AnonFiles was very sketchy. They had extremely generous file size limits and were apparently funded completely through donations. On their footer they linked to other file sharing sites, which linked to even more file sharing sites. All of them had the exact same layout and generous file size limits. They also shared the exact same IPs. There were around 15 of them. A lot of them impersonated other defunct file sharing websites which shut down such as MegaUpload. All of these sites are now offline. Make of this what you will, but to me it sounds like a honeypot.
Considering the plausibility of people downloading CP from government run sites over a government run anonymity network from a government run file host is interesting.
Supposedly, one of the biggest distributors of CSAM is US military networks. If you have access to them, you're not supposed to go trawling around just looking being curious because there's officially "need to know" stuff out there (and you don't need to know). Which makes it a great place to hide that sort of stuff.
I can’t speak to that generally, but in my anecdotal experience in 22 years in the US Military (in IT for most of that):
I dealt with one case that was completely horrific, and two minor. The horrific case involves the PRODUCTION of CP using other service members children via the spouses daycare, then distribution from our network. The other two were relatively simple storage/redistribution via workstations.
It happens, but from my viewpoint if it’s that rare it must be extremely rare elsewhere if your statement is true.
That's a pretty routine thing. Remember how the government sold arms to Iran, or facilitated drug trade in Central America, or trafficked firearms for Mexican cartels? It's different when they do it, because they are the good guys.
Agreed. The moment i saw AnonFiles i was out of there, even considered uploading the declaration of indepence in pdf form to get my social credits up.
I dont know where the servers were, but i feel like it was used for less lovely purposes by the owners and a lack of identifiers & internet curated mess would obfuscate law enforcement's efforts
Edit: my theory however falls flat if there were multiple websites, since having a one large database would be in their best interest. You could argue that there were multiple entities self-hosting the same thing, but why would they link to eachother? Coupled with the VPN ad, sounds like data harvesting all around (honeypot or not)
It looks like from June 24th 2022 through August 10th 2023 (or 16th, likely whenever they changed their index to announce the shutdown) they only listed filechan.org and letsupload.cc.
All of the file sharing sites listed do appear to be parodies of other popular websites, some of them file sharing. They also appear to all be identical except for the site name and styling. All of the file sharing sites except for anonfiles.com now return NXDOMAIN. (ovpn.com appears to still exist.)
The obvious parodies of file sharing websites does call into question their assertion that they didn't want abuse.
It does sound fishy, but why a honeypot? Why not a place to hide traffic? With populair large up/downloads, it's practically impossible to trace all of it. Or perhaps it was a communication board for some shady, rich organization.