Silk Road 2.0 compromised, 2 admins arrested

JackTheBongRipper

Well-Known Member
http://www.dailydot.com/news/silk-road-inigo-arrest-rumors/

Quote from the story:

" “Guys I was arrested yesterday and out on bond now,” said the vendor. “But something is fucked! I know I’m risking more warning you guys and my attorney doesn’t even want me on the internet but you guys need to know this. When I was in the interview room they showed me all sorts of shit that they should not know or have access to including conversations I’ve had with buyers and even DPR. I don’t fucking understand.. and when I was in there I was at a loss for words. Something is definitely wrong and they have the ability to see things on here only mods or admins should like btc transfers and a dispute I had. WHAT THE FUCK?” "

The FBI/NSA/other agencies are all up in their shit. Seem to have access to things people thought were secure.

Be safe, but remember, big brother is ALWAYS watching... :shock:
 
feel good stories like the 'open letter' from apple, google, aol. etc give a false sense of righteous security.

There were never any infrastructure companies on that list. If I own the vehicle it doesn't matter how well it's hidden, it's only a matter of time.

the term o day comes to mine as well.
 
Funny story...when will people learn? There is nothing you do these days that can't be seen or heard. :wall:
if you already don't have a smartphone and if you aviod this stuff like the plague, because... well lets face it who wants to be attacked to their electronics non stop. seriously if your life is all phone ... you need mental and serious help.
 
LoL, I don't care that the Feds see all my miscreant deeds online -- when I don't want them to see, I use remote networks, and then I use encrypted connections, I use multiple tunnels, and play ping-pong with 3rd world countries.

There are indeed a lot of ways to keep yourself invisible -- on YOUR end. What you reveal to the OTHER end is what they'll have to rely on...

DragonFly BSD is open, and well vetted -- it doesn't utilize the flawed MS encryption "tools," that were compromised by the NSA; it doesn't utilize the encryption and random number generator chips that the NSA compromised, nor does it utilize the corrupt RSA edition rand() or the encryption algorithms that RSA compromised at the NSA's (10M dollar) request. SHA1 was allegedly cracked, using CPU audio snooping, but that was a simple message, and a known key -- they also knew when it was running, and they didn't run multiple processes, on a multi-core chip, to poison the audio snooping.

I build firewalls based on DragonFly BSD, like Secure Computing, I moved away from SE-Linux, because of the deep hand the NSA had in it -- compromised or not, I won't sign off on something that they had their hands in.

GPG+encrypted file system+bit shifting (just to be obnoxious) guarantees that, unless decrypted and bit shifted in the PERFECT ORDER, all you'll get is a corrupt gobbledygook of worthless file system. Add in a nice stateful firewall, a solid blacklist (they are about 40% reliable and useful) or better yet a trusted whitelist, chroot/jailing, and get rid of all the crud that sits in most Operating Systems, and you are (currently) impenetrable ... But, again, the other end probably isn't.

EDIT: Bongbrain, on my RazrM, I run an encrypted (unsupported) version of Android -- and, I'm looking for an even more solid one... I'm intricately tied to my droid. We're inseparable. I can contact my laptop or my desktop, using SSH, from anywhere in the world. I can also connect to my phone from either of them. Having a smartphone isn't necessarily dumb -- calling your coke trafficker in Colombia, while using your subscription service (anything) android or iOS device is dumb.

EDIT 2: Just got a nice update. The "cracked" encryption. It wasn't SHA1, it was RSA 4096. It was cracked with a microphone -- and 10 million dollars from the feds. ALL RSA CRYPTOGRAPHY IS COMPROMISED! Anyway, in the Update, it was researchers at the Tel Aviv University, they started with known emails, sent them to the laptop, decrypted while listening with a smartphone microphone, and ran isolation algorithms to get the sounds of the microchips working while decrypting -- from their they took about an hour to recover the key. Not a realistic hack in the wild, but still a cause for concern.
 
http://www.dailydot.com/news/silk-road-inigo-arrest-rumors/

Quote from the story:

" “Guys I was arrested yesterday and out on bond now,” said the vendor. “But something is fucked! I know I’m risking more warning you guys and my attorney doesn’t even want me on the internet but you guys need to know this. When I was in the interview room they showed me all sorts of shit that they should not know or have access to including conversations I’ve had with buyers and even DPR. I don’t fucking understand.. and when I was in there I was at a loss for words. Something is definitely wrong and they have the ability to see things on here only mods or admins should like btc transfers and a dispute I had. WHAT THE FUCK?” "

The FBI/NSA/other agencies are all up in their shit. Seem to have access to things people thought were secure.

