this post was submitted on 16 Sep 2025
1115 points (97.9% liked)

Technology

571 readers
1830 users here now

Share interesting Technology news and links.

Rules:

  1. No paywalled sites at all.
  2. News articles has to be recent, not older than 2 weeks (14 days).
  3. No external video links, only native(.mp4,...etc) links under 5 mins.
  4. Post only direct links.

To encourage more original sources and keep this space commercial free as much as I could, the following websites are Blacklisted:

More sites will be added to the blacklist as needed.

Encouraged:

Misc:

Relevant Communities:

founded 4 months ago
MODERATORS
 

Comments

Relevant legal documents

Source: Reddit- Private front-end.

(Eastern District of Michigan - Detroit)

My husband, Conrad Rockenhaus, is wrongly incarcerated in a county jail. I’m posting this here because you are one of the few communities that will understand the full technical and political reality of how he ended up there.

My husband is a former Tor operator, and at one point, he ran some of the fastest relays and exit nodes in the world.

This nightmare began when he refused to help the FBI decrypt traffic from his exit nodes.

Months later, the government arrested him. Their official reason? A minor, non-violent CFAA charge from an old workplace dispute that had nothing to do with Tor.

In fact, the statute of limitations was just a couple of months from expiring. It was a clear pretext to target him.

That minor charge was all they needed to get him into the system. To deny him bail, a U.S. Probation Officer in Texas lied under oath, telling a judge that Conrad had installed a "Linux OS called Spice" to "knock out their monitoring software" and access the "dark web."

Read the transcript

Here is the technical reality of their lie: The software was a standard SPICE graphics driver needed for his Ph.D. program. As many of you know, this is a basic utility for displaying graphics from a virtual machine. It is not an OS, has no connection to the dark web, and was technically incapable of interfering with their monitoring software.

The claim is a technical absurdity, equivalent to saying a mouse pad can hack a server.

Based on that lie alone, he was held in pre-trial detention for three years.

Now, the retaliation has escalated in Michigan. After I filed a formal complaint against his US probation officers for harassment, they used fraudulent warrants to jail my husband again.

During this violent arrest by US Marshals (who smashed in our windows and nearly shot my dog) he sustained a severe head injury that caused him to have a grand mal seizure in court. The jail’s “medical attention” was to ask him what year it was (he said 2023) and then send him back to his cell. He is being denied real medical care.

See videos:

To make matters worse, U.S. District Judge Stephen J. Murphy, III has created a procedural trap that has stripped my husband of his right to a lawyer to fight for his life, health, or innocence. He is trapped in a constitutional and medical crisis.

I am not asking for money. I am asking for your help to amplify this story. You understand the technical truth and why this fight is so important.

We have all the evidence: the court transcript of the false testimony, the fraudulent warrants, the proof of medical neglect. It’s documented on my website:

https://rockenhaus.com/

TL;DR: My husband, a former Tor operator, refused to help the FBI decrypt Tor traffic. They retaliated by using an old, unrelated CFAA offense to arrest him and then lied about him using a "graphics driver to access the dark web” to keep him in pre-trial detention for 3 years. Now he's been jailed again in Michigan on fraudulent violations, is being denied care for a head injury, and has no lawyer.

I need help getting the word out🙏

Adrienne Rockenhaus

For updates:

More Context from her comment:

Seeing a lot of questions and some misinformation in the comments, so I wanted to clarify a few key facts with sources:

  • On the original case: My husband did not have a trial. He took a coerced guilty plea in Texas after being held for three years based on perjured testimony about a "SPICE graphics driver." We have the court transcript proving the perjury on our website.
  • On the violent arrest: The claim that my husband was "combative" is a complete fabrication, likely being spread to justify the U.S. Marshals' actions. We have the unedited security camera footage of the entire raid, and it proves the opposite.
  • On the relevance of Tor: The government's retaliation against our family began after my husband, a Tor exit node operator, refused to help the FBI decrypt traffic. They then used an unrelated workplace dispute as the pretext for the initial charge. The entire case stems from his support for online privacy.

