this post was submitted on 23 Jul 2023
444 points (100.0% liked)
Technology
39227 readers
407 users here now
A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.
Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.
Subcommunities on Beehaw:
This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.
founded 3 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
He wasn't searching for it or knowingly distributing it. The way Tor exit nodes work is that you're hosting a machine that lets other people on the Tor network communicate with the internet. You're essentially routing a portion of the entire network's traffic through your machine. You can't really control who is using it or what it transmits at that point.
He got punished because somebody else shared CP, using his equipment to do so. It's like being jailed for having your car stolen and being used to hit a pedestrian.
This is the first I've heard of it. Why would someone willingly host an exit node when the risks are so high?
Because Iranian women deserve to tell their stories. Because Ukrainian soldiers need the most secure relays for their messaging services possible. Because the Chinese government's great firewall is designed to keep people from seeing reality. Because Facebook, Amazon, Netflix, and Google want to control the future of the web, and that future includes willing participation in incomplete police action that gets minorities and people of color killed. Because control of your personal identity is a matter of grand security when it comes to preventing the most successful kinds of attacks: social engineering. Because all of these things can either be accomplished with a paid VPN owned by a corporation who might ALSO be complicit in all of the problems above, or they can be acheived on donated computing time, and be more effective in their application.
Child porn happens on the internet. I don't see anyone clamoring to shut down the whole thing. So which do you want? To destroy every single tool that can be used to acquire it, or to foster a more fact and policy based government that performs root cause analyses and works to make a better society rather than doling out punishment and asking quearions later
You can even add half the USA with their anti abortion laws to your list! Remember people, what you have to hide is not yours to decide.