Cops Are Raiding Homes of Innocent People Based Only On IP Addresses (fusion.net) 241
Kashmir Hill has a fascinating story today on what can go wrong when you solely rely on IP address in a crime investigation -- also highlighting how often police resort to IP addresses. In the story she follows a crime investigation that led police to raid a couple's house at 6am in the morning, because their IP address had been associated with the publication of child porn on notorious 4chan porn. The problem was, Hill writes: the couple -- David Robinson and Jan Bultmann -- weren't the ones who had uploaded the child porn. All they did was voluntarily use one of their old laptops as a Tor exit relay, a software used by activists, dissidents, privacy enthusiasts as well as criminals, so that people who want to stay anonymous when surfing the web could do so. Hill writes: Robinson and Bultmann had [...] specifically operated the riskiest node in the chain: the exit relay which provides the IP address ultimately associated with a user's activity. In this case, someone used Tor to make the porn post, and his or her traffic had been routed through the computer in Robinson and Bultmann's house. The couple wasn't pleased to have helped someone post child porn to the internet, but that's the thing about privacy-protective tools: They're going to be used for good and bad purposes, and to support one, you might have to support the other.Robinson added that he was a little let down because police didn't bother to look at the public list which details the IP addresses associated with Tor exit relays. Hill adds: The police asked Robinson to unlock one MacBook Air, and then seemed satisfied these weren't the criminals they were looking for and left. But months later, the case remains open with Robinson and Bultmann's names on police documents linking them to child pornography. "I haven't run an exit relay since. The police told me they'd be back if it happened again," Robinson said; he's still running a Tor node, just not the end point anymore. "I have to take the threat seriously because I don't want my wife or I to wake up with guns in our faces."Technologist Seth Schoen, and EFF Executive Director Cindy Cohn in a white paper aimed at courts and cops. "For many reasons, connecting an individual to a crime linked to an IP address, without any additional investigation, is irresponsible and threatens the civil liberties of innocent people."
"they'd be back if it happened again" (Score:4, Interesting)
Re: (Score:2)
"The police told me they'd be back if it happened again." For what crime? Is it normal for police in Canada to threaten to invade an innocent couple's home for doing something legal?
As someone else pointed out, Seattle WA; not Canada.
Anyway, there are a couple of other points to make here:
Re: (Score:2)
It depends on the police force. Sometimes they'll use a no-knock warrant - the one where they smash your door down and force everyone to the floor at gunpoint. But that's not their preferred procedure, it's only used if they believe the suspect may destroy evidence when they see a policeman at the door.
I'm somewhat surprised they didn't go with that approach, because any half-competent dealer in child pornography is going to pull the plug on their encrypted computer the instant they see a uniform.
Exit Nodes (Score:2)
It's /. so here we go. If you let anyone use your car, no questions asked, then you wouldn't be surprised if the cops traced the plates back to your house when it was used in a crime.
Re:Exit Nodes (Score:5, Insightful)
Tracking it back to you is fine.
Asking you if you know anything about the crime in question is fine.
Raiding your home at 0600 is not fine.
Threatening an innocent party not to participate in their legal activities is not fine
Re: (Score:2)
Raiding your home at 0600 is not fine.
Actually given how easy it is to destroy digital data it is necessary to surprise the person whose computer needs to be looked at.
Re: (Score:2)
Re: (Score:2)
Re:Exit Nodes (Score:5, Insightful)
Sure, so the cops rock up at the front door: "sir, do you own a black chevy impala", "yes sir I do", "were you driving it last night", "no sir, I lent it to a friend of mine", "can you tell us their name and contact details", "do I have to?", "by law, yes you do" [questionable, of course], "OK then sir, here they are, are we done?", "yes sir, have a nice evening", "you too".
Why would any of this require an armed response is absolutely insane. The entire scenario fabricated above can be applied equally to internet access.
Is this finally a legitimate car analogy?
Re: (Score:2)
I should hope so. This is perfectly legal. It may open you up to insurance issues but there's nothing illegal about lending something to a stranger, especially if you can prove it's still ongoing at the time of the sudden police raid.
IP V6 (Score:4, Funny)
Re: (Score:2)
do the iot dance
Re: (Score:3)
I remember a friend delivering a phone book to a boiler.
The reason : the boiler was connected to a phone line, probably for remote control. And because at that time, when you had a landline, a phone book was sent to the subscriber's address, the boiler had its phone book too.
Re:IP V6 (Score:5, Funny)
I once knew someone online who said she was into food porn.
It was sex...using food.
I didn't talk to her much after that. I'm not even 100% sure it was a "she".
thanks for helping me remember that.
Asshole.
Re: (Score:2)
I once knew someone online who said she was into food porn.
It was sex...using food.
I didn't talk to her much after that. I'm not even 100% sure it was a "she".
thanks for helping me remember that.
Asshole.
Was it onion rings?
Not for me anymore.... (Score:3, Interesting)
It's probably not a good idea to use Tor anymore. There was a time when it was very useful, especially as a tool for journalists and dissidents ETC.
My main use for it was as a remote testing platform. Which it excelled at. Heck- I even wrote a small section of the Tor website regarding Tor's use by IT professionals.
Now... there's so much scrutiny on the system that your presence there basically gets you tagged as "suspicious".
My decision to stop using Tor was based on the apparent numbers of pedophiles that were hiding on the darknet. In an effort to not be confused with "them"- I stopped using it.
YMMV- it's a risky proposition. If you've ever run an exit node (not me!!) you are a potential target for misguided law enforcement. Plus the fact you may be unwittingly be aiding illegal activity as a middle man node.
Not for me. Make sure you understand what you are doing if you participate.
Re:Not for me anymore.... (Score:5)
"Plus the fact you may be unwittingly be aiding illegal activity as a middle man node."
If your home network is compromised, or any of your home computers are compromised, then you are most likely being used as a relay for nefarious purposes.
It's actually easier to crack your neighbor's WiFi password, then use a disposable WiFi dongle with a random rotating MAC to connect to their network. Bonus points for compromising their PC and routing through that, but it's not strictly necessary. The true danger is not knowing when the game is up. To do this reliably and consistently you need to monitor the neighbor's coms and also put some trip wires in place to ensure you aren't caught out unawares. This is unwise to do locally for those reasons, but it's trivial to park up on a random street, find the weakest WiFi network, breach it, and either use it immediately, or leave a payload on local PCs so they can act as relays later on.
If you are reading this, go and change your passwords right now...that is, unless I'm already in your network and waiting for you to change your password so I can intercept the new value...social engineering for the win!!!!
Re:Not for me anymore.... (Score:4, Interesting)
We have a rather large area that's covered with open wifi at work.
We have had problems with abuse. The people that were loitering around the building after dark were leaving litter everywhere. So wifi now gets switched off at dark.
The wifi is still open the rest of the time. We actually had not noticed just how many people were using it until we started shutting it off at dark and then people started walking up to the building with their phone trying to get a signal.
I feel it's a public service there are a few others in town that still run free wifi 24/7 like the library, walmart and mcdonalds.
Not sure how ours got to be so popular. It's only got a 12 Mbps dsl line attached.
But other than that we've never had any issues.
Re: (Score:2)
I agree with you entirely, and I too run open WiFi wherever I can.
Unfortunately a sibling poster missed the point entirely. Please see my reply [slashdot.org] for a clarification: though I'm confident you got all that without too much difficulty.
Here in the UK there are vague legislative issues surrounding open WiFi, and the common belief is that the entity running the access point is somehow responsible for those who utilise it. Whether this is true or not doesn't matter, it plays right into the establishment and ensures
Re: (Score:2)
Jesus Christ that's crazy talk.
The entire point of my post was to highlight the difference between the perceived issues with running Tor, and the fact that most home networks are quite equally at risk of the same exposure.
The fundamental problem stems from a justice system that comes down heavily on very tenuous evidence. So whether you're running a Tor exit relay, or your home network is compromised, neither scenario justifies a SWAT raid at 6am.
That's the point. Make of it what you will.
Re: (Score:2)
"It's probably not a good idea to use Tor anymore. "
I run a Tor exit node with a VPN on the next door Starbucks, never had any problems.
Rights not excercised are rights lost (Score:2)
You should use Tor — and other systems intended to enhance privacy — just to keep it legal to use them. Rights not exercised are rights lost. This is also why you should be able to burn somebody's Holy Book every once in a while, refuse police' request to search your car, and carry (or, at least, own) a firearm.
Yep, that may very well have been the objective (even if secondary): let's go, guys, either we bust th
Re: (Score:2)
The public US court cases with an ip been tracked finally showed the per case budget and skills needed to trace any onion routing network user.
Re: (Score:2)
Best to keep Tor running 24/7. Not necessarily as an exit node, just the client is enough. Routing traffic for others. Then it becomes very difficult and resource intensive to even know when you are using it, because it balances traffic in and out so there isn't a spike.
I run it over a VPN anyway so all the cops would ever get is the address of a server in a random country and no logs or way to trace where it originated from.
Re: (Score:2)
You're no more aiding illegal activity by running a Tor nod of any kind than your ISP is by allowing network traffic. Or Verizon is with their 4G network. The Internet, in all it's forms, is used for an unfathomable amount of illegal activity. Nothing will stop it. Ever. Policing infrastructure is an absurd idea.
Right. I think you need to come up with better arguments.
The fact that nothing will stop illegal activity means noting: nothing will stop people from murdering each other, yet we have all these laws.
Policing the internet is a must, but we are at a point in our technological revolution where technology is way more advanced than our policing abilities. And, let's be honest, at a point where the public's trust in the police as an institution is at an all-time low.
That's the problem (Score:2)
That's the problem with Tor: Most people aren't brave enough (and, rightfully so) to operate an exit node because of the law enforcement repercussions. So, the only people that can operate exit nodes without repercussions is law enforcement. Which defeats the purpose of Tor.
Re: (Score:2)
Re: (Score:2)
That's the problem with Tor: Most people aren't brave enough (and, rightfully so) to operate an exit node because of the law enforcement repercussions. So, the only people that can operate exit nodes without repercussions is law enforcement. Which defeats the purpose of Tor.
And criminals. Notably ones in hard to prosecute countries.
Run a Tor exit node to conceal your illegal acts (Score:4, Insightful)
Re: (Score:2)
Could smart criminals just also run a Tor exit node, and just use it to blame anything that they get caught on?
Only if the police were dumb enough to look at a list of Tor exit nodes, find the IP there, and decide not to investigate the owner of that IP.
Re: (Score:2)
Running an exit node might provide plausibly deniability in court though.
Re: (Score:2)
It doesn't make sense, smart criminals wouldn't attract the police, they would just use tor, there is no gain in running an exit node.
If the couple in question didn't unlock their notebook to prove their innocence they would face a legal battle to get it back from the State.
In the same situation, the criminal would lose his electronics and keep praying for the statute of limitations to go faster than the technology to unlock computers (or an image of his HD) with current cryptography.
Re: (Score:3)
Could smart criminals just also run a Tor exit node, and just use it to blame anything that they get caught on?
A Tor exit node is just a tool used to obscure your location. Nothing more. So let's rephrase your question as such:
"Could smart criminals just tape over their house numbers, and just use it to blame anything that they get caught on?"
Uh... no...
A Tor exit node is the last "hop" or "layer" before data exits the encrypted tor network.
So let's rephrase the parent's question as such:
"Could smart criminals just operate a package exporting company and just blame other people when they get caught for exporting contraband?"
The answer is yes.
Operating an exit node privately is a bad idea (Score:4, Insightful)
It's one thing for libraries and nonprofits to operate them, but as a private citizen running one? Your misguided attempt to help some people will almost certainly end up badly for you because of bad people using that goodwill to do bad things.
To be perfectly honest, reading the linked story I was quite surprised the end result of the police visit was as positive as it was. I fully expected the cops to not know or care what Tor was and just round everyone and everything up and let the courts deal with it, which has happened several other times. Which again reinforces my point that there are precedents that show running a Tor exit node is just bad news and if you are still doing it, you're playing with fire.
Re: (Score:2)
I fully expected the cops to not know or care what Tor was
I'd imagine that cops looking for child pornographers would have a pretty good understanding of what TOR is (even if they didn't think to check that it was an exit node)
Re: (Score:2)
Re: (Score:2)
I bet they are a lot of TOR exit nodes and VPN endpoints during their investigations. They are probably used to it by now.
porn? (Score:3)
why do we continue to call this "PORN" and not just child exploitation/crime/abuse.
Re: (Score:2)
Because it is pornographic material for some? There are other types of pornography that are abusive, still referred to as pornography even though the vast majority of people would be sick looking at it...
Re: (Score:2)
because then they wouldn't be able to apply it to images that don't contain actual children.
Re:porn? (Score:4, Insightful)
To many people, the word "pornography" does not carry the positive connotations you seem to think it has.
Re: (Score:2)
Because napalm girl isn't porn
Re: (Score:2)
Agreed. I try to call it 'child abuse imagery' so as not to taint the name of good pornography by association. But it won't work. Language is hard to direct.
Re: (Score:2)
I know it's trendy for SJW's to reframe language to make it more horrible. But do you honestly believe that the general public doesn't think that child porn is already horrible enough?
It is child abuse, and child porn. You don't need to reframe it one way or the other as for common people it is equally bad.
Re:porn? (Score:4, Interesting)
What's wrong with fantasizing about 20-30 year old women when you are 10-15? They are in peak physical shape and have experience. Biologically, that's the ideal age for child bearing, something, we, as a specie, associate with "sexy".
Fantasies are an ideal. And what's more normal a straight male to fantasize about women the ideal age.
And about virtual child porn, my stance is that as long as no kid is harmed, anything goes.
In fact true pedophiles have a skewed perception of sexiness, they just don't find the right category of person attractive. Kind of like homosexuals in fact. The difference is while homosexuals can (now) happily do as they like because they are consenting adults, pedophiles can't, the relationship is asymmetrical and will always be.
To cope with this, pedophiles can turn to crime, or find substitutes. Substitutes can be virtual child porn, young looking adults, age play, etc... In fact there are probably millions of pedophiles you never heard of, simply because they know how to deal with their desires without harming anyone. But if you criminalize everything innocuous that could make a pedophile jack off, it is no wonder they end up as criminals.
Re: (Score:2)
If we are talking biology, as soon as puberty sets in is the ideal age for mating. Get in early before anyone else, give your offspring the best chance of being healthy and surviving, the longest time with their mother's protection, and before her body can no longer produce children.
Thus attraction and sexuality starts at that time too, much as many societies would prefer otherwise.
Of course we understand child psychology reasonably well and know that it's best to wait until children are older now. We expec
Re: (Score:2)
In a hundred years, I'm guessing it will be legal to make a computer program that lets you virtually have sex with, or murder, six year old little girls, or 500 year old dragons. Because like, that's not actually the same thing as hurting another human being. Oh, except that it hurts society that I didn't choose to join the army instead so I could go create some collateral murder...
At 500 years old a dragon is barely legal!
Can a jury look at CP? You own legal team? 3rd par (Score:3)
Can a jury look at CP? You own legal team? expert witness?
In a case what if some takes it to court (does not take the plea deal) and demands an jury trail?
What you legal needs the logs / system to prove that it was not from your systems? If they try to say they give that out then they in possession of CP.
Re: (Score:2)
It depends what your definition of child porn is. In cases where it's very clear cut the court would probably take the investigator's word for it, but in the UK at least it can include things like children's clothes magazines and TV shows if the police think you have been jacking off to them. In that case the jury might see them and the defendant might explain why they had them.
