We've seen this before. Earlier this year we wrote about law enforcement in Europe being equally confused by a Tor exit node.
Of course, some people will claim that this is "the price you pay" for running a Tor exit node. In fact, after the EFF gave ICE agents basic remedial training in how the internet works, it returned King's hard drives, but told him "this could happen again." Sure, it could. But it shouldn't. The fact that law enforcement is clueless over the fact that an IP address is not a unique identifier, and yet seems to rely on it as if it does, shouldn't place more of a burden on users. It should indicate that law enforcement should be required to do more than simply identify an IP address.
An IP address alone is not probable cause that a person has committed a crime. Furthermore, search warrants executed solely on the basis of IP addresses have a significant likelihood of wasting officers' time and resources rather than producing helpful leads.
In the case of Tor, the police can avoid mistakenly pursuing exit relay operators by checking the IP addresses that emerge in their investigations against publicly available lists of exit relays published on the Tor Project's web site. The ExoneraTor is another tool that allows anyone to quickly and easily see whether a Tor exit relay was likely to have been running at a particular IP address during a given date and time. The Tor Project can also help law enforcement agencies set up their own systems to query IP addresses easily. These simple checks will help officers concentrate their investigative resources on tracking down those actually committing crimes and ensure that they don't execute search warrants at innocent people's homes.
Permalink | Comments | Email This Story
slash dot linux news popular science articles popular mechanics
No comments:
Post a Comment