- My Forums
- Tiger Rant
- LSU Recruiting
- SEC Rant
- Saints Talk
- Pelicans Talk
- More Sports Board
- Fantasy Sports
- Golf Board
- Soccer Board
- O-T Lounge
- Tech Board
- Home/Garden Board
- Outdoor Board
- Health/Fitness Board
- Movie/TV Board
- Book Board
- Music Board
- Political Talk
- Money Talk
- Fark Board
- Gaming Board
- Travel Board
- Food/Drink Board
- Ticket Exchange
- TD Help Board
Customize My Forums- View All Forums
- Show Left Links
- Topic Sort Options
- Trending Topics
- Recent Topics
- Active Topics
Started By
Message
re: Will Bitcoin crash? Re: Nancy Guthrie
Posted on 2/11/26 at 8:27 am to 1BIGTigerFan
Posted on 2/11/26 at 8:27 am to 1BIGTigerFan
quote:
They just can't get into the wallets to get it (supposedly).
They can still get you and they have no problem doing that.
Posted on 2/11/26 at 8:29 am to geauxkoo
The only way money can be transferred without someone else knowing, besides the two parties, is when it's cash.
That's why they want cash to end. If it's electronic, it can be monitored and it can also be manipulated.
That's why they want cash to end. If it's electronic, it can be monitored and it can also be manipulated.
Posted on 2/11/26 at 8:44 am to geauxkoo
quote:
If the authorities are able to find the kidnapper through this BTC wallet the veil of security using BTC will evaporate.
Or...
If the authorities cannot trace him through the BTC wallet it will reinforce the security.
All bitcoin (BTC) transactions are recorded on the BTC blockchain, which is copied / replicated on a countless number of nodes. Any public, full node is adequate for anyone, including anyone here (not just law enforcement), to do on-chain analysis of transactions... if you have the right tools and know what you're doing.
So, it isn’t necessarily difficult for anyone to know when $1 million in BTC hits an account. In fact, there is something of a cottage industry of crypto nerds viewing the network to see when large amounts of BTC move across the network-- especially on and off exchanges-- and certain addresses/accounts become monitored by other investors as they are believed to be market makers or "whales" and activity in such accounts may signal price might move up or down quickly.
That being said, while the chain of transactions itself is public, and the activity of a whale account might be easy to monitor, the owner of a given account is not necessarily easy to know. Identities are comprised of a public address / key (sort of like an account number and also sort of like your username on here) and your private key (like a password).
If someone used a US based exchange like Coinbase, which requires Know Your Customer (KYC) protocols, then they will have to have provided ID to make an account and establish a public key. If they did this, they would be easy to track if law enforcement can determine the account is associated with a crime and is on Coinbase. If they used a foreign exchange that does not require KYC and isn't responsive to US law enforcement, they make it harder to find out who they are. If they create their BTC keys with an offline method-- usually using a hardware wallet or the old school paper method-- they can possibly leave even less of a trail to connect the address to them.
So, it is possible for a given criminal to actively move specific amounts money all over the chain in a notable way since all transactions on the chain, but that doesn't necessarily make it easy to pin their identity and LEO will be left watching with frustration... unless / until they move it out of the network to a bank or in some other type of transaction (like buying peptides with BTC online and providing a physical address that LEO can somehow obtain). If I'm not mistaken, this is where it usually goes wrong for criminals who get caught.
But also, though the BTC blockchain itself is visible, I think the Lightning Network that was built on it is less visible with regards to how easily money can be tracked. And if they convert their BTC into Monero or any other number of other crypto projects, some of which purposefully bundle transactions into larger baskets to blend and blur identities, they can further obscure the money trail and eventually convert to cash.
In short, no, this case will not "evaporate" the security or anonymity of BTC. If / when they are caught and details of how they were caught get leaked, it'll just be a lesson to future criminals of what not to do.
This post was edited on 2/11/26 at 9:02 am
Posted on 2/11/26 at 8:46 am to geauxkoo
I saw some cyber expert say that the fallacy that Bitcoin transactions are not traceable is laughable. I have no clue but that's sure what he said.
Posted on 2/11/26 at 8:47 am to Flapjacks
quote:
Wallets are provided by companies that can be subpoenaed for information on their users
We don’t give personal info when making wallets though.
Posted on 2/11/26 at 9:05 am to geauxkoo
Isn't the whole point of blockchain to be able to clearly identify chain of ownership back to inception? Why wouldn't they be able to identify the people behind the bitcoin address?
To be clear, I am pretty dumb and know next to nothing about how bitcoin works.
To be clear, I am pretty dumb and know next to nothing about how bitcoin works.
Posted on 2/11/26 at 9:53 am to Bunkie7672
quote:
drug kingpins like Ross Ulbricht
It was not Crypto. Watched an interesting video on it once. The AI synopsis
How Investigators Found Ross Ulbricht
1. Early “Silk Road” Mentions Tied to His Personal Email
In 2011, when Silk Road first appeared, a user calling himself “altoid” promoted the site on several forums (like BitcoinTalk and StackOverflow).
Investigators later discovered:
“altoid” once posted a request for an “IT pro” and accidentally included rossulbricht@gmail.com.
The writing style of “altoid” matched early Silk Road posts.
That was one of the first links between Ulbricht and the marketplace.
2. The “Frosty” / StackOverflow Slip
Ulbricht asked a technical question on StackOverflow under his real name, then edited the post to change the username to “frosty.”
Investigators recovered the original version showing:
His real name used for a question related to Tor and server configuration
Similar technical concerns to those used to run Silk Road
This established another digital breadcrumb.
3. Tracing Server Behavior (Not “hacking”)
Investigators monitored Silk Road’s login page and discovered patterns that allowed them to find the location of the server hosting the site (in Iceland).
They then used legal processes to obtain server data from the hosting provider.
The data strongly pointed to the administrator known as “Dread Pirate Roberts.”
4. Cryptocurrency Was Not the Main Clue
Contrary to popular belief, blockchain forensics weren’t the key in initially finding him. They played a later role, but the real discoveries came from:
Forum posts
Email connections
Traffic patterns
Physical surveillance
5. Physical Surveillance in San Francisco
Once they believed Ulbricht was likely the administrator, agents began tracking him:
They observed him frequently using his laptop in libraries.
They believed he kept the Silk Road admin panel open at all times.
On October 1, 2013, at the Glen Park Library, undercover agents staged a distraction and grabbed Ulbricht’s laptop while it was unlocked, preserving evidence that he was logged in as Silk Road’s administrator.
In Short
Ross Ulbricht was discovered because of operational mistakes he made years earlier, which investigators carefully pieced together over time—combined with surveillance and standard investigative techniques.
Posted on 2/11/26 at 10:02 am to LordSaintly
I think people misconstrue wallets and exchanges.
Posted on 2/11/26 at 2:08 pm to DarthRebel
quote:
It was not Crypto.
The IRS was onto him since the early mt gox days. They weren't after him for the silkroad offenses, but they were the first feds to have his actual name in their investigation. Dude was colossal litany of errors, but the worst was probably saving his chat logs and IDs of staff
Popular
Back to top


0







