Government Took My Bitcoins The FBI seized the Silk Road and 26,000 Bitcoins They accuse Ross Ulbricht AKA The Dread Pirate Roberts of being the mastermind.

Slides:



Advertisements
Similar presentations
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Advertisements

The Tor Browser Network Anonymity and its Relation to the Public By Jackson Wright.
© and The Internet Copyright Law applies to materials found on the internet to the same extent it applies to materials in traditional formats.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
WEB HOSTING. WHAT IS WEB HOSTING? A web host is a company with several computers that are connected to the internet at all times. The computers they have.
Network Layer and Transport Layer.
Skills: Concepts: layered protocols, transport layer functions, TCP and UDP protocols, isochronous applications This work is licensed under a Creative.
The Expressions for Internet & e-Commerce Complied by Terri Yueh.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Domain Name System: DNS
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Gmail Tutorial This tutorial aims to quickly cover some of the basic elements of web based using Gmail - a free service Use the Index on the.
How to Establish a Blog. What is a Blog A blog is a collection of informational articles/ideas intended to update a viewer on new information associated.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
Using It! John H. Green WB4MOZ wb4moz.mooo.com (wb4moz.home.comcast.net/~wb4moz/)
Principles of Secure Account Management By Chuck Connell
How the Internet Works: What happens when information is sent from your computer?
Staying Safe Online Keep your Information Secure.
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
What is Museum Box? A Museum box is a way of presenting information that allows you to create a cube project that can be shared with others. You can use.
Customer Service and Support Sutherland Global Services Consultant Learning Services Microsoft Store.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
We will now practice the following concepts: - The use of known_hosts files - SSH connection with password authentication - RSA version 2 protocol key.
Protecting Students on the School Computer Network Enfield High School.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
How the Web Works Building a Website – Lesson 1. How People Access the Web Browsers People access websites using software called a web browser. To view.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
CS 101 – Nov. 23 Communication, continued LANs –Bus (ethernet) communication –Token ring communication How the Internet works: TCP/IP.
Alex Leifheit NETWORKS. NETWORK A number of interconnected computers, machines, or operations. Key Components Network components, Network Architecture,
The Silk Road: An Online Marketplace
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
A PC Wakes Up A STORY BY VICTOR NORMAN. Once upon a time…  a PC (we’ll call him “H”) is connected to a network and turned on. Aside: The network looks.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin.
Secure Transactions Chapter 17. The user's machine No control over security of user's machine –Might be in very insecure: library, school, &c. Users disable.
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
COOKIES AND SESSIONS.
HOW TO HACK SOMEONES CELL PHONE CAMERA. Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just.
Website Monitoring Services: Who Is Keeping Your Web Host In Check?
Scoop it : Step by Step Dr. Carole Redline Tracking my steps to use the tool.
1-way String Encryption Rainbows (a.k.a. Spectrums) Public Private Key Encryption HTTPS Encryption.
Skype.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Cyber Info Gathering Techniques
Port Knocking Benjamin DiYanni.
SSL Certificates for Secure Websites
Authentication & .htaccess
Tor Internals and Hidden Services
How to Become Invisible On the Web: Tor and VPNs
Due: a start of class Oct 26

Yahoo Support Ireland Toll-Free Number:
Hiding Network Computers Gateways
Man-in-the-Middle Attacks
QuickBooks Pro- Issues That Are Commonly Faced by You Failure in upgrading data file Rebuilding data file Connection loose while attempt Reinstallation.
QuickBooks Pro- Issues That Are Commonly Faced by You Failure in upgrading data file Rebuilding data file Connection loose while attempt Reinstallation.
QuickBooks Pro- Issues That Are Commonly Faced by You Failure in upgrading data file Rebuilding data file Connection loose while attempt Reinstallation.
Exercise ?: TOR.
Dark Web, I2P, and Deep Web Team 5
IRLP Remote Node Control
2008 Workshop AHEPA District 3 Website Presentation
Unit 8 Network Security.
NVOC Single Sign-On (SSO) for Students!
Presentation transcript:

Government Took My Bitcoins The FBI seized the Silk Road and 26,000 Bitcoins They accuse Ross Ulbricht AKA The Dread Pirate Roberts of being the mastermind

How Do They Seize Bitcoins? And that brings us back to the fifth amendment and forced decryption Only by already knowing the passwords to begin with.

So...They Hacked It The most likely theory is that they hacked the Tor browser. Used an account to follow the IP to the main server. From there to The evil mastermind.

