Feds Bust Alaska Man With 10,000+ CSAM Images Despite His Many Encrypted Apps (arstechnica.com) 209
A recent indictment (PDF) of an Alaska man stands out due to the sophisticated use of multiple encrypted communication tools, privacy-focused apps, and dark web technology. "I've never seen anyone who, when arrested, had three Samsung Galaxy phones filled with 'tens of thousands of videos and images' depicting CSAM, all of it hidden behind a secrecy-focused, password-protected app called 'Calculator Photo Vault,'" writes Ars Technica's Nate Anderson. "Nor have I seen anyone arrested for CSAM having used all of the following: [Potato Chat, Enigma, nandbox, Telegram, TOR, Mega NZ, and web-based generative AI tools/chatbots]." An anonymous reader shares the report: According to the government, Seth Herrera not only used all of these tools to store and download CSAM, but he also created his own -- and in two disturbing varieties. First, he allegedly recorded nude minor children himself and later "zoomed in on and enhanced those images using AI-powered technology." Secondly, he took this imagery he had created and then "turned to AI chatbots to ensure these minor victims would be depicted as if they had engaged in the type of sexual contact he wanted to see." In other words, he created fake AI CSAM -- but using imagery of real kids.
The material was allegedly stored behind password protection on his phone(s) but also on Mega and on Telegram, where Herrera is said to have "created his own public Telegram group to store his CSAM." He also joined "multiple CSAM-related Enigma groups" and frequented dark websites with taglines like "The Only Child Porn Site you need!" Despite all the precautions, Herrera's home was searched and his phones were seized by Homeland Security Investigations; he was eventually arrested on August 23. In a court filing that day, a government attorney noted that Herrera "was arrested this morning with another smartphone -- the same make and model as one of his previously seized devices."
The government is cagey about how, exactly, this criminal activity was unearthed, noting only that Herrera "tried to access a link containing apparent CSAM." Presumably, this "apparent" CSAM was a government honeypot file or web-based redirect that logged the IP address and any other relevant information of anyone who clicked on it. In the end, given that fatal click, none of the "I'll hide it behind an encrypted app that looks like a calculator!" technical sophistication accomplished much. Forensic reviews of Herrera's three phones now form the primary basis for the charges against him, and Herrera himself allegedly "admitted to seeing CSAM online for the past year and a half" in an interview with the feds.
The material was allegedly stored behind password protection on his phone(s) but also on Mega and on Telegram, where Herrera is said to have "created his own public Telegram group to store his CSAM." He also joined "multiple CSAM-related Enigma groups" and frequented dark websites with taglines like "The Only Child Porn Site you need!" Despite all the precautions, Herrera's home was searched and his phones were seized by Homeland Security Investigations; he was eventually arrested on August 23. In a court filing that day, a government attorney noted that Herrera "was arrested this morning with another smartphone -- the same make and model as one of his previously seized devices."
The government is cagey about how, exactly, this criminal activity was unearthed, noting only that Herrera "tried to access a link containing apparent CSAM." Presumably, this "apparent" CSAM was a government honeypot file or web-based redirect that logged the IP address and any other relevant information of anyone who clicked on it. In the end, given that fatal click, none of the "I'll hide it behind an encrypted app that looks like a calculator!" technical sophistication accomplished much. Forensic reviews of Herrera's three phones now form the primary basis for the charges against him, and Herrera himself allegedly "admitted to seeing CSAM online for the past year and a half" in an interview with the feds.
fake images are now being treated as kiddie porn (Score:2, Insightful)
This is a very dangerous slope, why not comic books? Or actual books like Lolita? The whole point of making kiddie porn illegal to have is the theory that abuse occured in order to make it therefore making it illegal to have will prevent it from being made. If that goes out the window then it's just ruining people's lives for no reason.
Seems we should be encouraging people to make AI kiddie porn on the same basis that fake ivory is a thing.
There was a case involving a woman named Little Lupe who actually h
Re:fake images are now being treated as kiddie por (Score:5, Informative)
First, he allegedly recorded nude minor children himself and later "zoomed in on and enhanced those images using AI-powered technology."
Nothing fake about that.
Re:fake images are now being treated as kiddie por (Score:4, Insightful)
According to the quoted report, the suspect fed nude children imagery into an AI image generator.
For an AI image generator to be 100% clean and legal, we need to know the full data source fed into it and be sure there are no copyright violation nor nude real children. Else any AI generated CSAM will be suspected to be generated with real children victim behind the scene.