Be safe, but remember, big brother is ALWAYS watching... :shock:


SERIOUSLY???? SECURE ON THE INTERNET!! DARPA paved the fucking roads we move data on.... secure...... NEVER...... only if you own the highway and DARPA built it therefore this place was owned from inception....
 
SERIOUSLY???? SECURE ON THE INTERNET!! DARPA paved the fucking roads we move data on.... secure...... NEVER...... only if you own the highway and DARPA built it this place was owned from inception....

I respectfully disagree -- unless the NSA has a true quantum computer, they can't break a properly formed multi-tunnel connection... They couldn't break it inside about a million years...

The problem is like I said -- it depends on both ends also being properly secured. Having the most encrypted and locked down computer on the 'net doesn't do shit, if the sites you connect to are vulnerable to compromise.
 
I respectfully disagree -- unless the NSA has a true quantum computer, they can't break a properly formed multi-tunnel connection... They couldn't break it inside about a million years...

The problem is like I said -- it depends on both ends also being properly secured. Having the most encrypted and locked down computer on the 'net doesn't do shit, if the sites you connect to are vulnerable to compromise.

Ahh sweetie you don't have to be respectful, you can tell me I'm full of shit as a Christmas goose :) I'm good with that. I don't require my friends hold my same opinions ;D
 
Ahh sweetie you don't have to be respectful, you can tell me I'm full of shit as a Christmas goose :) I'm good with that. I don't require my friends hold my same opinions ;D

And here, I thought you'd be comin' at me all:

[video=youtube;Q8fRiEpB5fM]http://www.youtube.com/watch?v=Q8fRiEpB5fM[/video]

In theory, I'm correct, in execution, you are. That's the shit about the current crypto and security situation. A nice push to pre-paid wireless, DragonFly firewalls, and Linux Distros behind those firewalls, secure tunnels to-and-fro... It'd be great; unfortunately, the worst damage that's going to happen to the whole security/crypto industry because of this shit is that no one's going to trust anyone else's solutions, and it's going to be '96-'99 all over again. At least we know definitively who some of the corporations are that gave Uncle Sam hand jobs and opened their back doors for vendor contracts and cash! (Yeah RSA, MS, Novel, Oracle, IBM, Intel, AMD, SiS, etc. we know you're a bunch of dirty little whores.)
 
And here, I thought you'd be comin' at me all:

[video=youtube;Q8fRiEpB5fM]http://www.youtube.com/watch?v=Q8fRiEpB5fM[/video]

In theory, I'm correct, in execution, you are. That's the shit about the current crypto and security situation. A nice push to pre-paid wireless, DragonFly firewalls, and Linux Distros behind those firewalls, secure tunnels to-and-fro... It'd be great; unfortunately, the worst damage that's going to happen to the whole security/crypto industry because of this shit is that no one's going to trust anyone else's solutions, and it's going to be '96-'99 all over again. At least we know definitively who some of the corporations are that gave Uncle Sam hand jobs and opened their back doors for vendor contracts and cash! (Yeah RSA, MS, Novel, Oracle, IBM, Intel, AMD, SiS, etc. we know you're a bunch of dirty little whores.)

Thank god they didn't plan this eh? ;)
 
Thank god they didn't plan this eh? ;)


Dude, it's killin' me! Seriously, I see so many people just fuckin' up... Corporations won't touch ex-gov security contractors right now. Small businesses don't think they're big enough to worry, home users figure they're already fucked... It's a mess of epic proportions, and is just getting worse -- I'm trying to pull all of the RSA mods outta my GPG deployments, that's a painstaking fuck of a mess... I'm just using other algorithms for now...

