Your Source for Leaks Around the World!

4 Important Lessons Learned from the Silk Road Smackdown

In Archive, News, Silk Road, Ulbricht on October 3, 2013 at 4:14 PM



Law enforcement has finally caught up with the notorious Silk Road underground market, and reporters are having a field day writing about an incredible story as revealed by federal investigators.

Rife with drug trafficking, secretive Internet sites, and assassins for hire, Silk Road’s tale is a crypto-crime story of epic proportions. But Silk Road is more than just a fascinating yarn: The site’s demise also has a lot to teach us about our current digital environment, especially when it comes to online security.

Here are four key takeaways from the end of Silk Road and the Dread Pirate Roberts.

It’s About the Crimes, Not the Tech

An oft-cited fact about Silk Road is that it was part of the ominous-sounding “Darknet,” a secretive, hidden part of the web that’s unseen by search engines like Google and only reachable with the help of the anonymizing Tor software.


But Heisenberg-proportion criminal enterprises conducted in a crypto-laden back alley tell only half the story of the so-called Darknet.

“It’s essential that the use of encryption, anonymization techniques, and other privacy practices is not deemed a suspicious activity,” the Electronic Frontier Foundation said in a recent blog post. “Rather, it must be recognized as an essential element for practicing freedom of speech in a digital environment.”

Beyond criminal enterprises, is also used by activists in parts of the world where speaking freely is impossible. Tor is even recommended by security experts as a good tool to use for anyone that objects to the U.S. National Security Agency’s reported surveillance activities.

Endpoint Security Will Get You in the End

Assuming the case goes to trial, some of the data tying Ulbricht to the Silk Road will likely come from his own computer. FBI agents arrested Ulbricht and seized his laptop only after he had turned on his laptop and entered his passwords, according to a report by Ars Technica. Presumably, Ulbricht had encrypted data on his laptop, which the feds wanted to have in a decrypted state before arresting him.


Read More . . .


Related Links:

FBI Shuts Down Silk Road, Dread Pirate Roberts Arrested

FBI Seizes ‘Silk Road’ Black Market Domain, Arrests Owner

Fed’s Shut Down Silk Road, Seize $3.6 Million in Bitcoins

The Alleged Silk Road Mastermind Teaches Us All How Not to Hire a Hitman

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: