![]() This hints at the notion that the "service provider" was not tor2web or any popular gateway. My evidence is because the service kept at least 3 months of user activity and IP addresses. The question is: How would the FBI know that he was using tor2web? Also, how was the service provider able to see what IMS username Grief used? My theory was that the "service provider" was an actual instant messaging service similar Skype/AIM/ICQ than a gateway. Some folks have speculated that the service is tor2web or similar based on a brief statement about "Gateways" in the complaint. This means that Grief continued to use the IMS for over a year since the FH takedown. The subpoena for the "service provider" was conducted on June 2014 and revealed activity from the IMS username in March 2014. I think the "electronic communications service provider" is not tor2web or any other known "gateway", but is actually the IMS service/server. ![]() Otherwise, the FBI would not have had to obtain his IP address by other means. A couple of takeaways and discussion points I got from reading the criminal complaint:Īssuming that Grief was an active user of the sites hosted on FH, it is safe to also assume that he was not snared as part of the Torsploit operation. Regardless, they struck gold on this case. Then YOU get the visit from the FBI Partyvan. Someone has a grudge against you? They'll sign up for one of these websites and put your information on it. Someone could have used YOUR clearnet e-mail to populate their profile on one of those Pedo Boards or whatever. There's nothing to stop dangerous pedophiles from using false information in order to maliciously frame innocent people or attempt to further hide themselves from prosecution. I'm sure there are thousands of Internet users with the handle "LiveFreeOrDie" or some other common phrase or term. They must be careful with trying to match up usernames that are fairly common. I can think of a couple of gray areas, though: Somewhere out there, a busy squad of federal agents are working around the clock to Dox as many dangerous pedophiles as they can using techniques such as this: Tying together darknet and clearnet user information.
0 Comments
Leave a Reply. |