• tatterdemalion@programming.dev
    link
    fedilink
    English
    arrow-up
    51
    ·
    edit-2
    2 months ago

    It seems irrelevant whether this person is using encrypted channels if they failed to maintain anonymity. If they distributed material and leaked any identifying info (e.g. IP address), then it would be trivial for investigators or CIs to track them down.

    • ours@lemmy.world
      link
      fedilink
      English
      arrow-up
      18
      ·
      2 months ago

      Likely, data may have been encrypted but he may have leaked compromising metadata. Even more likely it was bad operation security linking a personal identity to his anonymous persona.

      I’m always thankful for incompetent criminals.

      • technocrit@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        8
        ·
        2 months ago

        Thankfully it seems pretty unrealistic that someone addicted to CSAM would maintain perfect OpSec over a lifetime of abuse.

    • Trainguyrom@reddthat.com
      link
      fedilink
      English
      arrow-up
      15
      ·
      2 months ago

      In the list of apps he was using I don’t see any mention of a VPN. How much you want to bet he raw dogged it with encrypted apps over the clearnet so it was trivial to leak his real IP address

      • Baalial@lemm.ee
        link
        fedilink
        English
        arrow-up
        6
        ·
        2 months ago

        He posted the AI filth to a “public server”, so I’m willing to bet his plan was just full of holes. I don’t mind pedos getting taken down, buy I do mind encrypted software being owned by the government - any government.

    • Clent@lemmy.world
      link
      fedilink
      English
      arrow-up
      13
      arrow-down
      1
      ·
      2 months ago

      It sounds like he created material, not only AI but actual children then distributed it. The tools to track down the creators of CASM is only getting better.

      A single legal image of any of those children posted to social media is going to allow algorithms to make the match and its routine detective work from there.

      It only takes one child to talk. No amount of encryption is going to stop that.

    • addictedtochaos@lemm.ee
      link
      fedilink
      English
      arrow-up
      6
      ·
      2 months ago

      i watched some documatnary about hackers, and usually, they catch them because they talk way to mouch about themselves.

    • rottingleaf@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      All this is obvious.

      Since nobody pressures Signal and Wire in Europe, it really seems to me that the pressure is mostly applied to those who do have the ability to spy upon their users.

      That would be too optimistic about humanity, but maybe not. What if.