There have also been cases where young looking adult actors in porn were claimed to be child porn. There was a prominent lawyer who
Re: (Score:2)
But if that cop can look at it then your defense team better have the same rights and if not you must acquit
"used by activists, dissidents, privacy (geeks)" (Score:3)
10% of all Tor traffic is used by such people. The rest are people engaged in some degree or another of crime. (Unfortunately, I can't find the citation.)
Re: (Score:3)
I don't know how such a thing could be measured.
It isn't just TOR (Score:3)
Here's a real-world example from just this week. I'm a moderator on a site on the StackExchange network. We had a problem user who was posting a bunch of stuff the community didn't want posted (consistently badly moderated). What I'm supposed to do in this circumstance is point said user to our instructions for writing acceptable posts. However, such users often are just sock-puppet accounts for someone who's already been suspended. If that's the case, I'm supposed to take more drastic action.
SE has a (community-mod only) link for this, that shows you the user's IP, and all user accounts that have used that user's same IP. I click on this, and discover that he happens to share an IP with one of our better users. Not only is the writing style completely different (writing style is practically a fingerprint), but this user has in fact voted to close all but one post the problem user has ever made.
I talked to the "good" user about this, and he confirmed that his work access point is shared by a very large number of other people.
Just this week we got another new problem user. Again, totally different style than the other two users mentioned above, but also same IP.
As an investigative tool, IP address is useful, but only as a piece of evidence. I'd place it somewhere down with blood-type (perhaps like sharing an uncommon blood type like AB), rather than up in the realm of fingerprints.
Re: (Score:2)
It's really good that you bother to check these things and don't just apply blanket IP bans. I haven't been able to edit Wikipedia for years due to IP bans affecting the addresses I use. There is an exemption but they are unwilling to give it.
Re: (Score:3)
Well, the main question was whether to treat this user like any other normal user doing the same thing, or like sock-puppet account. In this case it was pretty clear with a modicum of other investigation that he was in fact a separate user, and not a sock of the other ("good") user.
If I'd treated this the way the cops in this story were treating things, I would have just dumbly acted as if every user who's ever shared an IP were all socks of each other, and sent a nasty note (and probably a suspension) to
Reminds me of "Napster for long-distance calls" (Score:2)
This reminds me of a late-90s first-dotcom-boom service that was planned to be like Napster, for long-distance phone calls. The general idea was that you'd run a server program on your pc that made your winmodem and phone line available for others to use for making phone calls that were long-distance for them (over the internet), but local and free for you.
It was a great idea, until assholes started using it to make anonymous bomb threats using other people's phone numbers. I think the service lasted for ma
This happned to me... (Score:5, Interesting)
Re: (Score:2)
If you're smart enough to realize you live in a flawed society, you should be smart enough not to do things that have a high-enough profile they're almost guaranteed to get the jackboots standing on your neck.
Of course, this is just intimidation... (Score:3)
...to suppress the use of TOR and it's ever growing list of alternatives. I'm surprised they didn't break heads and steal their equipment while they were at it.
Think about 'Package Forwarders' (Score:2)
Comment removed (Score:5, Insightful)
Re:Tor exit node = child sex offender (Score:5, Funny)
Re:Tor exit node = child sex offender (Score:5, Insightful)
A nice improvement would be doing away with the "guns in your face" part. Even if this couple had been the perps that the cops were looking for, what part of of "posting child porn" necessitates an early morning armed raid? Do cops not know how to interact with the public at all anymore besides by kicking down doors and shooting their pets?
Re: (Score:2)
police seems to be acting like tor itself did.
tor's less than transparent investigations of its employees assumed guilt before any convictions based on allegations.
Re:Tor exit node = child sex offender (Score:5, Insightful)
Re: (Score:3, Informative)
Re:Tor exit node = child sex offender (Score:5, Insightful)
Re:Tor exit node = child sex offender (Score:5, Informative)
Re:Tor exit node = child sex offender (Score:5, Informative)
Pay-as-you-go SIMs can be bought at pretty much any gas station, 7-11, Mac's, Koodo, Fido, or Virgin booth with cash, without showing ID. Some of them require you to fill in an online form to activate the SIM, but you can put any info in there you want, and "payment" is done using the code on the receipt instead of credit card.
