[Cryptography] how to put a password in an evidence bag?

Ray Dillinger bear at sonic.net
Sat Apr 4 14:57:17 EDT 2015



On 04/03/2015 03:40 PM, ianG wrote:
> Many here will likely decline to follow the Bridges / Force arrests in
> USA, but in short, the two federal agents who were chasing the "Silk
> Road" website for bad stuff were also raiding the pot.
> 
> http://techcrunch.com/2015/04/01/feds-nabbed-for-big-bitcoin-heist-involving-gox-and-silk-road/#BhiiWz:b5eO
> 
> 
> At one point, they arrested an employee of the website and got the admin
> password from him.  They then proceeded to raid the value that was
> escrowed within (customer funds) and sell it through an exchange
> provider - Mt.Gox.  Once they had extracted all the cash out via this
> exchange provider they proceeded to shut it down for running an
> unlicensed money transmitter ... you can't make this stuff up.
> 

What I can't understand is how they got the admin password from
Ulbricht's computer, and *THEN* were able to use a text log file
(easily faked, authorship non-provable) from that computer as
evidence against him.  Nobody even knows that they didn't
*write* that log.



-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150404/33320766/attachment.sig>


More information about the cryptography mailing list