seasonone@opidea.xyz to Technology@beehaw.org · 1 year agoTor’s shadowy reputation will only end if we all use it | Engadgetwww.engadget.comexternal-linkmessage-square151fedilinkarrow-up1323arrow-down10cross-posted to: privacyguides@lemmy.onetechnology@lemmy.ml
arrow-up1323arrow-down1external-linkTor’s shadowy reputation will only end if we all use it | Engadgetwww.engadget.comseasonone@opidea.xyz to Technology@beehaw.org · 1 year agomessage-square151fedilinkcross-posted to: privacyguides@lemmy.onetechnology@lemmy.ml
minus-squarejarfil@beehaw.orglinkfedilinkEnglisharrow-up3·edit-21 year agoIt’s not bullshit. If A has proof your system launched an attack, or sent CSAM, to another system, but your only defense is “I let anyone use my system in that way”, then at the very least you’re an accomplice.
It’s not bullshit. If A has proof your system launched an attack, or sent CSAM, to another system, but your only defense is “I let anyone use my system in that way”, then at the very least you’re an accomplice.