• PoliticalCustard@lemmygrad.ml
    link
    fedilink
    arrow-up
    43
    ·
    9 months ago

    Interesting piece. It’s a bit weirdly worded in that it suggests that the police shut the accounts when really it’s Mega, Proton, Tuta who are closing the accounts. Presumably the police tell those companies which accounts are being used for illegal purposes and then those companies then close the accounts. I was a bit alarmed at first because it sounded like the authorities were closing the accounts when that’s not really the case.

  • LucidBoi@lemmy.world
    link
    fedilink
    arrow-up
    23
    ·
    edit-2
    9 months ago

    So the police provide the companies with addresses associated with illegal activities and the companies disable those accounts?

    EDIT: This was a genuine question :p

    • ResoluteCatnap
      link
      fedilink
      English
      arrow-up
      15
      ·
      9 months ago

      Essentially. Police or anyone could report an account for illegal activity which is against ToS for all three of the services. From there the service would need to be able to substantiate the claim and then shut down the account. I’ve seen a few cases of proton accounts getting shut down. Proton can’t read emails but they can read headers and if you’ve posted illegal activity in public using your proton email address or if law enforcement/ someone reports you for using proton for illegal activity then proton will be able to review headers to determine if you’re violating ToS. Like a few years ago i think someone was using proton for ransomware, and proton was able to match the headers with emails that had been posted in public, and acct got shut down.

      Unfortunately can’t find that specific case but that was one example I’ve seen

  • bartolomeo@suppo.fi
    link
    fedilink
    arrow-up
    7
    ·
    9 months ago

    states the LockBit .onion site, now controlled by British officials.

    How does one hijack a .onion site?

    • catalog3115@lemmy.world
      link
      fedilink
      arrow-up
      13
      ·
      9 months ago

      You don’t hijack a .onion site. You pwn the server which hosts .onion site. Give you full access to site. You hijack .onion because its very secure

        • catnip@lemmy.zip
          link
          fedilink
          arrow-up
          7
          ·
          9 months ago

          By pwning it. You dont have to find it to pwn it. You just have to be able to send data to it, which everyone can do because whats the point of having a server if noone can interact with it. The attacker just interacts with it in a way that manipulates it to execution attacker controlled code. So for a .onion website for example you find a vulnerability in the websites code and exploit it to make the server the website is running on do what you want.

            • /home/pineapplelover@lemm.ee
              link
              fedilink
              arrow-up
              4
              ·
              9 months ago

              Nah nothing like that. I mean that they’re sharing info to friends willy nilly and some cops got wind of it. That’s kinda what happens to some of the dark web guys who get caught. It’s very rarely something very technical it’s just their own idiocy for reusing emails, transferring funds incorrectly making it traceable, Delivering sus packages all at once to usps

        • catalog3115@lemmy.world
          link
          fedilink
          arrow-up
          4
          ·
          9 months ago

          In simple terms you can’t trace back the server useless the webadmin did some stupidity or vulnerability

    • BaumGeist
      link
      fedilink
      arrow-up
      2
      ·
      9 months ago

      Outside of controlling and rewriting the protocol: steal the keys used to generate the route or take over control of the server that hosts it