Fuck this human
Tldr; Asshole used encrypted everything and Tor to create and spread csam. Government isn’t disclosing how they caught him
Fuck this human
Tldr; Asshole used encrypted everything and Tor to create and spread csam. Government isn’t disclosing how they caught him
Interesting, thanks for the info
That makes sense, I’ll have to check the path. Thanks for lending your thoughts on this
Yeah everything (server, Linux clients, Android clients, other clients) is on the same WiFi network which is why this is extra frustrating since Linux just works like usual
No tcpdump isn’t seeing the request… Thanks for the suggestion
Your comments were good and kind. Debugging even obvious things is good since computer science is literal magic electrified rocks and keeping every step in our heads is impossible
Yeah don’t worry about the downvotes
Hmm not seeing it on GrapheneOS
Yeah same netmask of 255.255.255.0
ERR_NETWORK_ACCESS_DENIED
But if I can see the server on the same WiFi network from any Linux machine wouldn’t that ensure all those steps are OK?
Is there a setting for this? Yeah, I assume it’s some default setting I missed
(I’m seeing this issue on any Android distro, I’ve tried a few)
nmap -Pn 192.168.1.2
At least it shows the server is up from the client’s perspective (other clients can actively see the same IP and server on port)
Same WiFi subnet
No mobile network
Thank you
Any good debugging tools for android here or should I just rely on Linux networking tools through installed shells? Is there an industry standard for Android as a client?
What system is this? Miyoo?
Thanks for the insightful comment
True. Or it could have been a backdoor in his phone, or the full running browser in his sim card, or the backdoor into his CPU chips… Maybe they do old fashioned police work for these cases and only use the pegasus spyware for others?
Pretty silly to do anything illegal on a computer when we know how flawed they are, imo