RT @FedericoTenga: Blockchain analysis is basically a scam. They just sell assumptions as reliable proofs to people who do not understand the tech. It cannot be a profitable business in the long term https://t.co/Q5oBga69av
Might be tempting to see "crypto winter" here. (God knows we saw post-ICO pain.) But Chainalysis is keeping its R&D unit and has some real deals in play. More "rightsizing" (uggh, hate that word) than "downsizing." Anyway, read @realDannyNelson's scoop: https://t.co/pMmnKcbPFj
#33kByJuly3018Moku //not_giving_away_ETH\\ - @CarpeNoctom6 months ago
Unfortunately, I suspect that the real problem is that other IT behemoths with existing contracts with governments are muscling in on their territory and eating this little upstart’s lunch. Anybody with big data capability and an R&D Department can smell the money on this
I used to believe that Ross was taken down by unmasking him and his associates with chain-analysis, but it was rather that Ross was terrible at crime and could not stop himself from talking about his views both as Ross and DRP, it had nothing to do with Bitcoin being transparent.
He advertised his own site using an account by pretending to be a customer (Altoid), one of the first mentions of the site online, then later asked for IT-workers on that same account with his personal gmail address rossulbricht(at)gmail. He then logged into his Gmail and SilkRoadServers from the same machine on the same IP, so google could confirm the suspicion.
Ross expressed his particular political/philosophical convictions Ross on public profiles like LinkedIn and Google+ which lined up with the same expressions from his Silk-Road alter-ego that he also published to further solidify suspicion.
He was practically begging to be caught and would be caught even if they used magic-untraceable-crypto. One guy instrumental in getting him caught used google-searches within date-ranges, that was all it took to link an account to a real-life gmail-account to a IP address accessing that same address and SilkRoad.
It's quite possible even the adoption among criminals is much lower than we all expect. Maybe it's too hard/volatile/unfungible even for serious crime these days. Even our boy Gerry who did nothing wrong bragged about packing bags full of fiat and flying all over the world.
FBI isn't going to shell out big bucks to a consultancy over some methhead buying meth with monero. L
Yes for Bitcoin and other non-privacy coins.
But, Monero and others (Zcash, etc) are still pretty tough to trace through, aren't they ?
Iirc, tracing Monero was much easier a year or so ago, but changes since then have made things more difficult.
Monero would be hard to pin down, I think the weak spot with Monero is that presuming you actually buy something on darknet with it, is that the darknet seller would be the police and trace illegal products back to you physically, which they can always do.
And there seems to be some decloaking of the anonymity related to Tor, probably because the intelligence agencies have much much much more visibility into the Internet than people realize. Eg, they can cause outages here and there and see where connectivity drops using just traffic analysis, and suss out where hidden servers are physically located.
Wouldn't crime enforcement agencies still like to farm this stuff out to third parties? For one they would be independent and be able to provide compelling reports in court cases. Perhaps this company just sucked at it or were they just another BS industry trying to ride some hype for quick cash?
Edit replied to wrong person
Yes I think law enforcement prefers to have third parties provide tools for their agents to use.
Example - EnCase for police digital forensics. The police could use free tools like whatever you might find on Kali linux, but I'm pretty sure if they were hunting for porn on a device they'd just get an EnCase image and use EnCase to analyze it.