But Silk Runs On Tor The NSA has been de-anonymizing Tor browsers for a while. Tor Browser Bundle Quantum system Fox Acid EgotisticalGiraffe

How Tor Works Node two opens it with its key, and receives a connection to an exit node thus the process repeats. Then node three connects to the servers you wanted to access But there is a snoop point (red dotted line) and certain things are visible. Any information given can be used to implicate you. Every Computer uses three things to browse the web. Operating System Browser Internet Connection Tor programs the browser to create a connection to an entry node. Once the connection is established the node sends a packet back with a key The browser then sends another connection to the node to connect with a middle server. The middle server then sends back to the browser another key. The Tor browser then sends a two layered package to node one Node one opens with its key and gets a pass along command so it passes the package

You Look Lost, Well So Was The NSA

The Big Deal The way the NSA hacks Tor means less privacy These techniques, while often noticeable when abused make people fear for their privacy. Do you want the NSA to be able to control your computer? Openness is all fun until the government goes bad. Think Stalin.

Quotes "EFF will tell you there are many pseudo- legitimate uses for Tor...we're interested as bad people use Tor" “the biggest weakness of the complaint (which is not something that really needs to be answered here, but will need to be answered in court) is how the Silk Road server was discovered. I would suspect that, since it was imaged without being noticed that what happened is the FBI (with a warrant) hacked the site sufficient to discover the site's IP by generating a non-Tor phone-home, and then contacted the country of the hosting provider which then got the server imaged.” Yet since the server imaging didn't involve taking the server down or disrupting service sufficient to spook Mr DPR into taking his bitcoins and running, I suspect that this was some virtual-machine hosting provider. "It will be interesting to see what the authorities do with those assets...Will they sell them through a licensed exchange and will we be able to track the sale?"

Citations a-gchq-attack-tor-network-encryption a-gchq-attack-tor-network-encryption 08/silk-road-hack-suspicion-fbi-server 08/silk-road-hack-suspicion-fbi-server 02/bitcoin-silk-road-how-to-seize 02/bitcoin-silk-road-how-to-seize /fbi-bitcoin-silk-road-ross-ulbricht \

Pics 6/Photos/ME/MW- BH366_bitcoi_ _ME.jpg?uuid= 9b2e8964-0e5f-11e3-bfa b3fc 6/Photos/ME/MW- BH366_bitcoi_ _ME.jpg?uuid= 9b2e8964-0e5f-11e3-bfa b3fc ross.jpg ross.jpg pointing.svg pointing.svg r=0&site=imghp&tbm=isch&source=hp&biw=16 80&bih=925&q=uncle+sam+bitcoins&oq=uncle +sam+bitcoins&gs_l=img ac.1.27.i mg UQJC2lMRTaI#authuser=0&hl=e n&q=raised+eyebrow+meme&tbm=isch&facrc= _&imgdii=_&imgrc=27FeV1Zoc9ahWM%3A%3 BVxAuo_OKXgPVOM%3Bhttp%253A%252F% 252F3.bp.blogspot.com%252F- oCZ9v9bqN0s%252FTzc_YwrChuI%252FAAA AAAAACAk%252F3cP9YWaaxCQ%252Fs400 %252Fskeptical%25252Bbaby%25252Bmeme %25252Bplain.png%3Bhttp%253A%252F%252 Fwww.dailyvowelmovements.com%252F2012 %252F02%252Fskeptical-baby-meme-baby- with-eyebrow.html%3B253%3B260 r=0&site=imghp&tbm=isch&source=hp&biw=16 80&bih=925&q=uncle+sam+bitcoins&oq=uncle +sam+bitcoins&gs_l=img ac.1.27.i mg UQJC2lMRTaI#authuser=0&hl=e n&q=raised+eyebrow+meme&tbm=isch&facrc= _&imgdii=_&imgrc=27FeV1Zoc9ahWM%3A%3 BVxAuo_OKXgPVOM%3Bhttp%253A%252F% 252F3.bp.blogspot.com%252F- oCZ9v9bqN0s%252FTzc_YwrChuI%252FAAA AAAAACAk%252F3cP9YWaaxCQ%252Fs400 %252Fskeptical%25252Bbaby%25252Bmeme %25252Bplain.png%3Bhttp%253A%252F%252 Fwww.dailyvowelmovements.com%252F2012 %252F02%252Fskeptical-baby-meme-baby- with-eyebrow.html%3B253%3B260 Wjr8XxRr70c/TekLIPGyxFI/AAAAAAAAR30/O G1Vy3ZZ9cg/s1600/raised_eyebrow.jpg Wjr8XxRr70c/TekLIPGyxFI/AAAAAAAAR30/O G1Vy3ZZ9cg/s1600/raised_eyebrow.jpg com/0f/45b5903d4511e1abfd005056b5004b/file /Kitty%20playing%20with%20laser%20pointer %20GettyImages_ jpg com/0f/45b5903d4511e1abfd005056b5004b/file /Kitty%20playing%20with%20laser%20pointer %20GettyImages_ jpg /images/bottled_lightning.jpg /images/bottled_lightning.jpg 7d65a90c1.jpg