Hacker Newsnew | comments | show | ask | jobs | submit login

Criminals (and worse) use all sorts of things, including technology, that everyone else uses. By your logic, the FBI should execute seizure warnings against GMail, Yahoo mail and Facebook... every time they have "evidence that criminal emails passed through that server."

Frankly, your logic makes no practical sense.




> Criminals (and worse) use all sorts of things, including technology, that everyone else uses. By your logic, the FBI should execute seizure warnings against GMail, Yahoo mail and Facebook... every time they have "evidence that criminal emails passed through that server."

They do, actually, except most of the time they don't bother with the warrant, and it doesn't make the news because neither law enforcement nor the companies involved have any interest in disclosing it.

If secure anonymization technologies become a lot more common, law enforcement organizations will eventually learn not to bother. Until then, anyone running such a service (such as a Tor exit node) should expect to have this happen to them periodically.

-----


The FBI should absolutely execute a seizure warrant against those companies, if doing so is effective, but:

- Those companies probably have too many servers and too much data to make seizing all of it productive.

- Those companies would be less likely to be effected, as they have backups and redundant servers for handling outages.

- Those companies keep records that they provide to law enforcement when presented with a warrant or subpoena.

It's 100% ok to run an anonymizing remailer, with no backup strategy in place. It's retarded to act surprised and indignant when the server gets seized because it was probably used to commit a crime.

-----


It's retarded to act surprised and indignant when the server gets seized because it was probably used to commit a crime.

Did you read the press release? Riseup was not running the anonymizing remailer, it just happened to be on the same physical machine as some of Riseup's infrastructure/e-mail accounts/listservs/etc.

From the press release:

The seized server was operated by the European Counter Network (“ECN”), the oldest independent internet service provider in Europe, who, among many other things, provided an anonymous remailer service, Mixmaster, that was the target of an FBI investigation into the bomb threats against the University of Pittsburgh.

-----


Good point. Then it's ok to be surprised. This is a non-obvious risk of shared hosting.

-----


Further, Public Enemy Number 1 (Bin Laden) purportedly used basically no direct network technology to disseminate his bidding he used a sneakernet to get info to various folks.

EDIT:

Obviously the person down voting me is not aware of how Bin Laden used USB sticks...

http://news.techworld.com/security/3279773/bin-laden-used-us...

-----




Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | DMCA | Apply to YC | Contact

Search: