home

"Silk Road" Busted and Closed

The travails of Silk Road owner Dread Pirate Roberts is an interesting tale. Bitcoins, internet drug sales and now contract hits are alleged.

< War on Drugs: Cheaper and Purer Than Ever | Dzhokhar Tsarnaev Seeks End to " SAMS" Restrictions >
  • The Online Magazine with Liberal coverage of crime-related political and injustice news

  • Contribute To TalkLeft


  • Display: Sort:
    Wild story... (5.00 / 1) (#1)
    by kdog on Thu Oct 03, 2013 at 11:06:44 AM EST
    I liked knowing Silk Road was out there...that kinda thing gives me hope for the future.  I'm sure a copycat will be up and running in no time.

    What's the FBI gonna do with a seized currency that the US govt. doesn't even recognize?  Can Bitcoin still deem  Ulbricht the rightful owner of the currency?  Many interesting questions raised...

    Can't condone the attempted murder, if the allegatons are true, but it sounds like the thief and extortionist probably had it coming.  "To live outside the law you must be honest"...and when you're not, you're not gonna get served with papers.  Everybody knows the "outside the law" unwritten rules.  

    Hey, KDog, my favorite Dylan quote ever (none / 0) (#2)
    by Peter G on Thu Oct 03, 2013 at 11:43:46 AM EST
    I point that out to my clients all the time, prefaced by "In the words of the prophet ..."  So where are you tonight, Sweet Marie?

    Parent
    One of my faves too... (none / 0) (#3)
    by kdog on Thu Oct 03, 2013 at 11:54:03 AM EST
    because it rings so true.  Beyond dispute.

    Parent
    Gotta wonder how the Winklevoss twins' (5.00 / 1) (#4)
    by Mr Natural on Thu Oct 03, 2013 at 04:29:10 PM EST
    Bitcoin venture capital fund and investments will fare following this implosion.

    One obvious weakness in the silk road model was that the purchaser's address was necessarily known to the purveyors.

    Bloomberg with same story, different details.

    Guardian: NSA and GCHQ target Tor network (5.00 / 1) (#8)
    by Mr Natural on Sat Oct 05, 2013 at 12:44:56 AM EST
    that protects anonymity of web users:

    Top-secret NSA documents, disclosed by whistleblower Edward Snowden, reveal that the agency's current successes against Tor rely on identifying users and then attacking vulnerable software on their computers. One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets' computers, including access to files, all keystrokes and all online activity.

    But the documents suggest that the fundamental security of the Tor service remains intact. One top-secret presentation, titled 'Tor Stinks', states: "We will never be able to de-anonymize all Tor users all the time." It continues: "With manual analysis we can de-anonymize a very small fraction of Tor users," and says the agency has had "no success de-anonymizing a user in response" to a specific request.



    Guardian: NSA and GCHQ target Tor network (5.00 / 1) (#9)
    by Mr Natural on Sat Oct 05, 2013 at 12:51:18 AM EST
    Top-secret NSA documents, disclosed by whistleblower Edward Snowden, reveal that the agency's current successes against Tor rely on identifying users and then attacking vulnerable software on their computers. One technique developed by the agency targeted the Firefox web browser used with Tor, giving the agency full control over targets' computers, including access to files, all keystrokes and all online activity.

    But the documents suggest that the fundamental security of the Tor service remains intact. One top-secret presentation, titled 'Tor Stinks', states: "We will never be able to de-anonymize all Tor users all the time." It continues: "With manual analysis we can de-anonymize a very small fraction of Tor users," and says the agency has had "no success de-anonymizing a user in response" to a specific request.



    more details... (none / 0) (#5)
    by Mr Natural on Thu Oct 03, 2013 at 08:17:29 PM EST
    Seeking the mastermind behind it, investigators began picking up clues: an anonymous posting to a website devoted to hallucinogenic mushrooms, recurring references to libertarian economics and early hints left on public sites including Google and LinkedIn.

    A big break came in July, when a routine inspection of inbound mail from Canada turned up a parcel containing several counterfeit IDs -- each with a different name and all featuring the photograph of the same man.

    Bloomberg again.


    "FBI Description of Tor component not (none / 0) (#6)
    by Mr Natural on Thu Oct 03, 2013 at 11:37:21 PM EST
    quite accurate," Kevin O'Brien, enterprise solution architect at CloudLock, told eWEEK. "The .onion address is a descriptor, which allows a Tor client to connect to a service such as the Silk Road Website indirectly via the Tor network, without ever knowing the actual IP address of the service itself," O'Brien said. "There are some additional components involved, but in essence, Tor is about indirection, and .onion addresses are the mechanisms of indirect routing used to provide this functionality."


    Tor project blog comments on the bust: (none / 0) (#7)
    by Mr Natural on Thu Oct 03, 2013 at 11:51:57 PM EST
    Tor and the Silk Road takedown:

    We've been watching carefully to try to learn if there are any flaws with Tor that we need to correct. So far, nothing about this case makes us think that there are new ways to compromise Tor (the software or the network). The FBI says that their suspect made mistakes in operational security, and was found through actual detective work. Remember: Tor does not anonymize individuals when they use their legal name on a public forum, use a VPN with logs that are subject to a subpoena, or provide personal information to other services.

    A comment on the comment:

    The complaint says that the server running Silk Road was imaged and forensically examined in late July. This was done surreptitiously by the hosting provider at the request of the FBI via local authorities and the Mutual Legal Assistance Treaty. They used the server's ssh config to find the VPN server he was logging in from and the VPN server's last login record to find a cafe near his house. They were able to correlate the location based on Google's records of the email account that was previously used to solicit users and help on the BitCoin forums, which he accessed from home the same day he logged into the VPN server. Other information on the Silk Road hidden server was used to correlate with openly sourced information to get the probable cause needed to arrest him.

    This blog post links to many related posts and faqs about the byzantine world of Tor facilitated anonymity.