Hacker News new | past | comments | ask | show | jobs | submit login

The interviewer didn't even get the operator's first name. I think he (she? they?)'ll be fine.



We know he found a wallet bug so that immediately gives away what level of competency/expertise to look for on the bitcoin forums which he undoubtedly posts there too. How he discovered the site is relevant and will give away how long he has been on bitcointalk since the orig dpr advertised there. We know his book recommendations from the forum which he prob recommended on clearnet in the past, or attached to his FB profile. Theres dozens of other ID markers he's left which I don't think is misinfo, mainly his Libertarian arguments which again he prob repeated elsewhere. Stylometry analysis incoming.

#1 rule to stay out of jail by thegrugq: stop talking


Not to mention, the dude had to have money (even before taking this over) if he said the previous owner was "well compensated".


There is no guarantee that the money is actually available to him. He probably has most / all of it tied up in Bitcoin, and is probably using only small amounts at a time via exchanges.

It is the classic mafia problem. Yes you can make lots of money on the black market, but it is useless if spending means getting caught. Hence money laundering.


This was interesting too, since I always assumed one of the big vendors on the site bought him out but clearly not thanks to his helpful talking.

I bet he raised the money through a group loan, fund or he runs a coin mixing service/mining pool. something that would give you expertise in setting up secure wallets. This is why saying anything is bad unless it's for misinformation only.

DPR clearly hasn't seen the weev court docs where everything he wrote on IRC was used against him to cement a flimsy case


flip side, it could have been a down payment then an 'earn-out' where the former DPR took xx% of revenue until the debt was paid off.


I thought the article said he worked along side of the original owner for some time before buying him out with his share? Or did I misread that part?


I hadn't thought of a few of those tactics. Good thinking. Just goes to show how little data you need acquire identifying information. Still though, I think the interview is fascinating, if possibly revealing.


Are there tools to beat stylometry? Like something that strips all personality out of your writing.



I bet you could scramble it through a translation tool. Though it's probably not the best idea to feed Google your secret messages, there's probably a local solution.


hmm indeed, although that could be predictable and not as random as Jstylo/Anonymouth.


I wouldn't believe any of what DPR said is actually true.


Or he could easily have stolen the book recommendations from absolutely anywhere on the damn planet. Also who cares if he posted on bitcointalk, also do you honestly believe he has a facebook or if he does do you honestly believe there is any overlap between the 2 personas? If so, your recent silk road purchase must have been a humdinger.


Considering the so-called advanced APT1 Chinese state sponsored hacker team was decloaked through facebook cookies I'd say yes. DPR may not be caught through his online gloating or political rhetoric, but they may use it against him in court to shatter whatever defense he's cooked up by linking his words to his IRL identify. Not like people haven't gone to jail over totally circumstantial evidence before (weev).


The way a proper counterintelligence effort goes after someone like this is to develop a list of candidates based on known facts, then use surveillance, statistics, etc to rule people out. I could ID DPR for $500k with a few staff in a year, either by breaking the law or as an official state entitity breaking the laws of other countries.


I would start by examining where all the major Tor exit nodes are, since that's likely where you would hide your heavy trafficked Tor hidden service, right beside a giant exit node to blend in with the other traffic. Feds already know this, this is probably how they caught Freedom Hosting.

Failing that go looking for hosting services that accept bitcoin, or online wallet services esp one's coded in php, since this guy has expertise in that area it's logical to assume he's running a hosting front so when the feds come in to seize the servers, he would be the guy they ask to retrieve it. You wouldn't want to trust your multi-million dollar drug site to colocation you'd want to see your server all day and be able to get to it or notice if somebody sabotaged it. He kind of already dropped he had physical control of the server when it crashed once while he was "out of town". Now cash out a lot of your coins and pretend it's for contract services, DDOS, hosting ect. You could also then enjoy plausible deniability, claiming an unknown customer set that site up and it wasn't you. Since your site accepts bitcoins, you have a reason to be using them. All well and good.. unless you talk too much and drop intel on yourself so they can use other circumstantial evidence against you in court.

He would also have to launder and sell all those coins. If I were him I'd be selling them directly to buyers in an underserved country using a decoy clearnet fixed-rate exchange, or I'd also be running my own small exchange and dumping coins in it, using fake ID scans and paying for traffic to simulate customer records. I'd probably also run my own mixing service like bitfog, lending service, or online casino/betting site to help launder them. If there's any large bitcoin investment funds still around I'd be all over that too, getting new coins out from other investors and giving them my SR coins.

Feds can identify the operators of all the above and then compare them to identity markings DPR has dropped on himself. Anybody with a 60% or higher chance of fitting the profile mark them for long term surveillance they will slip up eventually. Feds already know all of this.. which is why you need to be incredibly careful and never get too comfortable running the world's biggest outlaw darkmarket. Satoshi is a good example of excellent OPSEC. Never once did he stray from the topic of development of bitcoin. There is only 1 post in his entire bitcointalk history that does and it was when he chastised some idiots who wanted to sign up Wikileaks back in 2010 for donations, warning them Bitcoin would be killed before it could even start. He certainly didn't talk about politics with the exception of his genesis block comment. He also seemed to have had chosen a fictitious personality and slid in and out of it confusing anybody trying to go after him. Every unique phrase or word he wrote was analyzed then looked for in old whitepapers and mailing lists... nothing.

He also doesn't give interviews


>I would start by examining where all the major Tor exit nodes are, since that's likely where you would hide your heavy trafficked Tor hidden service, right beside a giant exit node to blend in with the other traffic. Feds already know this, this is probably how they caught Freedom Hosting.

You would not want to run a heavily used hidden service that you want to remain hidden right beside an exit node. That would be foolish.


I wouldn't want to run a long-lived service which attracted serious attention on an onion routed network. You could get some initial protection by terminating the onion frontend traffic on "tamper resistant, untraceable, throwaway nodes", and then backhaul (maybe via Tor?), to other servers, etc. The frontends would be able to do some local processing to maybe break up the traffic somewhat.

All of this kind of stuff would impair site reliability. IMO, if SR went down more often, I'd have a higher opinion of the paranoid exhibited by the admins. A highly reliable underground site is usually either 1) run by people who are going to get caught or 2) run by people who are doing the catching. There's I guess 3) run by really exceptional people who are doing it as a political statement -- generally unlikely, but in this case, possible.


> He also doesn't give interviews

Unless he's DPR.


This almost sounds like what happens at the start of Vernor Vinge's True Names a book written in late 1970s and still relevant.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: