[Cryptography] how to put a password in an evidence bag?
Ray Dillinger
bear at sonic.net
Sat Apr 4 14:57:17 EDT 2015
On 04/03/2015 03:40 PM, ianG wrote:
> Many here will likely decline to follow the Bridges / Force arrests in
> USA, but in short, the two federal agents who were chasing the "Silk
> Road" website for bad stuff were also raiding the pot.
>
> http://techcrunch.com/2015/04/01/feds-nabbed-for-big-bitcoin-heist-involving-gox-and-silk-road/#BhiiWz:b5eO
>
>
> At one point, they arrested an employee of the website and got the admin
> password from him. They then proceeded to raid the value that was
> escrowed within (customer funds) and sell it through an exchange
> provider - Mt.Gox. Once they had extracted all the cash out via this
> exchange provider they proceeded to shut it down for running an
> unlicensed money transmitter ... you can't make this stuff up.
>
What I can't understand is how they got the admin password from
Ulbricht's computer, and *THEN* were able to use a text log file
(easily faked, authorship non-provable) from that computer as
evidence against him. Nobody even knows that they didn't
*write* that log.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20150404/33320766/attachment.sig>
More information about the cryptography
mailing list