←back to thread

989 points heavyset_go | 7 comments | | HN request time: 1.165s | source | bottom
Show context
1970-01-01 ◴[] No.45262018[source]
It's very important to get the official source on this one. Husband was legally restricted and being monitored by the FBI, so he decided to go install a VM to bypass the monitoring. It's not so much bravery against authority as it is hubris that got him 3 years.

https://rockenhaus.com/wp-content/uploads/2025/09/U.S.-v.-Ro...

replies(2): >>45262767 #>>45263274 #
1. NotMichaelBay ◴[] No.45262767[source]
Since it seems to have been glossed over in the court transcript, can anyone explain how exactly a VM or client for remote VM could be used to bypass the monitoring?

Wouldn't the monitoring software capture any application's network activities, including a client for a Remote VM? I'm imagining something like Wireshark?

replies(2): >>45263225 #>>45263261 #
2. nusl ◴[] No.45263225[source]
A VM would bypass monitoring software installed on devices the person uses. A VPN would obscure their traffic such that it is encrypted and not easily monitored. Even something like SSH is encrypted and not straight-forward to monitor, so a VPN isn't required to do this anyway.

A remote VM would combine both of these things, where the device/computer is in a location that isn't monitored and accessed by means aimed at bypassing controls in place. Activities carried out from the remote VM are then not monitored.

User + Devices -> VPN/other -> Remote VM -> Unmonitored Activities / Network Access

^ Monitoring is here, but may not capture the rest of the chain

Law enforcement would need to monitor the VM itself to monitor those activities, or I guess request logs from the provider if at all possible.

There's a limit to how much you can monitor someone and I assume there's a degree of good faith in cooperation with these controls. Failure to comply, seemingly, has severe consequences.

replies(2): >>45263441 #>>45263869 #
3. Almondsetat ◴[] No.45263261[source]
Monitoring software installed at the OS level can monitor both traffic and what applications generate it. But if the traffic is coming from a VM, it can only do the former.
4. NotMichaelBay ◴[] No.45263441[source]
Okay, that makes sense. But the monitoring software should capture the connection request to the VPN or Remote VM?
5. rnhmjoj ◴[] No.45263869[source]
> A VM would bypass monitoring software installed on devices the person uses.

Not really, no: a VM is just another userspace application and a monitoring software should be able to capture its traffic just fine. If he was also using a VPN, tor or conneting to a remote machine that's another story, but only saying he was using a VM doesn't really mean much.

replies(1): >>45274392 #
6. dns_snek ◴[] No.45274392{3}[source]
It's possible to pass PCI devices directly to the VM at which point they don't exist as far as the host OS is concerned. You can pass an entire USB hub to the VM and anything plugged into it is invisible to the host OS (at least by default).
replies(1): >>45286378 #
7. rnhmjoj ◴[] No.45286378{4}[source]
Ok, but you certainly need root privileges to do that, in that case you could bypass the monitoring software in many other ways.