Even More Context:

I'm seeing comments about a deeply offensive search term ("NAMBLA") that the prosecution brought up in my husband's 2020 hearing in Texas, and I want to address it directly so there is no confusion. The search was for an article my husband was writing for Encyclopedia Dramatica, a well-known (and very controversial) satirical wiki that parodies offensive topics. He was researching the topic to make fun of it, much like the show South Park did in a famous episode. The prosecution knew this search was irrelevant to the case, but they put it in front of the judge anyway . This is a classic "poison the well" tactic, using something shocking and out-of-context to prejudice a judge against a defendant. It's a hallmark of a malicious prosecution. While they want everyone distracted by this, the real issues are the ones they can't defend: the fraudulent warrants, the perjured testimony, the ongoing medical neglect, and the judge's documented conflict of interest.

(page 3) 50 comments
sorted by: hot top controversial new old
[–] bort@piefed.world 28 points 16 hours ago (3 children)

From tptacek on ycombinator:

OK, I think I found the original thing Rockenhaus was convicted of. Back in 2014, Rockenhaus worked for a travel booking company. He was fired. He used stale VPN access to connect back to the company's infrastructure, and then detached a SCSI LUN from the server cluster, crashing it. The company, not knowing he was involved, retained him to help diagnose and fix the problem. During the investigation, the company figured out he caused the crash, and terminated him again. He then somehow gained access to their disaster recovery facility and physically fucked up a bunch of servers. They were down a total of about 30 days and incurred $500k in losses. (He plead this case out, so these are I guess uncontested claims).

[–] arararagi@ani.social 21 points 15 hours ago

So he deserves being beaten for running a TOR node now?

[–] eah@programming.dev 15 points 15 hours ago

Relevant:

Screwing with your current or former employer: not a great idea.

load more comments (1 replies)
[–] Hector@lemmy.world 28 points 17 hours ago (1 children)

Can you paste more of the story in here under a comment or something? I think a lot of people would be interested, but maybe not to click the link if the link even worked and was not blocked.

[–] Pro@programming.dev 22 points 17 hours ago

I just did that.

:)

[–] bluGill@fedia.io 15 points 16 hours ago (4 children)

The comments at https://news.ycombinator.com/item?id=45261163 give the other side of the story and paint a compelling picture that this guy has done unrelated crimes (that he was convicted of) and should be in prison.

[–] CileTheSane@lemmy.ca 4 points 13 hours ago

Why are we being linked to the comments of Randos for "the other side of the story" instead of a source?

load more comments (3 replies)
[–] NoodlePoint@lemmy.world 7 points 14 hours ago

Everytime the FBI is now mentioned, the first image I get is an eager-beaver looking director with a "got mine, fuck you" mindset.

[–] malloc@programming.dev 11 points 15 hours ago

This is sadly nothing new. The militarization of domestic law enforcement agencies since the 1980s has only made it worse.

[–] sexy_peach@feddit.org 14 points 16 hours ago

Damn we live in dark times.

[–] sp3ctr4l@lemmy.dbzer0.com 10 points 16 hours ago (4 children)

... Horrifying as this all is:

Further evidence that TOR is far from safe or secure.

[–] CosmicTurtle0@lemmy.dbzer0.com 15 points 15 hours ago (1 children)

Tor is safe so long as you are considering your OpSec. Decrypting an exit node would only show the police where a connection is going and can only tie it to the middle node.

They would have to have access to each layer to affirmatively link one connection to a specific website. Not impossible but the number of people at each layer makes this challenging.

If you need security, you should be cycling your tor connection frequently and using an OS like Tails to resist fingerprinting.

I've never run an exit node but honestly it's the weakest point in the tor network since it bares the most risk. It's why Tor is always looking for more people to run exit nodes so that the risk is spread across multiple end points.

