way to mouch about themselves.

    • @rottingleaf@lemmy.world
      link
      fedilink
      English
      19 months ago

      All this is obvious.

      Since nobody pressures Signal and Wire in Europe, it really seems to me that the pressure is mostly applied to those who do have the ability to spy upon their users.

      That would be too optimistic about humanity, but maybe not. What if.

    • @chakan2@lemmy.world
      link
      fedilink
      English
      39 months ago

      And…that’s still not how he got caught. He hit a child porn honey pot and they got his IP.

      I would have assumed all his AI work was local on his own server.

  • Ellia Plissken
    link
    fedilink
    English
    219 months ago

    saw a headline the other day about the gov’t tracking people on tor using Google ads

    • @linearchaos@lemmy.world
      link
      fedilink
      English
      239 months ago

      I’m still not entirely convinced that tor is as protected as people think it is.

      There’s only something like 6,000 exit nodes. It really wouldn’t be that much money for the government to run thousands of them. If you monitor enough exit nodes and enough relays, you can start to statistically tie connections back together with timing analysis.

      I don’t know this to be the case for sure but I can’t imagine the government hasn’t pushed towards breaking the security and identifiability of the tor network

      • @Snowclone@lemmy.world
        link
        fedilink
        English
        99 months ago

        If you read a lot of news, it’s really clear Tor isn’t protecting anyone from the FBI. It’s about as effective as using limewire at this point. Which also, the reporting makes it pretty clear it’s not effective to hide criminal acts in the least. But it’s pretty great abusers think it’s effective so they get caught.

        • @0x0@programming.dev
          link
          fedilink
          English
          79 months ago

          If you read the news it’s really clear people commit opsec mistakes - all it takes is one - and get caught.

          • @Snowclone@lemmy.world
            link
            fedilink
            English
            19 months ago

            The inciting thought of most criminal acts is ‘‘they’ll never catch me’’. Which if you’re as lucky as me, you’ll know you’ll get caught everytime, and they’ll make an example of you. It’s kept my nose clean a long time.

      • yeehaw
        link
        fedilink
        English
        29 months ago

        It’s not as protected as people think it is. This has popped up on headlines for years. It helps, but if someone really wants to find you on there, they can. It’s just not as easy.

  • @chimera@lemm.ee
    link
    fedilink
    English
    119 months ago

    It is also because of people like him that laws like Going Dark become plausible to the eyes of the politicians and the masses

  • @sumguyonline@lemmy.world
    link
    fedilink
    English
    -49 months ago

    It’s all publicly approved backdoors until feds are planting child abuse imagery on your PC because you spoke out against them in the wring venue. No one will believe you when they do. Currently you can’t trust articles like this, maybe the dude was actually hurting kids. Maybe the feds just needed a win. You won’t ever know, and neither will I so long as the same ideology is in control. Now watch them turn every single kid in the pics into a sex offender because the fed believes if you were raped, you WILL rape someone in the future. But by all means keep enjoying their rage bait.