SirChiko
Legendary
Offline
Activity: 966
Merit: 1000
|
|
July 12, 2014, 04:24:03 PM |
|
He has to have some kind of script for that it would take him forever otherwise.
|
The only online casino on which i won something. I made 17mBTC from 1mBTC in like 15 minutes. This is not paid AD!
|
|
|
|
EvilDave
|
|
July 12, 2014, 05:28:36 PM |
|
Looks to me like the hackers only realistic option is to return the BTC.
Sooner or later, he/she/it is going to make a mistake and reveal their identity. When that happens, they are going to become a target for a lot of very unfriendly people. Don't know about the hacker, but I couldn't live my life looking over my shoulder for bad guys 24/7. Settling with Klee to return most of the BTC seems like a much safer option.....
|
|
|
|
jonald_fyookball
Legendary
Offline
Activity: 1302
Merit: 1008
Core dev leaves me neg feedback #abuse #political
|
|
July 12, 2014, 05:32:56 PM |
|
I couldn't live my life looking over my shoulder for bad guys 24/7. Settling with Klee to return most of the BTC seems like a much safer option.....
Sadly, that is unlikely to happen. Scammers don't understand karma. Neither on spiritual level (what goes around comes around), nor in practical terms. If they did, they would think twice about scamming. No... the path of the scammer is keep scamming till you get busted. Sad but true.
|
|
|
|
SirChiko
Legendary
Offline
Activity: 966
Merit: 1000
|
|
July 12, 2014, 05:34:04 PM |
|
But this way without mixer it's easy to track anyway so i don't see the point of doing that.
|
The only online casino on which i won something. I made 17mBTC from 1mBTC in like 15 minutes. This is not paid AD!
|
|
|
keithers
Legendary
Offline
Activity: 1456
Merit: 1001
This is the land of wolves now & you're not a wolf
|
|
July 12, 2014, 05:47:30 PM |
|
Do you guys think it would help at all to notify dropbox or what a major security breach this could have been? They could at least get their resources looking into who has logged into his dropbox account over the most recent time...
I'm sure they have a decent IT security team there. The more people working on this the better IMO
|
|
|
|
CIYAM
Legendary
Offline
Activity: 1890
Merit: 1086
Ian Knowles - CIYAM Lead Developer
|
|
July 12, 2014, 05:49:45 PM |
|
You should read up on the Linode hacks that happened a couple of years ago.
There is simply no way that dropbox is going to take any responsibility.
|
|
|
|
SirChiko
Legendary
Offline
Activity: 966
Merit: 1000
|
|
July 12, 2014, 05:51:16 PM |
|
Do you guys think it would help at all to notify dropbox or what a major security breach this could have been? They could at least get their resources looking into who has logged into his dropbox account over the most recent time...
I'm sure they have a decent IT security team there. The more people working on this the better IMO
OP should def. atleast try it atleast it gives more % of chance to find the thief than going with no traces.
|
The only online casino on which i won something. I made 17mBTC from 1mBTC in like 15 minutes. This is not paid AD!
|
|
|
haploid23
Legendary
Offline
Activity: 812
Merit: 1002
|
|
July 12, 2014, 05:54:00 PM |
|
Couldn't the thief just launder the coins bit by bit and get away with it scot-free?
For example: You could just trade some of them for another virtual currency on some random exchange, and then convert what you bought back into BTC, and voila, clean bitcoins. Or use a laundering service. It seems really easy to get around if you're smart?
Actually, the best way to clean the coins is to send them to an exchange, then cash it out to your bank account. Then use all that fiat to buy back the coins on the same exchange. Untraceable
|
|
|
|
Buffer Overflow
Legendary
Offline
Activity: 1652
Merit: 1016
|
|
July 12, 2014, 05:57:01 PM |
|
Wow... that's a freaking theft... The wallet was online I assume?
Electrum - dropbox was compromised (with plain txt for the pwd, I know I know..) Sorry for your loss. Next time use offline armory.
|
|
|
|
The Avenger
|
|
July 12, 2014, 06:16:26 PM |
|
Edit: No, you are right. All his transactions have occured at 02 or 03 seconds. Must be a script.
But this way without mixer it's easy to track anyway so i don't see the point of doing that. It completely pointless isn't it? He seems to have stopped doing it on two of the large amounts now. What do you think? Is he/she trying to show off his scripting skills? Or is the hacker in such a panic he thought this was doing something, but later realised it was pointless? That $300,000 bounty on his head has got to be eating him up. That helicopter over his house. Those sharp-shooters hiding in the trees outside
|
"I am not The Avenger" 1AthxGvreWbkmtTXed6EQfjXMXXdSG7dD6
|
|
|
gelar24
|
|
July 12, 2014, 06:20:03 PM |
|
wow I was surprised how come? -_- if I lose that much weight may have been crazy-_- I pray for you may get back
|
|
|
|
validium
Sr. Member
Offline
Activity: 350
Merit: 250
Decentralized thinking
|
|
July 12, 2014, 06:47:03 PM |
|
But the biggest mistake op made was storing his password in plain text doesn't matter where its stored on an offline computer or on a cloud you should never have your wallet passwords stored in plain text. Tips for other users: use password safe http://passwordsafe.sourceforge.net/ or keepassx http://www.keepassx.org/ -where passwords are stored in an encrypted database.
|
|
|
|
Anon136
Legendary
Offline
Activity: 1722
Merit: 1217
|
|
July 12, 2014, 06:57:05 PM Last edit: July 12, 2014, 07:46:14 PM by Anon136 |
|
Perhaps another approach:
Consider offering a full pardon and a promise to call off the search in exchange for the safe return of your funds while at the same time increasing the bounty to the full 1100 and something bitcoins should he fail to comply with the aforementioned.
|
Rep Thread: https://bitcointalk.org/index.php?topic=381041If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
|
|
|
Buffer Overflow
Legendary
Offline
Activity: 1652
Merit: 1016
|
|
July 12, 2014, 07:24:57 PM |
|
But the biggest mistake op made was storing his password in plain text doesn't matter where its stored on an offline computer or on a cloud you should never have your wallet passwords stored in plain text.
I think you'll find it does. If the private key had been stored offline this thread wouldn't exist.
|
|
|
|
EvilDave
|
|
July 12, 2014, 07:40:45 PM |
|
Perhaps another approach:
Consider offering amnesty and a promise to call off the search in exchange for the safe return of your funds while at the same time increasing the bounty to the full 1100 and something bitcoins that were stolen should he fail to comply with the aforementioned.
That really will bring the bad guys out of the woodwork.....the hacker may also want to think about how the advance of technology is going to make locating assholes like him easier over the next few years. He may be able to hide today, but in a year or 2, will he still be able to? He can't cash out to a bank account and he cant buy anything useful with the BTC without leaving clues to his irl identity, so all he has is a pile of semi-useless BTC and a massive manhunt on his ass. The current 500 BTC bounty is very motivating and provides more than enough cash to finance some very effective action, no matter where in the world the thief might be. Klee just has to keep up the pressure and wait for the mistake. Hope the thieving dipshit is having fun right now.......because it isn't going to last.
|
|
|
|
ElectricMucus
Legendary
Offline
Activity: 1666
Merit: 1057
Marketing manager - GO MP
|
|
July 12, 2014, 07:43:21 PM |
|
I've heard Mark K is thinking about a similar bounty!
|
|
|
|
Anon136
Legendary
Offline
Activity: 1722
Merit: 1217
|
|
July 12, 2014, 07:47:45 PM |
|
Perhaps another approach:
Consider offering amnesty and a promise to call off the search in exchange for the safe return of your funds while at the same time increasing the bounty to the full 1100 and something bitcoins that were stolen should he fail to comply with the aforementioned.
That really will bring the bad guys out of the woodwork.....the hacker may also want to think about how the advance of technology is going to make locating assholes like him easier over the next few years. He may be able to hide today, but in a year or 2, will he still be able to? He can't cash out to a bank account and he cant buy anything useful with the BTC without leaving clues to his irl identity, so all he has is a pile of semi-useless BTC and a massive manhunt on his ass. The current 500 BTC bounty is very motivating and provides more than enough cash to finance some very effective action, no matter where in the world the thief might be. Klee just has to keep up the pressure and wait for the mistake. Hope the thieving dipshit is having fun right now.......because it isn't going to last. What do you think? Just one knee cap or both?
|
Rep Thread: https://bitcointalk.org/index.php?topic=381041If one can not confer upon another a right which he does not himself first possess, by what means does the state derive the right to engage in behaviors from which the public is prohibited?
|
|
|
SirChiko
Legendary
Offline
Activity: 966
Merit: 1000
|
|
July 12, 2014, 07:47:51 PM |
|
They clearly are, as that tree does show the origin county of these adresses and every one of them is different.
|
The only online casino on which i won something. I made 17mBTC from 1mBTC in like 15 minutes. This is not paid AD!
|
|
|
InwardContour
|
|
July 12, 2014, 07:49:56 PM |
|
Couldn't the thief just launder the coins bit by bit and get away with it scot-free?
For example: You could just trade some of them for another virtual currency on some random exchange, and then convert what you bought back into BTC, and voila, clean bitcoins. Or use a laundering service. It seems really easy to get around if you're smart?
Actually, the best way to clean the coins is to send them to an exchange, then cash it out to your bank account. Then use all that fiat to buy back the coins on the same exchange. Untraceable This would actually be very traceable as once it is discovered which exchange the coins were sent to then you could subpoena the exchange to provide the identity of the user who deposited the coins. An exchange would provide only temporary cover to your identity.
|
|
|
|
|