Tuesday, February 12, 2019

and they shouldnt have to risk anything to get the word out

these kinds of cases bring up a few parallels

Misuse of Tor end nodes are fairly common. Back in 2008, a man was arrested by German police after bomb threats passed through his Tor node, and similarly, they confiscated all electronics--hardware, software, and threatened imprisonment because someone abused his generosity. These kinds of cases bring up a few parallels. Should the Austrian government sue Google for having illegal data flowing through its servers? Were not only talking about images or bomb threats. Warez, kidnapping, extortion, bribery, espionage, a long laundry list of crimes occur on a daily basis via their search engine, and though Google cooperates with law enforcement (as Weber did), when was the last time you heard Googles servers confiscated by a court order?

And then there is encryption. Should Drivecrypt and Truecrypt developers be held liable for helping illegal enterprises? Truecrypt is a software used quite heavily by Mexican cartels as well as organized crime in the United States. Law enforcement, particularly the FBI, tends to shoot first and ask questions later. Maybe. If theyre in a good mood (or ordered to by a judge). Meanwhile, your electronics are confiscated and your reputation damaged.

The entire ordeal has been setting dangerous precedent for years, as any average Joe who just happens to pass some part of an illegal data packet through his connection (or unsecured WiFi) can be prosecuted. Furthermore, police are not known for their technical aptitude, in Austria or anywhere else. They took his Xbox360 and anything else plugged in that looked about as complex as a toaster. We mustnt allow Tor node operators to be scapegoats. If Tor dies, innocent people die. They wont get the word out about corrupt government actions without risking their own lives. And they shouldnt have to risk anything to get the word out.