Re: (Score:2)
Most of the large training data sets have been found to contain illegal images. They were just scraped from the web and image libraries without much oversight.
Even the models that have been designed to not produce child abuse images are still creepy as hell. All the women look about 12 years old, but with massive boobs. These are the big players like Midjourney too.
Re:fake images are now being treated as kiddie por (Score:5, Insightful)
>The whole point of making kiddie porn illegal to have is the theory that abuse occured in order to make it therefore making it illegal to have will prevent it from being made.
That is most certainly NOT the only rationale. There's also a very scary argument that if a potential molester indulges in kiddie porn, it will lead to them eventually molesting real children. If you buy that argument, then stopping even artificial child porn (which, as others have noted, is not all that this guy was involved in) stops kids from getting raped.
That being said, there is a counter argument that the availability of artificial child porn (eg. child hentai in Japan) actually *reduces* the number of child molesters (see https://en.wikipedia.org/wiki/... [wikipedia.org]). According to that theory, potential molesters view kiddie porn instead of harming actual kids.
Personally I don't know enough to say for sure who is right. The one thing I do know is that we should do everything possible to stop child molestation. That means listening to the science ... even if that science contradicts our gut feelings.
Re: (Score:2)
"That means listening to the science ... even if that science contradicts our gut feelings"
There's about as much chance of that as me winning the Powerball without ever buying a ticket
Re: (Score:2)
Yep. "Caveman wants to apply big club to problem!" That has never worked, but usually makes things worse. But people do not learn and have no insight.
Re: fake images are now being treated as kiddie po (Score:2)
If COVID has taught us anything it's that a vocal minority of people don't give two cents about what science says, and somehow convinces even intelligent people in to ignoring it.
Social sciences also teach us that it's cheaper to prevent crimes by providing social services than it is to be reactionary and incarcerate people, and yet...
Re: (Score:2, Insightful)
The "science" kept you alive. Physically at least.
It appears brain death happened long before the virus hit unfortunately.
Re: (Score:2)
What exactly do you imagine science is? Like a magic Wizard of Oz figure that knows everything and tells everyone what to do?
It's not. Science is just human beings doing their best. Human beings doing their best will always fail sometimes ... but it's still better than not doing their best (ie. ignoring science).
Re: (Score:2)
It's acceptable for society to have standards. If the majority of Americans hold that sexualizing minors is undesirable behavior, there are legal avenues by which their elected officials may prohibit such sexualization.
It is imperative that the people fully understand what powers they've granted to law enforcement, as well as how law enforcement chooses to exercises those powers. It's also acceptable to question elected officials and/or law enforcement regarding any of these matters.
Ultimately, if the peo
Re: (Score:2)
These standards are not morally acceptable if they lead to more child abuse. In fact, one could easily argue that those setting such standards have a significant part in making the problem worse and hence are morally on a comparable level of what they pretend to "fight".
Incidentally, you just justified making being gay a criminal act, as it was for a long and dark time. Well done.
Re: (Score:2)
The availability and ease of storing such reprehensible content, and the right of a person to be safe in their effects and persons from an out of control surveillance state. It can't be a coincidence that some of this content was hidden behind Encryption. Many of us have noticed that news seems to be dropping those bits in more and more as if
Re: (Score:2, Troll)
You aren't going to convince many people that CSAM leads to less child abuse. You're also making the mistake of assessing how CSAM distracts pedophiles from potential rape victims without considering how CSAM affects those who aren't necessarily pedophiles (yet). Talk to any abuse counselor who treats victims of molestation and you'll discover that many victims become the abusers later in life. The same holds for exposing people to CSAM. Making it readily available and at least nominally acceptable is at
Re: (Score:2)
Spoken like one of those fanatics that do not mind doing utter evil, as long as their ideas of how the world should be (but not is) are met. Congratulations, you are part of the problem.
Re: (Score:2)
Generally I'm with drugs decriminalization and I support your comment that we should aim for policy that "standards are not morally acceptable if they lead to more child abuse" however that's not an absolute. The science around sexual things tends to be horribly badly done. The grandparent is just saying that people aren't convinced by it. They also give a specific example of scientific question that they claim isn't answered. I can add my own: even if the research shows that instantaneously today, fake CSA
Re: (Score:2)
Well, maybe not, but most of the people also used to be convinced that the Earth was flat, center of the universe, that maggots and flies could spawn from meat unassisted, etc...
