Pages:
Author

Topic: How is DPR securing his wallets from the Feds? (Read 5848 times)

legendary
Activity: 2674
Merit: 2965
Terminated.
November 12, 2013, 11:58:31 PM
#51
I'm more interested why FBI sent the coins in portions like 300 coins each time. They documented each transaction? Why not all at once?

324 corresponds to "FBI" if you type it on a phone keypad. They were being clever.

That is clever...

...for a kindergartener!
Even children from kindergarten know better.
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
DiskCryptor does no have option for self-destruct. It have additional options on wrong password like handling boot sequence to another bootloader or rebooting computer. More to do with manageability and configuration flexibility and not self-destruct.
Quote
Similar to how Prey works, and how most phones have a delete feature if wrong password or something.
Phones don't encrypt data or do it with backdoors. All it takes is to desolder memory chip and read the raw data from it. It will keep out meth addicts from your private data it but not police.
Quote
The best way to secure data, in my opinion, is physical destruction of the encrypted media. The best way I can tell to do that is to have a small thermite bomb on top of the hard drive that ignites and melts it when you hit a panic button. (If you can get to the panic button.)
Really good 25+ chars random password is the best. Physical destruction is not guaranteed to succeed and why damage perfectly fine device? My panic button is located behind trigger guard and below slide but I'm not relying on it for privacy of my data.

Yes, I meant that you make it boot into another OS, and that OS has a program at start up that does the self-destruct of your data.

Of course, for the panic button, the drive is already encrypted. Then you melt it with thermite. That is almost guaranteed that no one can read the plain data after that.

The reason to damage a perfectly fine device is the lack of time to properly do a wipe. (It won't wipe if the drive is not dismounted or something.) If you do have more than a few seconds, then you can do it the software way. It's extreme, I know.
full member
Activity: 187
Merit: 162
I'm more interested why FBI sent the coins in portions like 300 coins each time. They documented each transaction? Why not all at once?

324 corresponds to "FBI" if you type it on a phone keypad. They were being clever.
legendary
Activity: 2674
Merit: 2965
Terminated.
I'm more interested why FBI sent the coins in portions like 300 coins each time. They documented each transaction? Why not all at once?

Self-destruct is useless if it cannot prevent data copy in first place. Hard drives are not smartcards. Remember that and use really strong passwords that are unrealistic to break by brute force or wordlist guessing.
Why not microwave the HDD just?
legendary
Activity: 1512
Merit: 1049
Death to enemies!
I'm more interested why FBI sent the coins in portions like 300 coins each time. They documented each transaction? Why not all at once?

Self-destruct is useless if it cannot prevent data copy in first place. Hard drives are not smartcards. Remember that and use really strong passwords that are unrealistic to break by brute force or wordlist guessing.
full member
Activity: 187
Merit: 162
It seems like DPR's mistake as far as having these coins identified as his was putting everything onto one address.

What if instead DPR had used a mixing service and had the mixing service send a few hundred coins at a time to a completely new address each time? Wouldn't people then have no idea how much he owned, or which addresses were his? He'd just have 1000 addresses each with somewhere between 90-120 coins which no one could tell apart from any other new address containing that many coins.


legendary
Activity: 2674
Merit: 2965
Terminated.
It has no self-destruct feature?  Angry
legendary
Activity: 1512
Merit: 1049
Death to enemies!
Quote
Well, the configurable boot loader allows you to attempt the self-destruct feature. Of course, it won't work against enemies that image your hard drives and work on the copies.

My version of TC has a work around. You boot into the decoy OS and if you don't do something, it will proceed to wipe the data on the hidden OS, and it really only needs to wipe a megabyte or two to get the job done.

It only works on the assumption that they do not image my hard drive.
DiskCryptor does no have option for self-destruct. It have additional options on wrong password like handling boot sequence to another bootloader or rebooting computer. More to do with manageability and configuration flexibility and not self-destruct.
Quote
Similar to how Prey works, and how most phones have a delete feature if wrong password or something.
Phones don't encrypt data or do it with backdoors. All it takes is to desolder memory chip and read the raw data from it. It will keep out meth addicts from your private data it but not police.
Quote
The best way to secure data, in my opinion, is physical destruction of the encrypted media. The best way I can tell to do that is to have a small thermite bomb on top of the hard drive that ignites and melts it when you hit a panic button. (If you can get to the panic button.)
Really good 25+ chars random password is the best. Physical destruction is not guaranteed to succeed and why damage perfectly fine device? My panic button is located behind trigger guard and below slide but I'm not relying on it for privacy of my data.
legendary
Activity: 2674
Merit: 2965
Terminated.
the currently second-richest address with >111k BTC belongs to DPR
Then he's a very rich man.
full member
Activity: 125
Merit: 101
It's my understand the majority of his coints are not seized.
http://www.coindesk.com/fbi-proves-seizing-bitcoins-isnt-owning/

