this post was submitted on 21 Oct 2023
595 points (97.4% liked)
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
54788 readers
690 users here now
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
💰 Please help cover server costs.
Ko-fi | Liberapay |
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
ACAB? Also, I'll get back to this
And only people with similar politics to you will ever gain that understanding? Again, more on this
And countries around the world are increasingly pushing legislature to make "anonymization" and "encryption" tools illegal (or at least require backdoors).
Which gets back to the politics aspect. Even among those of us who care about personal security (which, again, has nothing to do with torrenting but here we are), the likelihood of others to use it for nefarious and evil purposes is a problem. I've taught a few journalist friends how to use tor but I personally do not because that, and tools like i2p, tend to also be used for csam and I have pretty strong morals and ethics about not facilitating the dissemination of that.
And, as we remember once or twice a year, there are "hacktivist" groups out there who like to have a field day. And compromising tools used for the distribution of csam is something that many groups do.
But also? Those piece of shit cops and governments trying to get their fascism on? It is a lot easier to push for "extreme measures" when it is going up against pedophiles and child abuse. We saw similar with how the US (and other western nations) cracked down on immigration under the guise of "stopping the Muslims from doing another 9-11". And we are likely to see similar come out of the Israel/Palestine war.
MAYBE you get a really good lawyer so that you can get off on... Maybe you get a really good lawyer who cites the proper legal precedents AND a judge AND a jury who actually care about that. You have still had your reputation ruined for "being a pedophile" and laws are already being pushed to make using any of these tools illegal to begin with. And The People will generally support it because CSAM.
And getting back to "an IP address isn't enough": Yes, some judges have decided that. Was it Avatar that was the big case people like to cite? Been a minute. But that doesn't stop other judges who just don't give a shit about precedent still providing the subpoenas. And considering that getting the equivalent of a peer list requires "understanding the i2p network statistics console": There are likely to be additional "fingerprints" involved. I've not spend much time looking at said console so am assuming there is nothing as stupid as a mac address, but it becomes a lot harder to say "Old Lady Withers across the street was using my wifi".
Just because people are stupid and this is the inevitable drive by from the peanut gallery:
No, I am not saying that everyone who uses tor or i2p or whatever are pedophiles. What I am saying is that those are tools that are pretty notorious for being used to distribute and share csam. And while some people are okay with "Oh yeah, my private browsing of this website helped to mask child porn but I personally didn't look at or share any", I am not.
Your scenario would specifically require the cops to ask their techs for a detailed report and then deliberately lie about it's conclusions to attack completely random people, and just FYI the last few rounds of this happened when public WiFi was new and the cops kept losing so badly in courts that this doesn't really happen much anymore. You don't even need a great lawyer, just an average one who can find the precedence.
There's no "additional fingerprints" of relevance binding any node in a tunnel to the communications in the tunnel. It uses PFS and multiple layers of encryption (tunnels within tunnels). They need to run a debugger against their node to have any chance to really argue that a specific packet came from a specific node, which also would ironically simultaneously prove that node didn't actually know and was just a blind relay (just like how mailmen aren't liable for content of packages they deliver).
Your argument is literally being used to argue that nobody should have privacy because those who don't break laws don't need it, yet you yourself are arguing for why we still need privacy if we haven't broken laws. The collateral damage when such tools aren't available is so much greater than when privacy tools are available. One of the greatest successes of Signal is how its popularity makes each of its users part of a "haystack" (large anonymity set) and targeting individual users just for using it is infeasible, protecting endless numbers of minorities and other at-risk individuals.
In addition, it's extremely rare that mass surveillance like spying on network traffic leads to prosecutions. It's usually infiltration that works, so you running an I2P node will make zero difference.