birdwatcher (birdwatcher) wrote,
birdwatcher
birdwatcher

True Names

Robinson and Bultmann had employed one of their computers—an old Asus Netbook—to run the software that makes the anonymity browser network possible, and specifically to run the riskiest node in the chain: the exit relay which provides the IP address ultimately associated with a user’s activity. In this case, someone used Tor to make the porn post, and his or her traffic had been routed through the computer in Robinson and Bultmann’s house. The couple wasn’t pleased to have helped someone post child porn to the internet, but that’s the thing about privacy-protective tools: They’re going to be used for good and bad purposes, and to support one, you might have to support the other.

“I haven’t run an exit relay since. The police told me they’d be back if it happened again,” Robinson said; he’s still running a Tor node, just not the end point anymore. “I have to take the threat seriously because I don’t want my wife or I to wake up with guns in our faces.”
http://fusion.net/story/349359/cops-and-ip-addresses/

Менты, конечно, скажут, что они совершенно обычные люди и что у них такая же работа, как любая другая.
Tags: преступление
Subscribe
  • Post a new comment

    Error

    default userpic
    When you submit the form an invisible reCAPTCHA check will be performed.
    You must follow the Privacy Policy and Google Terms of use.
  • 1 comment