• Pigeon@beehaw.org
      link
      fedilink
      arrow-up
      6
      ·
      2 years ago

      It seems like yes, but also:

      To make matters worse, it appears that the admin targeted in the raid was in the middle of maintenance work which left would-be-encrypted material on the server available in unencrypted form at the time of seizure.

      • dan@upvote.au
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        2 years ago

        What type of maintenance work leaves the drive unencrypted?

        • The Doctor@beehaw.org
          link
          fedilink
          arrow-up
          3
          ·
          2 years ago

          The drive wasn’t encrypted, a not-encrypted database dump was on the laptop when the raid happened. It might have had to do with gearing up for the Mastodon update that caused us a lot of grief across Fedi a couple of weeks back. Or it could have been database server debugging; the timing was incredibly bad.

          • dan@upvote.au
            link
            fedilink
            arrow-up
            2
            ·
            edit-2
            2 years ago

            But if the drive wasn’t encrypted, how is it “would be encrypted material”?

            I’m surprised that people are hosting Mastodon servers without full disk encryption given the overhead isn’t significant plus the fact that people have private messages in the DB.