xSTHNSx, on 07 November 2016 - 08:16 PM, said:
retsmah, on 07 November 2016 - 06:23 PM, said:
I am in Europe. But I know for sure that there was no completed downloads at the time, and no known (filename title identifiable) bad files in the partial downloads. (Any info for the raid was probably from some time before)
It would not matter if the contents in question is fully completed or still partial. What does matter is "possession" and the fact you did not delete it when discovered thus left it as partial proves "intent" to download. As you were also sharing by default also proves "distribution". Regardless did they take your electronic equipments? like PC/ExtHD/ect? If so are there any incrementing evidence on it? It does not matter if its encrypted or not as majority of EU nation are funny and can jail you if you refuse to hand over your passphrase.
Now normally the biggest problem with our network is the authenticity of the file. So if the movie said WordOfGod.avi it can still be fake cP movie. This is the exact reason majority of us use ShortyPower or Peerates to lookup the hash. If there is no other cP no images/videos/ect located anywhere they can find as evidence then get a good lawyer and prove that the filename in this case was misleading. Which would be hard if the filename itself contains label which describe the content. Only you can be the judge as you know what you did as you have all the details regarding this matter. But as I said if you were in USA thats all DA would need to send you in federal prison for next 10-15years. They would prove intent, possession and distribution.
retsmah, on 07 November 2016 - 06:25 PM, said:
Did you know all this (internal files used by eMule and other info) naturally or did you research it for me question?
But is the UserHash (cryptkey.dat) not encrypted?, and how can the UserHash be verified onsite in a raid (in little time), is there an automated procedure & tool ?
Yes I was part of eDonkey-BlackNET project for Shareaza. I don't use eMule never used it but I was using xMule and now using aMule and been part of ED2K/KAD community for over decade+. You're also focusing on the wrong things, as UserHash does not matter. There are old clients which changes UserHash or used same community based UserHash. What matters is that IP which is how they tracked and raided you and then search yield eD2K/KAD client on the PC with actual evidence.
So xMule and aMule use the same configuration files as eMule? (you referred to eMule configuration files)?
I was asking about UserHash and other things as during the raid, the Law Enforcement narrowed down the machine of interest to a particular machine, I wanted to know how they would narrow it down to a particular machine in the building. That's why I ask about the UserHash and questions about its encrypted form: But is the UserHash (cryptkey.dat) not encrypted?, and how can the UserHash be verified onsite in a raid (in little time), is there an automated procedure & tool ?
I do not recall any cP being shared or in a download queue (recognisable as cP by files names) at time of raid.
Where I am, on internet news it can be seen that all time everyday there are people who are found with possession of hundreds of cP and are not actually jailed (maybe suspended jail or other things), but extreme possessors are jailed but usually for a few years maximum.
Yes they took all equipment also, no cP stores on them, I am very certain. I am not a user of cP.
What is the 'eDonkey-BlackNET project for Shareaza'?
Have you ever accidently downloaded cP ?
This post has been edited by retsmah: 08 November 2016 - 12:02 AM