@hakan_geijer ngl I am both very impressed by the fact kolektiva admins actually do stuff, but also I'm not sure I wanna be on a high risk instance I suppose? Like I'm very boring, I don't commit crimes, and if I did I wouldn't post about them, but I also idk I don't want to be on a high-risk instance.
Like my first thought was "oh the admin had an unencrypted db downloaded? Sounds like the sort of thing everyone says they'd never do until they need to and don't have an extra four hours to deal with an SSL connection to an in-production server using most of its processing power for other tasks". I haven't run a social media server before but I do run multiple VPS for mail administration and I've had to do that before, only difference is I have dedicated computers for this stuff because it's what I do for a living, I'm not a volunteer doing IT server administration from my fucking bedroom or w/e.
The thing that's suspicious to me is that IF what the feds were after was the server data specifically, and IF it wasn't a coincidence (which seems reasonable to assume, if you assume a mantra that you maybe shouldn't underestimate the imperial secret police), it's weird they knew precisely when to hit. I wouldn't jump to "there's a rat", there are several ways it could happen with all the tools available to the feds, but I am interested in how they knew when to hit.