You do have a point and theory about considering the wider pool of CSAM viewers and the effects on them. It is NOT a well understood or studied topic. Even just pornography is barely studied, though the balance of results there is that access to porn in society generally reduces sexual assault and rape.
That said, we have two oppos
Re: (Score:3)
It's acceptable for society to have standards.
No. If someone's behavior isn't harming others, it's no one else's concern.
No one is harmed during the creation of computer-generated kiddie porn. There is little evidence that it has a net effect of increasing actual sexual abuse, and some evidence that it has the reverse effect.
Personal anecdote: I've known a few "porn addicts" who spent much of their spare time ogling sexually explicit photos of adult women. None of them had sex with real women or even attempted to.
Re: (Score:2)
When the sources aren't computer generated, that makes the source material illegal to have. On top of that, encouraging others to view illegal things also ends up encouraging them to do more than just view them, but to also participate. The best way to stamp this stuff out is to keep people from making it in the first place, then it wouldn't be there to talk about, which would keep others who might be tempted to not be influenced by it.
Note that porn will be out there, but kiddie porn just isn't somethi
Re: (Score:2)
Reread your last sentence and then rethink your position.
Re: (Score:2)
It's acceptable for society to have standards. If the majority of Americans hold that sexualizing minors is undesirable behavior, there are legal avenues by which their elected officials may prohibit such sexualization.
Society is organized by legitimacy which requires broad consent of the governed to maintain. You can only use the legal system against outliers far beyond threshold of "majority of Americans" without eroding the states legitimacy and by doing so inflicting collateral damage on society.
The war on hookers and blow being examples of the consequences when people lose sight of legitimacy. While most people may believe these things are bad a staggering percentage roughly 15% have done them anyway regardless of
Re:fake images are now being treated as kiddie por (Score:5, Insightful)
That being said, there is a counter argument that the availability of artificial child porn (eg. child hentai in Japan) actually *reduces* the number of child molesters (see https://en.wikipedia.org/wiki/... [wikipedia.org]). According to that theory, potential molesters view kiddie porn instead of harming actual kids.
Personally I don't know enough to say for sure who is right. The one thing I do know is that we should do everything possible to stop child molestation. That means listening to the science ... even if that science contradicts our gut feelings.
That would be a good idea. Incidentally, research into the question is made basically impossible. You cannot get funding, getting permission is hard and protecing interview data and the like is basically impossible. It almost looks like some groups have no interest in finding out what the actual facts are. As having the actual facts would allow a real reduction in child abuse, this is pretty evil. Of course, child abuse happening serves a lot of interests: Law enforcement can claim more resources and claim great "victories", politicians can get even more invasive and abusive laws passed, fanatics of all kinds can point to child abuse to misdirect away from the evil they do, etc., ad nauseam. The whole thing is also eerily similar to the utterly failed "war on drugs".
Incidentally, there is hard data from non-child porn: Allow access and rape rates drop. Not to zero, but significantly. Same, incidentally, with prostitution, although that clearly is not an option here, except maybe for some role-play approaches. But it shows that substitution is significantly beneficial overall. Not investigating whether these benefits could be had for child abuse as well puts those that prevent that from happening on the same moral level as the child abusers.
Re: (Score:2)
Until they get into a relationship and have unfettered access to the age children that excites them. I would argue that psilocybin would be a more productive treatment for the perversion.
Re: (Score:2)
Yes, all criminals escalate: tobacco smokers turn to heroin, house-burglars turn to serial murder and lobbyists turn to bribing elected officials. Anyone have a problem with that line of thought: Except the last one, we know there's no humanity in elected officials?
As so many victims explain, criminals don't suddenly appear: They learn to be a criminal: Newspapers make a big deal when a criminal has history. Why, are they dishonestly demanding petty criminals spend their life in a chain-gang? Would
Re: (Score:2)
Re: fake images are now being treated as kiddie po (Score:2)
Brain Training (Score:2)
Do violent video-games make people violent?
Repeated exposure to violent and horrific images desensitize people to violence, even more-so when it is an active immersive training experience. Media does this, and video games are much more effective. (This effect happens with unrealistic cartoons like Bugs Bunny, but that is so far removed from reality that the effect is minimal and mostly ignorable.) But we're discussing highly realistic imagery here. This effect is due to neiroplasticity and the reward mechanisms of the brain. Do you disagree with the
Re: (Score:2)
Missing the point. Fundamentally, it is a thought crime. It's the thought that the authorities seek to extinguish, not actual abuse of minors.
