"Article 5 eV, a civil rights group helping to maintain the Tor network, has reported that German police raided the private address where the non-profit was registered.

The authorities came knocking at the Essen-based office on August 16th, 2024, the group said, with armed officers spending nearly two hours in the office. Article 5 eV facilitates Tor network by operating its exit nodes.

“There are obviously still people working in German law enforcement today, who think that harassing a node-operator NGO would somehow lead to the de-anonymization of individual Tor users. At least that is what they claim in the paperwork,” Gero Kühn, the leader of the group, said…"

  • shortwavesurfer@lemmy.zip
    link
    fedilink
    arrow-up
    20
    ·
    2 months ago

    Then why aren’t they catching more “criminals”? Also, why hasn’t the $600,000 US dollar bounty from the IRS been claimed?

    • NuXCOM_90Percent@lemmy.zip
      link
      fedilink
      arrow-up
      13
      ·
      edit-2
      2 months ago

      I can’t speak to monero specifically

      But:

      • Why aren’t they catching more criminals? They are. They just are finding alternate sources of evidence. Dick Wolf shows love to talk about how cops need to protect themselves from any poison fruit and blah blah blah. The reality is that they immediately go to the poison fruit and use that to make a plausible excuse for why they investigated something else that can confirm information they got from the illegal source. If you’ve ever wondered why they would think to investigate a random unrelated company that ends up being the smoking gun…
      • Why didn’t anyone claim the bounty? Because the CIA and the like don’t want people to know they compromised it?

      Back in my pure research days it was always fun to guess what the latest “big thing” was actually about. It was especially fun when you would be looking for funding opportunities and see really weird stuff that made no sense for the org sponsoring it but would have made perfect sense for a different 3LA.

      It was ALSO real fun to totally never notice when certain funding opportunities dried up and then there was a big push in the news about how we need to outlaw technology those opportunities totally didn’t already compromise.

      Like, for the better part of a decade The Big Thing was graph analysis techniques. And the number of kids who had no idea they were basically writing algorithms to process social media (especially twitter) was downright sad. And the people who DID realize what their work was geared toward? They applied for jobs where they got paid a lot more to do exactly that without needing to pretend it is actually about data storage technologies or optimizing cell tower load.

      And… let’s just say that most of those algorithms ALSO apply toward cryptocurrencies and transaction logs (since they had great applications for bank transactions…) and even doing a number on tumblers and so forth.

      • kbal@fedia.io
        link
        fedilink
        arrow-up
        10
        ·
        2 months ago

        I too don’t know much about monero specifically, however:

        Parallel construction is still a thing, yes. But so is spreading the false idea that everything is already compromised so there’s no point trying to defend yourself.

        • NuXCOM_90Percent@lemmy.zip
          link
          fedilink
          arrow-up
          6
          ·
          2 months ago

          No. There is every reason to “defend yourself”. The key is to actually be aware of what research and efforts are out there and minimizing your risk profile any time you are dealing with a black box.

          I mean, it is known that people can pick locks. Do you plug your ears every time you hear someone talk about how doors can be compromised? Or do you give up on everything and remove every single deadbolt in your home?

          Or… do you do a bit of research and figure out what you can do to make your home harder to break into. Whether it is sturdier screws, a reinforced doorjam, or other methods?

          • kbal@fedia.io
            link
            fedilink
            arrow-up
            3
            ·
            2 months ago

            Well then, what specific research do you have suggesting that monero has been broken? After all it is not in any way a “black box”. The algorithm is well known.

            • kbal@fedia.io
              link
              fedilink
              arrow-up
              6
              ·
              2 months ago

              … not that I especially trust Monero much; not even as much as Tor. What I object to is the tendency to be too quick to go ahead with the assumption that it probably has been broken even in the total absence (such as in this thread so far) of any evidence to demonstrate that.

              It’s the same misguided instinct that leads people to believe that all encryption is futile, that the NSA already knows all the keys no matter what we do. It’s not really true. It is true they can easily compromise the security and privacy of any one of us normal people they choose to single out, but for those of us who don’t practise unreasonably strict op-sec the point of choosing secure and private modes of communication (including monero if your sense of morality allows for the use of a proof-of-work cryptocurrency) is not to protect one target against all possible threat models. And it’s not only to protect against lesser threats. Much of the time the most important thing is to contribute to the effort to make it impossible for anyone to systematically spy on the whole world all at once. Nobody should have that power.

      • shortwavesurfer@lemmy.zip
        link
        fedilink
        arrow-up
        4
        ·
        2 months ago

        Interesting information, although I’m not the one best suited to process it, I would recommend you posting this to something like the skepticism Sunday threads on !monero@monero.town. If it truly has been broken, they are managing to keep it very quiet. And if it has been broken, then there’s a good chance that the vast majority of encryption has also been broken, such as HTTPS.