archive.is is being seized by the FBI.

archive.was
1762466429591.png
 
I want to remind the doomers that Ghost Archive exists, however who knows how long it'll last if they're actually trying to take down Archive Today.

We need an actually good way to download websites. Chromium browsers have this already, but are pretty flawed compared to the main 3 archive sites.
? Httrack? Wget? Both of these options seem fine for independent archival purposes, I've even archived some websites already using these.

Not going to say the writings been on the wall for this because dooming about the site going down immediately after this would be kneejerk but any site (or similar service of dubious legality) like this is always on an invisible clock that can tick down at any time really. Same with large scale torrent sites or piracy repositories (different service but same concept). People always say "there'll always be an alternative" but really this is just taking things for granted, because it's so easy for the opposite to be the case at any point in time, that there is no alternative and people give up with putting their necks on the line for effective digital preservation and sharing. Best they/anyone can do is provide accessible rips of their entire serverbase on time so that in the event they get nuked someone else can rehost, but as far as I know archive.today does not have that (last I recall they also had 50?TB upwards of archived data? Would be tragic if all of that got lost).

The second paragraph is mostly a rant about copyright but it applies to pedos gripping onto any legally dubious or circumventive tool and running with it as well, if copyright doesn't fully tardwrangle AI image gen models into uselessness then mass produced CP and illegal porn definitely will, as an unrelated example
 
Last edited:
reading the subpeonea, it looks like they just want someone's billing & customer info from archive is? am I misunderstanding?
 
Blaming child pornography is "won't someone think of the children!" levels of distraction.
Funny that they go after archives of child porn and not the actual pedophiles.

Tinfoil hat: They found someone archived the esptein list.
 
Oh. That's what they're after: someone is using this to archive child pornography.
I am almost certain this is a CSAM case:
  1. The supervisory special agent, SA Marisa Kim Cowdry, seems to only work on CSAM cases. She worked at NCMEC back in 2015, she wrote search warrants related to CSAM, and she even went as far as posing as a parent selling a fictional 11-year-old to nab a pedophile.
  2. The case number is 305A-HQ-1497320-I045_PG; FBI case numbers consist classification numbers, then the name of the field office, then a number unique to the field office. The classification code "305A" was notably used for Operation Torpedo, which targeted CSAM websites on the dark net. It was also in the case number against a Nebraska man who was convicted of CSAM offences.
 
reading the subpeonea, it looks like they just want someone's billing & customer info from archive is? am I misunderstanding?
They aren't seeking information from archive.today. It is a subpoena to Tucows, who is their domain registrar. They want information on the owner of the domain (i.e. the owner of archive.today).
 
reading the subpeonea, it looks like they just want someone's billing & customer info from archive is? am I misunderstanding?
What they're asking is also definitive in terms of profiling: real name, phone number and billing address (if they can even get any of these, if the archive.today guy uses monero then he most definitely uses VoIP, and if he's actually russian he probably has some bullshit fake ID lol). So they're looking to unmask the owner entirely due to CSAM concerns, which would in turn open the them up to get nuked by corporations proper but that's an aside.

I can't think of any reason why they'd give a subpoena to Tucows specifically, who'd be the only people that can have that info.
 
"See, they're doing something, big win for the Toe, go get them!!!"

Beyond retarded. You have places like us, the Sharty, and 4chan, which while all small have scrutinized over security against CSAM and have made literally thousands of requests to law enforcement on every level which include the names, faces and addresses of various people responsible for an incredible volume of child exploitation material. Then you have tech giants that are responsible for the bulk of CSAM distribution publicly acknowledging that they know they profit from it for reasons ranging from "internal training" to just plain "it makes money". Yet the only action they take is against the upstream for a random website because they might get an XMR address out of it

There's a good chance the same people responsible for the CSAM on archive.today is related to the same network of people fucking with us right now. If they wanted to go after child predators they'd target the people like that who are already a known quantity and put them down like dogs, or they'd get on the assess of Facebook and the like and start making big examples of them. This shit is just a roundabout way dig at archives without catching flak for it; they know that it's unlikely to yield results, but it'll still open up the site admin himself to lawsuits that would otherwise be unlikely to ever pierce through to him.

I hate the feds so much it's unreal.
 
They aren't seeking information from archive.today. It is a subpoena to Tucows, who is their domain registrar. They want information on the owner of the domain (i.e. the owner of archive.today).
Only person ITT who can read. Not saying there will not be consequences if the owner is phonebooked (and subsequently un-personed), but nobody is seizing anything it's just a subpoena for information from Tucows.
 
I am almost certain this is a CSAM case:
  1. The supervisory special agent, SA Marisa Kim Cowdry, seems to only work on CSAM cases. She worked at NCMEC back in 2015, she wrote search warrants related to CSAM, and she even went as far as posing as a parent selling a fictional 11-year-old to nab a pedophile.
  2. The case number is 305A-HQ-1497320-I045_PG; FBI case numbers consist classification numbers, then the name of the field office, then a number unique to the field office. The classification code "305A" was notably used for Operation Torpedo, which targeted CSAM websites on the dark net. It was also in the case number against a Nebraska man who was convicted of CSAM offences.
Damn that SA sounds based
 
What the fuck are they going to do with the owner's information? Imagine Null's upstream got a subpoena for the shit happening right now. What is the expected outcome besides revealing his personal address to the world? It's not like he wants to host child porn, and it seems to be the same with archive.is; nothing about it seems to point to them wanting him in court for CSAM, they want to get to him so he can magic up personal information about someone else that he has no connection to besides having used his site. A site that allows TOR connections to archive stuff and which takes donations in XMR. It's a naked attempt to open him up for liabilities.
 
What the fuck are they going to do with the owner's information? Imagine Null's upstream got a subpoena for the shit happening right now. What is the expected outcome besides revealing his personal address to the world? It's not like he wants to host child porn, and it seems to be the same with archive.is; nothing about it seems to point to them wanting him in court for CSAM, they want to get to him so he can magic up personal information about someone else that he has no connection to besides having used his site. A site that allows TOR connections to archive stuff and which takes donations in XMR. It's a naked attempt to open him up for liabilities.
We're not allowed to have nice things. That's what all of this is about. It's why gay race communism has already won the culture war thanks in no small part to the right letting the left win.

All wrongthink will be purged from the human mind. TPTB are about to get the everlasting dystopia they have dreamed of.
 
Back
Top Bottom