• mox@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      7 months ago

      Neither Tor nor end-to-end encrypted messengers will cover the endpoints. It’s possible that they caught him using good old fashioned detective work. You don’t need a software back door for that.

      • Lost_My_Mind@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        7 months ago

        Please don’t talk about child predators, and use the term “back door” in the same sentence. It ain’t right…

        • yoshisaur@lemm.ee
          link
          fedilink
          English
          arrow-up
          1
          ·
          7 months ago

          we’re talking about encryption here, not…that. please get your mind out of the gutter

    • Wilzax@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 months ago

      If you distribute encrypted materials you also need to distribute a means of decryption. I’m willing to bet a honeypot was used to trick him into distributing his csam right to the government hinself.

    • CrazyLikeGollum@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 months ago

      He didn’t use encrypted everything. He had a public telegram group chat in which he stored a lot of his material. Which, as many people in the comments on the article pointed out, is not encrypted, but is presented by telegram as if it is. That’s likely how they caught him.