- Joined
- Nov 26, 2018
The internet in general is used to spread CP, shut it down!It's morally objectionable to support a network that most likely is used to spread CP
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
The internet in general is used to spread CP, shut it down!It's morally objectionable to support a network that most likely is used to spread CP
I remember this at the time. I'm skeptical as to whether they actually have a way to tell for sure who's requesting child porn rather than passing on requests for other people for child porn. I assume they instead did something along the lines of running a few nodes, and identifying IPs where 90% of requests are for known child porn files, as opposed to only 10% or so. At that point you can probably get away with going to a judge to get a warrant, and assuming the pedo doesn't have their drive encrypted or is in midspank when you hit the door (pedos are stupid, so it likely works out) they're done.Speaking of such things, I found this article from about 5 years ago.
Seems like the network glows rather brightly, but at the time this was written, the focus of enforcement action was on the ultimate requesters of CP.r/privacy - Anonymity compromise in Freenet by U.S. law enforcement
39 votes and 11 comments so far on Redditwww.reddit.com
Bro, the thing with FreeNet is that practically _everyone_ is actively hosting kiddie diddling content. This isn't like Tor, where if you run a relay (including an internal one) you might be providing a path for traffic to someone's darknet CP website to be transmitted, or IPFS, where if you actively request content from someone else's IPFS files, that will be stored in the cache until it works its way out. Requests for CP made by people you happened to connect to from a public nodelist will be stored on your computer indefinitely.Hashes aren't going to find diddly in an encrypted store on a random drive on a random node in a big network. Not that I'm a fan of hosting some pedo's wank pics, but I can't think of a way to filter content in a double-blind setup like this, and running a node wouldn't make me fear the feds kicking my door down some night. If someone's actively hosting a kiddie-diddling site on the network, yeah, I could absolutely see several legal organizations going to the trouble of tracking them down, but a person just running an open node where the data's all encrypted and they don't have a key to view it seems pretty safe to me.
I'm not even making an argument based on morality here. While CP purveyors should be shut down and hung in the street, my point here is not to make a moral judgement, but instead to convey a warning. If you run FreeNet for a few weeks, with say, a 10-20gb cache, there is enough CP on your computer for you to become one of those nasty-sounding stories in a local newspaper "Local man John Smith, 26, was arrested and has been charged with possession of 669 images of child pornography, of which 99 were of the most depraved nature."The internet in general is used to spread CP, shut it down!
That's a garbage argument and you know it. I'm not actively aiding the distribution of CP by being online and using a browser, which cannot be said of FreeNet.The internet in general is used to spread CP, shut it down!
Oh I know, and a FreeNet solution doesn't seem optimal just for that kind of risk. I was more poking fun at his statement and how he said it.I'm not even making an argument based on morality here. While CP purveyors should be shut down and hung in the street, my point here is not to make a moral judgement, but instead to convey a warning. If you run FreeNet for a few weeks, with say, a 10-20gb cache, there is enough CP on your computer for you to become one of those nasty-sounding stories in a local newspaper "Local man John Smith, 26, was arrested and has been charged with possession of 669 images of child pornography, of which 99 were of the most depraved nature."
If Freenet would be illegal, Tor would be too. Nobody has ever tried to fuck with Tor, even though it has lots of CP, is used by lots of far-right sites, and is probably the ultimate guarantor of them staying online.Tor relays aren't 'hosting' anything. They simply relay traffic. FreeNet nodes retain and further distribute material that not just yourself, but others connected to you, request.
If you're running a Tor relay, you can fairly say that you're just relaying traffic. If you're running a FreeNet node, you're retaining and distributing a bunch of CP. You just can't say for sure whether it's babyfuck1.jpg or babyfuck2.jpg without a list of hashes of CP (which I'm sure law enforcement would build up if FreeNet ever really took off).
It's morally objectionable to support a network that most likely is used to spread CP
Proof? I hear people making this claim all the time, but I've never seen any evidence for it. If you go on FMS, the top boards (excluding cross-posters) are:Oh I know, and a FreeNet solution doesn't seem optimal just for that kind of risk. I was more poking fun at his statement and how he said it.
