Bitcoin Forum
June 21, 2024, 02:38:59 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Freedom Hosting attack - why?  (Read 1076 times)
domob (OP)
Legendary
*
Offline Offline

Activity: 1135
Merit: 1166


View Profile WWW
August 07, 2013, 10:27:55 AM
 #1

I've been thinking recently a little about the attack with compromised sites on Freedom Hosting (http://www.wired.com/threatlevel/2013/08/freedom-hosting/), and can't really make sense out of it.  Of course, the attack seemed to be successful in uncovering the identities of some of the people who tried to access sites on Freedom Hosting (and got a "Down for Maintainance" page instead according to the reports).

But what exactly does this use the FBI?  All they have is a proof someone tried to access a particular .onion site - but didn't succeed in accessing any illegal material because they took it down already.  Is this already a criminal offence for which they can hope to jail those people, even though there's no proof that they actually accessed such material (like child porn) in the past?  At least as far as I know the laws in my country, that would be difficult to argue in court (apart from the fact that I'm not sure how evidence gained by such an attack would be valued).  If they on the other hand just wanted to identify "suspects" in order to investigate further and search their computers, I think that everyone of those people should have heard about the attack already and just wiped their computers.

What am I missing here?

Use your Namecoin identity as OpenID: https://nameid.org/
Donations: 1domobKsPZ5cWk2kXssD8p8ES1qffGUCm | NMC: NCdomobcmcmVdxC5yxMitojQ4tvAtv99pY
BM-GtQnWM3vcdorfqpKXsmfHQ4rVYPG5pKS | GPG 0xA7330737
/dev/null
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250


View Profile
August 07, 2013, 10:38:53 AM
 #2

They tried to get ip but got caught.

FreedomCoin
Hero Member
*****
Offline Offline

Activity: 675
Merit: 507


Freedom to choose


View Profile
August 07, 2013, 12:38:21 PM
 #3

I think its a guilty by association thing they were going for.

Foxpup
Legendary
*
Offline Offline

Activity: 4396
Merit: 3062


Vile Vixen and Miss Bitcointalk 2021-2023


View Profile
August 07, 2013, 12:49:12 PM
 #4

Accessing these sites after they were taken down is not illegal, but it is probable cause to get a warrant to seize your computer and arrest you for any illegal material you might have already saved to your hard drive, assuming you were dumb enough to not use encryption.

Will pretend to do unspeakable things (while actually eating a taco) for bitcoins: 1K6d1EviQKX3SVKjPYmJGyWBb1avbmCFM4
I am not on the scammers' paradise known as Telegram! Do not believe anyone claiming to be me off-forum without a signed message from the above address! Accept no excuses and make no exceptions!
Spendulus
Legendary
*
Offline Offline

Activity: 2898
Merit: 1386



View Profile
August 07, 2013, 11:10:39 PM
Last edit: August 08, 2013, 12:49:27 AM by Spendulus
 #5

Accessing these sites after they were taken down is not illegal, but it is probable cause to get a warrant to seize your computer and arrest you for any illegal material you might have already saved to your hard drive, assuming you were dumb enough to not use encryption.
Then again, honeypot sites attract the bees, don't they?

Here is my question.  If you or I wrote the same little code that launched through javascript to all computers accessing a website, such code constructed to report back to us the surfing behavior of ALL VISITORS TO THAT WEBSITE , we would have done something illegal.

Did the FBI do something illegal here?  If yes, why and in what circumstances would that hold?  If no, why?

For example, would they be justified in tracking all users to the "AQ BMB MAEKIN SIT"?

How about a virus to track all users to "Reddit"?

Remember, we are discussing tracking through a downloaded virus.  And this is done in an attempt to negate the design goals of the Tor browser.

Going a step further.  Would it have been legal for the NSA to target US citizens with this virus?  What about local police?  How about the Dept. of Agriculture?  The IRS?

And so the cancer metastasizes....
domob (OP)
Legendary
*
Offline Offline

Activity: 1135
Merit: 1166


View Profile WWW
August 08, 2013, 05:45:22 AM
 #6

Accessing these sites after they were taken down is not illegal, but it is probable cause to get a warrant to seize your computer and arrest you for any illegal material you might have already saved to your hard drive, assuming you were dumb enough to not use encryption.

Yes.  But it must have been clear to them that the code would be discovered soon - and now everyone who cares at least a little about security should have read about it and wiped their computers.  Or do you think they speculate on lots of people not even realising the problem and removing incriminating stuff?

Use your Namecoin identity as OpenID: https://nameid.org/
Donations: 1domobKsPZ5cWk2kXssD8p8ES1qffGUCm | NMC: NCdomobcmcmVdxC5yxMitojQ4tvAtv99pY
BM-GtQnWM3vcdorfqpKXsmfHQ4rVYPG5pKS | GPG 0xA7330737
tacoman71
Sr. Member
****
Offline Offline

Activity: 320
Merit: 250



View Profile
August 08, 2013, 10:06:05 PM
 #7

I heard that the founder started to accept bitcoin payments and the FBI traced those to a bank account, which naturally, had a name attached.

Feeling generous? Like my post? Leave a tip at BTC: 1NZJ8cceqEiKDZGAJged2vNGCyfFMUEYPt
Mike Christ
aka snapsunny
Legendary
*
Offline Offline

Activity: 1078
Merit: 1003



View Profile
August 08, 2013, 10:33:55 PM
 #8

I heard that the founder started to accept bitcoin payments and the FBI traced those to a bank account, which naturally, had a name attached.

I guess no one told him that Bitcoin was only pseudonymous?

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!