Just went through this process to get a Koodo SIM for friends visiting from Australia. No ID required, no paper trail created.
No regulation on this up here (Canada) that I can see.
Re: Tor exit node = child sex offender (Score:2)
Re: (Score:3)
The real question here is, how did the police discover this IP address was associated with CP? As I understand it, and maybe I'm wrong, but if you're finding CP that came from the Tor network, then you know that the exit node that the offending data came out of wouldn't have been the source. How would a warrant have been granted based on such loose evidence? I mean, this type of s
Re: (Score:3)
The telecoms are responsible for providing a point of origin (account).
And they did.
How do we know they did? Because the cops showed up at the physical address linkable via their records to the IP address.
Re: (Score:2)
Makes sense, so long as you're also willing to charge every employee of every telecom company as being accessories to terrorism or child porn distribution.
Well yes, every potential sex offender should go on the registry. Obviously thats the end game here.
Re: (Score:2)
Makes sense, so long as you're also willing to charge every employee of every telecom company as being accessories to terrorism or child porn distribution.
Well yes, every potential sex offender should go on the registry. Obviously thats the end game here.
Can you provide an example of someone who is NOT a potential sex offender? I'm guessing they must be, thirsty, shut ins or both to start...
At least 13 states require sex offender registration for public urination, according to Human Rights Watch's comprehensive review of sex offender laws in 2007.
The sarcasm fairy really zoomed over your head, didn't she...
Re: (Score:2)
Tor exit node = child sex offender.
and they can slap down some accessory to crime as well on you as you are helping people do stuff on the tor network by running an exit node.
Seriously, I am surprised they didn't get on the sex offenders registry. There seems to be a push to get as many people on it as possible, so people peeing behind a dumpster at 2am on the way back from a bar get put on the registry etc.
Re:Tor exit node = child sex offender (Score:5, Informative)
Re: (Score:2, Insightful)
Yes, like, three of them. The ratio of good vs bad going through Tor routers is abysmal.
Re: (Score:2)
How can such a thing possibly be measured? I imagine there are a fair number of people in oppressive countries who use it just to read a few news sites and access Facebook. Very low-level dissidents.
Re:Tor exit node = child sex offender (Score:5, Insightful)
Re: (Score:3)
As an ISP you're already required to report address allocation information to the regional registry who makes the associations publicly available. The police know whether they're looking for ISP staff or a customer when they show up at the door because as an ISP you published enough information for them to make that determination.
Re: (Score:3)
As an ISP you're already required to report address allocation information to the regional registry who makes the associations publicly available. The police know whether they're looking for ISP staff or a customer when they show up at the door because as an ISP you published enough information for them to make that determination.
What does any of that have to do with police abuse against people doing nothing illegal?
Re: (Score:2)
What penalty have they undergone for this "doing nothing illegal" you speak of? An open case file that has their names in it? So what? They effectively "laundered" data by running the node. Think of it as noble as you want, but in this case, it allowed someone to do something nasty, and yes, since it flowed through them, they're damn well going to get some attention from anyone trying to trace it back.
I bet shiny money that they were violating their ISP's TOS/EULA by running ANY kind of server, let alone a
Re: (Score:2)
They got off lightly this time. This could easily have ended with their door being smashed down at three in the morning and everything with a memory chip in confiscated - to be eventually returned when the investigation is complete, a year and a half later.
Re: (Score:2)
Being raided at 6 A.M. probably wasn't very fun.
As for ISP policy, that depends. They may well have had a business account.
Being on TOR exit node list is insufficient (Score:5, Insightful)
What does any of that have to do with police abuse against people doing nothing illegal?
Police are responsible for **investigating** crimes. Sometimes this means surprising people so that evidence can not be destroyed. From the summary it seems that the the residents told the police they operate a TOR exit node, the police looked at a laptop and left. The resident is a bit naive thinking that being on a public list of TOR exit nodes should have made the search unnecessary. Being on that list does not indicate that the resident is not the uploader the police are looking for, just that they are unlikely to be that person but it still needs to be **investigated** to rule them out. That what a lot of **investigation** is, ruling innocent people out as suspects.
