this post was submitted on 08 Feb 2026
416 points (96.0% liked)

Technology

80859 readers
2949 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

The authorities apparently got tired of asking and just went in themselves.

Canada-based Windscribe, a VPN provider, just said that one of its European servers has been allegedly seized by Dutch authorities without a warrant. According to the company’s post on X, law enforcement said that they will return it to the service provider after they “fully analyze it.” It’s unclear why law enforcement impounded just a single rack from Windscribe’s cabinet, but the VPN provider said that it only uses RAM disk servers, meaning anyone who would look through the installed SSDs would only find a stock Ubuntu install on it, so the servers shouldn't hold any trackable data.

top 50 comments
sorted by: hot top controversial new old
[–] vacuumflower@lemmy.sdf.org 2 points 40 minutes ago

Oh no, without a warrant. How could they. How impolite. No, our security is only intended for jurisdictions with law-abiding police.

[–] zer0bitz@lemmy.world -3 points 5 hours ago (2 children)

That is why you dont use VPN. See you guys in I2P.

[–] Psythik@lemmy.world 8 points 3 hours ago

Mullvad is safe. They were raided and the authorities got nothing.

[–] FalschgeldFurkan@lemmy.world 4 points 3 hours ago

No, this is just why you don't use Windscribe.

They have a reputation for being in a legislation where they have to save logs. They themselves know that they're the "black sheep" among VPN providers, which is why they continuously make cheap offers and use raunchy advertising, like this one:

Doesn't take a genius to figure out that their VPN is likely insecure

[–] carrylex@lemmy.world 70 points 19 hours ago* (last edited 18 hours ago)

Too sumarize the article:

US clickbait and ad infested news website directly quotes "trust me bro" Twitter post + describes in 2 sentences what a ramdisk is and does zero real "journalism" like maybe contacting mentioned dutch authorities or Windscribe themselfs.

Once again: Ban Tom's Slopware. Post the original source instead.

[–] Auster@thebrainbin.org 16 points 17 hours ago

There's that legal jargon that comes to mind, fishing expedition

[–] NepGinger@lemy.nl 76 points 23 hours ago

What authorities exactly? How did they get their hands on these servers without being let in? Do they have a response to this all being put on twitter? Even the article doesn't mention reaching out to "Dutch authorities" for comment, in a great journalistic failure to clarify anything.

[–] gressen@lemmy.zip 50 points 22 hours ago* (last edited 22 hours ago) (1 children)

Got it, do not use IT services in ~~Denmark~~ Netherlands.

[–] deadmyk@lemmy.world 68 points 22 hours ago (4 children)

Dutch is not Denmark. Dutch is Netherlands

[–] sunbeam60@feddit.uk 25 points 20 hours ago (5 children)

“Oh you’re Danish! You should meet my friend Geert Van den Berg, he’s also from Dutchland!”

If I had a penny for every time, I’d have at least three fiddy.

[–] NeilBru@lemmy.world 4 points 4 hours ago

Tree-fiddy.

[–] P1k1e@lemmy.world 9 points 19 hours ago (1 children)

Goddamn it Loch ness Monster.....

[–] regedit@lemmy.zip 8 points 18 hours ago (1 children)

Right? I use lemmy to avoid dinosaurs from the Paleozoic era, not to interact with them!

[–] vrek@programming.dev 1 points 9 hours ago

Look, I know I am no longer young and hip but calling me a dinosaur hurts my feelings...

[–] einkorn@feddit.org 5 points 19 hours ago (1 children)

Also, turns out Geert is from Germany and not the Netherlands.

[–] sunbeam60@feddit.uk 2 points 4 hours ago

Cries in European.

load more comments (2 replies)
[–] lesinge@sh.itjust.works 21 points 22 hours ago

An important distinction lol

load more comments (2 replies)
[–] Darkcoffee@sh.itjust.works 107 points 1 day ago (9 children)

Whatever they find is inadmissible, if there truly wasn't a warrant.

[–] jeansburger@piefed.world 78 points 1 day ago (1 children)

Doesn't mean they can't use it for parallel construction

[–] FartsWithAnAccent@fedia.io 12 points 21 hours ago (2 children)

Does Dutch/EU law have that?

[–] jeansburger@piefed.world 13 points 16 hours ago (1 children)

https://en.wikipedia.org/wiki/Parallel_construction

It's not a law but a practice that cops do in order to use dubiously acquired evidence to build a case against someone.

[–] FartsWithAnAccent@fedia.io 6 points 14 hours ago (1 children)

Yes but that doesn't answer the question of whether it's an accepted practice in the EU. I'm also not so sure it isn't somehow codified into law, in the US there's precedents supporting it but IDK about other countries.

[–] Cethin@lemmy.zip 1 points 12 minutes ago

The point is that it skirts the law. You can't really make it illegal because it is a way of subverting legality. If they legally obtain the evidence then it's legally obtained. If they happened to get to that point through extra-legal means that doesn't really matter, as long as the end result is legal. Maybe you could argue in court that they only got there because of extra-legal actions, but they can argue the opposite. If this helps them look in the right spot for illegal actions, who's to say that them looking there couldn't have happened purely by chance?

[–] rollin@piefed.social 22 points 19 hours ago (1 children)

It basically means dodging legal restrictions on investigation by using illegal (or at least inadmissible) means to obtain evidence, and once the police have it, they look for legal ways to get that same information.

So everywhere "has it", the question is whether they use it. I don't know if there's reason to believe that EU police forces use such methods more or less than their US counterparts.

[–] FartsWithAnAccent@fedia.io 3 points 14 hours ago

I know what it is, but that doesn't mean it's an accepted practice in the EU. I don;t really know much about how their law works, which is why I asked about it.

load more comments (8 replies)
[–] Zephorah@discuss.online 33 points 22 hours ago (1 children)

To what end? What authority? At this point it could be you or me in a mask with a body cam, for all the credentials authorities are showing these days.

Spoiler: it was a random thief in need of hardware.

[–] P1nkman@lemmy.world 7 points 20 hours ago (4 children)

The thief just want to set up their own gaming server; issue is that it's too expensive to purchase, so it's easier to steal it.

[–] Zephorah@discuss.online 2 points 4 hours ago

Good odds that type of thing is happening more than is being told.

load more comments (3 replies)
[–] AllNewTypeFace@leminal.space 8 points 19 hours ago (1 children)

Police have UPS-like devices which splice into existing mains cables to keep machines alive on the way into the forensics lab. Presumably it’s standard practice to use those.

Of course, the server could be configured to wipe itself if it loses connectivity for more than a few seconds, or its routing changes. The police would need devices that route Ethernet traffic over 5G, though those would presumably be detectable as bandwidth goes down and latency goes up.

[–] glitch1985@lemmy.world 2 points 8 hours ago

No clue if data centers in other countries are similar to the ones in the US but the handful I've been in are basically Faraday cages with zero cellphone service inside so it would be quite the feat keeping any kind of internet connection after the ethernet cable is removed.

[–] flowers_galore2@lemmynsfw.com 28 points 1 day ago (3 children)

RAM disks alone will not be enough; the law enforcement can literally freeze the DRAM for forensics.

[–] BozeKnoflook@lemmy.world 21 points 1 day ago (3 children)

Police have had, since the late 90s I think, the "Hotplug" which is a special battery pack / generators that provide a special power plug where you can gently loosen the existing plug, slide the generator's plug in place over it, then remove the computer from the main supply while keeping it powered on.

Power plug locks only buy you time or prevent casual mayhem; the police can work around those.

[–] Strawberry@sh.itjust.works 13 points 1 day ago* (last edited 23 hours ago) (4 children)

I'm intrigued how that would work with some styles of plug that disconnect before coming out of the socket like the uk type-G plugs. Unless they're not touching the socket itself and connecting somewhere else? I have no idea, i'm not an electrician.

[–] Passerby6497@lemmy.world 24 points 22 hours ago (1 children)

It doesn't matter for server class hardware, they generally have dual PSUs to ensure they stay up if one of the two lines fails. So unplug one side, plug in your backup/mobile supply, the disconnect everything else and then run away with the blade

[–] Strawberry@sh.itjust.works 3 points 19 hours ago

oh yes that makes a lot of sense for server stuff. I imagine that may be quite useful for general use & maintenance too.

I'm too caught up thinking of consumer stuff.

load more comments (3 replies)
[–] DancingTable@lemmy.world 6 points 20 hours ago (2 children)

Should build the software so the second it loses internet connection, or its IP address changes, it clears the ram.

Cannot move a server without it losing internet, and even if they find a way around it, it’d still force an IP address change.

[–] CosmicTurtle0@lemmy.dbzer0.com 7 points 17 hours ago (1 children)

The DevOps way is to have them die at regular intervals in addition to other triggers and then rebuild on a regular cadence. Iirc correctly Netflix servers have a 12 hour TTL. Windscribe could easily do a 1-2 hour TTL with matching certs and encryption keys.

[–] oftenawake@lemmy.dbzer0.com 1 points 12 minutes ago

Surely the servers aren't running on bare metal anyway? So wouldn't they just keep the virtual servers in ram and destroy them regularly to redeploy from an image? (I have no idea - I was a web dev 20 years ago!)

But it seems like when you have imaginary "computers" that can be regularly destroyed and rebuilt at little cost or hassle, there shouldn't be much point in trying to capture or examine the actual hardware because all it's doing is managing virtual machines existing in ram?

[–] BanMe@lemmy.world 3 points 19 hours ago

Seems trivial to code in a beacon dependency and then embed that beacon in the walls or floor so the police would have to dismantle the entire building before being able to find it and take it along for the ride. Or heck a combination of beacons so the police don't know how many to look for.

[–] MonkderVierte@lemmy.zip 11 points 22 hours ago* (last edited 22 hours ago)

While it is running or seconds after...

load more comments (1 replies)
load more comments
view more: next ›