▲ | 1970-01-01 16 hours ago | ||||||||||||||||||||||||||||
It's very important to get the official source on this one. Husband was legally restricted and being monitored by the FBI, so he decided to go install a VM to bypass the monitoring. It's not so much bravery against authority as it is hubris that got him 3 years. https://rockenhaus.com/wp-content/uploads/2025/09/U.S.-v.-Ro... | |||||||||||||||||||||||||||||
▲ | MadnessASAP 15 hours ago | parent | next [-] | ||||||||||||||||||||||||||||
Yeah, that is a significantly more damning then what was given by his wife on Reddit. While SPICE is a normal means to interact with VMs, the defense couldn't offer any legitimate reason for him to be using one. They didn't even make an attempt to. They only established that the monitoring company couldn't say for certain that it was used explicitly to bypass the monitoring. Also that it occurred right after the search mentioned on Page 28. It's a really bad look. | |||||||||||||||||||||||||||||
▲ | NotMichaelBay 15 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||
Since it seems to have been glossed over in the court transcript, can anyone explain how exactly a VM or client for remote VM could be used to bypass the monitoring? Wouldn't the monitoring software capture any application's network activities, including a client for a Remote VM? I'm imagining something like Wireshark? | |||||||||||||||||||||||||||||
|