09-09-2025, 02:26 AM
That’s a misrepresentation of both the facts and the timeline.
Let’s clarify:
I never used a VPN or Tor to access the site in question. The FBI’s own forensic analysis—conducted after the warrant was quashed—confirmed that no VPN, Tor, or anonymizing software was present on my devices. That’s not a lie. That’s a documented fact.
Your timeline is off. The FBI took possession of my devices in April 2018, the same day the charges were dropped and the warrant was quashed. They began cataloging them immediately. So yes, I knew they had the devices—because the transfer was documented and occurred while the case was still active.
The second warrant wasn’t issued until March 2020, nearly two years later. That delay doesn’t mean I didn’t know they had the devices—it means they searched them without a valid warrant for nearly two years. That’s the constitutional violation.
Copying public posts ≠ accessing the site via VPN. Quoting or referencing content from a public forum doesn’t require a proxy, VPN, or Tor. The site didn’t require login credentials, and its content was publicly visible. That’s the whole point—it was open to impersonation and abuse.
Let’s clarify:
I never used a VPN or Tor to access the site in question. The FBI’s own forensic analysis—conducted after the warrant was quashed—confirmed that no VPN, Tor, or anonymizing software was present on my devices. That’s not a lie. That’s a documented fact.
Your timeline is off. The FBI took possession of my devices in April 2018, the same day the charges were dropped and the warrant was quashed. They began cataloging them immediately. So yes, I knew they had the devices—because the transfer was documented and occurred while the case was still active.
The second warrant wasn’t issued until March 2020, nearly two years later. That delay doesn’t mean I didn’t know they had the devices—it means they searched them without a valid warrant for nearly two years. That’s the constitutional violation.
Copying public posts ≠ accessing the site via VPN. Quoting or referencing content from a public forum doesn’t require a proxy, VPN, or Tor. The site didn’t require login credentials, and its content was publicly visible. That’s the whole point—it was open to impersonation and abuse.


