They could do that.... but they would have to have a reason to be searching your computer in person (IE a warrent).
If they already have a warrent... you've probably done something else thats caught their eye.
 
Roger Hayter <[EMAIL PROTECTED]> writes:
 
>
> In message <[EMAIL PROTECTED]>, Matthew
> Findley
> <[EMAIL PROTECTED]> writes
> snip
> >
> >Your right we would have to show when your node transmitted ilegal
> >matterials.  But assumeing freenet has been cracked and your traffic is
> >being monitered.  This would be quite easy.
> >
> >
>
> As far as I can see, it is a lot easier than that.  All the LEA has to
> do is to look for lots of illegal material on Freenet:  note the hashes
> (or whatever the Freenet labels are called) of all the parts of the
> relevant files, and search your data store for these hashes.  They can
> then, if they are lucky, find at least some of the illegal files on your
> computer.  It will probably aid the process if they spend the preceding
> week requesting said files from your computer.  They will certainly aid
> the process if they inject the illegal material themselves.  But neither
> of the latter steps are essential.
>
> Please someone tell me if I am wrong, I certainly don't feel guilty
> about random unidentifiable (to me) parts of things I have never seen or
> downloaded temporarily residing in my data store!
>
> >
> Snip
>
_______________________________________________
chat mailing list
[EMAIL PROTECTED]
http://news.gmane.org/gmane.network.freenet.general

Reply via email to