Everything is 'encypted' in that FreeNet doesn't directly download babyfuck3.jpg to your computer in the clear and name it that.Is there even any evidence that a significant portion of files on Freenet would be CP? I mean, how are you going to arrive at that figure, when everything is encrypted?
We've explained repeatedly that this is a completely different model. Tor doesn't store child porn on your computer. FreeNet does.If Freenet would be illegal, Tor would be too. Nobody has ever tried to fuck with Tor, even though it has lots of CP, is used by lots of far-right sites, and is probably the ultimate guarantor of them staying online.
Honestly, it's not far off that. If you fired up FreeNet a decade ago and clicked around until you got to an index, the index would have libertarian blogs, it'd have dubiously sourced bombmaking instructions... and it'd have links to 'child modelling' galleries.Do you ACTUALLY think they'd have it out in the open? You're not going to log onto a public net and see it being advertised.
I'm not sure that these sorts of concepts are that applicable to a situation like the one we're discussing.How about some more blockchain retardistry?
I was looking into some of the "enterprise blockchain" solutions out there, such as Enterprise Ethereum, Corda, and Hyperledger Fabric.
The general idea behind all of these is that you run a private blockchain which is based on something other than proof-of-work (mining). And they're big on using trusted execution environments such as Intel SGX to run verified (signed) code off-chain - although this technology isn't quite infallible.
The tricky thing about these private blockchains is that they typically replace mining with a voting system. A block gets added when it receives a certain number of votes from whoever you configure as "qualified to vote".
The problem, of course, is that this system is designed for corporate networks or internetworks where you assume everyone has some vested interest in keeping the network functional, and all nodes will be up at all times. The equivalent of a 51% attack in this system is for the attacker to control enough voting nodes to rewrite the blockchain any way they want.
So the question is: how would you set up voting so that it's hard for an attacker to subvert 51% of the votes, but still easy enough for blocks to get added? As I write this, about 1.7% of all accounts ever to exist are logged in right now.
I'm not sure either, but I do think there are some ideas worth playing with when it comes to distributed consensus. I haven't seen much else yet that strikes a middle ground between the complete anarchy approach, and a traditional fully centralized server with a database.I'm not sure that these sorts of concepts are that applicable to a situation like the one we're discussing.
Is that true in a non-proof-of-work blockchain? You can rewrite a blockchain, it's just near-impossible on the public mining-based ones due to the amount of computing power it would take.If there is consensus on the inclusion of a block, it's there forever.
Where is the proof? You're just claiming, baselessly, that this network is full of CP.Everything is 'encypted' in that FreeNet doesn't directly download babyfuck3.jpg to your computer in the clear and name it that.
BUT it still downloads babyfuck3.jpg to your computer, and if Freenet becomes a platform that people actually use, pigs will use the fact that babyfuck3.jpg exists on your computer to prove that you possess and are distributing child pornography.
Well, you're talking about distributing child porn too, no? If encrypted child porn you don't know about and don't want is child porn - and it isn't - all the Tor people would be behind bars. They aren't, because it isn't.We've explained repeatedly that this is a completely different model. Tor doesn't store child porn on your computer. FreeNet does.
So where's the evidence then? You're claiming it's absolutely riddled with invisible child pornography nobody can see?Do you ACTUALLY think they'd have it out in the open? You're not going to log onto a public net and see it being advertised.
Enterprise blockchain is a scam, sorry. If there's people you trust, just use a distributed database. Enterprise blockchain is a buzzword.How about some more blockchain retardistry?
I was looking into some of the "enterprise blockchain" solutions out there, such as Enterprise Ethereum, Corda, and Hyperledger Fabric.
Well, if you really don't like Freenet, just redo FMS with another backend like IPFS. All the other parts are ironed out and battle-tested already.I'm not sure either, but I do think there are some ideas worth playing with when it comes to distributed consensus. I haven't seen much else yet that strikes a middle ground between the complete anarchy approach, and a traditional fully centralized server with a database.
Everyone would have to redownload the blockchain since the fork point.Is that true in a non-proof-of-work blockchain? You can rewrite a blockchain, it's just near-impossible on the public mining-based ones due to the amount of computing power it would take.