this post was submitted on 29 Aug 2024
13 points (88.2% liked)

Technology

59366 readers
3993 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 3 points 2 months ago* (last edited 2 months ago) (4 children)

It seems irrelevant whether this person is using encrypted channels if they failed to maintain anonymity. If they distributed material and leaked any identifying info (e.g. IP address), then it would be trivial for investigators or CIs to track them down.

[–] [email protected] 2 points 2 months ago (1 children)

In the list of apps he was using I don't see any mention of a VPN. How much you want to bet he raw dogged it with encrypted apps over the clearnet so it was trivial to leak his real IP address

[–] [email protected] 3 points 2 months ago

He posted the AI filth to a "public server", so I'm willing to bet his plan was just full of holes. I don't mind pedos getting taken down, buy I do mind encrypted software being owned by the government - any government.

[–] [email protected] 2 points 2 months ago

It sounds like he created material, not only AI but actual children then distributed it. The tools to track down the creators of CASM is only getting better.

A single legal image of any of those children posted to social media is going to allow algorithms to make the match and its routine detective work from there.

It only takes one child to talk. No amount of encryption is going to stop that.

[–] [email protected] 1 points 2 months ago

Likely, data may have been encrypted but he may have leaked compromising metadata. Even more likely it was bad operation security linking a personal identity to his anonymous persona.

I'm always thankful for incompetent criminals.

[–] [email protected] 1 points 2 months ago (2 children)

i watched some documatnary about hackers, and usually, they catch them because they talk way to mouch about themselves.

[–] [email protected] 1 points 2 months ago

This dude wasn't a hacker by any stretch