3
all 15 comments
sorted by: hot top controversial new old
[-] ICastFist@programming.dev 2 points 1 year ago
  • Step 1: Don't host in the USA
  • Step 2: Don't host in a USA puppet ally
[-] insomniac@sh.itjust.works 1 points 1 year ago

Probably good advice but not exactly relevant. The person was hosting a server in their house and got raided for unrelated reasons and all their electronics were seized. Had they hosted in a data center or at least had off premises back ups, this wouldn’t have happened.

[-] JohnDClay@sh.itjust.works 0 points 1 year ago

I thought one of the points of the fediverse was to not be centralized in data centers that are more easily controlled. It's supposedly supposed to be easy and relatively cheap to spin up your own instance on your own hardware. Just outsourcing to a data center I think goes against what the fediverse promised.

[-] insomniac@sh.itjust.works 0 points 1 year ago

Like anything, it’s a trade off. The fact that you can do whatever you want is the good thing. As long as everyone isn’t in the same datacenter, it’s fine. There’s datacenters all over the planet.

If you’re self hosting, you can mitigate the risks by having some kind of contingency plan though. Just having backups in another location would have made it possible to get back up after the interruption. Now, this instance is probably just screwed.

Data centers aren’t inherently bad and neither is self hosting. But there’s different risks that need to be planned for.

[-] Revan343@lemmy.ca 1 points 1 year ago

If you’re self hosting, you can mitigate the risks by having some kind of contingency plan

Like a degaussing loop hidden in the door frame?

Just having backups in another location would have made it possible to get back up after the interruption

Oh. Not that kind of contingency plan

[-] KyRoLen@sh.itjust.works 1 points 1 year ago

There should be a way to encrypt things when the server is off and then have a Killswitch for situations like this. Idk if it'd be overkill in this case thougj

[-] freeman@lemmy.pub 2 points 1 year ago

Luks is a thing. No reason it can’t be done on the server though things like patching won’t be automated.

Kill switch is well, not as easy. But possible.

That said. The government would just lampoon you in the media as some child porn hoster or whatever they want and taint the jury pool. And probably charge you with obstruction and a host of other things if you didn’t decrypt the server.

There is case law where refusing a description password isn’t covered by the 4th or 5th amendment so they could just Guantanamo your ass as pressure.

https://arstechnica.com/tech-policy/2017/03/man-jailed-indefinitely-for-refusing-to-decrypt-hard-drives-loses-appeal/

https://arstechnica.com/tech-policy/2020/08/nj-supreme-court-no-5th-amendment-right-not-to-unlock-your-phone/

https://www.zdnet.com/article/florida-court-says-password-disclosure-not-protected-by-fifth-amendment/

https://www.eff.org/press/releases/appeals-court-upholds-constitutional-right-against-forced-decryption

https://www.postschell.com/insights/third-circuit-imprisonment-refusing-order-decrypt-device-cannot-exceed

TL:DR - there’s no established case law that protects you from withholding the encryption key from government and there’s conflicting rulings in the current US districts. In some places you can be held indefinitely. Unsure what occurs if you can’t remember the key though.

[-] Repossess6855@lemmy.dbzer0.com 0 points 1 year ago

The US again continuing to flex its muscles that it truly does own and control half the world, as it so affectionately reminds us daily.

It is absolutely hysterical how bad authoritarianism has engulfed all modern governments. This isn’t remotely a left vs right thing or a US thing, almost all modern governments have become this way.

[-] Underwear@lemmy.world 0 points 1 year ago

The person referenced in the article was raided for completely unrelated charges. It just happened they took the server and backups as part of the raid. Had they hosted off-site or kept the backups off-site, the damage would have been minimal. This article brings up a good point, but it's not the nefariousness that the title implies.

[-] girlfreddy@sh.itjust.works 0 points 1 year ago

Cops took what wasn't needed and haven't returned it (that we know of).

I'd say that's about as nefarious as it gets.

[-] ZodiacSF1969@sh.itjust.works -1 points 1 year ago

How do we know it wasn't needed? What were the charges?

[-] xkforce@lemmy.world 0 points 1 year ago* (last edited 1 year ago)

How do you know that it was? Were you involved in this case enough to know something the rest of us dont? Or are you just a bystander playing devil's advocate?

EDIT: since I apparently cant reply to your comment below, you cant just claim that the hardware was involved in a crime by "just asking questions" then accuse me of "stirring up shit" after calling you out on making unsubstantiated claims. If you make a claim it is YOUR job to defend that claim. Not everyone elses' job to disprove your assertion.

[-] ZodiacSF1969@sh.itjust.works -1 points 1 year ago
  1. I'm not the person you can't reply to below.

  2. I was literally just asking. If the warrant was in relation to a charge that they were hosting CSAM, then yes the seizure of the server would be appropriate.

this post was submitted on 25 Jul 2023
3 points (100.0% liked)

sh.itjust.works Main Community

7584 readers
18 users here now

Home of the sh.itjust.works instance.

Matrix

founded 1 year ago
MODERATORS