What is the evidence that DPR has another 489,000 coins? Just that if you subtract the amount of coins that the FBI seized from the total amount of commissions that Silk Road made, you get 489,000?



the currently second-richest address with >111k BTC belongs to DPR
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
Dunno. I never bothered to read all the details.

I bet it's all in the blockchain. You just have to look. (Of course, it's all there!)
full member
Activity: 187
Merit: 162
It's my understand the majority of his coints are not seized.
http://www.coindesk.com/fbi-proves-seizing-bitcoins-isnt-owning/

What is the evidence that DPR has another 489,000 coins? Just that if you subtract the amount of coins that the FBI seized from the total amount of commissions that Silk Road made, you get 489,000?

full member
Activity: 200
Merit: 100
I thought the FBI stole almost all of DRP's coins already.

This is the FBI's address that they used to store the Silk Road coins (belonging to customers, in a 'hot wallet'): https://blockchain.info/address/1F1tAaz5x1HUXrCNLbtMDqcw6o5GNn4xqX. It contains about 29,000 BTC.

This is the FBI's address that they are using to store DPR's personal coins: https://blockchain.info/address/1FfmbHfnpaZjKFvyi1okTjJJusN455paPH. It contains about 144,000 BTC.

How did they get the second batch of DPR's personal coins? I'm guessing that DPR either had his wallet password written down somewhere, or had hints to the password written down somewhere, which made cracking it very easy.

Some people think DPR has a few hundred thousand more coins somewhere in another wallet. It's possible, but it's also possible that the FBI already has almost all of his coins.

EDIT: note that the FBI started moving the silk road coins on October 2nd, and they started moving DPR's coins on October 25th. This suggests that the FBI had to work pretty hard to get DPR's coins, but eventually they succeeded somehow.

It's my understand the majority of his coints are not seized.
http://www.coindesk.com/fbi-proves-seizing-bitcoins-isnt-owning/
member
Activity: 70
Merit: 10
But if your key is on your hard drive and it's encrypted they can't get it unless they have your passphrase right?


For the "brain wallet" you don't need to get your wallet file.  You can recalculate the private keys just from that phrase.  The problem here is that people are using large supercomputers to calculate as many possible brain wallets as they can.  Several people have reported funds being stolen from brain wallets because people don't realize how many brain wallets can be checked by a group of large computers.  They are making large databases of possible brain wallets and they watch the Bitcoin network and steal money when they can.  A regular user should not use a brain wallet because it takes a certain level of knowledge and sophistication to do it right.

To encrypt a wallet means you have to get access to that wallet file.  If someone gets the file they can try to brute force the password but they have to have a copy of the file.  So those supercomputers that are trying to break brain wallets do not do any good since they don't have the wallet file

If he is in jail and he can't get to the file he can not get to the funds.  however, if he used a brain wallet and still remembers it he can communicate that info and someone can recreate the wallet.

http://millybitcoin.com/common-bitcoin-misconceptions/

I see but isn't that just a deterministic wallet?  Or functionally the same as a deterministic wallet?
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
Well, the configurable boot loader allows you to attempt the self-destruct feature. Of course, it won't work against enemies that image your hard drives and work on the copies.

My version of TC has a work around. You boot into the decoy OS and if you don't do something, it will proceed to wipe the data on the hidden OS, and it really only needs to wipe a megabyte or two to get the job done.

It only works on the assumption that they do not image my hard drive.

Sorry, I don't understand Russian, but again, it works on the assumption that whoever grabs your computer just turns it on. Similar to how Prey works, and how most phones have a delete feature if wrong password or something.

