-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Rejo Zenger: > ++ 03/10/13 13:49 -0400 - Ahmed Hassan: >> One question is still remain unanswered. How did they locate >> Silkroad server before locating him? >> >> They had full image of the server before his arrest. > > Where have you read this or deducted this from?
It has been reported in several places online. Here's one[1]: "In July 2013, a forensic analysis of the hard drives used to run one of the Silk Road servers revealed a PHP script based on curl that contained code that was identical to that included in the Stack Overflow discussion, the complaint alleged." (It appears they were able to find the server and have it imaged well ahead of the arrest, and this is described in the court documents.) 1. http://arstechnica.com/security/2013/10/silk-road-mastermind-unmasked-by-rookie-goofs-complaint-alleges/ Best, - -Gordon M. -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJSTuQvAAoJED/jpRoe7/ujIHIH/3F94LZ6dhvW+JIGpwmMuNp4 U9jxjQrROpWy4+kis1kLwVgiPDxqIKoZyoYpsR58SV8Y4U+vxsN/LvkHHRX6XOMZ I9Po7ol+qblvUpCqR1sSl7OYsPIpGu8LBs9PAle576qSB9P7FygLpeLmQ2r2BWd0 s/0k0oFN2E3gXVchtxv2etYsMM4873lumS9zHlbEQLMOBPkitPoupWPfYkuHahDb r6KJhwVFod9AishRtMUl3K19yhetiZbgrntTvDaLE84RLOgMrJmApqR/wj2xSFTI YHnZaKtOkz+u4MAu4Nrd4JXjluXCaA44jeSbCaa09uqmSt3JqPFXZ8KaK8F87iM= =61NQ -----END PGP SIGNATURE----- -- tor-talk mailing list - [email protected] To unsusbscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
