FBI says it situated the Silk Street by exploiting an error with the server’s login web page
The US Federal Bureau of Investigation might have seized the Silk Street and bought off its horde of sick-gotten Bitcoin, however the case is not over but — the darkish website online’s creator nonetheless has to face trial. The protection of Ross Ulbricht, the person allegedly behind the Silk Street, is doing its greatest to discredit the FBI’s proof; particularly, its accusing the bureau of sniffing out Silk Street server’s location by means of unlawful means. The FBI says that could not be farther from the reality. In a courtroom rebuttal, the FBI claims that the IP handle of the server was “‘leaking’ from the location because of an obvious misconfiguration of the consumer login interface by the location administrator.” Principally, FBI officers exploited a glitch to get the server to cough up its hidden location.
Officers discovered that the login web page might be coaxed into producing an IP tackle that did not match TOR requirements. When this tackle was utilized in a non-TOR browser, it produced a component of the login web page, confirming that it represented the server’s true location. If this rebuttal is accepted, it can dismiss the protection’s accusations that the FBI used the NSA to illegally hack into the server to seek out its location. This is able to make sure that a lot of the FBI’s proof is admissible and probably seal Ulbricht’s destiny. Take a look at the FBI’s full rebuttal within the courtroom doc under.