• parpol@programming.dev
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    5
    ·
    edit-2
    8 months ago

    You get a different IP from someone else who uses the VPN, and someone else gets to use yours. Sounds like a win-win to me in terms of both privacy and having an excuse for damning evidence. “Your honor, I assure you that ‘giant horse cock’ and ‘how to make anthrax’ were from someone else on the VPN network.”

    • Avid Amoeba@lemmy.ca
      link
      fedilink
      English
      arrow-up
      7
      ·
      8 months ago

      Yeah, I don’t know how strong this defense would be when they put you on trial for CSAM.

      • pivot_root@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        8 months ago

        “Your honor, I didn’t distribute distribute CSAM. That was somebody else.” and “Yes, your honor, I did sign that internet service contract agreeing that I am responsible for all activity that originates from my network.”

    • redcalcium@lemmy.institute
      link
      fedilink
      English
      arrow-up
      4
      ·
      8 months ago

      Only if they’re stating this upfront, in a giant text. Those apps hide this capability and are thus categorized as malware. Turning the victim’s computer into a residential proxy has always been a staple in botnet operations.