• mox@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    7 months ago

    Neither Tor nor end-to-end encrypted messengers will cover the endpoints. It’s possible that they caught him using good old fashioned detective work. You don’t need a software back door for that.

    • Lost_My_Mind@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      arrow-down
      1
      ·
      7 months ago

      Please don’t talk about child predators, and use the term “back door” in the same sentence. It ain’t right…

      • yoshisaur@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 months ago

        we’re talking about encryption here, not…that. please get your mind out of the gutter