[Chugalug] Silk Road and Bitcoins

Matt Keys mk6032 at yahoo.com
Sat Oct 5 15:35:09 UTC 2013

I gotcha, thanks. I'll bet a chugalunch there will be blowback to 
follow. IMO the LEA actions in this instance are more criminal than the 
offender(s) they targeted. I mean c'mon... who are they to bitch about 
China's government sponsored hackers now? Stuxnet was one thing and 
questionably was worth it... but this?

On 10/05/2013 10:35 AM, Dan Lyke wrote:
> On Sat, 05 Oct 2013 06:42:30 -0400
> Matt Keys <mk6032 at yahoo.com> wrote:
>> Can someone explain to me how the FBI (or whatever gov 3 letter
>> acronym) "seized" a Tor domain? The Tor DNS resolution is supposed to
>> be distributed to where it never reveals the actual location, is it
>> not?
> They got to the server itself. Control the server, control what it
> serves.
> For Silk Road, it looks like they found the guy through other means.
> For the other Tor related busts recently, they compromised one server
> that delivered a JavaScript payload that exploited a vulnerability
> to deliver a worm that hit another site simultaneous with the Tor
> accesses, which gave them a correlatable IP address.
> Which is further evidence that JavaScript is evil evil evil. But you
> knew that.
> Dan
> _______________________________________________
> Chugalug mailing list
> Chugalug at chugalug.org
> http://chugalug.org/cgi-bin/mailman/listinfo/chugalug

More information about the Chugalug mailing list