Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Monday January 16 2023, @02:28AM   Printer-friendly
from the Guilt-by-association dept.

From: Gizmodo:

Motherboard originally reported that the bureau has somehow managed to nab the IP address of an alleged criminal using Tor, short for "The Onion Router," as part of an ongoing anti-terrorism case. The guy in question, Muhammed Momtaz Al-Azhari, of Tampa, Florida, was charged in 2020 with attempting to provide material support to ISIS. According to the government, Al-Azhari is "an ISIS supporter who planned and attempted to carry out an attack on behalf of that terrorist organization." Part of the government's case against Al-Azhari revolves around his use of Tor to make multiple visits to an ISIS-related website prior to the planned attack. ...

It's not exactly clear what happened here. Somehow, the government ascertained Al-Azhari's real IP address—which actually turned out to be his grandma's IP address because he was staying with her in Riverside, California at the time of his arrest, court documents state. Since Tor should have protected Azhari's real location and IP address, the question remains: how did the feds get this information?

--------

Is use of TOR probable cause for other investigative techniques that would ordinarily violate civil liberties? (ask a warrant issuing judge.) It it any different from wearing a ski mask to the bank teller window?


Original Submission

 
This discussion was created by Fnord666 (652) for logged-in users only, but now has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by Reziac on Tuesday January 17 2023, @02:24AM

    by Reziac (2489) on Tuesday January 17 2023, @02:24AM (#1287170) Homepage

    I use NoScript, and do not find it to be a PITA. Most sites only need one or two servers enabled, and it's usually fairly obvious, because they have CDN or the like in the domain name. And once that scripting is enabled, usually the superfluous servers vanish from NoScript's list. And most of the ad and tracking servers are known names. On maybe one site out of a hundred, I have to do more server-fishing to locate the necessary scripting. But once it's done for a given site, I never need to do it again. On perhaps one site in a thousand I give up and resort to a different browser.

    --
    And there is no Alkibiades to come back and save us from ourselves.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2