​FBI says it located the Silk Road by exploiting an error with the server’s login page


The US Federal Bureau of Investigation may have seized the Silk Road and sold off its horde of ill-gotten Bitcoin , but the case isn’t over yet — the dark web site’s creator still has to face trial. The defense of Ross Ulbricht, the man allegedly behind the Silk Road, is doing its best to discredit the FBI’s evidence; specifically, its accusing the bureau of sniffing out Silk Road server’s location through illegal means. The FBI says that couldn’t be further from the truth. In a court rebuttal, the FBI claims that the IP address of the server was “‘leaking’ from the site due to an apparent misconfiguration of the user login interface by the site administrator.” Basically, FBI officials exploited a glitch to get the server to cough up its hidden location. Officials found that the login page could be coaxed into producing an IP address that didn’t match TOR standards. When this address was used in a non-TOR browser, it produced an element of the login page, confirming that it represented the server’s true location. If this rebuttal is accepted, it will dismiss the defense’s accusations that the FBI used the NSA to illegally hack into the server to find its location. This would ensure that most of the FBI’s evidence is admissible and possibly seal Ulbricht’s fate. Check out the FBI’s full rebuttal in the court document below. Silk Road Prosecution 4th Amendment Rebuttall Comments Source: Wired

​FBI says it located the Silk Road by exploiting an error with the server’s login page


Please enter your comment!
Please enter your name here


This site uses Akismet to reduce spam. Learn how your comment data is processed.