Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It requires fiddling with configuration.

Reconfiguring a security tool without reading the FM, and then using said tool to commit a federal-pound-me-in-the-ass-prison-crime is mind-bogglingly stupid.

These people lack even the most basic forms of common sense.



These are people that were using said security tool for one of the worst possible uses imaginable not security experts or even what most people would call "power users". IF they had common sense they wouldn't be looking up pictures of kids in the first place.

As someone else pointed out they probably got told about Tor to avoid being caught either on a a really creepy message board or wherever it is creeps hangout (the 70's wire frame glasses and fanny pack store?), watched a youtube video or read a text file/readme that has been passed around on these boards or whatever. They likely have very little actual computer knowledge.


Or they are mundane people who wants to discover tor. It happened to me (20 years ago). Hopefully the hard disk where the picture has been stored (during less than one minute, before I removed it) does not exist anymore.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: