We spoke about this last week on our podcast. With the feds issuing that warning last month.. that they are coming to take out everyone and anyone .
Stay safe ya'll
You mean the "Reload" AI that is in development courtesy of Michaelsoft Binbows, which will monitor everything you do on screen and send the data back to them?
Takes me back before the time I tied an onion to my belt and we called that kind of thing 'spyware' (which was the style at the time)
People who still use Windows in 2024 should please terminate their internet connections for good.
At this stage, I consider using blatant Govware 12+ years post-Snowden as criminally neglectful to the point that people should get extra time on top of their sentence for being *"criminally stupid"*...
Windows Recall is just them upselling the features of *"Magic Lantern"* and *"Carnivore"* Govware as features - kinda how Valve managed to upsell an Online - DRM [Steam] as a feature so hard, Devs get bullied and harrassed if they don't want to publish on said store that cashes in 30% gross sales revenue (!) aka. before (!!) taxes (!!!)...
Let the *"Tech Illiterates"* die out for good - they chose to be ignorant and accept the Enshittification!
Idk about AI but most computers have backend openings for government entities to observe. Gov also made monitoring viruses which firewalls aren't allowed to block, meaning they have infected most computers in the US I'd guess
Don't get me started on Copilot smh.....fuckin Winblows is a goddamn open book smh....if you're not on OpenBSD you better get there if you're breaking enough law to get on their radar smh....stay safe ya'll
Thank you finally someone is thinking. It's only moments before brief press convference talking about the advancements in AI and the crackdown. Like far right shit. but with robots
Its more than just a virus its an endless life loop maybe you dont wanna know more its fuuuuuckkeeeddd... bank ant has been hacked... my physical ID is compromised throuhg gvt portals... wtv they got everything even my health and its impossible to reverse this its only gonna get worst
leaked video from part of the interview from the bank also got videos of how it reacts its migrating from windows to linux to mac to android so its smart already then it clones desktop through the clouds like onedrive or google drive and when you delete the content of the cloud you delete your stuff, it hops through various datacenters around the world and also steals all the infos it can get from email passwords to crypto wallet accnts
xchange.cx is a phishing attempt on xchange.me. Be warned!
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
shit can u post a link to where they said that lucky i live in canada haha they wont be as worried about us and focus more on there own people but going to be going after markets hard ewww there lame think theey can win the war on drugs silly people
I agree but US Government will run our country in the ground over the dumbass war on drugs... but then again if they didn't the whole USA would look like Portland lmao
It isn't about any legacy, the domain is important for many reasons. Including familiarity and search engine ranking. I feel a lot more comfortable now that it will likely be seized, rather than the opportunity arising for a phisher to take over it. The downside is that it will likely drop in ranking now also when the pages become unavailable, giving prominence to existing phishing sites. It might be time to actually search engine optimize Daunt, right now it has absolutely 0 structure for search ranking because it was never intended to be permanent.
I think now we're back into the swing of Daunt being a community necessity, I suggest maybe please getting its onion online again too while you're speedrunning those indian SEO tutorials. You and Paris have kept a conservative attitude about Daunt's existence, and the fucking idealistic goofy goobers on Dread are going to tell you there's no reason to kill it, but I'm here to reinforce that while Daunt is a golden gift, it and the reasons forcing its creation have to die. My assumption is that you don't want Daunt to exist as a resource, even though you can leave it up in its current form with no issue, because you don't want to be the only two guys that are relied upon. Recon, Dread, my fucking grandmother, Dread admins having overwhelming control of DN invites unpleasantness to you two and presents a broader danger to the community.
The best solution is more trusted individuals hosting more services and providing anchoring to the community. Maybe not more shit tier markets and redundant forums; but link resources, git servers, key repositories, unique ideas to get more funding to the things that matter (the reliability of the Tor network is a pretty good one /post/ca0360fe2071d94ef4d5), technical/OPSEC education to the millions of scrubs that come here, and so many more useful, boring things. There is little diversification of trust in the DN community, and I worry if you and Paris get knocked out, even if your deadman's switch works, there's going to be a shitshow that'll ensue of who gets to keep grandpa's money. I don't know how much I trust a market owner or some moderator of some major sub to make something to fill a gap left by Dread. BTW a friendly reminder to check your deadman's switch procedures. Anything you forgot to do? Did you pay the server bill? Maybe the carrier pidgin holding the dread source code USB drive needs to be refamiliarized with the route? (to what I assume is the strip club /u/dontlaugh dances at)
For Daunt I think it's an awful existence to know as a child that your parents are just waiting for the day they kill you :-( poor guy.
For search engine ranking, the structure of the pages has to be optimized, especially specific key words. It was built for a single limited purpose so it does not have these optimizations, it wasn't really intended to stick around as a future link directory.
I'd say it just depends on the number of agents and federal prosecutors available to make cases. Even local police officers give traffic tickets when there's nothing else to do.
Feds go for big fish. Unless the perpetrator confesses (surprisingly common), the FBI won't even investigate crypto thefts under worth under 7 million dollars.
Most of the buyers will be fine. Especially if proper opsec was used.
Also, I have a pet theory that CZ's relatively short sentence is related to him allowing the feds access to Binance's backend to conduct parallel construction in reverse-engineering transactions. I have no evidence of this, but the feds have done this before at a much smaller scale and is their preferred way of crypto attribution because everyone except the one judge in SDNY seems to be entirely aware that chainanalysis is bullshit.
I would tend to agree, however I would also argue that they don't care how big or small you are, as much as how easy someone is to make a case sufficient for their prosecution. Low hanging fruit...
These guys work hand and hand with cartels. They don't bust people to stop it. They bust people to keep their jobs and show that they're "making progress"
It's more that they prioritize big cases if possible, but won't pass up on a smaller case if they come across it and it's low hanging enough so that it can get handled quickly. They are in the coercion business, after all, but they are ultimately limited by how many prosecutors work on cases in any specific field. I know that they keep score and even a hung jury at trial will be a major embarrassment and especially if it's some chickenshit relatively minor case. That's why they like to create grand conspiracies that involve a ton of defendants so it creates the whole Mexican standoff situation where the most involved race to plead out. AUSAs seldom do it because they are true believers - you'd be either a psychopath to not become cynical real quick. They do it as a stepping stone to politics. If your record is "I got a bunch of small timers to plead out" you can consider your politics career dead in the water, so they prioritize and sometimes pass the small but not 100% easy cases down to the state level if the jurisdiction fits. State prosecutors are a lot more cowboy and would go places the feds won't go (and lose cases that the feds wouldn't lose). Same sport, but slightly different league. Dutch Eredivisie versus the Premiership.
Oh and they are doing more than that. They are effectively actively creating crime in order to appear occupied. Vice is already a bullshit social construct (even comparing attitudes and laws towards it between 1650 and 1750 and 1850 in the UK and you can see how wildly different the conceptualization can become in the same place) and to criminalize it is truly vile. The craziest thing is that they don't care that their own inspector general issues reports about their wrongdoing. they did kind of slow walk the money laundering report so that it dropped during the first month or two of the lockdown, but like, pretty much all LE air-ed out their dirty laundry at that time if by law they were required to do so, like Wisconsin disclosing that they were more or less charging kids for trafficking themselves and really don't have a sex trafficking problem (https://www.doj.state.wi.us/sites/default/files/ocvs/human%20trafficking/5%20Key%20Takaways%20Assessment2020.pdf for summary, https://www.doj.state.wi.us/sites/default/files/ocvs/human%20trafficking/2019%20Law%20Enforcement%20Assessment%20of%20Sex%20Trafficking%20in%20Wisconsin%20-%20Final%20Report.pdf for the whole thing). Metadata says that the report was finished in January and it dropped conveniently the day after the NBA cancelled games and everything ground to a halt. What a coincidence, right?
The DEA arguably had even more damning reports drop at pretty much the same time. https://oig.justice.gov/sites/default/files/reports/a20071.pdf and https://oig.justice.gov/sites/default/files/reports/21-109.pdf basically both show that taxpayer money ends up paying for cartel operations and the DEA either are in on it or are grossly incompetent. And tried to cover up shit when it goes wrong. That's just part of the culture at the agency at this point. Your tax dollars are paying for birthday parties, and they dgaf. https://oig.justice.gov/sites/default/files/reports/23-019.pdf. I don't think they even really care about the appearance of making progress since it's widely acknowledged that the war on drugs have failed but the DEA isn't going away any time soon, is it? If they feel threatened, they'd do a better job covering up. They have the capabilities, they just. don't. give. a. fuck.
Seems they identified him a while ago, I can't remember the dates in the indictment now you'd have to check. He made multiple mistakes that lead to his identity. I doxxed him from a single comment he made on Dread.
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
No. No matter what anyone does, anonymity is sacrosanct.
In this case I did consider it, but ultimately I let it go when he didn't follow through on the data leaks. The funny part is that while facing the possibility of his dox being leaked, his ego told him he was going to be fine.
It was thin linking it to him, I was 90% sure so I bluffed that the connection was strong to him and he was typing for 2 minutes, then stopped typing for a while and then just replied verbatim "Lol not me".
For anyone interested, to pre-face it, I was looking for someone with some sort of NFT activity as a confirmation, the site screamed "I have an NFT collection". After the extortion started I was digging through his posts and his past usernames, there was nothing that stood out to link to anyone other than the same username being used in the past and some details for it being part of past database leaks, none of it was useful and I didn't believe that to be the same person. I then came across a comment where he listed XMR nodes, I overlooked it at first, but then remembered him mentioning he runs multiple XMR nodes and Tor relays, so I went back to that comment. One of the XMR nodes he listed, I actually recognized, maybe from one of Thotbot's lists, but there was another I didn't recognize so thought I'd look it up. It wasn't in any of the public lists I checked, so when searching online I found it listed on a public node list hosted by our friend here Rui on his personal website, along with the first one that I recognized and 1 or 2 more. I thought, he can't be this stupid to share his own nodes like this... his site made me believe instantly that this is him (NFTs, Gitbub repo with a PoW DoS protection fork) , the only doubts I had were that it was too easy and maybe I was focusing on the NFT thing too much and then him just denying it.
Now its confirmed, I should have felt more confident in it and pushed it with him, but I don't think it could have changed much knowing what we know now.
I see in the indictment that his use of XMR was also tracked and used to confirm he was indeed the culprit.
Several examples of where he sent market BTC funds to a swap service like changelly to receive XMR of say 305 XMR. Then sent 305 XMR to cash out at Binance within the hour - probably shortly after 10 confirms.
I do wonder if that contributed towards his extreme minimum life proposed sentence.
The fact that he was working with law enforcement sure must be embarassing for them - but I guess now they know the guy did know what he was talking about when it came to darknet markets... lol
I alluded to it, its why he changed his mind on some things too, have a look at the comment chain with that new account he made, /u/stayinginnovative or something like that
Much pwnage. Nicely done, bruv; you smacked that little bitch in the face, knocked the taste out his mouth. I'll bet he was shitting bricks. And it's funny, because maybe if he hadn't put up the extortion notice, he wouldn't have tipped off the feds of the exit scam. Perhaps he could've quietly absconded to Taiwan before the feds realized it. Doubt it, but maybe.
Right, but I was thinking if he had managed to abscond to Taiwan / China and was beyond U.S. extradition, you know maybe he would be very much wanted by the FBI, but still, free. I guess it depends on how soon after compromising the server the feds would've put out an APB or whatever to stop him from International flight at all airports. Obviously they allowed him to continue operating for a couple years. I wonder how closely they watched his movements during that spell. Two years of federal investigation and having agents trail a person is not exactly cheap, you know...
If convicted, Lin faces a mandatory minimum penalty of life in prison for engaging in a continuing criminal enterprise; a maximum penalty of life in prison for narcotics conspiracy; a maximum penalty of 20 years in prison for money laundering; and a maximum penalty of five years in prison for conspiracy to sell adulterated and misbranded medication. A federal district court judge will determine any sentence after considering the U.S. Sentencing Guidelines and other statutory factors.
DUDE IS SOOOOO FUCKED. They going to give him life ..
Assuming they are gonna use ross ulbricht's sentence as the precedent for this case, in which case yeah. He's definitely gonna get life. Imagine being 23 years old and spending the rest of your life in an American prison. 7500 miles away from your home. Why the fuck would he come to the united states. I would fly through Russia, Ukraine or even fucking Afghanistan before i would get on any plane even flying near US air space.
I would rather take my chances boarding yevgeny prigozhin's jet and flying directly through Kuzhenkino, Russia then landing anywhere near the United states.
Currently there is a flight to Helsinki, a flight to Amsterdam and a flight to London over Afghanistan's airspace so god bless our brave Mujahideens and god shall curse you infidel
I had some (now deceased) friends who were both straights -- no drugs, no illegal behavior whatsoever, yet they organized their trips to go the other way 'round the world to avoid the United States. They had heard, and I believe it to be true, that the U.S. photographs/fingerprints people from certain countries in transit to places other than the United States.
The Americans are so mind-bogglingly arrogant, that they have given themselves the right to ban people flying from the UK to other countries, e.g. Canada, Cuba, the Carribean, etc. The following article is over a dozen years old, yet I believe it is still accurate.
Planning a trip to Canada or the Caribbean? US Immigration may have other ideas...
New security checks are already in place – even for flights hundreds of miles from American airspace
Simon Calder
Sunday 25 March 2012 22:10 BST
One million British travellers planning to fly to Canada, the Caribbean and Mexico this year face the risk of being turned away at the airport – at the insistence of the US Department of Homeland Security.
New rules require British Airways and other airlines flying to certain airports outside America to submit passengers' personal data to US authorities. The information is checked against a "No Fly" list containing tens of thousands of names. Even if the flight plan steers well clear of US territory, travellers whom the Americans regard as suspicious will be denied boarding.
Simon Hughes, the deputy leader of the Liberal Democrats, told The Independent: "The concern by the US for its own security is entirely understandable, but it seems to me it's a whole different issue that American wishes should determine the rights and choices of people travelling between two countries neither of which is the US."
For several years, every US-bound passenger has had to provide Advance Passenger Information (API) before departure. Washington has extended the obligation to air routes that over-fly US airspace, such as Heathrow to Mexico City or Gatwick to Havana.
Now the US is demanding passengers' full names, dates of birth and gender from airlines, at least 72 hour before departure from the UK to Canada. The initial requirement is for flights to Toronto, Ottawa, Montreal and the Nova Scotia capital, Halifax – 150 miles from the nearest US territory. A similar stipulation is expected soon for the main airports in western Canada, Vancouver and Calgary.
Any passenger who refuses to comply will be denied boarding. Those who do supply details may find their trip could be abruptly cancelled by the Department of Homeland Security, which says it will "ake boarding pass determinations up until the time a flight leaves the gate ... If a passenger successfully obtains a boarding pass, his/her name is not on the No Fly list." In other words, travellers cannot find out whether they will be accepted on board until they reach the airport.
Canadian Affair, the leading charter operator between Britain and Canada, began supplying the data a week ago and 13,500 of its clients have complied with the demands. None has so far refused to provide the information and no one has been refused boarding.
Air Canada and British said they would comply with any new rules and The Independent understands that they will join the scheme in April. Flights to Mexico and Cuba - the Caribbean island closest to the US – are also included.
The US will have full details of all British visitors to Cuba, including business travellers, which could potentially be used to identify people suspected of breaking America's draconian sanctions against the Castro regime.
Neil Taylor, a tour operator who pioneered tourism to Cuba, said: "Imagine if the Chinese were to ask for such data on all passengers to Taiwan, and similarly if the Saudis were to ask about flights to Israel – would the US government understand?
"One also has to wonder how an American traveller in Europe would react if he were denied boarding on a flight from London to Rome because the German government had not received sufficient data from him."
Tony Wheeler, founder of Lonely Planet travel guides, said "This extension of the rule to include flights that never enter US airspace is scarcely credible. What on earth right does the US have to ask for passenger information if you're flying London-Havana?"
NOW BOARDING: WHO IS AFFECTED?
725,000: Number of British visitors to Canada each year. Airports affected: Ottawa, Toronto, Montreal and Halifax
300,000: Number of British visitors to Mexico each year. Airports affected: Mexico City and Cancun
160,000: Number of British visitors to Cuba each year. Airports affected: Havana, Varadero and Holguin
Yea but feds offered ross a plea deal for a 10year sentence. This Rui guy is going to snitch and help the feds in every way imaginable. I wouldnt be suprised if this snake avoids a life sentence.
Of course they are. Garland fails to prosecute the single biggest threat to National Security in modern times, but he, nor any other AG on either side, will fail to make an example of cyber-criminal drug kingpins whenever they can. Elites within the power structure only dicksize when they're pretty sure they won't lose.
It's not the first guy you see at the beginning of the video it's the other guy talking about DDOS, his voice is way deeper btw.
Anyway he'll get raped in prison 100%
He's gonna be serving a lifetime sentence in a maximum security facility underground somewhere out in Colorado, with El chapo. The fact he rugged the market and stole everyone's money will also be brought up and used against him, not that it will really matter but it's one more thing they are gonna use against him that isnt going to help him in front of a US jury.
In other words, he isnt gonna be able to say "oh i just wanted to help the people and give them the freedom to buy what they want" ... nah, in the end he fucked over the same people he was allegedly helping.
I really have to admit that I like that this about LE, in case you are a piece of shit and steal from the users they will bring it up in court against, they did the same to WSM and this resulted in +1 year to every WSM admin back in the days.
If that is really true, then I feel satisfied. He wanted to play the tough gangsta, that blackmails people, here he has it. Like a gangsta he has to serve his best years in prison - in a supermax one, haha
Depending on the charges they are convicted of they are assessed points. It used to be anything over 13 points is medium custody. Anything over 15 points is maximum custody. Anything less than 13 points is minimum custody but if your sentence is over 10 years, you normally process in a maximum facility processing center and are then shipped to what they call "closed" custody which is 24/7 lock down (I think they get an hour of rec a week) from there they have plenty of time to work their way down to minimum. Most people who get 20 years or more, wild out in prison for the first 3-4 years because they dont give a single fuck. I dunno if they changed the point system since. It's similar for state custody as well
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
I'll take a knock on the door from the feds any day in exchange for Rui-Siang Lin being fed the long dick of the law preferably in the same cell Epstein did (but not a requirement)
He told me he had been storing auto encrypt data and transactions (the data he threatened to leak) since the beginning, if that is to be believed, the feds have that data. They will have any live data that was sent unencrypted and tx data from any periods where they imaged the server after discovering it in 2022.
probably greed.. there is a lot more info in setting up a btc merchant than monero, also a lot more people use BTC. Ironic being the thing that it was meant to do being an anonymous way of sending money is easy tracked by feds now and monero is the one getting delisted from exchanges so we know it's safe :")
xchange.cx is a phishing attempt on xchange.me. Be warned!
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
How the hell was he in a vid about cyber security and running this large of an operation with that awful opsec smh? Also I didnt read that in the justice dept press release, where did you get that info?
Utmost stupid OPSEC and mental attitude. He got what he earned for the coming decades, and his thoughtlessness and recklessness are beyond imagination.
In scenario where you have been withdrawing BTC multiple times to an electrum wallet (New address everytime) and moved them to another BTC Wallet without your identity linked directly to the wallet (Again, using a new address everytime), how traceable would your identity be, if you afterwards have been purchasing items on a legal website a couple of times (Using personal info), using the second wallet? Can the BTC be traced back to the first withdrawal, even when using a new address for every deposit and every wallet switch?
BTC can be traced from when its mined to the very last transaction it was involved in. Doesn't matter if that's 1 hop away or 100 hops.
If you ever gave your personal info to any party that received Bitcoin, and that party would cooperate with law enforcement, they can get your personal information.
the feds wouldn't see customer addresses unless they bust the individual vendors before they're able to delete their private pgp keys. Which they will probably attempt to do for some of the more prolific vendors but not everyone because this would be massive undertaking and not something I'm worried about. I'm more worried about conversations had without PGP and the Fed's ability to potentially track the IPs from those log instances and thereby likely identity and addresses
can you elaborate a little bit on why they would have the data going back to 2022? Not trying to argue or anything I'm just new to this but why would he keep the server data around after doing the exit scam? I'd imagine if I were to pull off such a move that I would erase everything behind me. Is this just PRISM shit where the NSA can grab any data they want? or what?
I read the same sentence the first time, I'm asking you how do you know this? It just says they discovered the site on that .gov article. It doesn't say they directly imaged the servers...that sounds like something the NSA could do from just knowing about the website, but not the FBI.
"13
a. Law enforcement officers executed a search warrant on or about July 20, 2022 and
a second search warrant on or about August 2, 2023, on several servers that host data for
Marketplace-1—including “Server-1” and “Server-2.” Law enforcement officers executed search
warrants on or about August 16, 2022 and on or about January 5, 2024, on additional servers
including “Server-3.” As explained herein, Server-1 appears to be a DDoS prevention system for
Marketplace-1.9 Server-2 appears to host the back-end Marketplace-1 data, including a history of
all completed narcotics transactions. Server-3 appears to be the server responsible for
Marketplace-1’s bank, including its cryptocurrency transactions. Law enforcement officers
corroborated that Server-1, Server-2, and Server-3 are Marketplace-1 servers based on, among other things, the following..."
Glad I popped back on the dread to check out details.and stuff. Wasn't worried myself as a noble law abiding citizen.. but did ditch the key to my last car.
So ill cross reference stuff on clear net to see what's out there on this POS but didn't feel alarm with PGP (gpg) encrypted communication etc.
Months ago he was extorting everyone after the Incognito exit scam, now he has become the girlfriend of a black Haitian in some federal prison! The world spins too fast lmao
> From on or about January 30, 2023, through on or about May 9, 2023, law
enforcement officers obtained a Pen Register and Trap and Trace order on Server-2 (the “PRTT”). The PRTT had more than approximately 14,000,000 connections to Server-1, which further indicates that Server-1 operated as “filter” for Server-2 to thwart DDoS attacks
> A review of BTC Bank Wallet-1 indicates that from on or about November 9, 2020 through on or about January 9, 2024, there were approximately 244,483 Bitcoin transactions in and out of BTC Bank Wallet-1, consisting of approximately 183,772 deposits and approximately 60,711 withdrawals. The total Bitcoin deposited represents approximately 1,316.038719 BTC ($36,895,586.12), and the total Bitcoin withdrawn represents approximately 1,303.126267 BTC ($36,431,574.05).
> LIN Used Administrator Wallet-1 to Purchase an Internet Domain. As described below, Administrator Wallet-1 was used to purchase a domain registered to LIN
> On or about July 26, 2021, at approximately 07:43 UTC, Administrator Wallet-1 transferred approximately .04 Bitcoin to a particular swapping service (“Swapping Service-2”) (approximate value at the time of transfer was $1,528), where it was swapped for approximately 6.7681 XMR
> Documents from the provider of Crypto Account-1 indicate that its user provided Phone Number-1 as his mobile number, Lin Personal Email Account-1 as his email address, and the below pictured Taiwanese Driver’s License as proof of identity.
> Based on that resume, LIN’s employment history is not consistent with the large amount of assets in his cryptocurrency accounts. That is, LIN’s past employment does not appear to be the sort of employment for which an individual would have been paid or otherwise obtained millions of dollars. Of the four listed “professional experience[s]” in LIN’s resume, the first position is an “intern,”
> 304. Cryptopunk Generator a. On or about February 7, 2022, the user of Lin Personal Email Account-1 searched Google for “cryptopunk generator js,” “array.reduce,” “get random in array,” and “js random true false.”
Yeah literally, even worse when feds crashed his servers on purpose and he went on google and was trying to find a solution on how to fix it. Just no care assume he didnt even use a proxy/vpn or a tunnel. But either way was too late.
google is gay. use mojeek,, etools.ch, yacy, metager, gigablast, peekier, searx.me, etc..... instead.
... also: jewgle* ftfy
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
My assumption about him one month ago turned out to be quite accurate:
"He is not the brightest guy and he also wants to play himself important. Just read the message he wrote on his site: "We have got another nasty surprise for you". (or something like this)
It is the way he presents it - he wants to be a cool villain since he is behind a screen and can't get beaten up."
I highly doubt, that one of the vendors will sit in the same jail. People also threatened Martin Frost from the WSM, they even had his address. But nothing has happened.
This is crazy, he was so careless because of his own ego. Most of these mistakes are prevented with basic common sense, he had to of known too, he was just careless and overconfident.
What makes me a bit suspicious about the whole report released by the feds after looking at the guy's socials is that he generally seemed to understand blockchain analysis really well, so how the fuck would he out of all guys make such stupid mistakes? I wouldn't be surprised if the real reason he got caught is something else that the feds just didn't want to release to the public.
Many are, and no need to differentiate between mafia and intelligence agencies - they're just two parts of the same thing.
Not likely but in this case it's not impossible that Rui Siang was shielded during the operation of the system, believing they were an asset to intelligence and therefore protected, until the slush funds generated by his arrest were more useful for another part of the criminal state to finance terrorists in Central Asia or something. I would assume the domain registrations were changed later as part of parallel construction either way, but based on their public github and such it appears they probably ran the market on public cloud infrastructure allowing law enforcement to easily control the arrest. He would've been extradited by ROC if US LEO requested it, so either way he was boned but I guess they knew his travel plans.
As much as I despise the North Korean regime and don't want to see it be able to generate more foreign currency for itself, I have to say that the idea of a DNM operated by a rogue nation state such as North Korea rather than just some private individual(s) sounds kinda intriguing to me because of how it would make it virtually impossible for Western law enforcement to take down such a DNM even if they manage to figure out who is operating it. It would be like a DNM protected by nukes basically. I wonder why something like this doesn't seem to have happened yet given how desperately the North Korean government has been trying to generate foreign currency for itself through all kinds of cybercrime and drug trafficking already, much of which already makes use of cryptocurrency too (e.g. the WannaCry ransomware attack--which iirc has been linked to the North Korean government--asking people to pay up in XMR). I wonder if they have ever considered operating a DNM. It just seems like a relatively simple way for them to generate many millions in XMR which they can then convert to any foreign currencies as needed.
I found the section interesting where they tapped his Google searches and correlated them with new Incognito features. That and his overall skillset as showcased by his open-sourced projects.
Should be a valuable lesson for anyone with skin in the game, that separation of identities boils down to much more than what you disclose on public forums; the real you and the devices the real you uses need to be completely disconnected from your alter ego.
There is simply no reason for a market owner or even most larger vendors to not have an entire duplicate set of hardware, ready access to at least a couple "starting" IPs that are not in any way connected to anything you ever touch in real life. Not just a VPN, I'm talking "yagi antenna to the coffee shop a mile away" plus a VPN plus the separate physical hardware - and ideally hardware that you can physically verify has no GPS/GLONASS/etc. chip in it.
It's more work upfront, I get it, but there is really no threat model too severe when you're facing life in prison charges if caught and are by definition going toe to toe with nation states with entirely unknown exploit chains/methods/whatever, and the legal apparatus capable of parallel construction to hide those methods in the final indictment.
Hell, put a faraday cage condom on your dick when you hire hookers for all I care.
If I get time I'll have to write a breakdown of the indictment if there's anything not completely obvious that might benefit the community. Sucks that it can all be used against us in the future if the wrong market owner decides to act smart, but the benefits to everyone's security are worth that possibility.
If LE imaged his server, I believe they might have stolen all the funds resulting in him getting fucked and exiting because of it, what do you think? Was the "extortion" his last attempt to at least make a tiny bit of profit?
The extortion was bc he lost a big sum of money aka got drained in his eth wallet and lost 2 Bored Apes and other things think around 1 million usd at the time.
Servers imaged in 2022 doubt they stole any funds tbh,
Dude got drained same as SUPER a bit later. However contrary to SUPER Dread Pitchforks got far more free reign in that case with him having 0 chance of building up again and finally resorting to the butthurt extortion "exit". Because in his mind he also got fucked so this is just fair.
People also said this kind of stuff about Martin Frost. Nothing has happened. What do you think will happen? People breaking into the jail and beating him up? He will serve his sentence and then go back to Taiwan, where this yellow Chink came from.
He only pissed of some irrelevant vendors online, not the elite. He will most likely survive and maybe not even beat up, as it is a max security prison.
lol y'all think this a movie... the reality is this kid ain't never gonna run into the big bad "cartels" or "big time criminals" you think are after him. He's gonna have a calmer time in prison than most guys he'll just be reading books while the blacks and whites are having their 5th race war of the week
Amazing that his first move wasn't a direct flight to a non-extradition country... at least to collect himself and figure out what to do from there.
He clearly had enough cash to get on a plane, and proceeded to go to the one country every market owner should never set foot in if possible: the United States.
the guy's from NYC I doubt any big time criminals are gonna be in the same prison as him, NYC gangs hardly have any structure amongst themselves out in the streets ain't no way they're running darknet drug dealings or connected to a cartel that wants that kid to pay
how do they even find the servers? I was under the assumption that markets would move hosting providers / change the url periodically and have fake downtime along with no auto starts to negate against what they did to "confirm" it was incognito.
would they have a clone up to the most recent even if he never got busted?
do the other markets go on the assumption there servers Will get siezed/cloned by the fbi cause it was a couple years before they done anything?
why didnt they shut it down when found if they really cared about health of people?
and lastly when markets are siezed how do vendors get busted like do they order from suppliers on the site to resell or something else cause i thought the big ones would get there stuff from on the grounds sources and not online?
its easy to find in which jail he is, we have enough USA vendors with connections in US jails. lets take some money to hurt him.
i pay 1k for first, we have a lot of vendors who are able to pay also 1k. and in US jails are for sure some poeple who like money. lets create a sign. for all this bastards. only a bust is not enough for pharaoha. and even if yes, we need create a sign for all these teenager scammers, who the fuck you wanna kiddin?
Why the shit are all fed articles just sucking themselves off and saying how much of a hero they are fuckin retards, though love the thought of his tiny dumbass asian hole getting filled
They often don't operate much differently than a business. You have to produce. It's just cases instead of sales here. Agents need cases, their supervisor needs to show his boss all the cases his guys are making, the Agent in charge needs production so he can move up.
Plus the auto fellatio you mention shows the public that they are totally doing something in the WAR on drugs. Same reason that from small town departments to the Fed agencies love the press conference standing next to the keys, money stacks, guns, etc.
The Wire showed this well, with supervisors demanding "dope on the table" while the detectives are trying to build big complicated cases that take a long time to pay off. The supervisor needs to show his boss results that his boss can tout to his boss, or the press.
asking for myself and others who are worried, if we used our own PGP for all personal info, only used vendors who did PGP for sensitive data, and used XMR ran through offline wallets are we safe?
unreal to be so talented in programming, and absolute shit in opsec. mistakes that are glaringly obvious even to a noob like me. I wonder will Abacus discontinue use of BTC?
I am not a big fan of much commentary videos such as these but if this guy is correct then as a vendor or manufacturer with opsec inferior to your product and hoping your product isn't crap. I am not trying to spook anyone, but you're too on the LE list.
As far as anyone thinking Lin is in a position to cut a deal, there are no deals, LE has everything since on or before 2022. What deal is there, LE has your info, a 100mil what more at this point is going to help?
As far as users go, LE isn't concerned with you even if your opsec is poor.
Hypothetical, let's just say even if Lin has the greatest legal representation known to man with political ties, it still wouldn't comb over very well, as the lesser charges not explained in the official report from homeland security would be more than enough to put Lin away for 60 years or more being that of financial crimes. But since the charges that are greater than the financial legalities, there is no point in charging someone with theft when murder will do.
You all should know doing business in the underworld, this is the risk we all take and one should always expect to get busted at any time. With that being said, or more so understood, specific precautions should be taken in consideration off the grid.
Which goes to say, if I were a vendor or manufacturer, I would definitely lay low for a while. Probably for a long while. Reinvent yourself, it's unfortunate but it's part of opsec and this should always be part of practice. If your product is good then it will always speak for itself amd everything else follows.
What's done is done, we can't go back and change what happened, all we can do is learn from other mistakes as well as our own, shape-shift in to something new.
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
Could i interest you in a role playing opportunity? Instant payout ... 2 XMR.
Here's the pitch.
You are Rui-Siang Lin, an inmate at Metropolitan Correctional Center. You are currently in the process of taking a shower ... When out of nowhere, 3 (much larger than you) men of African American descent request you turn away from them and face the wall. You are then ordered to wash your ankles, slowly ... While one by one, they each take turns washing your back.
I think he took a direct deposit and sold it on a exchange. Technically it would be 'clean bitcoin' if it wasnt mixed and also directly from a exchange.
xchange.cx is a phishing attempt on xchange.me. Be warned!
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
Immediately convert it to XMR and don't rely on the XMR encryption, but handle it like BTC. If the XMR encrption ever gets cracked, you are safe. Not sure why an admin is not able to do that.
BTC > XMR > LTC* > Bitcoin ATM with a covered face
If you need to have it in crypto again, buy XMR cash by mail or go to another Bitcoin ATM and cover your face with different clothes.
*Litecoin is just an example, you can use any other currency, that is supported by the ATM. But they usually support LTC, too and it is fast and cheap.
Most bitcoin atm's require a drivers license and an actual (non-VoIP) phone number they send a code to to verify. Within 100 miles I could only find one that didn't, and that was ONLY on transactions <$1000 USD
Here I'm not sure if it's legally required, but all the vendors basically do for some reason. And the one that doesn't (or didn't; it's been years since I used it.)
Even with the opsec mistakes he did using his identity to buy a domain with the hot wallet from the market, If he ALL he used and accepted was just Monero and no btc he could have gotten away with it
How can somebody be genius enough to architect an entire marketplace, and build things like a POW based DDOS protection mechanism, but have 0 opsec and money laundering skills?
His crypto deposits to a KYC exchange went from $60k one year to over $4m just 2 years.
xchange.cx is a phishing attempt on xchange.me. Be warned!
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
Arvhetyp.cc is a phishing site for archetyp.cc. I accidentally went to it, and had a strange feeling right before signing in, so I went back and sure enough it was. So glad i caught it
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
If they're holding him in a New York City prison and looks like an Asian boy, he's going to get a cock so big shoved right up his ass. Protective custody or not he's gonna be somebody's bitch.
Lmao
From the court docs ---
iii. LIN Emailed Himself a Diagram of a Darknet Marketplace
1. On or about March 12, 2020, the user of Lin Personal Email
Account-1 emailed himself a diagram, which is pictured below
d. LIN Has the Required Technical Knowledge. Based on publicly available
information, LIN appears to have the requisite technical knowledge and experience to operate and
manage a complex darknet market such as Marketplace-1.
i dont know exact article but congress is starting to question the credibility of the feds, they just dissapproved a huge budget they asked for because they keep abusing their powers and authority and keep saying they will do better but never do.
Nemesis and the capture of Ruisiang (Pharoah) have something in common, human passions, Francis was never very careful with properly anonymizing his servers that were always exposed, several times I warned him and always received a rude reply from him, Pharoah, despite being a great programmer was always a stupid guy making beginner OPSec mistakes.
i wouldn't be that worry, but i would consider the address burnt if you use the auto-pgp encryption.. regarding pgp yourself, as long as the market doesnt have access to the private vendors keys you should be fine, but even if vendors deleted their private pgp key, it still might be saved in the RAM or backup.
personally, i never used incognito, but if i did, clean house and consider your address burnt.
Normally i am sad when a market owner is busted not pharaoh that piece of shit exited scammed and tried to extort people he now has to look over his shoulder for the rest of his fucking life HAHAHAHAHAHAHAHAHAH!!!!!
be·tray·al is an unfortunate aftermath effect of nearly all market Administrations. For the small getting by vendors, these 1T professionals are monsters. Remorseless and not caring about helping other people network and make a difference that gets noticed by Big Medical Professionals or the illicit drug sales markets. The administration target themselves, then fumble the ball when it gets too big, EVERY T1ME. This is the best form of entertainment to me. Realizing . . . . ? Market Admins "ROLL" like teens afraid and hide when their parents get home. So lets get going "DARK WEB", who's up to bat next, before running away from home plate to score for real.
as for the "FEDS", fuk'em because diverting the direction of this is like like their faggot dogs pissing in the wind. God damn, I'd pepper spray a COPS FAGGOT DOG, then slit its throat.
if you encrypted all your messages with sensitive info you shouldnt worry at all, im new asf and still didnt make this mistake, if you go down because of this it's your own fault atp
And THAT's why you don't fuck with us, you'll get what is coming to you when you steal! Glad he's been screwed over, completely deserved and will hopefully deter other markets from trying to pull the same stunt.
let this mother fucker be a mirror for us all. When we forsake virtue, we dance with shadows. We may revel in our cunning, but the abyss awaits. True strength lies not in deceit but in honesty with the tribe you are with, not in betrayal but in loyalty to your community . Let us choose wisely, for our actions echo through eternity.
nigga he got caught cuz he was a darknet admin who used shitty opsec and made a project which made it easier to gather evidence against him, this has nothing to do with the exit scamming he's just shit idk why everyone in these comments thinks the FBI gives a shit about him running off with your weed and cocaine money
"Based on a review of the Bitcoin digital ledger, law enforcement officers learned that Administrator Wallet-1 conducted at least four transactions with Namecheap .... Namecheap Account-1 is registered to “RuiSiang Lin.”
and that folks is how you get caught. Using Bitcoin for a DNM is so crazy.
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
maybe intel will ask him to run inside jail... and provide more info or profits for the government hahaha or to create another market to hit China as well... 哈哈哈
I'd love to hear from some vendors that sold on Incognito. From your perspective, is there anything you are concerned about regarding opsec? Did the vendor sign up process over there require you to give anything that would compromise yours and your customers opsec?
Ya'll should read the actual Complaint PDF. It contains a trove of information.
Lots to be learned here on so many levels from his mis-steps. But the biggest lesson to learn is do big shit like run a market and you'll eventually go down.
I just like the DNMs to chat on here and buy some personal use drugs.
They're going to go after all the vendors since they have everything. Wow.
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
he hired someone from clearnet to fix something in his site, using his own email and phone number and didn't even use VPN.
,
that guy is an idiot, with all that money he couldve just stop and live like a king, people dont know when enough is enough
too young bro.... if he get to know a mentor...... nothing like this will happens.... sometimes get rich in too young age will fall....... but this fall is painful bro
so glad my gut made me avoid Incog in every possible way now... best wishes and clean house if needed.. didnt he fkn exit scam anyway? Do they have servers? sorry if ive missed it i just woke!!
this is my worry, him knowing that in the past everyone caught running a market in the US speshlly, having nothing to bargain with they all became toast, so he may have took the money and ran, but had a server hidden or pc with everyones details..
Always remember to PGP maually.
Why do folks reckon it's smart to reside in the US and then manage a market? Haven't they grasped the lesson from the outcome of Silk Road, which resulted in a life sentence without parole? I hope he enjoys the amazing prison meals that going get. 100% he going be someone prison wife he have to get a sex change done maybe a new set of tits because his mouth and ass going be loose than his blackmail treats
yah , thats the point dude !! you got the point !! if they are managing inside US is very very easy to get caught..... should be going away from China , example Myanmmar (super easy) / Cambodia (super easy ) / Malaysia (easy) / Indonesia (Hard) / Thailand (hard to bribe now a days)
If you paid with XMR and used PGP for any sensitive information then really no need to worry at all.
If you used BTC then there is a good chance Chainalysis and the other crypto tracing firms already know your UTXOs involved are dirty so prepare accordingly when it comes to exchanging those.
xchange.cx is a phishing attempt on xchange.me. Be warned!
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
All that shit talking he was doing. Threatening EVERYBODY. Dumb fuck let to many ppl know who he was, that he thought he could trust. Guaranteed someone close to him ratted him out. He wasn't spreading the wealth like they thought he should have. Oh, you're taking all that cash with you to Taiwan? Nah, not today. He had millions. Should've left peacefully....
nope , he is just not experienced enough in his situation , he should have planned to run away from US . too dangerous US intel is very intelligent tho
So how long do you think it's gonna take before this asshole turns state it starts finding big fish to throw into the fire for a reduced sentence? Keep in mind that these fish have to be pretty major to convince the states attorneys office to take him seriously, and the users of incnog, might actually not be big enough for anybody to care but who knows just speculating here.
For me .... I would rather suicide than locking up in US... because its life sentence... at least in South east Asia you can use money to change personnel to jail period and paid monthly around $800 to their family
i feel sorry for the guy,he is 23 years and his life is pretty much over.
he did a shit thing with his extortion but still its pretty sad he will not see his family anymore in a normal way.
the punishments are ridiclous
I love it when karma works so very fast... now he will be enjoying a long vacation in a federal fuck in the ass prison. thank you karma for showing us you have mercy to those affected by his pathetic hostage situation exit scam
His OPSEC was so Gud that he publically showed off his NFT's, Monero Nodes, Tor Relays, Monero Wallet Projects, DDOS Protection Projects.
Went on public podcasts talking about his projects: https://www.youtube.com/watch?v=zeNKUDR7_Jc
That's why you should never be in business with someone with a low sense of worth, imo no one not even family should know what you do, what you earn, what you have and what you are planning to do/achieve. Stay safe out here :)
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
xchange.cx is a phishing attempt on xchange.me. Be warned!
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
Karma is a funny thing.Excuse my french but i do hope that the cunt gets ass raped multiple times a day until he cannot take it any longer and do us all a favor.
It's one thing to fuck off with everyone's money,it's another to attempt to blackmail a large part of the DNM community,buyers incuded.
He better get used to the idea that best case scenario he is about to become someone's girlfriend
Ironically he left a final little nasty surprise for us to open up. With all the culturally offensive cryptopunks you could generate and the stupid jokes that made no sense, it was only a matter of time.
and then you can look at the mnemonics he gave like this,
steal pants depend midnight clear skin tangle them crowd very lucky guy within reflect lifeless ahead art limb group another practice asleep strong.
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
a note to all the people asking on here "how do i create a market???"
"...faces a *mandatory* minimum sentence of life in prison"
--this is for running the market. no sweet talking into a short term... and my money says this guy could run circles around 99.99999% of other people on the dnms opsec wise, and look, he's done. so think before you act
xchange.cx is a phishing attempt on xchange.me. Be warned!
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
> From on or about January 30, 2023, through on or about May 9, 2023, law
enforcement officers obtained a Pen Register and Trap and Trace order on Server-2 (the “PRTT”). The PRTT had more than approximately 14,000,000 connections to Server-1, which further indicates that Server-1 operated as “filter” for Server-2 to thwart DDoS attacks
> A review of BTC Bank Wallet-1 indicates that from on or about November 9, 2020 through on or about January 9, 2024, there were approximately 244,483 Bitcoin transactions in and out of BTC Bank Wallet-1, consisting of approximately 183,772 deposits and approximately 60,711 withdrawals. The total Bitcoin deposited represents approximately 1,316.038719 BTC ($36,895,586.12), and the total Bitcoin withdrawn represents approximately 1,303.126267 BTC ($36,431,574.05).
> LIN Used Administrator Wallet-1 to Purchase an Internet Domain. As described below, Administrator Wallet-1 was used to purchase a domain registered to LIN
> On or about July 26, 2021, at approximately 07:43 UTC, Administrator Wallet-1 transferred approximately .04 Bitcoin to a particular swapping service (“Swapping Service-2”) (approximate value at the time of transfer was $1,528), where it was swapped for approximately 6.7681 XMR
> Documents from the provider of Crypto Account-1 indicate that its user provided Phone Number-1 as his mobile number, Lin Personal Email Account-1 as his email address, and the below pictured Taiwanese Driver’s License as proof of identity.
> Based on that resume, LIN’s employment history is not consistent with the large amount of assets in his cryptocurrency accounts. That is, LIN’s past employment does not appear to be the sort of employment for which an individual would have been paid or otherwise obtained millions of dollars. Of the four listed “professional experience[s]” in LIN’s resume, the first position is an “intern,”
THanks for the response - So basicallly was it the KYC regulations which was his undiong because he gave his own details for verification ? They also were able to trace BTC transaction which he made when withdrawing profit ?
How about XMR , is it still anonymous .? Im trying to understand if it is still possible to buy stuff without fear of getting caught lol
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
from how he was going out with last extortion attempt to this..... what a complete fuckin jackass. he couldve won his customers and vendors over if he closed down properly. but now he is hated by all. fuckin LOSER. he absolutely deserves whats coming to him. RIP.
They probably looked everything over and realized there were too many Federal employee's doing their weekly shopping on the market and decided to leave everyone aside from the owner alone. There was also a bet going on around the water cooler as to whether the owner was a moonlighting Federal Agent.....
Why do you think, objectively, is such difficult to run a "Liberal" Market on the deep web and not get caught? A lot of vectors and factors are involved, even more as long as it grows up, but is really technically impossible to do so?
Theres still a few questions regarding Pharaoh or whatevea Mr Incognito....
Mr /u/Hugbunter would love your prof opinion..... anyhow I am not completely convinced that our Government whom has never told the truth in there life is telling us the complete truth regarding the situation with Incognito... Lets remember the best liars in the world can say what they wont, whilst a man is in jail he can not respond ... My point is I would bet last dollar the story about them cloning his servers a year or two prior sto arresting him is LOAD OF BULLSHIT.... They didnt have access to servers before 2024 and still to this dont have access... Thats why his .onions and DarkNetLive have no seizure banners and are still active to this day....
My guess is that he doxxed himself by exposing his Monero Node and that is all.....
what if i learned like black hat because they are two step forward from ethical hackers i learned enough from hackthebox and tryhackme what are the resources to learned like blackhat hackers? and please give me black hat learning strategy because they are extremly powerful than white hat hacker
Edit: On a serious note, buyers and vendors the feds likely have data going back to 2022, so this is actually really worrying news.
Stay safe ya'll
Takes me back before the time I tied an onion to my belt and we called that kind of thing 'spyware' (which was the style at the time)
At this stage, I consider using blatant Govware 12+ years post-Snowden as criminally neglectful to the point that people should get extra time on top of their sentence for being *"criminally stupid"*...
Windows Recall is just them upselling the features of *"Magic Lantern"* and *"Carnivore"* Govware as features - kinda how Valve managed to upsell an Online - DRM [Steam] as a feature so hard, Devs get bullied and harrassed if they don't want to publish on said store that cashes in 30% gross sales revenue (!) aka. before (!!) taxes (!!!)...
Let the *"Tech Illiterates"* die out for good - they chose to be ignorant and accept the Enshittification!
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
OpSec is and will always remain imperative to operating on the Dark Web, regardless of who is watching or coming for you.
The best solution is more trusted individuals hosting more services and providing anchoring to the community. Maybe not more shit tier markets and redundant forums; but link resources, git servers, key repositories, unique ideas to get more funding to the things that matter (the reliability of the Tor network is a pretty good one /post/ca0360fe2071d94ef4d5), technical/OPSEC education to the millions of scrubs that come here, and so many more useful, boring things. There is little diversification of trust in the DN community, and I worry if you and Paris get knocked out, even if your deadman's switch works, there's going to be a shitshow that'll ensue of who gets to keep grandpa's money. I don't know how much I trust a market owner or some moderator of some major sub to make something to fill a gap left by Dread. BTW a friendly reminder to check your deadman's switch procedures. Anything you forgot to do? Did you pay the server bill? Maybe the carrier pidgin holding the dread source code USB drive needs to be refamiliarized with the route? (to what I assume is the strip club /u/dontlaugh dances at)
For Daunt I think it's an awful existence to know as a child that your parents are just waiting for the day they kill you :-( poor guy.
Darknetlive in the other hand tho....
Most of the buyers will be fine. Especially if proper opsec was used.
Also, I have a pet theory that CZ's relatively short sentence is related to him allowing the feds access to Binance's backend to conduct parallel construction in reverse-engineering transactions. I have no evidence of this, but the feds have done this before at a much smaller scale and is their preferred way of crypto attribution because everyone except the one judge in SDNY seems to be entirely aware that chainanalysis is bullshit.
These guys work hand and hand with cartels. They don't bust people to stop it. They bust people to keep their jobs and show that they're "making progress"
Oh and they are doing more than that. They are effectively actively creating crime in order to appear occupied. Vice is already a bullshit social construct (even comparing attitudes and laws towards it between 1650 and 1750 and 1850 in the UK and you can see how wildly different the conceptualization can become in the same place) and to criminalize it is truly vile. The craziest thing is that they don't care that their own inspector general issues reports about their wrongdoing. they did kind of slow walk the money laundering report so that it dropped during the first month or two of the lockdown, but like, pretty much all LE air-ed out their dirty laundry at that time if by law they were required to do so, like Wisconsin disclosing that they were more or less charging kids for trafficking themselves and really don't have a sex trafficking problem (https://www.doj.state.wi.us/sites/default/files/ocvs/human%20trafficking/5%20Key%20Takaways%20Assessment2020.pdf for summary, https://www.doj.state.wi.us/sites/default/files/ocvs/human%20trafficking/2019%20Law%20Enforcement%20Assessment%20of%20Sex%20Trafficking%20in%20Wisconsin%20-%20Final%20Report.pdf for the whole thing). Metadata says that the report was finished in January and it dropped conveniently the day after the NBA cancelled games and everything ground to a halt. What a coincidence, right?
The DEA arguably had even more damning reports drop at pretty much the same time. https://oig.justice.gov/sites/default/files/reports/a20071.pdf and https://oig.justice.gov/sites/default/files/reports/21-109.pdf basically both show that taxpayer money ends up paying for cartel operations and the DEA either are in on it or are grossly incompetent. And tried to cover up shit when it goes wrong. That's just part of the culture at the agency at this point. Your tax dollars are paying for birthday parties, and they dgaf. https://oig.justice.gov/sites/default/files/reports/23-019.pdf. I don't think they even really care about the appearance of making progress since it's widely acknowledged that the war on drugs have failed but the DEA isn't going away any time soon, is it? If they feel threatened, they'd do a better job covering up. They have the capabilities, they just. don't. give. a. fuck.
did they find a rasberry pi shoved up his ass at the airport with his key on it or something?
curious what was d comment?
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
A good market in fact !
But sending himself a plan of how running a marketplace to his personal email...
Well... A good market can be host by a bad opsec guy.
Never trust the auto encrypted PGP market !!!!
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
https://youtu {dot} be/zeNKUDR7_Jc?si=5pLrQW8C1K--LozJ
Well, if so congratulations. This is the outcome we all could of hoped for (or he get beat up to an inch of his life).
In this case I did consider it, but ultimately I let it go when he didn't follow through on the data leaks. The funny part is that while facing the possibility of his dox being leaked, his ego told him he was going to be fine.
For anyone interested, to pre-face it, I was looking for someone with some sort of NFT activity as a confirmation, the site screamed "I have an NFT collection". After the extortion started I was digging through his posts and his past usernames, there was nothing that stood out to link to anyone other than the same username being used in the past and some details for it being part of past database leaks, none of it was useful and I didn't believe that to be the same person. I then came across a comment where he listed XMR nodes, I overlooked it at first, but then remembered him mentioning he runs multiple XMR nodes and Tor relays, so I went back to that comment. One of the XMR nodes he listed, I actually recognized, maybe from one of Thotbot's lists, but there was another I didn't recognize so thought I'd look it up. It wasn't in any of the public lists I checked, so when searching online I found it listed on a public node list hosted by our friend here Rui on his personal website, along with the first one that I recognized and 1 or 2 more. I thought, he can't be this stupid to share his own nodes like this... his site made me believe instantly that this is him (NFTs, Gitbub repo with a PoW DoS protection fork) , the only doubts I had were that it was too easy and maybe I was focusing on the NFT thing too much and then him just denying it.
Now its confirmed, I should have felt more confident in it and pushed it with him, but I don't think it could have changed much knowing what we know now.
Several examples of where he sent market BTC funds to a swap service like changelly to receive XMR of say 305 XMR. Then sent 305 XMR to cash out at Binance within the hour - probably shortly after 10 confirms.
All round terrible opsec.
The fact that he was working with law enforcement sure must be embarassing for them - but I guess now they know the guy did know what he was talking about when it came to darknet markets... lol
One of the most elementary mistakes imaginable, it's a shitty miracle that indgo lasted as long as it did with him at the helm.
That's impressive you tracked his ID down man. Must admit I suspected you would say you had :)
Pretty clear evidence of his spending BTC from Incognito -> own wallet -> Namecheap for his personal domain.
Servers imaged years earlier so they were going to get him eventually with blockchain analysis.
DUDE IS SOOOOO FUCKED. They going to give him life ..
The Americans are so mind-bogglingly arrogant, that they have given themselves the right to ban people flying from the UK to other countries, e.g. Canada, Cuba, the Carribean, etc. The following article is over a dozen years old, yet I believe it is still accurate.
Planning a trip to Canada or the Caribbean? US Immigration may have other ideas...
New security checks are already in place – even for flights hundreds of miles from American airspace
Simon Calder
Sunday 25 March 2012 22:10 BST
One million British travellers planning to fly to Canada, the Caribbean and Mexico this year face the risk of being turned away at the airport – at the insistence of the US Department of Homeland Security.
New rules require British Airways and other airlines flying to certain airports outside America to submit passengers' personal data to US authorities. The information is checked against a "No Fly" list containing tens of thousands of names. Even if the flight plan steers well clear of US territory, travellers whom the Americans regard as suspicious will be denied boarding.
Simon Hughes, the deputy leader of the Liberal Democrats, told The Independent: "The concern by the US for its own security is entirely understandable, but it seems to me it's a whole different issue that American wishes should determine the rights and choices of people travelling between two countries neither of which is the US."
For several years, every US-bound passenger has had to provide Advance Passenger Information (API) before departure. Washington has extended the obligation to air routes that over-fly US airspace, such as Heathrow to Mexico City or Gatwick to Havana.
Now the US is demanding passengers' full names, dates of birth and gender from airlines, at least 72 hour before departure from the UK to Canada. The initial requirement is for flights to Toronto, Ottawa, Montreal and the Nova Scotia capital, Halifax – 150 miles from the nearest US territory. A similar stipulation is expected soon for the main airports in western Canada, Vancouver and Calgary.
Any passenger who refuses to comply will be denied boarding. Those who do supply details may find their trip could be abruptly cancelled by the Department of Homeland Security, which says it will "ake boarding pass determinations up until the time a flight leaves the gate ... If a passenger successfully obtains a boarding pass, his/her name is not on the No Fly list." In other words, travellers cannot find out whether they will be accepted on board until they reach the airport.
Canadian Affair, the leading charter operator between Britain and Canada, began supplying the data a week ago and 13,500 of its clients have complied with the demands. None has so far refused to provide the information and no one has been refused boarding.
Air Canada and British said they would comply with any new rules and The Independent understands that they will join the scheme in April. Flights to Mexico and Cuba - the Caribbean island closest to the US – are also included.
The US will have full details of all British visitors to Cuba, including business travellers, which could potentially be used to identify people suspected of breaking America's draconian sanctions against the Castro regime.
Neil Taylor, a tour operator who pioneered tourism to Cuba, said: "Imagine if the Chinese were to ask for such data on all passengers to Taiwan, and similarly if the Saudis were to ask about flights to Israel – would the US government understand?
"One also has to wonder how an American traveller in Europe would react if he were denied boarding on a flight from London to Rome because the German government had not received sufficient data from him."
Tony Wheeler, founder of Lonely Planet travel guides, said "This extension of the rule to include flights that never enter US airspace is scarcely credible. What on earth right does the US have to ask for passenger information if you're flying London-Havana?"
NOW BOARDING: WHO IS AFFECTED?
725,000: Number of British visitors to Canada each year. Airports affected: Ottawa, Toronto, Montreal and Halifax
300,000: Number of British visitors to Mexico each year. Airports affected: Mexico City and Cancun
160,000: Number of British visitors to Cuba each year. Airports affected: Havana, Varadero and Holguin
Everybody remembers Ross Ulbricht, right?
Who?
Anyway he'll get raped in prison 100%
In other words, he isnt gonna be able to say "oh i just wanted to help the people and give them the freedom to buy what they want" ... nah, in the end he fucked over the same people he was allegedly helping.
Then has the audacity to threaten extortion of the sites members..
Dude made a lot of enemies rather quick.
Yeah he's totally getting action in prison.
I heard there's pussy in prison, just smells like shit..
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
in the future, i hope to god, any1 thinking of setting up marketplace MUST exclude btc for christ sake!
This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
he got what he deserved. stupidity in its finest.
If you ever gave your personal info to any party that received Bitcoin, and that party would cooperate with law enforcement, they can get your personal information.
"13
a. Law enforcement officers executed a search warrant on or about July 20, 2022 and
a second search warrant on or about August 2, 2023, on several servers that host data for
Marketplace-1—including “Server-1” and “Server-2.” Law enforcement officers executed search
warrants on or about August 16, 2022 and on or about January 5, 2024, on additional servers
including “Server-3.” As explained herein, Server-1 appears to be a DDoS prevention system for
Marketplace-1.9 Server-2 appears to host the back-end Marketplace-1 data, including a history of
all completed narcotics transactions. Server-3 appears to be the server responsible for
Marketplace-1’s bank, including its cryptocurrency transactions. Law enforcement officers
corroborated that Server-1, Server-2, and Server-3 are Marketplace-1 servers based on, among other things, the following..."
So ill cross reference stuff on clear net to see what's out there on this POS but didn't feel alarm with PGP (gpg) encrypted communication etc.
I made sure the messages were deleted. Am I still screwed ?
Nothing crazy and that happened months ago.
All other sensitive datas were encrypted.