[tor-talk] How FBI Pinpointed Silk Road's Server

Adrian Crenshaw irongeek at irongeek.com
Thu Sep 11 10:52:53 UTC 2014

I've seen plenty of error messages before that leak internal ip addresses,
so still possible. I'd like to know the exact fields they used, and
characters. Tired of things being dumbed down enough for lawyers to
understand. What captcha software did they use?

On Sep 11, 2014 1:25 AM, "Jim" <jimmymac at copper.net> wrote:

> Wired has recently published an article about how the FBI claims to have
> found Silk Road's server:
> http://www.wired.com/2014/09/the-fbi-finally-says-how-it-
> legally-pinpointed-silk-roads-server/
> The FBI claims:
> "As they typed 'miscellaneous' strings of characters into the login
> page's entry fields, Tarbell writes that they noticed an IP address
> associated with some data returned by the site didn't match any known
> Tor 'nodes,' the computers that bounce information through Tor's
> anonymity network to obscure its true source."
> I don't see how that is possible, regardless how badly misconfigured the
> server is.  When the server is accessed as a Tor hidden service it
> doesn't know the client's IP address.  So the only way it can respond is
> back through Tor.  Unless by "typing miscellaneous strings" they managed
> to infect the server with something that contacted an FBI machine via
> clearnet, similar to Magneto.  Am I missing something?  Or are they
> stretching the meaning of "typing miscellaneous strings"?  Or outright
> lying?
> Jim
> --
> tor-talk mailing list - tor-talk at lists.torproject.org
> To unsubscribe or change other settings go to
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

More information about the tor-talk mailing list