They could do that.... but they would have to have
a reason to be searching your computer in person (IE a warrent).
If they already have a warrent... you've probably
done something else thats caught their eye.
Roger Hayter <[EMAIL PROTECTED]> writes:
>
> In message <[EMAIL PROTECTED]>, Matthew > Findley > <[EMAIL PROTECTED]> writes > snip > > > >Your right we would have to show when your node transmitted ilegal > >matterials. But assumeing freenet has been cracked and your traffic is > >being monitered. This would be quite easy. > > > > > > As far as I can see, it is a lot easier than that. All the LEA has to > do is to look for lots of illegal material on Freenet: note the hashes > (or whatever the Freenet labels are called) of all the parts of the > relevant files, and search your data store for these hashes. They can > then, if they are lucky, find at least some of the illegal files on your > computer. It will probably aid the process if they spend the preceding > week requesting said files from your computer. They will certainly aid > the process if they inject the illegal material themselves. But neither > of the latter steps are essential. > > Please someone tell me if I am wrong, I certainly don't feel guilty > about random unidentifiable (to me) parts of things I have never seen or > downloaded temporarily residing in my data store! > > > > Snip > |
_______________________________________________ chat mailing list [EMAIL PROTECTED] http://news.gmane.org/gmane.network.freenet.general