Doing some furious googling of the Silk Road 2.0 operator. Apparently he codes in Ruby on Rails. http://www.fbi.gov/newyork/press-releases/2014/operator-of-silk-road-2.0-website-charged-in-manhattan-federal-court …
-
-
@sarahjeong It's just a github private repo - tweeted about that earlier too. Wonder if github got a warrant for data@FredericJacobs@octal -
@abditum@sarahjeong@FredericJacobs They don't need a warrant to get data from the service provider, it's not <180 day email. -
@octal Why would they not need a warrant to gain private user data? Unless you're suggesting NSL.@sarahjeong@FredericJacobs -
@abditum@sarahjeong@FredericJacobs I don't believe a github repo is "user communications". -
@octal Hmmm.... That's a really good legal question.@sarahjeong, any thoughts?@FredericJacobs -
@abditum@sarahjeong@FredericJacobs I'd bet a subpoena is enough. Depends on github pushback, too. Also, saved credentials on seized pc? -
@octal Oh right. Yeah you're probably right on subpeona. If he was DPR 2.0, his laptop was probably encrypted.@sarahjeong@FredericJacobs -
@abditum@sarahjeong@FredericJacobs It's amazing how easy it is to defeat laptop encryption when you point some M4s at the user.
Fin de la conversation
Nouvelle conversation -
Le chargement semble prendre du temps.
Twitter est peut-être en surcapacité ou rencontre momentanément un incident. Réessayez ou rendez-vous sur la page Twitter Status pour plus d'informations.