Hacker News new | past | comments | ask | show | jobs | submit login

Also at some point the real IP of the silk road server was emitted via a lighthttpd config error.

Silk road was always going down, one way or another.




I thought the config error was debunked by his attorney. I think the question many people have is if parallel construction was at play and if TOR is compromised.


I wrote about it here:

https://www.nikcub.com/posts/analyzing-fbi-explanation-silk-...

The FBI argument was 'leaky CAPTCHA'. The defense argument was that the application was hacked. The most likely scenario is an info leak or debug page as Ross was known to live edit/debug the application.

This evidence wasn't tested in court on 4th amendment grounds since the defense didn't demonstrate ownership of the server:

http://www.wired.com/2014/10/silk-road-judge-technicality/


buttcoin.com reported on the leaked ip when it happened, long before it was brought up in court. buttcoin.com was bought by butterfly labs and shut down when they had their assets frozen but dailydot reported on it here: http://www.dailydot.com/news/silk-road-ip-address-leak-drug-...




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: