zlacker

[parent] [thread] 5 comments
1. not2b+(OP)[view] [source] 2022-02-08 17:59:32
The (alleged) criminal only has to make one mistake to get caught, if the pursuers are good. Steal enough money and the best pursuers will be assigned to catch the perp.
replies(2): >>Alexan+92 >>paulpa+i2
2. Alexan+92[view] [source] 2022-02-08 18:08:47
>>not2b+(OP)
Agreed. But the (alleged) criminal kept private keys on cloud AND used weak encryption. These are extremely silly mistakes.

They could have used bitwarden (or a password manager) and they would be good to go.

Also the best pursuers needs 6 years (2022 - 2016) to catch them. Plenty of time for the perps to take a lot of measures.

replies(1): >>nether+9K1
3. paulpa+i2[view] [source] 2022-02-08 18:09:18
>>not2b+(OP)
John Ruffo who stole $300 million still at large after 20 years
replies(2): >>aksss+b5 >>axiosg+lL
◧◩
4. aksss+b5[view] [source] [discussion] 2022-02-08 18:20:26
>>paulpa+i2
https://en.m.wikipedia.org/wiki/John_Ruffo

$25,000 bounty seems pretty small, considering.

◧◩
5. axiosg+lL[view] [source] [discussion] 2022-02-08 21:19:03
>>paulpa+i2
might be dead by now?
◧◩
6. nether+9K1[view] [source] [discussion] 2022-02-09 03:59:20
>>Alexan+92
I don’t think Bitwarden would be helpful. You still need to protect your master password and the company is still subject to the will of law enforcement.
[go to top]