this post was submitted on 08 Aug 2023
124 points (97.0% liked)

Technology

34388 readers
252 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
top 17 comments
sorted by: hot top controversial new old
[–] [email protected] 27 points 1 year ago* (last edited 1 year ago) (4 children)

I love me some privacy but have always been skeptical of Tor because I am afraid that I am acting as a relay for CSAM, which, even if encrypted I am not okay with.

Is that fear unfounded? To be honest I don’t really know how Tor works aside from some broad strokes.

[–] [email protected] 18 points 1 year ago* (last edited 1 year ago) (2 children)

No, by running a relay or exit node you are opting in to routing traffic that could contain CSAM. This is a problem with all anonymous unmoderated distributed systems like Tor. With Freenet, for example, you're even opting in to storing it (pieces of it in encrypted form that can't be accessed without the content hash key).

Privacy is good but so is censorship (moderation). The censorship just needs to be implemented by an accountable group of people that share the same interests of the users. Tor is trying to solve a problem that can only be solved through social struggle with institutions of power.

[–] [email protected] 7 points 1 year ago

There always needs to be an uncensored option, but it doesn't have to be the same option most people use day to day. One region's "accountable group of people" is another region's authoritarian police state.

Tor isn't just used by CSAM creators and distributors, but also journalists, resistance fighters, and refugees. The only way it works is if regular traffic is mixed with sensitive traffic, otherwise there are methods to uncover the source of sensitive traffic.

If you run a relay, you will be transmitting encrypted CSAM, but you'll also be transmitting journalist correspondence with sensitive sources, coordination with refugees from brutal regimes, etc. You can't really pick and choose, and that's the whole point and why it can be so useful to people in danger.

I don't think lemmy or ActivityPub should tolerate CSAM, so I'm not implying that censorship is always bad, only that there needs to be an uncensored channel available.

[–] [email protected] 5 points 1 year ago (1 children)

Not unfounded, person was arrested recently for being an exit node used for CSAM

[–] [email protected] 2 points 1 year ago (2 children)

In which country? In most countries you just have to send LE a boilerplate email saying your run a Tor node and they'll leave you alone.

[–] [email protected] 10 points 1 year ago (2 children)

Austria was the country. There is a few wrinkles here. They found cp on one of the hard drives, they had text logs of him offering to host cp on a server, and in the end he was sentenced to 3 years probation.

[–] [email protected] 6 points 1 year ago (1 children)

they had text logs of him offering to host

Well, that explains everything. It's not the Tor node, it's that he was offering to host it.

[–] [email protected] 1 points 1 year ago

It certainly does!

[–] [email protected] 1 points 1 year ago

So it sounds like he wasn't just relaying it then...

[–] [email protected] 2 points 1 year ago

This is new to me, and I would be very surprised if that has any (positive) effect.

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

It's always double edge. Don't you have anything to hide? Who need end to end encryption apart of pedos and terrorists? If you really want 100% security, then just give up 100% of your freedom.

[–] [email protected] 2 points 1 year ago (2 children)
[–] [email protected] 4 points 1 year ago* (last edited 1 year ago)

Child sexual assault material

[–] [email protected] 4 points 1 year ago (1 children)

Probs intended to write CSAM - Child Sexual Abuse Material

[–] [email protected] 1 points 1 year ago

Correct, it was a typo that I have since corrected.

[–] [email protected] 19 points 1 year ago

I love this! I'm going to contact my local uni's tech dept to see if that's something they'd be interested in participating in if they're not already.

load more comments
view more: next ›