As shit blows up, people will start, or at least corporations will start, to see that it's a nasty set up game, they've been dogging Crypto tech since the 70's. I think the problem is the absolute brainwashing of people... "Nothing to hide, nothing to fear." "If you aren't with us, you are against us..." (Yeah, GWB, I'm against you -- I support patriots, not cowering bitch terrorists. You to Obama, you're no better than a suicide bomber, you're actually WORSE -- you ARE the terrorists.)

Anyway, yeah, good thing they didn't intentionally undermine Citizen confidence in the entire crypto and security industry!
 
does this mean my oz of blow is gonna be late?

If it isn't late ... it isn't blow. This guy is having a field day.

063.jpg
 
Dude, it's killin' me! Seriously, I see so many people just fuckin' up... Corporations won't touch ex-gov security contractors right now. Small businesses don't think they're big enough to worry, home users figure they're already fucked... It's a mess of epic proportions, and is just getting worse -- I'm trying to pull all of the RSA mods outta my GPG deployments, that's a painstaking fuck of a mess... I'm just using other algorithms for now...

As shit blows up, people will start, or at least corporations will start, to see that it's a nasty set up game, they've been dogging Crypto tech since the 70's. I think the problem is the absolute brainwashing of people... "Nothing to hide, nothing to fear." "If you aren't with us, you are against us..." (Yeah, GWB, I'm against you -- I support patriots, not cowering bitch terrorists. You to Obama, you're no better than a suicide bomber, you're actually WORSE -- you ARE the terrorists.)

Anyway, yeah, good thing they didn't intentionally undermine Citizen confidence in the entire crypto and security industry!

Next Chase:finger: will only reimburse people who get their cards frauded from the Target breach with bitcoin!:hump:
 
****** If they don't want that they can have vouchers for toxic derivatives that the Fed is no longer buying from them.******
 
This is why i no longer order anything online especially not shit like that..... come on now.
How on earth is the internet secure? i used to be a hacker (paid) and let me say this nothing online is secure.
i cannot begin to explain to you how many little details got people found and how many hiddin goodies are there undetected by the
average user. i use firewall and proxys when I'm here and on a unverified phone along with some other tricks i picked up.
i am pretty well off grid now though
 
This is why i no longer order anything online especially not shit like that..... come on now.
How on earth is the internet secure? i used to be a hacker (paid) and let me say this nothing online is secure.
i cannot begin to explain to you how many little details got people found and how many hiddin goodies are there undetected by the
average user. i use firewall and proxys when I'm here and on a unverified phone along with some other tricks i picked up.
i am pretty well off grid now though

Yes, this is precisely the place I would announce that :) I would also remind you that the first rule of, actual, hacking is never hack from home. You did get that memo? LOL the kids today

Merry Christmas
 
Yes, this is precisely the place I would announce that :) I would also remind you that the first rule of, actual, hacking is never hack from home. You did get that memo? LOL the kids today

Merry Christmas

Not from your own home, anyway...

Everyone's always on about proxies -- the thing most people don't remember is to know who owns, operates, and has access to the proxy (physical access.) Another thing people don't think about: Proxy logs. Just because someone SAYS the proxy doesn't log does NOT make it so.

My favorite, when I was playing peek-a-boo with them, was using a computer in B-Town, proxy out from there, and use an open (exploited) public library system in another state to taunt my PO and the popo. That really pissed them off, cuz they kept trying to find me in downtown Boston. ;-) You only control systems under your control. I confess, I got sloppy towards the end -- but then I walked into a train station and purchased a ticket to head back and turn myself in... So, I didn't really care all that much. It was already end game.
 
Not from your own home, anyway...

Everyone's always on about proxies -- the thing most people don't remember is to know who owns, operates, and has access to the proxy (physical access.) Another thing people don't think about: Proxy logs. Just because someone SAYS the proxy doesn't log does NOT make it so.

My favorite, when I was playing peek-a-boo with them, was using a computer in B-Town, proxy out from there, and use an open (exploited) public library system in another state to taunt my PO and the popo. That really pissed them off, cuz they kept trying to find me in downtown Boston. ;-) You only control systems under your control. I confess, I got sloppy towards the end -- but then I walked into a train station and purchased a ticket to head back and turn myself in... So, I didn't really care all that much. It was already end game.

Precisely, every time I see 'free' proxy I think honeypot but who am I?
 
Back
Top