←back to thread

276 points leonry | 6 comments | | HN request time: 0s | source | bottom
Show context
Arubis ◴[] No.41889117[source]
Best of luck to the author! My understanding is that anything that makes large file sharing easy and anonymous rapidly gets flooded with CSAM and ends up shuttering themselves for the good of all. Would love to see a non-invasive yet effective way to prevent such an incursion.
replies(10): >>41889269 #>>41889987 #>>41890019 #>>41890075 #>>41890376 #>>41890531 #>>41890775 #>>41892233 #>>41893466 #>>41896754 #
neilv ◴[] No.41890775[source]
Do we know whether this uploading is motivated by actual pedo reasons, by anti-pedo honeypot reasons, by sociopathic trolling reasons, by sabotage reasons (state, or commercial), or something else?

It's discouraging to think that privacy&security solutions for good people might end up being used primarily by bad people, but I don't know whether that's the situation, nor what the actual numbers are.

replies(1): >>41891039 #
1. Barrin92 ◴[] No.41891039[source]
It is just pedophiles. A user posted here on HN a while ago that they ran a Tor exist node and the overwhelming majority of it was CSAM or other cybercrime. Here in Germany they busted some underground forum and a single individual had 35TB worth of it at home. There's no great conspiracy, the criminal underworld is huge and they use every service that doesn't clamp down on it in some form.
replies(3): >>41891697 #>>41894830 #>>41896624 #
2. neilv ◴[] No.41891697[source]
That's discouraging, if true. I don't mind doing the occasional on-principle thing (like running Tor Browser for general-purpose browsing, and Tor as the VPN plugin on my phone), and maybe it's a citizen-technologist obligation to do my share of that. But I'd rather not have some Orwellian Bayesian system flagging me for using Tor.
replies(1): >>41894491 #
3. 1oooqooq ◴[] No.41894491[source]
run a node. but never an exit one.
4. jmorenoamor ◴[] No.41894830[source]
Naive question. Isn't tor supposed to be private? How can you know the contents of the communication just by running a node?
replies(1): >>41894899 #
5. LikesPwsh ◴[] No.41894899[source]
If it's an exit node, you know what the user is connecting to but not which user.
6. immibis ◴[] No.41896624[source]
How would they know their traffic was csam? Traffic passing through an exit node is traffic between a Tor user and the open Internet. Who's running csam servers on the open Internet instead of as hidden services? And without https? Especially when Tor Browser enforces https? This story doesn't add up at all.

They did bust a site owner despite Tor, though. That story's true.