If you distribute encrypted materials you also need to distribute a means of decryption. I’m willing to bet a honeypot was used to trick him into distributing his csam right to the government hinself.
Neither Tor nor end-to-end encrypted messengers will cover the endpoints. It’s possible that they caught him using good old fashioned detective work. You don’t need a software back door for that.
Tor was created by NSA, half of Tor servers are run by NSA, not that secure
Tor was created by the NRL, which is a part of the US Navy and Marine Corps.
Tor was created by the Naval Research Labs, and was released to the public because it is secure.
The problem is that if it’s only the CIA or DIA using it, it’s easy figure out who is using it and where. Make it global and now there is a lot of noise to separate out.
Please don’t talk about child predators, and use the term “back door” in the same sentence. It ain’t right…
He didn’t use encrypted everything. He had a public telegram group chat in which he stored a lot of his material. Which, as many people in the comments on the article pointed out, is not encrypted, but is presented by telegram as if it is. That’s likely how they caught him.
Recent events have taught me that only individual chats are encrypted*. Group chats don’t have that feature.
Telegram groups are not E2E.
Chats are encrypted, but the servers hold the encryption keys (I believe).
There are one-to-one chats that are full e2e, but you have to enable it. And it has all sorts of compromises.
Qualifier: this is as dicumented by telegram. Since it’s not open source, we can’t really verify it
There is no point in encrypting a public group chat since anyone can join and decrypt it anyway.
my guess is that a large number of tor exit nodes is run by government agencies.