All the recent dark net arrests seem to be pretty vague on how the big bad was caught (except the IM admin’s silly opsec errors) In the article they say he clicked on a honeypot link, but how was his ip or any other identifier identified, why didnt tor protect him.

Obviously this guy in question was a pedophile and an active danger, but recently in my country a state passed a law that can get you arrested if you post anything the government doesnt like, so these tools are important and need to be bulletproof.

  • Possibly linux
    link
    fedilink
    English
    920 days ago

    No

    Any even if it were what else would you use? There is no other software that comes close

        • @refalo
          link
          219 days ago

          everything has some weaknesses

          • Possibly linux
            link
            fedilink
            English
            119 days ago

            In this case it is worse than Tor can be. In the future it is likely to get better but for now it is vulnerable to De-Anonymization attacks. Also it is very easy to see if someone is using i2p and that alone can get you into trouble.

            • @refalo
              link
              219 days ago

              the same can be said for tor

              • Possibly linux
                link
                fedilink
                English
                -119 days ago

                Tor isn’t perfect. Nothing is

                The problem with i2p is that it could put people in serious danger if you live in a country with aggressive anti free speech and privacy laws