The authorities apparently got tired of asking and just went in themselves.

Canada-based Windscribe, a VPN provider, just said that one of its European servers has been allegedly seized by Dutch authorities without a warrant. According to the company’s post on X, law enforcement said that they will return it to the service provider after they “fully analyze it.” It’s unclear why law enforcement impounded just a single rack from Windscribe’s cabinet, but the VPN provider said that it only uses RAM disk servers, meaning anyone who would look through the installed SSDs would only find a stock Ubuntu install on it, so the servers shouldn’t hold any trackable data.

  • carrylex@lemmy.world
    link
    fedilink
    English
    arrow-up
    56
    arrow-down
    3
    ·
    edit-2
    29 days ago

    Too sumarize the article:

    US clickbait and ad infested news website directly quotes “trust me bro” Twitter post + describes in 2 sentences what a ramdisk is and does zero real “journalism” like maybe contacting mentioned dutch authorities or Windscribe themselfs.

    Once again: Ban Tom’s Slopware. Post the original source instead.

          • FartsWithAnAccent@fedia.io
            link
            fedilink
            arrow-up
            5
            arrow-down
            1
            ·
            29 days ago

            Yes but that doesn’t answer the question of whether it’s an accepted practice in the EU. I’m also not so sure it isn’t somehow codified into law, in the US there’s precedents supporting it but IDK about other countries.

            • Cethin@lemmy.zip
              link
              fedilink
              English
              arrow-up
              6
              ·
              29 days ago

              The point is that it skirts the law. You can’t really make it illegal because it is a way of subverting legality. If they legally obtain the evidence then it’s legally obtained. If they happened to get to that point through extra-legal means that doesn’t really matter, as long as the end result is legal. Maybe you could argue in court that they only got there because of extra-legal actions, but they can argue the opposite. If this helps them look in the right spot for illegal actions, who’s to say that them looking there couldn’t have happened purely by chance?

              • FartsWithAnAccent@fedia.io
                link
                fedilink
                arrow-up
                1
                ·
                28 days ago

                You really can make it illegal if there’s the political will to do so, but it’s a hot potato, so the likelihood of of the practice being formally reigned in is unlikely. You make fruit of the poisonous tree absolute and create laws that make illegal search or seizure kill investigations without the possibility of future charges for a given criminal act.

                Obviously that would also have practical drawbacks as well, but it is certainly legally possible.

        • rollin@piefed.social
          link
          fedilink
          English
          arrow-up
          14
          ·
          29 days ago

          It basically means dodging legal restrictions on investigation by using illegal (or at least inadmissible) means to obtain evidence, and once the police have it, they look for legal ways to get that same information.

          So everywhere “has it”, the question is whether they use it. I don’t know if there’s reason to believe that EU police forces use such methods more or less than their US counterparts.

          • FartsWithAnAccent@fedia.io
            link
            fedilink
            arrow-up
            3
            ·
            29 days ago

            I know what it is, but that doesn’t mean it’s an accepted practice in the EU. I don;t really know much about how their law works, which is why I asked about it.

  • NepGinger@lemy.nl
    link
    fedilink
    English
    arrow-up
    21
    arrow-down
    1
    ·
    30 days ago

    What authorities exactly? How did they get their hands on these servers without being let in? Do they have a response to this all being put on twitter? Even the article doesn’t mention reaching out to “Dutch authorities” for comment, in a great journalistic failure to clarify anything.

  • TheObviousSolution@lemmy.ca
    link
    fedilink
    English
    arrow-up
    12
    ·
    29 days ago

    Free advertising for Windscribe if their claims are true. Also a lot of people in the thread spreading fud about it without any real evidence. I know because I actually tried to search for it. They are based in Canada and as such part of the Nine Eyes group, but they have a heavy no-logs focus towards privacy. What was seized was one of their Dutch proxies running on ram drives. They could put all the effort they want into preserving power, it doesn’t mean much if all they don’t have any logs except the vaguest of statistics. It doesn’t matter how mature they are if the privacy practices are there.

  • AllNewTypeFace@leminal.space
    link
    fedilink
    English
    arrow-up
    6
    ·
    29 days ago

    Police have UPS-like devices which splice into existing mains cables to keep machines alive on the way into the forensics lab. Presumably it’s standard practice to use those.

    Of course, the server could be configured to wipe itself if it loses connectivity for more than a few seconds, or its routing changes. The police would need devices that route Ethernet traffic over 5G, though those would presumably be detectable as bandwidth goes down and latency goes up.

    • glitch1985@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      29 days ago

      No clue if data centers in other countries are similar to the ones in the US but the handful I’ve been in are basically Faraday cages with zero cellphone service inside so it would be quite the feat keeping any kind of internet connection after the ethernet cable is removed.

  • vacuumflower@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    29 days ago

    Oh no, without a warrant. How could they. How impolite. No, our security is only intended for jurisdictions with law-abiding police.

    • Saledovil@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      12
      ·
      29 days ago

      Fun fact, but you can’t really do much if the police decide to just take your stuff, because they have guns. And likely more than you do.

      • vacuumflower@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        3
        ·
        28 days ago

        Yes. They should perhaps dispose of that server when returned, or thoroughly examine all the firmware and such for changes. A hostile party has touched it.

  • Zephorah@discuss.online
    link
    fedilink
    English
    arrow-up
    6
    ·
    30 days ago

    To what end? What authority? At this point it could be you or me in a mask with a body cam, for all the credentials authorities are showing these days.

    Spoiler: it was a random thief in need of hardware.

    • P1nkman@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      29 days ago

      The thief just want to set up their own gaming server; issue is that it’s too expensive to purchase, so it’s easier to steal it.

    • FalschgeldFurkan@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      29 days ago

      No, this is just why you don’t use Windscribe.

      They have a reputation for being in a legislation where they have to save logs. They themselves know that they’re the “black sheep” among VPN providers, which is why they continuously make cheap offers and use raunchy advertising, like this one:

      Doesn’t take a genius to figure out that their VPN is likely insecure