Tay 🦊 💖 Profile picture
Mar 31 37 tweets 20 min read Twitter logo Read on Twitter
The selling of this bitcoin is, by far, the least interesting part of the saga.

The govt's seizure, the dude who had his bitcoin seized, and why it even got seized in the first place is full of so many amazing, hysterical, enraging gems.

Heads up...not a short story. Buckle up.
To set the stage, dude w/ the bitcoin is a super OG bitcoiner living in Gainesville, Georgia.

In Sept 2012 he executed a very basic "hack" on the Silk Road and withdrew the coins.

Not a bad dude. Not a huge hack either. Way less than a mil at the time.

justice.gov/usao-sdny/pr/u…
After collecting up all these coins (~60k BTC) this dude, from at least 2012 thru at least 2021, fucking *lived* life.
Dude lived life like a only an OG bitcoiner from Georgia ever could.
Like, seriously, #bitcoinsquadgoals
what could ever be better than getting hammered and trolling roger and jihan with your stash of 60k btc + btc-fork coins?? 😂
lolllllllllllllll yeah, well, he did that too. 🤣
Keep in mind, this entire time, dude has a fucking stash of BTC thats growing from ~$150k to ~$3.36 billion dollars!!!!!

😳

where do you even keep ~$3.36 billion dollars????!!?
Turns out, he had a "state-of-the-art computer setup" protecting his coins.

Well, he had a "state-of-the-art computer setup" at least.
He kept his $3+ billy bitcoin in an underground floor safe.

And on a raspberry pi under blankets in a popcorn tin in his bathroom closet.
Oh, and in the kitchen drawer.

And on 25 Casascius coins.

😳 🤣

justice.gov/usao-sdny/pres…
T H R E E B I L L I O N D O L L A R S ! ! !
Now obviously youre wondering, "damn. how'd he get caught?"

And, well, considering he signed a message using his 60k BTC key and posted it to bitcointalk... 🙈

A better question though is *why* did he get caught? Like, who cares that someone hacked Silk Road back in 2012????
Turns out the govt cares. They *really* care. But not about lil Jimmy. Nope.

Govt cares bc it would look *really* bad if corrupt federal agents who were investigating Silk Road in 2013 still had a $3b stash of BTC that the (less corrupt) investigation in 2015 missed. 😬
I know—that last tweet was a doozy. Let's back up. You need some more context so you can appreciate what's happening here.

If we rewind even further back to 2011, Adrian Chen of Gawker infamy discovered the Silk Road and wrote about it.

gawker.com/the-undergroun…
In response, Sens. Charles Schumer of New York and Joe Manchin of West Virginia stood up on their high horses and demanded, loudly, that the DOJ and DEA 'shut down this shit down immediately!!!!!'

archive.sltrib.com/article.php?id…
And in response to that every possible agency jumped up and started trying to take down Silk Road.

Like, literally, all of them.

FBI, USSS, ICE, HSI, DEA, IRS-CI, USPS and random ass local agencies / individual agents, too.

h/t @lamoustache antilop.cc/sr/#timeline
Naturally, due to the huge number of federal cooks in the kitchen + the newness of Bitcoin + the fact being a federal law enforcement agent does preclude you from being a lying, stealing, scheming, greedy bastard...it didnt go super well.

h/t @a_greenberg amazon.com/Tracers-Dark-G…
Notably, they didn't end up finding the 20-something year old kid living in SF until late-2013.

2+ full years later.

He was in SF.

😐



And remember how I told you earlier that James hacked the Silk Road in late-2012 via a super basic race condition?
Silk Road was also hacked in *early*-2012 by a still unidentified " Individual X " using the exact same method. (That ~$1 billion worth of BTC was similarly seized in November 2020.)

news.bitcoin.com/a-look-at-indi…
There were a ton of incidents like this. Silk Road was not a state-of-the-art platform. It was basically duct-taped together.

How tf did it take so long for the govt to actually track down the servers and identity of Ross and other admins??????

antilop.cc/sr/#timeline
Oh right, they were too busy being corrupt as all fuck.

e.g. In Jan 2013 the dedicated Silk Road unit did a sting on one of the mods of SR.

Then they took over his account and......stole all the BTC they could from Silk Road users and vendors. 😬

arstechnica.com/tech-policy/20…
This isnt a conspiracy theory. These feds—Shaun Bridges and Carl Mark Force IV—were both busted after Katie Haun (then prosecutor @ NDCA) + Tigran Gambaryan (then investigator @ IRS-CI) got a tip from....Bitstamp. 🤡

arstechnica.com/tech-policy/20…

@a_greenberg amazon.com/Tracers-Dark-G…
The depth of fraud is really something else. The various filings are worth reading in full. These guys—who were not working together—were so fucking independently disgustingly dirty.

e.g. Corrupt US Secret Service Agent Bridges:
antilop.cc/sr/files/2015_…
+
s3.documentcloud.org/documents/2642…
And corrupt DEA agent Carl Force

Extortion, theft, lies, and then more thefts.

antilop.cc/sr/files/2015_…

arstechnica.com/tech-policy/20…
And even more theft, more lies, more fraud, more extortion by Corrupt DEA agent Carl Force

antilop.cc/sr/files/2015_…
+

antilop.cc/sr/files/2015_…
And Corrupt Bro #1, Bridges, *after* being arrested and pleading, RE-STOLE THE FUNDS THAT HAD TECHNICALLY (but not literally) SEIZED **TWICE** by then.

And then tried to run!!!

Cannot make this shit up. 🤣

Arrest #2:
antilop.cc/sr/files/2016_…
+
antilop.cc/sr/files/2016_…
BRRRROOOOOOOOOO!!!!!

antilop.cc/sr/files/2016_…
Anyways.

Obvs these 2 lying, murder-plotting, bitcoin-stealing and re-stealing asswipes were both eventually thrown in prison.

Carl Force got 78 months in October 2015.
oig.justice.gov/press/2015/201…

Shaun Bridges got 71+24 months consecutive in November 2017.
justice.gov/opa/pr/former-…
And then they were released from prison. Bc they are not evil like Ross Ulbricht is. Or something. 😒

Name: CARL MARK FORCE
Register Number: 58633-037
Released On: 10/09/2020

Name: SHAUN W BRIDGES
Register Number: 20436-111
Released On: 10/19/2021

bop.gov/mobile/find_in…
Sidenote: It is truly appalling that Ross got the literal book thrown at him, will never be released, and these guys got half a slap on the wrist.

Especially considering not one word of this corrupt shitshow was allowed in Ross's trial. 😨 #freeross
And that's the story of how the govt came to be in a position to dump piles of BTC via Coinbase today.

They knew there was unaccounted for BTC that had been stolen from SR.
They knew who stole repeatedly from SR before.
And those agents were about to be released.

🤡
But more importantly, its why the small handful of folks in the govt who actually know Bitcoin—the same ones who took down the corrupt agents, Alpha Bay, BTC-E, Welcome 2 Video, etc.—went from working those cases to working random, long-forgotten-about Silk Road hacks and stuff.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Tay 🦊 💖

Tay 🦊 💖 Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @tayvano_

Mar 23
🚨 If you're using Cloudflare for your web3 product, stop what you're doing right now.

You NEED to:

1. Rotate the Global API Key for all your accounts

2. Remove all accounts added to your Cloudflare unless you rotated their Global API Key in step 1

developers.cloudflare.com/fundamentals/a…
I know this sounds dramatic, but it's really not. Please do this. 🙏

The Global API Keys are deadly.

They will rekt you even after youve rotated tokens, changed passwords, or revoked employee access in your offboarding.

They will rekt you even if youre sure they cant rekt you
These are not API tokens or access tokens. They don't have the perms you think they have.

Here's how you rotate the global key:

1. Go to your Cloudflare dashboard
2. My Profile > API Tokens
3. Go to the API Keys section
4. Find your key
5. "Change"

developers.cloudflare.com/fundamentals/a…
Read 13 tweets
Mar 13
Looked at the timing and transactions around the Euler Finance exploit.

The onchain movements before, during, and after the exploit txns line up with the story told by 0x5F25

There's def 2 diff actors at play and only of them has control of any funds.

etherscan.io/tx/0x44b559c86…
Euler Exploiter EOA 1 + 2, Contract 2
(pink, red, the one who has the $)

0xb2698c2d99ad2c302a95a8db26b08d17a77cedd4
0x036cec1a199234fc02f72d29e596a09440825f1c
0xb66cd966670d962c227b3eaba30a872dbfb995db
0xc66dfa84bc1b93df194bd964a41282da65d73c9a
Euler Exploiter EOA 3, Contract 1
(purple, green, EPMAX thing, in from FixedFloat, does NOT have the $ 🪦)

0x5f259d0b76665c337c6104145894f4d1d2758b8c
0xbcaa6ce6fdf7a393dc903049324e443168e17c5c
0xebc29199c817dc47ba12e3f86102564d640cbf99
0x4db46f2c09f0740f1ed974e825a3df652d40f713
Read 5 tweets
Feb 8
There are a few things that have always stood out to me about these cases:

1. It requires meeting in person

2. It requires them to send a txn / new wallet

I’ve seen all phones, computers, Exodus, Trust Wallet, Blockchain.

I really really dont think it’s malware.
The scam has been going on for years. Most recently we’ve seen Rome. Also seen in Antwerp, Brussels, Amsterdam, and Barcelona. The earliest cases I’m aware of are from 2020.
People have prev assumed its a cryptographic thing.

The core libraries often are often the same per platform (ios vs android, javascript vs golang) not per application. As there’s no common platform or app, it would mean 3-6 different libs would have to have same bug/vuln.

Meh.
Read 20 tweets
Jan 30
hey CT I genuinely need your help

im trying to compile a buttload of cases where people shared (publicly) their story of how they got rekt by their wallet. key theft, phishing, approval scams, scam scams, etc

if you know of one (or five), id love if you could link them here. 💖
Here's examples of the types of stuff I'm looking for.

Read 81 tweets
Jan 5
so uhhh i dont wanna alarm anyone but i think we're all fucked

or maybe its just those who use
circleci
slack
okta
auth0
lastpass
travisci
heroku
oauth
github
npm
twilio
authy
signal
cloudflare
mailchimp
digital ocean
or anything that hasnt realized its been breached yet

🤷‍♀️😬🧵
CircleCI
December 21 2022 - January 4 2023

"we are confident that there are no unauthorized actors active in our systems"

circleci.com/blog/january-4…
Slack
December 27 2022 - December 31 2022

"We recently became aware of a security issue involving unauthorized access to a subset of Slack’s code repos. Customers were not affected, no action is required, the incident was quickly resolved."

LOLLL

slack.com/intl/en-au/blo…
Read 25 tweets
Jan 4
the newest iteration of the twitter scam bots are pretty cute. they're all under 30 "y.o" + have lil nft pfps + face emojis in their names + are fans of activities that have a verb emojis + retweet old shit thousands of times but never a single old tweet more than 5 times/day ImageImageImage
please someone violently murder them and their stupid inspirational quotes too ImageImageImageImage
oh shit the williams are going rogue tonight and retweeting things a sixth time Image
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(