Reminder: Bitcoin is NOT private. Bitcoin CAN be traced. The ways to link onchain tx's and ultimately tie them to your IRL identity are increasingly sophisticated and the efforts are increasingly led by US agencies. The blockchain is forever.

But.....
As far as I can tell the tracing of on-chain BTC transactions played ~zero part in tracking down/confirming Bitcoin Fog's alleged operator's id.

The narrative the govt, Wired, etc are pushing on this (that bitcoin is not anonymous) is true. But it's also pretty irrelevant here.
The reality is that w/o 4 separate, centralized, key data sources the govt wouldn't have been able to track him down. Only one of those data sources came from a lawful subpoena: Google.

The rest came from Mt Gox + Liberty Reserve + BTC-E data that the IRS-CI just...has?
Its worth noting the Google subpeona probably relied exclusively on that same data from Mt Gox, Liberty Reserve, and BTC-E.

Now I'm not a lawyer but...is it okay that the govt is using seized data from separate, past investigations to find other crimes/criminals/"kingpins"?
We all know the SDNY has a history of overstepping and being incredibly problematic, esp. under Preet Bharara 😒

But at least with Liberty Reserve the size, scope, duration, the US '̶s̶ ̶l̶o̶n̶g̶ ̶l̶o̶n̶g̶ ̶l̶o̶n̶g̶ ̶a̶r̶m̶ coordinating with 17 different countries for years...
...they have gone thru the processes. On top of multiple convictions, theres a pile of restraining orders/injunctions and seizure warrants around money, bank accounts, domain names, servers, etc.

Much insights: sherloc.unodc.org/cld/uploads/re…

Like, yes, domain name!=server
The one exception with regards to Liberty Reserve is the little detail that give credibility to those who spout "taxation is theft!"

The IRS(-CI?) still holds fuckloads of Liberty Reserve users' money. (lol. but not really lol.)

krebsonsecurity.com/2020/02/a-ligh…
In the case of BTC-E though, the US has NOT secured a conviction and didn't even win extradition—France did.

That means all the forfeitures that happen UPON CONVICTION are moot at this point in time.
With BTC-E, the US has only unsealed the a few docs. And only did that bc the clusterfuck of alphabet agencies wanted to throw a massive circlejerk party around said indictment. Any seizures, other affidavits, etc are still sealed.

justice.gov/usao-ndca/pr/r…
The last page of that doc DOES reference a July '17 warrant for BTC-E info on Equinix servers.

In New Jersey.

For info housed by a company HQ'd in Northern District of CA.

For a case indicted in May '16 and January '17 by Northern District of CA.

🤔

justice.gov/usao-ndca/pres…
Normally I don't consider the posts on BitcoinTalk from operators of a shady exchanges to be reliable. But in this case it all lines up (especially timing)

It may have been a different three-letter agency and they probably copied the data instead of running off w the machines.
But they got the important bits.

And if we ignore any problems w the validity of the search (which are heavily discussed bc rule 41 is fucked), it's far more interesting and far less discussed to look at what happens *after* the govt has, say, lawfully seized digital records.
So ask your lawyer friends to slide into the public replies of this tweet, please.

Assuming a valid search/seizure of digital financial transactions and user records from an (illegal money laundering) exchange...

What happens to the PII afterwards? Names, BTC addresses, etc?
Is it allowed to just float around the IRS, HSI, and FBI offices and searched to connect people/txs in other cases? Spawn new cases? Years later?

If info was obtained bc COMPANY is money laundering, can info be used against AN INDIVIDUAL CUSTOMER OF COMPANY who sells drugs?
Because that's def what's happening and they aren't even really attempting to hide it or play deep parallel construction games. It just seems...hinky. To me. But I'm not a lawyer. Or a special agent. 🤷

attached: USA v KARLSSON, 2019 and USA v. STERLINGOV, 2021
Lastly, just because THIS CASE doesn't rely on actual blockchain analysis doesn't mean blockchain analysis isn't a thing.

Bitcoin CAN be traced on-chain. The ways to link onchain tx's and ultimately tie them to your IRL identity are increasingly sophisticated.
If you want to see what it looks like when they do use serious on-chain and even cross-chain tracking and check out:

USA v Schemey COVID Terrorists: justice.gov/opa/press-rele…

USA v Crypto stolen by North Korean hackers from South Korean exchanges justice.gov/opa/press-rele…
So yeah. Interesting stuff. Curious to know if I'm alone in thinking this is fucked. 🤷

PS: this is not the first mixer to be taken down you lazy fucking "journalists." It's been a year since Helix was taken down. Google is a thing. Use it. 🤦‍♀️ justice.gov/opa/press-rele…
Oh fuck I forgot to share my theory on the "why now?" from the original thread

Theory: agents, mostly but not limited to IRS-CI agents associated around the Northern District of CA, have the BTC-E databases and are using it like its going out of style.

There are some key similarities between this and the Nov 2020 forfeiture of 69,000 2013-era BTC (justice.gov/usao-ndca/pr/u…)

Besides the time period, we have same agencies, jurisdiction, and a single understated mention of BTC-E hiding in piles of parallel construction fluff.
Just a theory. 😉

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Taylor Monahan

Taylor Monahan Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @tayvano_

28 Apr
Dude they got bitcoin fog

wired.com/story/bitcoin-…
I think we all know by now that anyone who knew about btc before 2013 is a villainous kingpin in the irs's eyes.

Feels to all the real kingpins out there who had to work hard irl for that title. 😂
Thanks Amy for the actual docs so I can stop thinking about clickbait headlines and the feelings of real kingpins. 😅

Read 22 tweets
22 Sep 20
understand the power of a telegram group. Even a tele full of non-devs who can't even register a domain name. 🤫
Ffs I get some work done and it went from like 20 ppl without a token name or a domain name or a fucking clue to 600+ people begging for drops.

This is for sure the future of finance folks.

🤫 ImageImageImageImage
The F U T U R E of finance folks. 😂😂😂 ImageImage
Read 48 tweets
21 Sep 20
Since I...uh...was having too much fun sharing insane attack vectors with you, I should probably calm my ass down and clarify a thing:

You should be far LESS scared of @metamask_io and far MORE scared of the other shit you're doing + your own opsec.
@Ledger and @Trezor are safer and more trusted than MM. Ice cold paper airgapped machine storage is even moreso.

But your random no-name mobile wallet, the port tracker that wants your full admin exchange API keys, and the rotting DeFi food you keep throwing $ at are WAY WORSE.
Flashy new wallet that's never endured a bull run? Yeah, no thanks lol.

Entering your private key directly into a website/dapp? Fuck off.

Centralized "recover with your phone number" shit? Hope you are bribing all the $1/hr support agents in the Philippines to NOT sim swap you!
Read 9 tweets
19 Sep 20
Oooh fun one. Okay so let's start with literally MetaMask. Meaning your actual legit MetaMask extension is actually used in order to get the keys, rather than the keys that you generated with MetaMask or use in MetaMask are compromised without MetaMask involvement.
1. Attacker gets physical access to your device.

e.g. Evil maid attack. Theft. Leaving it unlocked at starbucks.

MetaMask takes measures in how they store secrets + auto lock state. But honestly if someone targeting you and your crypto gets your physical device, RIP. ☠️⚰️🥀
2. Full remote access to your device.

Most commonly, Teamviewer. Hacker walks thru the door you left open & grabs your shit.

Here's an old example of exactly that. Bonus insights into securing a product like MetaMask/MyCrypto/MEW in full reddit thread.

Read 43 tweets
29 Aug 20
Apparently the scammer impersonator doesn't look at Twitter. 🤔

do you want to play a game? 😈 Fake Scammer Alex Impersonator
Well you've left me no option now honey. 😂 Image
Image
Read 7 tweets
28 Aug 20
I love Dan and folks like @mcutler who take the time to write this shit up in glorious detail.

Another lesson: people w deep niche expertise don't get crazy loud w what they know to be true. It can be weird bc they do yell about theoretical specs. Inverse them both. Then, run 😂 ImageImageImage
Related readings bc this topic is endlessly fascinating.

Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!