Re: (Score:3)
Not at all. Degrade and transform that real photo enough and it looks like a drawing. And suddenly you have outlawed essentially everything.
Re: (Score:2)
I am merely pointing out that this approach does not work. And you are demonstrating you are to thick to understand that.
What does CSAM stand for? (Score:5, Insightful)
Re:What does CSAM stand for? (Score:5, Informative)
Re: What does CSAM stand for? (Score:3)
Re: What does CSAM stand for? (Score:5, Funny)
Well, today is the day you find out that you're definitely on a watch list.
Re: (Score:3)
I'm retired USAF - computer security, communications. We once had a briefing by the refuelers, the people who fly airplanes that give other airplanes more fuel.
The briefer had a bad tendency to use acronyms without spelling them out first. Just about every acronym he used had a matching computer/communication acronym that meant something completely different.
It's why it's officially required on proper paperwork to spell out acronyms the first use in the document, assuming you don't end up with a straight
Re:What does CSAM stand for? (Score:5, Insightful)
Yeah, but do I have to RTFA? I'd rather not.
Re:What does CSAM stand for? (Score:5, Funny)
Re: (Score:3)
RTFA is what you tell people who have only read TFS.
Re: (Score:2)
Funny thing is there is/was an actual system within the Department of Justice that actually shares the same name (CSAM) but it has nothing to do with CSAM at all. Last I heard they are in the process of changing this system because of the weird context that it has despite the fact it has no relationships with CSAM.
Re: What does CSAM stand for? (Score:3)
Child sex abuse material.
Re: (Score:2)
Re: (Score:2)
Some venues don't allow you to even use the word "porn" anymore. Try saying it on a YouTube vid that isn't going to be flagged 18+.
Re: (Score:2)
It's a definition thing. First, not all sexual activities or obscenities are considered to be pornography - regardless of whether someone is masturbating to it. Second, theoretically, everyone in pornography should be consenting legal ages. Children are not legal, nor can they consent, thus it's sexual abuse and not porn.
Re: (Score:2)
Child porn. I don't know why we need new terms and abbreviations for this.
I assumed it was because they wanted to explicate that it was child "Sexual Abuse" material. Which rules out fantasy material not involving any child. And it makes a nice code word, which is more polite.
"What to you do for a living?"
"I screen child porn."
vs.
"I audit materials related to the sexual abuse of children."
I guess. I don't work in the field.
Re: (Score:3)
The /. poster could have spelled it out, more like it. This was an incredibly confusing post for most of us, methinks.
Re: (Score:3)
News for cops. Stuff that shatters kneecaps of criminals?
Re: (Score:2)
Re: (Score:2)
I know we're a bunch of screamin' autists here, but it's like you nimrods never even heard of context clues.
Example: "I saw footage of a young Queen Elizabeth riding bareback on the BBC" clearly means you saw her on a horse on the telly, NOT what half you pervos think it does.
Now that we have AI, it will be more than half...
Re: (Score:2)
I know we're a bunch of screamin' autists here, but it's like you nimrods never even heard of context clues.
Example: "I saw footage of a young Queen Elizabeth riding bareback on the BBC" clearly means you saw her on a horse on the telly, NOT what half you pervos think it does.
I didn't see the original, but I saw the listing for a documentary about royals dealing with the media. It was labeled "Young Queen's First Bareback Experience On The BBC". Either that, or it was a trans porno or something....very confusing!
"Despite all the precautions-" (Score:2)
Re: (Score:3)
Right? But also, does Telegram disclose the identity of their users? My understanding is that they do not, which is why that guy got arrested in France this week.
I would also like to know how law enforcement accessed the content of this person's phone.
Re: (Score:2)
"I would also like to know how law enforcement accessed the content of this person's phone"
Manufacturer backdoor which they'll never admit to
Re: (Score:2)
Manufacturer backdoor which they'll never admit to
15 minutes in a back room with a wrench, which they'll never admit to
Re: (Score:2)
Obligatory XKCD?
https://xkcd.com/538/ [xkcd.com]
Re: (Score:3)
My understanding is that they do not, which is why that guy got arrested in France this week.
No. The guy who got arrested in France this week had an openly published sheet of charges from the prosecution and precisely none of them had to do with "disclosing identity of users".
