1 / 10

Government Took My Bitcoins

Government Took My Bitcoins. The FBI seized the Silk Road and 26,000 Bitcoins They accuse Ross Ulbricht AKA The Dread Pirate Roberts of being the mastermind. How Do They Seize Bitcoins?. Only by already knowing the passwords to begin with.

bailey
Télécharger la présentation

Government Took My Bitcoins

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Government Took My Bitcoins • The FBI seized the Silk Road and 26,000 Bitcoins • They accuse Ross Ulbricht AKA The Dread Pirate Roberts of being the mastermind

  2. How Do They Seize Bitcoins? • Only by already knowing the passwords to begin with. • And that brings us back to the fifth amendment and forced decryption

  3. So...They Hacked It • The most likely theory is that they hacked the Tor browser. • Used an account to follow the IP to the main server. • From there to The evil mastermind.

  4. But Silk Runs On Tor • The NSA has been de-anonymizing Tor browsers for a while. • Tor Browser Bundle • Quantum system • Fox Acid • EgotisticalGiraffe

  5. How Tor Works Every Computer uses three things to browse the web. Operating System Browser Internet Connection Tor programs the browser to create a connection to an entry node. Once the connection is established the node sends a packet back with a key The browser then sends another connection to the node to connect with a middle server. The middle server then sends back to the browser another key. The Tor browser then sends a two layered package to node one Node one opens with its key and gets a pass along command so it passes the package Node two opens it with its key, and receives a connection to an exit node thus the process repeats. Then node three connects to the servers you wanted to access But there is a snoop point (red dotted line) and certain things are visible. Any information given can be used to implicate you.

  6. You Look Lost, Well So Was The NSA

  7. The Big Deal • The way the NSA hacks Tor means less privacy • These techniques, while often noticeable when abused make people fear for their privacy. • Openness is all fun until the government goes bad. Think Stalin. • Do you want the NSA to be able to control your computer?

  8. Quotes • "EFF will tell you there are many pseudo-legitimate uses for Tor...we're interested as bad people use Tor" • “the biggest weakness of the complaint (which is not something that really needs to be answered here, but will need to be answered in court) is how the Silk Road server was discovered. • I would suspect that, since it was imaged without being noticed that what happened is the FBI (with a warrant) hacked the site sufficient to discover the site's IP by generating a non-Tor phone-home, and then contacted the country of the hosting provider which then got the server imaged.” • Yet since the server imaging didn't involve taking the server down or disrupting service sufficient to spook Mr DPR into taking his bitcoins and running, I suspect that this was some virtual-machine hosting provider. • "It will be interesting to see what the authorities do with those assets...Will they sell them through a licensed exchange and will we be able to track the sale?"

  9. Citations • http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption • http://www.theguardian.com/technology/2013/oct/08/silk-road-hack-suspicion-fbi-server • http://www.theguardian.com/technology/2013/oct/02/bitcoin-silk-road-how-to-seize http://www.theguardian.com/technology/2013/oct/07/fbi-bitcoin-silk-road-ross-ulbricht www.youtube.com/watch?v=LAcGiLL4OZU‎ \

  10. Pics • http://ei.marketwatch.com/Multimedia/2013/08/26/Photos/ME/MW-BH366_bitcoi_20130826105541_ME.jpg?uuid=9b2e8964-0e5f-11e3-bfa7-00212876b3fc • http://images.comicbookresources.com/litg/122903-ross.jpg • http://www.clker.com/cliparts/P/0/H/6/S/Y/hand-pointing.svg • https://www.google.com/search?hl=en&authuser=0&site=imghp&tbm=isch&source=hp&biw=1680&bih=925&q=uncle+sam+bitcoins&oq=uncle+sam+bitcoins&gs_l=img.3...3051.13664.0.13924.24.11.4.9.4.0.89.504.11.11.0....0...1ac.1.27.img..6.18.493.UQJC2lMRTaI#authuser=0&hl=en&q=raised+eyebrow+meme&tbm=isch&facrc=_&imgdii=_&imgrc=27FeV1Zoc9ahWM%3A%3BVxAuo_OKXgPVOM%3Bhttp%253A%252F%252F3.bp.blogspot.com%252F-oCZ9v9bqN0s%252FTzc_YwrChuI%252FAAAAAAAACAk%252F3cP9YWaaxCQ%252Fs400%252Fskeptical%25252Bbaby%25252Bmeme%25252Bplain.png%3Bhttp%253A%252F%252Fwww.dailyvowelmovements.com%252F2012%252F02%252Fskeptical-baby-meme-baby-with-eyebrow.html%3B253%3B260 • http://2.bp.blogspot.com/-Wjr8XxRr70c/TekLIPGyxFI/AAAAAAAAR30/OG1Vy3ZZ9cg/s1600/raised_eyebrow.jpg • http://s3.amazonaws.com/assets.prod.vetstreet.com/0f/45b5903d4511e1abfd005056b5004b/file/Kitty%20playing%20with%20laser%20pointer%20GettyImages_85154539.jpg • http://www.lawlibrary.co.za/notice/updates/2002/images/bottled_lightning.jpg http://farm2.static.flickr.com/1255/1263976173_87d65a90c1.jpg

More Related