Re:Being on TOR exit node list is insufficient (Score:4, Insightful)
"The police told me they'd be back if it happened again,"
That doesn't sound like standard investigative work and ruling out innocent people to me. It sounds more like a threat.
Re: (Score:2)
As an ISP you're already required to report address allocation information to the regional registry who makes the associations publicly available. The police know whether they're looking for ISP staff or a customer when they show up at the door because as an ISP you published enough information for them to make that determination.
What does any of that have to do with police abuse against people doing nothing illegal?
They aren't going to jail. But if you run something that makes it difficult to tell whether you or just someone that you're proxying is the source of illegal content, you'll just have to accept that you're going to be an initial suspect in police investigations. That's kindof a part of the "route all information, even illegal traffic, through my network" decision that is running a Tor exit node.
Re: (Score:2)
Nothing - are you aware of which thread you're posting on? Hint: You're the one posting off-topic.
Not at all. An ISP that operates according to regulations is no more legal than running a Tor exit node is. So talking about all the things an ISP has to do to act in accordance with the law is irrelevant.
Re: (Score:3)
The point is that the IP address would be registered to an end user and the police already know who is at the final end point before conducting a raid. The ISP would be subpoenaed for subscriber info first, not get woken up at 6am with a raid. Nothing at all to do with legal regulations.
Re: (Score:3, Insightful)
Here's a better analogy. Imagine if a wanted criminal ran inside an open-door city shop in order to dodge the police, and the police then charged the shop owners as an accessory to evading law enforcement.
Re: (Score:2, Insightful)
Lame analogy.
Try you lend someone your phone and they use it to make a bomb threat.
Or Lend Someone your smart phone and they use it to watch child porn.
3rd attempt at analogy (Score:5, Insightful)
Poor analogy. Tor exit nodes don't store anything. It's a relay that people use in order to obscure the place they came from.
Here's a better analogy. Imagine if a wanted criminal ran inside an open-door city shop in order to dodge the police, and the police then charged the shop owners as an accessory to evading law enforcement.
Poor analogy. Here is a better analogy.
Imagine if a wanted criminal ran inside an open-door city shop in order to dodge the police, and the police questioned the shop owners to confirm that they were the shop owners and not the criminal.
Re:3rd attempt at analogy (Score:5, Funny)
Bad analogy.
Imagine instead, that you were an analogy and people kept using you as a comparison to the wrong things.
Re: (Score:2)
Poor analogy. Tor exit nodes don't store anything. It's a relay that people use in order to obscure the place they came from. Here's a better analogy. Imagine if a wanted criminal ran inside an open-door city shop in order to dodge the police, and the police then charged the shop owners as an accessory to evading law enforcement.
Poor analogy. Here is a better analogy. Imagine if a wanted criminal ran inside an open-door city shop in order to dodge the police, and the police questioned the shop owners to confirm that they were the shop owners and not the criminal.
I'm not seeing any cars!
Re: (Score:2, Insightful)
Just like how a public storage facility lets random people store things?
Re: (Score:2)
Not really. It's really only necessary when the address block will be dual homed. So that's going to be a class C or larger, certainly not a single IP allocated by DHCP.
For smaller blocks (but still more than a single IP), an upstream MAY wish to register it so abuse complaints will be routed to that customer rather than to them.
Go ahead and do a whois on your current IP address at home.
Re: (Score:3)
Re: (Score:2)
That sounds like a good idea up until the point where you expect people to return it......And that no children will happen upon it and assume it's a toy because none has ever explained to them that guns are dangerous.
Otherwise yeah great idea especially in areas with lots of snakes and/or other deadly pests.
Re: (Score:3)
Indeed. The rule of thumb to figure out whether to use "me" or "I" is to try the plural.
If you'd say "us", use "me". If you'd say "we", use "I".
Re: (Score:2)
Your grammar is outdated:
https://smile.amazon.com/Sense... [amazon.com]