Re: "Despite all the precautions-" (Score:3)
What is even stupider, clicked on the Feds' trap link without a proxy or at least the TOR he had, and gave them his IP address. A pro in perversion, a lamer in computer security, despite his eclectic sh!tload of tools.
Re: (Score:2)
And then proceeds to use a zoo of tools, clearly without overall strategy or risk assessment. Nobody understands KISS these days.
Re: (Score:2)
- creates public telegram group for child porn.
Honestly, the headline is one of those scare-tactic clickbait bullshit ones. "Don't trust encryption! IT FAILED!" It's stupid, but I guess it got us to click. *SHRUG*
Not to be in his side... (Score:2)
I don't want to sound like I'm on his side or anything, but it sounds like they shouldn't be able to know what's in all these places on his encrypted devices. It almost looks like they obtained all the evidence illegally, but the honeypot was their parallel construction to give them a reason to "search" his phones.
If it didn't involve children, people would be more willing to question whether anyone's rights were violated.
It's true that it sounds like the guy used every single encryption option available,
Re: (Score:3)
IANAL but it sounds reasonable to me. They didn't knock on his door and try to convince him to look at child porn that he otherwise would have avoided. He clearly and (seemingly) unambiguously went looking for it.
Entrapment is dodgy. This doesn't seem to be that. Searching his devices seems correct because these are the tools used in commission of the offences.
But what do I know? I'm an uninformed idiot with an opinion.
Re: (Score:2)
Yeah nat a lawyer either but entrapment specifically as I understand it is someone coercing you into commiting a crime that you would not otherwise commit and that last part is the important one. If an undercover says "Hey, you wanna go do a crime?" and you agree without much convincing, not entrapment. Could be something else legally though.
Re: (Score:2)
You basically got it, but it also requires one be capable of doing the crime too.
So if they say "hey, get me a kilo of cocaine, you'll be rich" and you go "boy golly, that sounds great" but you are a normal person that doesn't know how to go about getting a kilo of cocaine, they can't then have a guy walk up to you offering to sell you cocaine and bust you.
Re: (Score:2)
have a guy walk up to you offering to sell you cocaine
I bet we know this as precedent because a PD tried exactly that at some point in time. "Hello fellow kids, can I interest you in some kyocaine?!"
Re: Not to be in his side... (Score:2)
We don't really wish to tolerate predatory behavior in our society when children are involved. Seems pretty natural to want to protect children from a likely threat before it strikes.
Is it bordering on predicting thought crime? Maybe. But if there were leopards sleeping in my village I would be pretty concerned for the children even if they seemed like they haven't yet eaten any babies. Because being a predator is in their nature and it's bound to happen eventually.
So it's no coincidence that we use the pre
Re: (Score:2)
It almost looks like they obtained all the evidence illegally, but the honeypot was their parallel construction to give them a reason to "search" his phones.
Honeypots are not illegal, and there seems to be no evidence of parallel construction here.
Re: (Score:2)
Re: Not to be in his side... (Score:2)
He had *many* encrypted apps? (Score:4, Informative)
And he thought that would make it *harder* for the cops to get at his data?
Re: (Score:2)
That was my first thought.
It was a weird framing of the story that his opsec was good, sounds like it was a mess to me. A dunning Kruger of opsec.
Re: (Score:2)
The interesting question is whether the framing is due to more Dunning-Kruger or an intentional lie by misdirection.
Re: (Score:2)
I suspect the thought was if the cops only find 1000 of my images I'll only get 1/10th of the punishment.
Re: (Score:2)
Apparently though. Complete IT security management failure. The idea to throw (more) tools at the problem of IT security is found in professional settings as well. It hardly ever works out.
Re:He had *many* encrypted apps? (Score:4, Informative)
It's hard to say what he was thinking, given he ran a Telegram channel with this stuff. Telegram channels are unencrypted, so at best you can just make them unlisted or invite only the people you want.
Re: (Score:2)
Telegram channels are unencrypted, so at best you can just make them unlisted or invite only the people you want.
That's what you get for letting in FedMan69 asking "Sir, please grant expedited access to this telecommunications channel".
Anecdotal proof that... (Score:5, Insightful)
It's just one case, but it goes to show that the feds don't need to break encryption to do their job.
Re: (Score:2)
Indeed. As always, a capability to easily break encryption serves one purpose: Cheap mass surveillance. Of course, the lies to obscure this fact vary.
Re: (Score:2)
Are you an idiot? There are plenty of other ways to find criminals.
