TL;DR
- There are real federal dockets involving Conrad Rockenhaus in Texas and Michigan (see Sources). These establish case numbers, judges, and filing dates—not the truth of any allegation by themselves.
- His family alleges that after he ran high-bandwidth Tor exit relays, U.S. authorities pressured him to provide decryption/access; when he refused, they pursued him via other charges and later supervised-release proceedings. These are allegations pending verification in transcripts and orders.
- Tor 101: Exit operators cannot decrypt HTTPS or onion service traffic by design. Exits can see unencrypted streams (e.g., plain HTTP) like any internet intermediary; that’s not “breaking Tor.”
- SPICE ≠ an operating system. SPICE is a remote-display protocol/graphics stack used with virtualization (KVM/QEMU). Misstating it as an “OS” can mislead non-technical audiences.
Who is Conrad Rockenhaus?
Conrad Rockenhaus is described in public and community records as a long-time systems engineer and Tor relay/exit operator. Mailing list archives from 2018–2019 discuss his high-bandwidth exit relays, including several ranked among Canada’s top exits by bandwidth.
- Tor-relays threads referencing his Canadian exit capacity (2018): lists.torproject.org and Narkive mirror.
What the public record shows
Multiple federal dockets exist that involve Rockenhaus. Key entries include:
- E.D. Texas (Sherman) criminal matter 4:19-cr-00181 — entries available via govinfo.gov (orders incl. competency/R&R adoption).
- W.D. Texas magistrate case 6:20-mj-00002 — docket summary at CourtListener (filed Jan 7, 2020).
- E.D. Michigan (Detroit) 2:23-cr-20701 — docket page at CourtListener (admin. open/close on Dec 27, 2023; later updates in 2025).
- E.D. Michigan (civil) 2:25-cv-12736 — Rockenhaus v. Agapiou docket at CourtListener (Aug 28, 2025).
These links provide dates, judges, and filings, but you must read the actual documents (e.g., violation petitions, orders, transcripts) to confirm specific claims.
What his family alleges
Posts by his spouse, Adrienne Rockenhaus, and updates on rockenhaus.com assert (among other things):
- That federal agents sought the ability to decrypt or access Tor traffic from his exit nodes; he refused, citing impossibility/ethics.
- That a probation officer mischaracterized a SPICE graphics driver as a “Linux OS used to access the dark web,” and this influenced court decisions.
- That he endured extended pretrial detention, was re-arrested in September 2025, suffered a seizure in court, and faced periods without counsel; a hearing was postponed to Sept. 30, 2025 by Judge Stephen J. Murphy III.
See the family’s public statements: Reddit thread on r/TOR and the Press Kit (with running updates).
Editorial note: These are allegations. Where possible, match them to docketed transcripts (e.g., to verify the SPICE testimony) and orders/minutes (e.g., continuances, counsel status).
Counter‑narrative
Community commentary suggests the government actions relate to earlier workplace/CFAA conduct and supervised‑release violations, not Tor. If you cover this angle, cite the violation petition(s) and prior judgments: charges, plea, restitution, and conditions of supervision.
Technical Sidebar: Tor Exit Operators & “Decryption” Claims
What can an exit see?
By design, Tor’s exit relay is the last hop before traffic reaches the wider internet. It can observe unencrypted traffic (e.g., http://
), but cannot decrypt end‑to‑end encrypted sessions like HTTPS or onion services. Tor’s design rotates keys and does not allow past traffic to be decrypted if a node is later compromised.
- Design docs: Tor Design; operator resources: Tor Community & Legal, EFF Legal FAQ.
So what is SPICE?
SPICE (Simple Protocol for Independent Computing Environments) is a remote display protocol/graphics stack typically used with KVM/QEMU virtualization. It is not an operating system. Treat any courtroom references to SPICE accordingly and consult an expert if needed.
Living Timeline
Open Questions (What We’re Actively Verifying)
- SPICE testimony: Obtain the official transcript or exhibit with page:line cites that mention SPICE, and verify how it was characterized in court.
- Violation details: Pull the supervised‑release violation petition(s) from E.D. Michigan to quote the alleged violations verbatim.
- Medical/counsel claims: Cross‑check arrest reports, minute entries, and detention orders for Sept 4–5 events, counsel status, and any medical notes.
- Earlier CFAA facts: From E.D. Texas filings, summarize the precise counts, disposition, and restitution conditions; avoid relying on secondary commentary.
How Readers Can Evaluate Claims
- Read the dockets (CourtListener/govinfo) and follow links to PDFs where available. Transcripts are gold.
- Attribute precisely: When repeating a claim, note whether it’s from a court document, a family statement, or community discussion.
- Mind the tech/legal split: “Decrypting Tor traffic” is often a misconception; be precise about what an exit can/can’t see.
Sources & Primary Links
- E.D. Michigan criminal docket: 2:23‑cr‑20701 (docket page)
- W.D. Texas magistrate docket: 6:20‑mj‑00002 (docket page)
- E.D. Texas criminal matter: 4:19‑cr‑00181 (orders via govinfo)
- Civil docket (E.D. Mich.): 2:25‑cv‑12736
- Family site (updates/press kit): rockenhaus.com · Press Kit
- r/TOR statement by spouse: Reddit
- Tor‑relays threads referencing his exits: Aug 2018 (lists.torproject.org) · Narkive mirror
- Tor design/ops/legal context: Tor Design · Tor Legal FAQ (EFF)
- SPICE docs: linux‑kvm.org · spice‑space.org · Wikipedia (overview)
If you are a lawyer, technologist, or witness with first-hand documents (orders, transcripts, exhibits) and are willing to be cited, please contact us. We will update this page as primary records are obtained.