As the trial of alleged Silk Road drug market creator Ross Ulbricht approaches, the defense has highlighted the mystery of how law enforcement first located the main Silk Road server in an Icelandic data center, despite the computer being hidden by the formidable anonymity software Tor. Was the FBI tipped off to the server’s location by the NSA, who used a secret and possibly illegal Tor-cracking technique?
The answer, according to a new filing by the case’s prosecution, is far more mundane: The FBI claims to have found the server’s location without the NSA’s help, simply by fiddling with the Silk Road’s login page until it leaked its true location.
http://www.wired.com/2014/09/the-fbi-finally-says-how-it-legally-pinpointed-silk-roads-server/
Silk Road Prosecution 4th Amendment Rebuttal:
http://www.scribd.com/doc/238796613/Silk-Road-Prosecution-4th-Amendment-Rebuttall
FBI Explanation of Silk Road Vulnerability:
http://www.scribd.com/doc/238844570/FBI-Explanation-of-Silk-Road-vulnerability
(Score: 0) by Anonymous Coward on Sunday September 07 2014, @10:45PM
Funny how it probably resembles succesful black hat attacks of credit card systems and the like, although of course Tor wouldn't be an issue in the latter. Just keep probing until you notice something that shouldn't be there. When it comes to cybersecurity, it's far easier to play offense than defense.
(Score: -1) by Anonymous Coward on Sunday September 07 2014, @11:49PM
shutdown -h now