[–] sp3ctr4l@lemmy.dbzer0.com 6 points 15 hours ago* (last edited 15 hours ago)

And how do you know that any of the nodes your traffic is traversing... are not honey pots? Run by an intel or LE agency, or multiple of them collaborating or whatever?

Or that they're not, untill something like this happens, and then they are?

This kind of thing has been done before, yes, its difficult to backtrace a real identity out of TOR, but it has beem done.

I guess I am not trying to say TOR offers no, 0, additional security/privacy... as you say, depends a lot on your use case and the rest of your set up... but I also do not think TOR is anywhere near as secure as the ... uh, general security enthusiast community, for whom 'opsec' is more or less 'i installed the secure app'... or whatever you want to call them, thinks it is.

[–] mumblerfish@lemmy.world 4 points 14 hours ago (1 children)
[–] sp3ctr4l@lemmy.dbzer0.com 1 points 8 hours ago (1 children)

The super short version is that if your traffic gets bounced through enough transit nodes, which are honey pots, you can be deobfuscated.

We know this because this has happened before.

This, this story happening, shows that the FBI is very, very actively interested in there being at least one less node that they do not control.

load more comments (1 replies)
load more comments (2 replies)
[–] misteloct@lemmy.dbzer0.com 5 points 14 hours ago* (last edited 3 hours ago) (25 children)

Edit: looks like OP addressed these concerns in an update. I don't regret skepticism but it's clearly an insane civil rights abuse, possibly to forcibly suppress privacy by targeting Tor Node operators directly. This is unprecedented, but also not surprising to me. Misinformation is one hell of a drug, read my post below anyways and don't forget it had 20 upvotes before this edit. We all were fooled for a minute.


Original comment:

Another user brought up the witness testimony. I have no issue posting it because it's critical to determining if this is a privacy violation or simply CSAM abuse, possibly the only useful function of the FBI anymore:

Let me ask you about an entry. It's the last page of the first set of documents in Government's Exhibit 2. The entry is 2:10 a.m. a Google search for North American Man/Boy Love Association. That is not in any way associated with -- is that associated with the dark web or is that a separate search? THE WITNESS: No, that's an open web search that was conducted from the computer.

I did not get a sense after reading the testimony that the FBI had much wrongdoing here. Not saying we can completely trust the testimony or that Rockenhaus did bad things in reality. But that testimony was not even addressed by Mrs. Rockenhaus and therefore I'm immediately skeptical of anything she said about wrongful incarceration. This is not a high profile case where I'd suspect fuckery either, like Luigi Mangione. The FBI should not be violating our privacy, but they did not do that here, at least openly. They incarcerated a possible pedophile who happened to run Tor Nodes. Tor project themselves say running a Tor Node is unlikely to put you at risk.

If I were on a jury I'd be inclined to side with the witness and say Rockenhaus is possibly guilty of wrongdoing.

[–] thebeardedpotato@lemmy.world 13 points 14 hours ago (8 children)

Isn’t that search a reference to a South Park episode?

[–] misteloct@lemmy.dbzer0.com 0 points 10 hours ago* (last edited 10 hours ago)

If it is, I wouldn't be using my computer to search it if I was being monitored. Your point is he's probably innocent. It's possible but I do not have "no reasonable doubt" any more.

Actually if possible I'd avoid unnecessary internet searches completely during the period of being monitored. Privacy tools or bust.

load more comments (7 replies)
load more comments (24 replies)
[–] mkwt@lemmy.world 6 points 16 hours ago (1 children)

Here's the court docket .

It's not very clear from the post: Rockenhaus was convicted on a CFAA charge in Texas in the 2019-2022 time frame. The Michigan case is to revoke supervised release on the CFAA conviction.

I don't have time to get into any of the filings now, but I'll try to get back to it later.

load more comments (1 replies)
[–] arararagi@ani.social 5 points 16 hours ago

Wtf they are just lawful thugs.

[–] Tencho@lemmy.world 4 points 16 hours ago
load more comments
view more: ‹ prev next ›