• mox@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    97
    ·
    edit-2
    3 months ago

    Neither Tor nor end-to-end encrypted messengers will cover the endpoints. It’s possible that they caught him using good old fashioned detective work. You don’t need a software back door for that.

    • mkwt@lemmy.world
      link
      fedilink
      English
      arrow-up
      11
      ·
      3 months ago

      Well it probably wasn’t a Vic Mackey-style rubber hose attack, because it sounds like this chump is getting hauled into court.

    • Vilian@lemmy.ca
      link
      fedilink
      English
      arrow-up
      11
      ·
      3 months ago

      Tor was created by NSA, half of Tor servers are run by NSA, not that secure

      • psmgx@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        ·
        3 months ago

        Tor was created by the Naval Research Labs, and was released to the public because it is secure.

        The problem is that if it’s only the CIA or DIA using it, it’s easy figure out who is using it and where. Make it global and now there is a lot of noise to separate out.

        • Vilian@lemmy.ca
          link
          fedilink
          English
          arrow-up
          1
          ·
          3 months ago

          Yeah, the security of tor relies on the nodes being different, but when most of them are owned by the same person/government body the security go downhill, sadly i2p isn’t that popular, because every person is a node

    • Lost_My_Mind@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      3 months ago

      Please don’t talk about child predators, and use the term “back door” in the same sentence. It ain’t right…

      • yoshisaur@lemm.ee
        link
        fedilink
        English
        arrow-up
        38
        ·
        3 months ago

        we’re talking about encryption here, not…that. please get your mind out of the gutter