The best way to secure data, in my opinion, is physical destruction of the encrypted media. The best way I can tell to do that is to have a small thermite bomb on top of the hard drive that ignites and melts it when you hit a panic button. (If you can get to the panic button.)
legendary
Activity: 1512
Merit: 1049
Death to enemies!
I use DiskCryptor (TrueCrypt replacement) with 25+ character random password to protect my computer from tampering and forensic examination. If I was at risk of being hacked then I will apply password to wallet.dat in Bitcoin-Qt.
What are the benefits of each of those?
Why are you using that one as a replacement to TrueCrypt?
DiskCryptor have a lot better performance on my old CPU https://en.wikipedia.org/wiki/Pentium_4#Willamette The attached benchmark screens speak for themselves.
DC pros:
+works better with RAID arrays (i'm running RAID array on my computer)
+generally faster because of better code optimization (on computers lacking hardware AES acceleration the DC's more secure Serpent is even faster than TC's AES!)
+more configurable bootloader - good for servers

TC pros:
+better for single drives - can encrypt entire drives including unallocated space versus DC volume-based approach.
+ Hidden volumes and hidden operating system
+ ability to mount as read-only

Quote
I think with DC, you can easily set up a self-destruct sequence upon entering either the wrong password, or a password specifically to do that.

In TC, you can too, sort of, but it's a work around.
Entirely false. Both DiskCryptor and TrueCrypt does no have self-destruct feature. It is useless against any half-capable enemy because enemy will make copies before and ask to write down password on piece of paper. If You understand russian then DiskCryptor author NTLDR made very clear and profane statement about this.
Quote
How did they get the second batch of DPR's personal coins?
It's very sad ;( seems like they cracked DPR to cooperate or he did not use full disk encryption on his computer. Or his security got compromised. Anyway we most likely don't know full story. And it is bad news that the FBI have their CP masturbating hands on 1.5% of all bitcoins ever in existence.
full member
Activity: 187
Merit: 162
I thought the FBI stole almost all of DRP's coins already.

This is the FBI's address that they used to store the Silk Road coins (belonging to customers, in a 'hot wallet'): https://blockchain.info/address/1F1tAaz5x1HUXrCNLbtMDqcw6o5GNn4xqX. It contains about 29,000 BTC.

This is the FBI's address that they are using to store DPR's personal coins: https://blockchain.info/address/1FfmbHfnpaZjKFvyi1okTjJJusN455paPH. It contains about 144,000 BTC.

How did they get the second batch of DPR's personal coins? I'm guessing that DPR either had his wallet password written down somewhere, or had hints to the password written down somewhere, which made cracking it very easy.

Some people think DPR has a few hundred thousand more coins somewhere in another wallet. It's possible, but it's also possible that the FBI already has almost all of his coins.

EDIT: note that the FBI started moving the silk road coins on October 2nd, and they started moving DPR's coins on October 25th. This suggests that the FBI had to work pretty hard to get DPR's coins, but eventually they succeeded somehow.
legendary
Activity: 2674
Merit: 2965
Terminated.
http://en.wikipedia.org/wiki/DiskCryptor

Both that one and TrueCrypt work. I think with DC, you can easily set up a self-destruct sequence upon entering either the wrong password, or a password specifically to do that.

In TC, you can too, sort of, but it's a work around.

Again, if you can manage it, you can also try memorizing a whole private key (in base58 WIF or hex) instead of the passphrase for it. Don't use pi, even if you managed to memorize 200 digits already. Everyone else knows it.
I like the sound of that. The self destruct feature would be very useful.
legendary
Activity: 3416
Merit: 1912
The Concierge of Crypto
http://en.wikipedia.org/wiki/DiskCryptor

Both that one and TrueCrypt work. I think with DC, you can easily set up a self-destruct sequence upon entering either the wrong password, or a password specifically to do that.

In TC, you can too, sort of, but it's a work around.

Again, if you can manage it, you can also try memorizing a whole private key (in base58 WIF or hex) instead of the passphrase for it. Don't use pi, even if you managed to memorize 200 digits already. Everyone else knows it.
legendary
Activity: 2674
Merit: 2965
Terminated.
I use DiskCryptor (TrueCrypt replacement) with 25+ character random password to protect my computer from tampering and forensic examination. If I was at risk of being hacked then I will apply password to wallet.dat in Bitcoin-Qt.
What are the benefits of each of those?
Why are you using that one as a replacement to TrueCrypt?
Pages:
Jump to: