Reminder: Bitcoin is NOT private. Bitcoin CAN be traced. The ways to link onchain tx's and ultimately tie them to your IRL identity are increasingly sophisticated and the efforts are increasingly led by US agencies. The blockchain is forever.
But.....
As far as I can tell the tracing of on-chain BTC transactions played ~zero part in tracking down/confirming Bitcoin Fog's alleged operator's id.
The narrative the govt, Wired, etc are pushing on this (that bitcoin is not anonymous) is true. But it's also pretty irrelevant here.
The reality is that w/o 4 separate, centralized, key data sources the govt wouldn't have been able to track him down. Only one of those data sources came from a lawful subpoena: Google.
The rest came from Mt Gox + Liberty Reserve + BTC-E data that the IRS-CI just...has?
Its worth noting the Google subpeona probably relied exclusively on that same data from Mt Gox, Liberty Reserve, and BTC-E.
Now I'm not a lawyer but...is it okay that the govt is using seized data from separate, past investigations to find other crimes/criminals/"kingpins"?
We all know the SDNY has a history of overstepping and being incredibly problematic, esp. under Preet Bharara 😒
But at least with Liberty Reserve the size, scope, duration, the US '̶s̶ ̶l̶o̶n̶g̶ ̶l̶o̶n̶g̶ ̶l̶o̶n̶g̶ ̶a̶r̶m̶ coordinating with 17 different countries for years...
...they have gone thru the processes. On top of multiple convictions, theres a pile of restraining orders/injunctions and seizure warrants around money, bank accounts, domain names, servers, etc.
In the case of BTC-E though, the US has NOT secured a conviction and didn't even win extradition—France did.
That means all the forfeitures that happen UPON CONVICTION are moot at this point in time.
With BTC-E, the US has only unsealed the a few docs. And only did that bc the clusterfuck of alphabet agencies wanted to throw a massive circlejerk party around said indictment. Any seizures, other affidavits, etc are still sealed.
Normally I don't consider the posts on BitcoinTalk from operators of a shady exchanges to be reliable. But in this case it all lines up (especially timing)
It may have been a different three-letter agency and they probably copied the data instead of running off w the machines.
But they got the important bits.
And if we ignore any problems w the validity of the search (which are heavily discussed bc rule 41 is fucked), it's far more interesting and far less discussed to look at what happens *after* the govt has, say, lawfully seized digital records.
So ask your lawyer friends to slide into the public replies of this tweet, please.
Assuming a valid search/seizure of digital financial transactions and user records from an (illegal money laundering) exchange...
What happens to the PII afterwards? Names, BTC addresses, etc?
Is it allowed to just float around the IRS, HSI, and FBI offices and searched to connect people/txs in other cases? Spawn new cases? Years later?
If info was obtained bc COMPANY is money laundering, can info be used against AN INDIVIDUAL CUSTOMER OF COMPANY who sells drugs?
Because that's def what's happening and they aren't even really attempting to hide it or play deep parallel construction games. It just seems...hinky. To me. But I'm not a lawyer. Or a special agent. 🤷
attached: USA v KARLSSON, 2019 and USA v. STERLINGOV, 2021
Lastly, just because THIS CASE doesn't rely on actual blockchain analysis doesn't mean blockchain analysis isn't a thing.
Bitcoin CAN be traced on-chain. The ways to link onchain tx's and ultimately tie them to your IRL identity are increasingly sophisticated.
If you want to see what it looks like when they do use serious on-chain and even cross-chain tracking and check out:
So yeah. Interesting stuff. Curious to know if I'm alone in thinking this is fucked. 🤷
PS: this is not the first mixer to be taken down you lazy fucking "journalists." It's been a year since Helix was taken down. Google is a thing. Use it. 🤦♀️ justice.gov/opa/press-rele…
Oh fuck I forgot to share my theory on the "why now?" from the original thread
Theory: agents, mostly but not limited to IRS-CI agents associated around the Northern District of CA, have the BTC-E databases and are using it like its going out of style.
There are some key similarities between this and the Nov 2020 forfeiture of 69,000 2013-era BTC (justice.gov/usao-ndca/pr/u…)
Besides the time period, we have same agencies, jurisdiction, and a single understated mention of BTC-E hiding in piles of parallel construction fluff.
Just a theory. 😉
• • •
Missing some Tweet in this thread? You can try to
force a refresh
@Ledger and @Trezor are safer and more trusted than MM. Ice cold paper airgapped machine storage is even moreso.
But your random no-name mobile wallet, the port tracker that wants your full admin exchange API keys, and the rotting DeFi food you keep throwing $ at are WAY WORSE.
Flashy new wallet that's never endured a bull run? Yeah, no thanks lol.
Entering your private key directly into a website/dapp? Fuck off.
Centralized "recover with your phone number" shit? Hope you are bribing all the $1/hr support agents in the Philippines to NOT sim swap you!
Oooh fun one. Okay so let's start with literally MetaMask. Meaning your actual legit MetaMask extension is actually used in order to get the keys, rather than the keys that you generated with MetaMask or use in MetaMask are compromised without MetaMask involvement.
e.g. Evil maid attack. Theft. Leaving it unlocked at starbucks.
MetaMask takes measures in how they store secrets + auto lock state. But honestly if someone targeting you and your crypto gets your physical device, RIP. ☠️⚰️🥀
2. Full remote access to your device.
Most commonly, Teamviewer. Hacker walks thru the door you left open & grabs your shit.
Here's an old example of exactly that. Bonus insights into securing a product like MetaMask/MyCrypto/MEW in full reddit thread.
I love Dan and folks like @mcutler who take the time to write this shit up in glorious detail.
Another lesson: people w deep niche expertise don't get crazy loud w what they know to be true. It can be weird bc they do yell about theoretical specs. Inverse them both. Then, run 😂