Tor exit node operator gets raided by police

http://www.npr.org/sections/alltechconsidered/2016/04/04/472992023/when-a-dark-web-volunteer-gets-raided-by-the-police


Comments


[15 Points] Lolsteroids:

Running a tor exit node from your home is just looking at getting raided. Its like saying "It's fine, you can remotely use my computer to do illegal stuff. In fact, so much illegal shit will happen on my computer that It even gives me plausible deniability!"


[4 Points] psyopsec:

dark web volunteer

exit node

Lel, lernhowtorworks, npr. Exit nodes are not used for routing Hidden Service traffic, they are only used when exiting to clearnet. Hence the name exit nodes.

The Legal FAQ for Tor Relay Operators.

Abuse FAQ

Also, i hate the term "Dark Web". I prefer "Cipherspace". The definition of "dark web" or "darknet" = anything that is not indexed by search engines. Cipherspace = encrypted, anonymous web.


[2 Points] None:

This has happened before


[2 Points] Bobrosshappytreesman:

He brought up a good point. He wasn't there the watch them access his computer. They could have bugged his computer to grant access to his tor relay. Knowing full well he wasn't the guy behind the "picture" they used to grant a warrant.


[1 Points] sapiophile:

For example, when Seattle police showed up at David Robinson's home shortly after 6 a.m. last Wednesday, he figured he had little choice but to let them in and hand over all his computer passwords.

#DoingItWrong

If he's using full disk encryption with a decent passphrase (and there's no excuse not to, these days), he should have powered off all his equipment, stayed silent, and let them take everything to their lab to rip their hair out in frustration for a few weeks. It's not like he can trust any of the equipment that they touched in his house after that, anyway. Doesn't matter if it goes to the lab or they just stick a USB flash drive in - at that point, he's owned. But he can at least prevent them from getting the evidence they want.