For us Cobol users ... (Score:2)
Re: (Score:2)
Also Autosys has a CSAM component too (no idea what exactly that abbreviation means here).
Re: (Score:2)
Also Autosys has a CSAM component too (no idea what exactly that abbreviation means here).
ChatGPT comes to the rescue: In the context of AutoSys, which is a job scheduling and workload automation tool, CSAM stands for CA Secure Sockets Adapter Manager.
What is the story here? (Score:2)
IT security is not a subject where you can just throw tools at the problems in order to get a good solution. Instead, you must do risk analysis and strive for complete coverage of all relevant risks. Have one hole in there that attackers can reasonably be expected to find and you are done for.
In the case at hand, it sounds to me like this person had all these tools, but no understanding of how to turn them into an effective protection architecture.
Re: (Score:2)
So your take is this is about data given to a service provider being there forever and being visible even if it is Telegram? Does that really need a story?
Re: (Score:2)
That is that there is absolutely no backdoor needed in encryption technology ever because there will always be a way to find illegal activities without it, so it's not worth harming innocent people with weaker encryption.
I agree. Well said.
The real question is (Score:2)
Is he a drag queen? That's what inquiring minds want to know. Or is he like these folks [imgur.com]?
hahaha (Score:2)
Re: (Score:2)
Probably Rooted His Phone (Score:2)
He was flagged for hitting the honeypot and targeted. Most likely they found out which phones he was using and targeted his phone. Installed a rootkit and stole his passwords.
How can they install rootkits? You can compel an "app store" to install it on a targeted phone. When people hear about CP they fall all over themselves to cooperate.
Harder is they physically confiscated his phone either coped it to a hacked version of his phones internal electronics (using the old phone shell) or replaced a few chips
Re: (Score:2)
Biometrics and notification enabled on lockscreen (Score:2)
I wonder if he had enabled biometrics on the device as well as notification on the lock screen? If he didn't enable biometrics and had only a pin/password/pattern on the device and also not have notifications enabled on the lock screen of these devices I wonder if law enforcement can compel him to provide the pin/password/pattern to unlock the device and possibly incriminate himself.
Or perhaps they used some other means to get into the device, i.e. some un-reported 0-day exploit.
CSPAN images (Score:2)
Despite His Many Encrypted Apps (Score:2)
Despite His Many Encrypted Apps
the operative word there is probably 'many'
Operational security online is a INCREDIBLY difficult. There are just so so so many ways you can get unmasked. Running multiple encrypted apps might even be one of them. Oh look at the box that is connecting A, B, F, Q, Y, and Z 'secure communications tools' constantly. Hmm I wonder if that is a mostly unique identifier...
If someone with enough resources, and incentive wants to tie you to something online they likely can; unless you are being incredibly careful.
Infosec fail: device, app, or practices (Score:2)
So many ways to fail:
Re: (Score:2)
"Anyway, being in a picture with a bad guy, that's bad! Wanna see the ones with Slick Willy?"
Or Bill Gates, Prince Andrew or whoever the fuck, lock them all up
Re: (Score:2)
Another unintended side effect of AI ... incriminating photographs are no longer very incriminating, since it's quite plausible they were fabricated.
Re: (Score:2)
Slick Willie isn't so relevant to today.
But I suspect the reason the Epstein investigations were always cut short (it wasn't like it was news the last time he was arrested, he got a sweet deal in Florida for example) is because he was non partisan and his visitors are from all types of upper echelons. Probably by design even.
Re: (Score:2)
From my limited research on the man, Epstein was the type where he deliberately invited, or invited himself, to visits with as much "upper echelon" people as he could. Rich people, politicians, stars, athletes, you name it.
Even if they didn't actually do anything untoward at one of his parties. If nothing else, not everybody had the kinks that Epstein supported, so he'd have to canvas a lot of people to find the ones interested.
In any case, whether or not somebody liked his parties, or his parties, they h
Re: (Score:2)
Re: (Score:2)
I doubt they brute forced the key, a phone is fine for encrypting.
Re: (Score:2)
That is bullshit. Even an much more "puny" 8-bit Arduino can do secure encryption, just not very fast.
Re: (Score:2)
Check the calendar, we aren't discussing Windows Mobile 2003. Encryption was enabled in Android 5 (2014), and even if held back in some devices for performance reasons by the time the next version came it was generalized. iOS had it since earlier. And yes, they're using algorithms that are as unbreakable as it gets, that isn't the problem. Depending on the implementation you might get various key handling/secu