Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Ross Ulbricht’s private journal shows Silk Road’s birth (arstechnica.com)
221 points by gk1 on Jan 22, 2015 | hide | past | favorite | 146 comments


>"On that day, a male and female agent started an argument in San Francisco's Glen Park public library, to get Ulbricht's attention. As soon as Ulbricht was distracted, another agent grabbed the open computer"

And that, ladies and gentlemen, is how you defeat crypto. How could you even defend yourself against such a thing? The only thing that comes to mind is never working in public on a computer.


I tried a few weeks of living opsec to get a feel for how practical this stuff is. Really got into it, to the point of wearing disposable gloves to get sorta untraceable currency and looking into body armour and secured living arrangements. It's probably easy to get too paranoid, and perhaps those people never end up launching a successful Onion site.

But just quickly, he should have compartmentalized. Zero need to have all that data decrypted while doing day-to-day admin. A throwaway machine with Tails or something would suffice for management. Then, add some physical security, such as smartcards with removal events set to destroy and then chain it to your neck. Or there's little dongles that do proximity detection.

Then get some physical security so your RAM is never exposed. The commercial phreaking devices were said to have thermite, but something explosive might look too much like terrorism. I'm not sure it'd be out of the question to wire up a short-circuit to your RAM at single click, although that would look bad, versus something less obvious.

But really, this is apparently only because he messed up his server security so badly. Otherwise, they wouldn't have been there in person in the first place, right? It's probably safe to assume that if you're being physically targeted, you're going to have a bad time living a normal life. If you have a bunker or something where you can definitively see all approaches and have many minutes in case of a raid, eh, maybe. But by that time, there's probably some sort of correlation information or real-world bug going on, right? If Ross had been super careful, eventually they'd just bug his every movement, word, etc. Get video or audio on his keyboard, even, right?

So worrying about this is the barn door question after horses have left, it feels.


You don't even need something like Tails. You just need encrypted disk images, and to keep them unmounted when you're not actively using them. This is a capability that is for instance built into Mac OS X.


Well, just as a defense-in-depth, in case of a Firefox 0-day (or 90-day) or something, it'd minimize a leak, slightly?

Edit: Oh, also, since compulsion to reveal keys might be an issue, it's better if there's nothing around. In the US it seems to be if the prosecution can convince a judge that they really did see evidence but you since re-encrypted. I wouldn't want to rely on a judge in that case. Although at this point one is probably cooked but still.


What someone in that situation really needs is the opsec equivalent of a trap door function. Does such a thing exist that is easy to defend and difficult to attack? Could be very useful for e.g. rights activists in remote places of the world.


In the case of OS X this would still mean that the password for the disk is stored in memory, right?


What conclusions did you come to on the body armour? Did you end up walking around with it on day to day? Any other interesting tid bits on your opsec journey?


It can devolve into "Reflections on Trust". I started auditing everything above the OS and VMware on my host. It's intractable. So I just had to start drawing lines.

The beneficial part is to think of every action you do, how many bits is it leaking? What persona are you, at that moment? How is that persona contained? How will the traces you are leaving at the moment look to an investigator? A judge? A super power network analysis and correlation system? For each bit you're leaking, what specific steps are reducing it and how? Are you still in persona? If your persona is from County X, is he on at the right times? If not, and he makes casual comments, so they fit in persona? Eg if on late and the World Cup is being held in his come country, did the persona reference it accurately? (And the searches you performed to find out that info, can they be correlated back?)

I'm sure this has a name but getting in the mindset and making sure you don't break character is key. I think it's probably best to minimize all statements. But, many records show people being found because they slipped up. Like one of the recent hacking groups, he told someone in chat "yeah well I was arrested for pot back in '06". Damn, you just cut your identity space from something like 2^28 to 2^20. Do that a couple more times and your toast. Hell, even picking a username from a great book you're reading might take off several bits (eg if you bought the book on Amazon, and are reading it on Kindle, a well funded adversary could correlate - there's probably many such casual " unrelated " influences that might be detectable.

Personas need to extend to hardware, too. For example, cameras might have somewhat unique noise patterns. If you use your camera to take a pic of <something> , and with the same camera take pics to post on Facebook, it's plausible an adversary could get many bits of your ID. Fingerprints are everywhere, so minimize channels used to avoid surprises.

It's probably good to try to do things in batch. Download data, manipulate on a limited offline device, then batch upload. This is easy to disguise, and could be set on timers to coincide with different personas, establishing alibis. It helps defeat simple traffic correlation, like "let's cut off access to ISP A, and see if our target chat user disconnects". If you were chatting all day on a server, such an attack could be very effective. I didn't do batch mode, because I didn't have any actual work, other than " buy btc and setup a single server hosting a single static page ". (I was thinning of a legal product (something like dropbox) aimed at privacy users and wanted to know how hard it'd be in real live... I decided the Onion service limitations would put my users at too much risk, and many users would fail to follow procedure when using the service, very high risk for them).

The body armor idea was more an overreaction (it was mostly for at home/hotel/sleeping). Once you getting paranoid, it's a spiral. And hey, if you do get raided, there's probably a small benefit to be gained by having some accidental shots not be fatal, right? But no one takes any of this stuff seriously in general, so body armor is likely to get a friend to call the psych ward. Even the BTC or darknet forums. They suggest waking into a bank to buy BTC. Or meeting a stranger in public. Two great ways to link your meatspace and BTC identities! Sigh.

Anyways I recovered by going back to axioms, or trust anchors. Stuff like, "I trust Tor will not reveal my source IP on this persona in under a month", then build from there. The product idea didn't work out, so I dropped the " experiment ". I kept smart cards, FDE, multi VM, and tamper evident seals/stickers, but otherwise went back to normal.


I find it easiest to think in terms of "What cost would it take to defeat security here, and who does this price out of the market?" Defenses raise the cost of attacking, they don't defeat all attacks forevermore.

Thinking things through this way will quickly clue one into the notion that it is much more important to pick a good adversary than to pick good defenses. I strongly recommend not picking the USFG, or any other nation, as an adversary. You will not win. The price of your identity is not measured in aircraft carriers. Their budget is.


Yeah, but where is the fun in that? If you remove state level actors, you get to do all sorts of weak stuff like "yeah I checked my email from a cyber cafe without Tor once".

I do concur though. Basically my analysis came to that any customers that really wanted or needed the level of service I was considering would probably not be around long, even if I stayed hidden (purely to avoid getting subpoenas to expose them - my plans were totally legal). And if they didn't really need that level of safety, then they would not use my product, because the limitations and costs would not be worth it.

On the flip side, look how long SR operated, and how " easy " a job LE had. If Ross would have been content to have a dozen million dollars and move on early, he probably could have gotten away with it.


There's only one way to evade law enforcement for a long time, and that isn't it (in fact, it's kind of the opposite). The key is that doing business requires relationships -- very strong or very weak and everywhere in between -- and every relationship can be exploited. The more evasive you persona is, the more elusive, the less business people will be willing to conduct with you. So the more you try to hide, the less business you'll do and your crimes won't pay even without any enforcement involved -- you'll be punishing yourself for very little reward.

The way police thinks is like this: first they'll find someone close to you and try to flip them by exerting pressure (on them or on you). If you don't conduct business with close relationships but with strangers, they'll plant an agent. The more secretive the crowd you hang with, the higher the chances the man on the other end is an agent. If your strategy is that no one knows anything about you, you'll find that you won't be doing much business anyway, and so wouldn't become a police target anyway, and if that's the case, you've gone through a lot of trouble while simply remaining a small fish without any evasion would have been better. So the hiding technique you describe might work for a one-time crime.

The only technique that works for any significant amount of time actually relies on very strong relationships: organized crime. It is a feudal system of patronship and loyalty -- your employees depend on you and they'll be willing to go to jail for you -- combined with a the very powerful stick of physical intimidation, so that people are afraid to snitch on you.


In the case of this Ross, did he really need to cultivate relationships that required personal details leaking? From his story it doesn't seem much of the case. After some initial startup time, people were just winning to trust SR (the stupid ....). The hustle to sell some initial product looks to be the only exception, and yeah, with no risk you might have a hard time starting a business.

The ideas I've outlined would work for more than one person, though I'd be very hesitant to trust others, and you would need to find such candidates in the first place.

Hiring agents should have been taken as a given. You're paying someone a few thousand bucks, and you don't think they're going to sell out if someone comes along that has far more? SR should have been robust to malicious actors. DPR can keep the root level stuff to himself, while allowing his admins to have limited tools. Periodically review stuff.

I fail to see how organized crime would be an option for someone like Ross, wanting to start SR. So while that may be an option for some (a Mafia style threat profile is not something I'd likely be happy with) it's not really that viable for a random startup. I mean, here's another way to be immune from a lot of regulations: be really rich!

Also, when I say persona, I'm referring to the currently active one that you're using at the moment. Silk Road claimed to have been run by a line of these guys. Yet there was no real evidence of that, eh? If multiple personas would have been properly used, we'd see changes on the site, the staff would know, you be wouldn't have old documents, etc. That's what I mean by fully going into a persona. You might use one disposable persona to buy an order or two of bitcoins. Another to run a server. Etc. Anywhere you need to draw a line between one act d another.


What you're really seeing here is the limitation of full disk encryption. I talked a little about this here (the article is really about cipher modes, though):

http://sockpuppet.org/blog/2014/04/30/you-dont-want-xts/

The problem isn't "crypto". The problem is the extent to which full disk encryption overpromises and way, way underdelivers. It's easy to have a cryptosystem that is at least somewhat resilient to this threat. You just can't get it with a UX that "unlocks" your whole computer to use it, and then "locks" it again when it goes idle.


The problem of evil maid attacks is at least trying to be addressed by the QubeOS team, and think it's an interesting concept. Otherwise, yes, FDE is only a part of what should be a holistic approach.


Up to now I had never considered the need for protection against a mid-keystroke attack. Ideally it would have to involve no unusual hardware or software, or you might as well just slap a "I'm a criminal" sticker on your forehead.

Second, I can't see it working properly if you need to do something specific when you're being struck.

Closest thing I can think of:

- headphones must be plugged in to launch a certain program

- if headphones are unplugged before program is closed, lock and begin wipe

- don't, under any circumstances, let go of the headphones

At this level of paranoia you probably also need interrogation training. Ideally you'd also have your sensitive stuff on a machine that is both hidden and protected, and only access it remotely. You want to be able to deny its existence to have any chance of withstanding a torture attack.

Edit: iphone earbuds have a switch that you might be able to use in your hand/mouth as a deadman switch, but I can't see that being workable for more than a few seconds.

Also, if you're in public, they could film your monitor... so that would need to be sanitized somehow as well.


The problem with schemes like this, is that they show premeditated intent to destroy evidence. I hear that courts don't like that. Maybe there wouldn't be evidence that specifically unplugging the headphones is what caused the drive to self destruct. But a good forensic security analyst should be able to show that the system was intentionally destroyed.

If you can come up with a plan for plausible deniability when it comes to, say, permanently deleting the keys for an encrypted drive, then that's worth way more than the deadman's switch is on its own.


You won't know in advance who is going to rob you, in this case it was the FBI but for this attack it could be anyone, even a reasonably organized group of 13 year olds could probably pull this off. For example the situation could be the same but DPR is a tech CEO working in a coffeeshop in Asia, and someone has just ran off with a copy of his email and financials. He chases them out of the door, gets hit in the face with a bike chain, and wakes up in the hospital, not even knowing if they were just aggressive petty thieves, or if he was targeted and someone knows all this plans.

I think that "lock and wipe" might be too much though, and locking only would be more practical, wouldn't constitute destruction of evidence (as far as they know), wouldn't punish mistakes so much. Right now, off the shelf, a computer will lock up on screensaver, or sleep/poweroff. For a high paranoia user, you could add headphone unplug, power cord in/out, any usb in/out, even monitor the mic for certain codewords to trigger the lock. And if it happens it isn't such a big deal, just re-authenticate.


So now it's the locking mechanism that's gotta be made plausibly deniable. The beauty of it being done in software via (say) an HID interrupt is that the software itself is protected by the act of locking the computer.


Do I need to pay you royalties for implementing such a headphone-based security scheme in my device?


Not at all.


That sounds fine... until you turn your head and jerk your headphones out.


You have to evaluate the risk: how "expensive" are occasional miss-triggers compared to a failure to trigger when necessary, and where is the optimal balance? (the always/never problem)


https://twitter.com/patconnolly/status/517792555292164096

grugq removed the PoC repo in prep for a product launch, but here's a fork of a project that's a partial solution: https://github.com/RagnarDanneskjold/darkmatter

Basically, restart an full-disk encrypted device when loss of signal or drop in temperature occurs. Have something similar on your desktop. Wear a BLE Android watch, and make sure your devices restart when they get out of reach, or when put into a Faraday bag, or when dropped in liquid nitrogen :)

Yeah, it's still possible to defeat, especially if someone knows your setup, but it's at least pretty damn close to foolproof. If you sense trouble, just run like hell and lose the signal


Someone should invent a usb dongle that detects a nearby rfid chip that you keep on your keychain. As soon as that keychain is out of range, say 5 feet, the computer locks and encrypts itself. Integrate this into the computer and you wouldn't be able to tell who has one and who doesn't. Think you're being arrested with your computer open? Toss your keys.


You could be grabbed by agents and held there in your chair while another agent starts working on your files.

My idea would be more of a proximity sensor that not only does the RFID-walkaway thing, but also locks the machine up if anyone additional to yourself approaches the device.


Toss your keys.

But then the LEO agent sees this, and not only does he pick up the keys, he will then proceed to charge you with something for resisting arrest, or obstruction of justice or any of the myriad of ways they have to make your life a living hell.

I think this would be similar to smoking pot in a moving car, then getting a police car to tell you to stop and then you throw the drugs out the window. I believe that's enough of a reason to charge you with all sorts of nasty stuff.


Considering the alternative, I'd toss my keys.


Yeah but when you "throw the drugs out the window" they don't disappear.


That's my point. If you have your laptop locked depending on whether they are close by or not, then throwing the key away will not help you.

I was trying to say that it seems to me as an ineffective method. Just as ineffective as trying to argue with the police that since you don't have the drugs on you (because you just tossed them) you are not in trouble. The drugs don't disappear just as the keys won't, so the agents would just have to get the keys and unlock your laptop.


It'd be easier to just have the machine lock itself and power down whenever anyone plugged in an unknown HID device. The FBI (and other agencies) use USB mouse jigglers to keep the screensaver from activating while they transport the machine back to their lab.


that's called "security through obscurity". and sometimes it works great! Well, the first time.

Of course, just like the shoe bomber changed airport security forever, an rfid keyfob like you suggested becoming commonplace, would just lead to the cops immediately tazing and tackling you, and treating every single motion of your arms as an attempt to destroy evidence.


Tazing or tackling would probably take him out of RFID range.


I've worked with some pretty sensitive information at places where it's a matter of policy to lock your screen whenever you leave your desk. It's second nature for me to click the screen saver button every time I get up from my computer now. I'm a little surprised that someone as paranoid as Ulbricht didn't have the same sort of habit.


I think it implied that he didn't even get up from his chair. I think it implied that they grabbed it when he looked away.


This is the easiest/most feasible defense I can think of.

Use a laptop with a camera. Have the camera require that your face is in the picture to avoid activating the screen saver.

My cell phone already does this, so it's got to be easier with a full powered laptop.


That sounds like a huge hassle to be honest. My android phone had a feature that made the screen stay on as long as I was looking at it - it was a disaster. It just did not work properly. I ended up deactivating all that crap and just set the screen to never go off, unless I explicitly press the button.


> That sounds like a huge hassle to be honest.

You could probably describe what Ross Ulbricht is going through right now as an even bigger hassle.


Have it shut down if you haven't scanned your fingerprint in the last 5 minutes?


I would imagine that if you were up to something like this, the laptop in question wouldn't be your daily driver. In which case you would likely want to physically disable inputs and sensors like cameras, mics, location hardware, etc. I seem to also recall once reading that it was good measure to use a laptop with a removable battery, having actually removed the battery and only being powered by your power cord. Or so I've heard.


isn't facial recognition easily defeated with a picture of the person's face?

that said i concur, the proliferation of built-in cameras should spur us to adopt biometrics such as facial recognition, but it's gotta be better than picking out a few points and doing a simple match like most CV facial recognition systems do. some sort of challenge-response maybe, like "wink your left eye" or "blow a kiss", anything that a simple, static picture couldn't defeat.

but i concur on the larger paradigm - the hardware is common enough to force us to consider biometrics as commonplace.


Maybe if Microsoft gets Kinect sensors into their laptops, this kind of facial recognition will be much harder to fake...


Given the proliferation of comments about how to avoid linking meatspace and digital personas, having a laptop with a camera constantly filming your face, and a piece of software designed to recognise only your face stored next to your incriminating digital files seems like an escalation of risk to me.


I posted this on the OP comment, but what about using an accelerometer?


hmm. Do some computers have accelerometers? Maybe you could do something like if you are at a coffee shop or somewhere in public when your computer is picked up before you have that turned off it does the necessary security precautions. Not sure what/if any computers have one though, but you could probably build something via arduino or something.


MacBooks used to have accelerometers that were used to detect sudden motion and park the hard disk head to prevent a head crash. But it looks like they've stopped including the accelerometers in more recent models with SSDs, since there's no equivalent need.


or dont have a battery in your computer so it dies when they grab and run


Clearly we need laptops with kill-cords like outboard engines - operator steps away or device is removed from operator's vicinity, it shuts down.


This shouldn't even be that difficult to rig together: Take a small USB key, combine with a wrist strap, and write a script to listen for USB key disconnects. As a bonus, if you want to get fancy, the encryption key itself (or a part of it) could be stored on the USB key.


This also reminds me a bit of http://xkcd.com/538/.

Cryptography is only as strong as its weakest link. That link more often than not is the human factor.


Proximity sensor (bluetooth or something) + thermite on the disks.

If you get further away from the machine than 5m or so when it's powered up it will melt everything. For extra kicks also wire up another detonator with a case ground wire or something, if the case is opened - it melts.


No real need for thermite (and it's a tell).

Flush crypto keys, activate screensaver, kill all active terminal sessions.

If you want to get extra special: scramble the disk keys. Without those, data's good as toast. And that can happen a lot faster than a shred, wipe, or even dd if=/dev/zero of=/dev/sda bs=1g

Something to fry your memory might not hurt.


Pretty sure they'd just charge you with attempted murder of a federal agent then x the numbers of agents in the area.


Have a lanyard around your wrist with the end plugged into a USB port. Set up a daemon that watches for that device to disconnect, and once it does, the computer powers off.


The standard way is to check for your face every second using a webcam. If you go out of view, lock the machine.



Some kind of lanyard?


how is it legal for the feds to steal private property?


They had a warrant. It wan't technically stealing since they were legally authorized by a judge to take the property in as evidence.


So they don't have to show the warrant to the offender?


There's no legal requirement I know to show the warrant prior to seizure of material evidence based on a warrant. Do you know of any relevant case law that says otherwise?


Nope, just sincerely curious.

They need to show the warrant to enter suspects house but don't need to do it when seizing suspects property in public space. That's what confused me.


They don't need to show a warrant first in the case of no knock raids.


I think "Do things that don't scale" applies perfectly here, the part where Ross initially seeds the marketplace by selling magic mushrooms which he himself grew; may be this explain why new Darknet concepts failed to take off, not due to technological limitation or lack of market need.

https://bitcoinmagazine.com/5285/torbroker-anonymous-finance...

http://www.forbes.com/sites/andygreenberg/2013/11/18/meet-th...


I just want to grab this kid and shake him while screaming "WHY WOULD YOU EVER WRITE THAT SHIT DOWN?!?"

It's like he wanted to get caught...


In a folder labeled "TorChat," Ulbricht's computer holds years' worth of chat logs.

Felt the same way when reading this. Seriously - three years worth of chat logs? I don't think he wanted to get caught, he just felt that a clueless investigator could never decrypt his data, a clueless prosecutor could never understand let alone describe his operation and a clueless jury would never understand it.

So far we know he underestimated the investigator and the prosecutor. We'll know soon if he misjudged his chances with a jury.


Never assume you're the lone wolf in a world full of sheep....


Raise your hand if, when you read an article about gross incompetence while committing a crime, you get the urge to become a criminal mastermind yourself, just to do it right...


I know, right? Better yet, why the hell would anyone take anything with that much incriminating info out in public like that?

I wince when I read of security goofs like those mentioned in the article or Poulson's book Kingpin. These are bright guys who should assume they'll eventually get raided or otherwise targeted by the law and have safeguards in place.

Makes for good reading, though. I'm ordering popcorn for this one.


I remember reading about DPR before he got busted, and thinking "wow, this guy must be practicing some insanely paranoid opsec".

Turns out, he was doing nothing of the sort!


Seriously, why would you do that? Hasn't he seen Boardwalk Empire? You get rid of the book and keep it all in your head! That, and it's also common sense.


You write it down because it's a business and you need some amount of documentation to run any business. The journal thing could have been avoided, but the chat logs? There are bound to be disputes when running a black market, and it's useful to have a reliable record of what happened in the past.

The armchair commentators here write "just keep it all in your head", but that's just not possible.


These are very intimate details of his life. The entries do not read like the entries of a psychopath, rather they paint a vivid picture of his life and the perfect basis for a movie.


I've never gotten the impression that Ulbricht was a psychopath or anything similar. He always came across as a naive idealist, caught way over their head in a conspiracy they never expected to succeed. He openly admits in his diary that he practiced terrible OpSec, and didn't care much.


This article doesn't make him look like an idealist at all. It makes him look like an entrepreneur that cares about success about all else. The idealism seemed to come later, as a justification.


Being an idealist and entrepreneur who wants to be successful are not mutually exclusive at all.


Who said it was?


Hindsight is 20/20. Sometimes you don't realize you need OpSec above a certain level until after the fact and by them it's too late.


Considering they busted Anonymous' "Commander X" the same way, he should have been forewarned.


Yeah, the one where he tried to recruit hitmen made him seem a lot less idealistic. Maybe it's just me.


Yeah, the hollywood version is fait accompli.


Honestly my impression reading them was that there's a possibility he really was set up by Karpales, or that the prosecution is forging evidence. I just can't believe anyone would really keep journals like this outside of movies. I have a felony for distributing mushrooms years ago, and in that period I knew never to write stuff down like this, as did all of my colleagues, even those who were noticeably less classically intelligent.


I just can't believe anyone would really keep journals like this outside of movies.

The CEO of Google once sent someone an email which said, virtually verbatim [+], that he would appreciate them not talking about the illegal act he had just ordered over email because it would open them up to a lawsuit.

We know this. Guess why.

[+] The quote, in case anyone thinks I'm being too harsh in my summary: "I would prefer that Omid do it verbally since I don't want to create a paper trail over which we can be sued later? Not sure about this.. thanks Eric" (The antecedent was to "it" was "share with eBay and Paypal executives Google's internal anti-poaching rules as they pertained to eBay/Paypal for the purpose of eliciting their continued cooperation in the conspiracy.")


To be fair, there are plenty of totally legal things you can do that open you up to lawsuits if you write them down. This wasn't one of them, but an email with the same text could have been completely innocuous.


People do dumb things. Even smart people. The journal entries by Ross almost seem affected to the point of contrivance though.. he wasn't communicating with anyone. Of course, it's likely they are his, but it still strikes me as very Hollywood-esque.


Why would you have ever assumed that he was a psychopath?


He has been accused of putting out hits on people. That is at least somewhat psychopathic.


It's likely that when he was trying to put out the hit, as it appeared, he knew he was talking to the guy who was blackmailing him (who didn't know that he knew that) and he was trying to get him to believe that he was willing to kill to end the blackmailing. So he was never actually planning on killing anyone.


That is not likely at all. There is literally no evidence supporting that. It is simply an explanation that allows Ross's supporters to explain away the facts. The preponderance of evidence is that Ross is OK with murder.


Maybe I want to believe too much.

Regardless, I would say that there's a big difference between murdering someone who is blackmailing you and other kinds of murder, to the point that I wouldn't expect psychopathy from someone who was doing the former.


It all seems more amateurish with every additional piece of news coverage - why a single decryption key or even your day-to-day laptop as storage for that multitude of evidence! Surely you don't need 4 years of chat logs to run a site on a day to day basis.


The snatching of the computer before you have a chance to lock it issue seems like something that could be solved with software. I'm imagining a "swatd" service that listens for loud noises (gunfire, flashbangs, shouting, etc) or observes the camera for sudden motion and locks the machine. I'm sure there'd be some false positives from movies and the like, but for guys like this, better safe than sorry.


If the target manages to lock the computer, the next thing to do is to freeze the RAM sticks and try to get the encryption key from there: http://citpsite.s3-website-us-east-1.amazonaws.com/oldsite-h...

"We also confirmed that decay rates vary dramatically with temperature. We obtained surface temperatures of approximately −50C with a simple cooling technique: discharging inverted cans of “canned air” duster spray directly onto the chips. At these temperatures, we typically found that fewer than 1% of bits decayed even after 10 minutes without power. To test the limits of this effect, we submerged DRAM modules in liquid nitrogen (ca. −196C) and saw decay of only 0.17% after 60 minutes out of the computer."


Ulbricht's Samsung 700Z laptop used DDR3 RAM. These guys couldn't reproduce the "cold boot"/"RAM freeze" attack using DDR3 RAM: http://www1.cs.fau.de/filepool/projects/coldboot/fares_coldb...

But I don't see why they would need to freeze anything. I would think the feds should be able to make a device that plugs onto the DRAM connectors of chips and reads the content, although I'm not sure.


I just realized that an easier way, when you have a guy under surveillance using his computer in public, is to capture some decent footage of him entering his password before you bust him. Way less fun though.


To prevent cold boot attacks you can store the key in a CPU register instead of memory: https://en.wikipedia.org/wiki/TRESOR


The Linux distribution Tails will automatically wipe RAM when shut down, which can be triggered by removing the USB drive it is running off of. I guess the thing to do would be to only work in a place where you can delay law enforcement long enough for the wipe to complete. But alas, it seems Ulbricht wasn't paranoid enough.

https://tails.boum.org/doc/advanced_topics/cold_boot_attacks...

Or, of course, thermite always works.


I think this could still be circumvented if this service was known. I guess you would intentionally not make this software available to anyone other than yourself.

What about some sort of 5-10 minute prompt? You cant ask repeated questions due to surveillance, or you could be also requiring some hash value. Perhaps based on some permutation of the current time? It's weak but I can't think of something else you could consistently make a unique hash of using just your brain and some changing property of reality.

Another idea, a heart rate or brain wave monitor connected via bluetooth. If it's disconnected, moved, or shifted it prompts a lock. If your heart rate increases or brain patterns are it also locks. The point is that it cant be removed from yourself, but others cannot stop you from locking it as well.


> Another idea, a heart rate or brain wave monitor connected via bluetooth

I like this idea. It may or may not be practical, but it's out of the box thinking and would certainly warrant some investigation / development.


Senors, software and such seem pretty error prone or otherwise defeatable. What about a "deadman's switch", a wrist strap connected to a short cable connected to a USB dongle. When the dongle is removed (laptop snatched) it would lock the laptop. The only way to defeat this would to somehow completely restrain someone from moving, and I can't see how you'd do that without seeing it coming. Even a tranquilizer takes a few seconds to kick in.


It has to be something they can't see, or they'll counteract it, possibly by shooting you as the other commenter said.


please don't make their only option be to either secure your cooperation, or sever your brainstem before you can twitch.

"Oh shit, he's moving his arm! It might have an rfid dongle!" bang


I was thinking if it would be feasible to implement an OpenCV-style facial recognition script that could require sustained attention from the user to preserve an open session on the computer. If that user stops watching the screen or is physically separated from the view of the camera, then the locking operation would take place automatically.

I'd be curious from a legal perspective if that would constitute obstruction if you always used it, by analogy to having a data destruction policy in place before the discovery phase of a lawsuit.


You could use a laptop with some kind of sudden motion sensor and use that to lock the machine if the machine is moved.


Thinkpads have this sensor that is meant to protect the hard drive from sudden shock. I bet it could be used for something like that.

http://www.thinkwiki.org/wiki/Active_Protection_System


A bit old, but Amit Singh did some interesting work with the sudden motion sensor on the Mac Powerbooks:

http://osxbook.com/book/bonus/chapter10/sms/


I was thinking of a Bluetooth connection to his phone, and if the connection is lost the computer shuts down. I'm assuming the FBI would quickly get him away from his computer, which would trigger this defense.

Or just take the battery out of the laptop and work with the plug. Snatching it away shuts it down.


Is there software out there that will lock your session when a new USB device is detected? Maybe it wouldn't have changed much for Ulbricht but I would like to use something like that. If someone tried to copy files to their own drive while I was distracted then they would unwittingly lock themselves out.


I recall seeing a video of a presentation about trashing a device that's plugged in via exploits (I think?) in the USB protocol, but I imagine that the "do things when something is detected" part would be comparatively easy to reproduce.

Unfortunately, I can't recall where it was, nor can I seem to find it. Sorry.


how about an rfid device that simply locks the computer when you're more than a few feet away?


If you are under surveillance it's likely they would have observed this already. Don't assume they would go beyond removing all of your valuables and clothes right then and there if they thought this setup was in place.

Some of the above methods can still be broken. Requiring a face present? Why not just print a big blowup photo and quickly insert in front of camera?

There are smart people getting around security.


It's hard to imagine they could simultaneously arrest and restrain a guy, while keeping him within 3 feet of his laptop, while preventing him from shutting the lid or locking the computer. Falling to the floor would be enough to break the connection and lock the computer.


If they're already in your house, then it's probably game over. Otherwise it should not be detectable to a third party observer that you have a small transmitter in your wrist bracelet.


That's not a bad idea. You could use some kind of USB dongle connected to a wearable? Once you walk away from computer it takes a picture of the screen( looks like nothing is changed), but the computer immediately locks down everything except what's currently on the screen. Only a password along with the wearable would unlock it? (It's probally not easily feasible, but it doesn't sound impossible?) "Oh, I scratched my head, and my computer hard drive shut down."


You could have something attached to your belt and keep the laptop on your lap. A gpg smartcard would do well, probably.


Those journal entries don't really read like journal entries to me. The longer entries seem more like prepared and considered stories--stuff written for an audience other than yourself. I wonder if he was keeping those as notes for a book.


The extracted quote at the top of the Forbes article here seems to indicate he was thinking along those lines: http://www.forbes.com/sites/sarahjeong/2015/01/22/the-dread-...

"I imagine that someday I may have a story written about my life, and it would be good to have a detailed account of it."


A book he could never publish. Unless he got caught.


Write it and have it published when you die I suppose is the other solution.


Or after the statute of limitations runs out, but I'm not sure how long that would be for the crimes he's accused of.


People publish books about crimes all the time.


I think you'd expect that from someone on the spectrum of pathological narcissism or psychopathy, which is I think not unlikely given what we know about him.


Reading this, and other recent events, gives me the realisation that we need the successor of UNIX. Nowadays, everything runs UNIX. My iPhone, Android, my Mac, my Ubuntu laptop, my Debian or BSD server, even my e-reader runs some Linux.

On recent systems like iOS & Android applications run pretty isolated. You can't read and write the whole file system (afaik), and you need to have the user tap "yes" to use many system API's (like microphone, camera, etc).

Using UNIX for a desktop computer, you don't really utilise the user system. Everything I run is either as my own user, or as root (when adding/remove packages or doing system updates). Otherwise, it's a singe user system. So any program I run can read all permanent data stored by other programs in my home directory. In effect, all programs have 100% access (except for changing system settings, but why would they care when there is only one user to own?

When I encrypt my drive, I encrypt it all but also unlock it all when logging in. It's inherent to the system that my whole home dir is open when using (except for things I encrypt manually, like GPG mail or other user land things). Defaults matter. That's why Ross's documents were readable to the American government.

I think we need a new OS to take over after UNIX. One that is built up of sandboxed modules. Where each program gets it's own file system, where they can do whatever they want. That file system is, if I wish, encrypted until I chose to open it. It could be encrypted with a public key system, so I can have many FS's opened with one key, or derive keys from a master key.

These small systems could even be virtual machines, I can't say anything about the eventual overhead that would bring.

In short, UNIX is bad because the file system is bound to my user, and anything my user runs has 100% access to everything else I run. The user system is nice, but not practical. If it was, Ross would be a free man.


In theory LXC could do this. It needs to be tested more and clearly has security issues right now.


Posting as breadcrumbs so I can reference this post later.


In his diary regarding selling out of (illegal) mushrooms he writes: "...but at least now I was all digital, no physical risk anymore."

Given the revelations from the last few years, how many of you would agree that carrying out an illegal plan like this is safer online?


I never saw the number, what was DPR net worth when this all came to a crashing halt? I assume 10's of millions of dollars

Also - was that money recovered by the FBI or could they not find his private keys?


I think the peak number in the spreadsheet for the value of SR was $104M -- I can't remember the source, but that figure stood out.

edit for source: http://abcnews.go.com/Technology/wireStory/san-francisco-man...

The FBI had no problem finding his keys because he kept them in a folder called, "Keys" -- the kid was not an OpSec genius..

http://motherboard.vice.com/read/journal-and-chat-logs-from-...



It sounds like a scene from that terrible TV show "What Would You Do?" I'd ignore it that's what I would do.


This "diary" sounds like it was written by the FBI and planted on his computer...


It's surprising how much effort some on HN will go through to insist the case against Ulbricht must be completely invalid somehow. Several people in this thread have already assumed that because the FBI has his laptop, that must mean they stole it without a warrant. And now, if they found his diary, well, they must have planted it.

You may have to come to terms with the possibility that the FBI actually has a case supported by evidence obtained through legal means.


DPR definitely broke the law, there's no question about that. A lot of us think it's an unjust law, but whatever. He may have also put out hits on people (though, curiously, he is not being charged for that). If that's the case then he's also a danger to society and really does belong in prison.

But, it is immensely frustrating, even heartbreaking when you consider the cost in human lives, that given the choice between something like Silk Road and Mexican drug cartels, we as a society have apparently chosen Mexican drug cartels, and all the gut-wrenching bloodshed and destabilization they bring.

I'm reserving judgement on Ulbricht the person, but what he did should not be illegal, for reasons ideological, practical, and humanitarian.


I'm not entirely certain that black markets are the best way to facilitate a safe drug trade, but given a choice between Silk Road and more violent alternatives, Silk Road seems like the obvious better choice.


Right. Aside from, or in spite of, being a black market (by necessity), Silk Road was pretty benign compared to the alternatives. Surely Silk Road was taking some profits away from drug cartels. Probably not much, but a legal market would put them out of business. Now with Silk Road gone, all that trade is back under the umbrella of the cartels again, and the profits are theirs.


No, he is being charged for that. It's a separate case.


This same narrative also played out during the Hans Reiser arrest/trial. Even after his conviction (due in no small part to his own testimony), people were still defending him -- up until he revealed the location of the body in return for a reduced sentence.


I agree it does read that way.

But the most reasonable explanation is that an arrogant narcissist (classic Dunning-Kruger) wrote it.

The FBI did not write it.


I'm ignorant of the law here: This article starts off saying basically that the FBI agents distracted him long enough to steal his computer and image the hard drive...is that legal? I thought you needed a warrant or something for situations like this?

Or is it illegal-but-it's-ok-it's-the-FBI-shhhh?


A legally savvy poster in the original Ars Technica thread says it's allowed if the authorities can claim "exigent circumstances" -- basically meaning that lives were in danger or evidence would have been destroyed if they didn't act fast. Here's more on exigent circumstances via Wikipedia: http://en.wikipedia.org/wiki/Exigent_circumstance_in_United_...

From what we've been told so far, this sounds like a textbook case of an allowable grab.


They already had a warrant for his arrest, as well as for the computer. They just didn't want him to be able to turn off the computer, encrypt itself, and have it become inaccessible to them.


Imagine if you were the agent who grabbed the laptop, and you accidentally bumped the power button. Or if you were the forensic tech, and you accidentally triggered a reboot of some sort. No pressure!


They just mean they grabbed the laptop off the table before formally arresting him, i.e. they distracted him with a diversion of an argument, another agent grabbed the laptop from the table, and another agent physically detained him and arrested him.

So he couldn't close the laptop and enact the encryption.


According to the author, the FBI had a warrant for the laptop at the time.


From my understanding, they grabbed the computer just seconds before the arrest.


I assume they had a warrant?


This is when they arrested him. They didn't sneak a copy of his laptop before returning it to him.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: