Of Course Shutting Down Silk Road Will Not Deter the Black Market in the Slightest

The infamous online black market Silk Road was shut down by authorities at the beginning of the month and its alleged mastermind, Ross William Ulbricht, arrested.
While the feds actions have disrupted trade momentarily, the black market is already rebounding. Mashable tracked down one of their major vendors and found they've already figured out new ways to sell their THC lollipops:
Angelina was a vendor on Silk Road, which the FBI described as the Internet's largest "sprawling black market bazaar" after the agency seized the website and arrested its alleged owner earlier this month. Though we refer to Angelina as a female, in reality she's a highly secretive team of people who use sophisticated anonymizing technology to maintain a booming online drug business.
We communicated with Angelina through a series of encrypted messages before the fall of Silk Road, and she said her business runs "like a small Internet retailer/packing and shipping company." A couple weeks after the site closed, we reconnected with Angelina on Silk Road's forums, which are still up and running.
"The shutdown of Silk Road and the instantaneous rise of several new sites has taught us that the market is an idea, not a particular web address," Angelina wrote. "It doesn't matter who, or where or how exactly — as long as there are buyers there will be sellers."
"Angelina" has moved on to two other sites to sell her THC-infused suckers. Mashable notes the volume of customers is much lower than Silk Road, but no doubt they will certainly grow now.
Read the whole story here.
Follow this story and more at Reason 24/7.
Spice up your blog or Website with Reason 24/7 news and Reason articles. You can get the widgets here. If you have a story that would be of interest to Reason's readers please let us know by emailing the 24/7 crew at 24_7@reason.com, or tweet us stories at @reason247.
Editor's Note: As of February 29, 2024, commenting privileges on reason.com posts are limited to Reason Plus subscribers. Past commenters are grandfathered in for a temporary period. Subscribe here to preserve your ability to comment. Your Reason Plus subscription also gives you an ad-free version of reason.com, along with full access to the digital edition and archives of Reason magazine. We request that comments be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of reason.com or Reason Foundation. We reserve the right to delete any comment and ban commenters for any reason at any time. Comments may only be edited within 5 minutes of posting. Report abuses.
Please
to post comments
This tells me that authorities haven't expended enough resources on this yet. They must redouble their efforts.
And redouble they will.
Bez Carefulz BlackMarket Reloaded...
Sorry, links for the curious:
http://www.newscientist.com/ar.....owers.html
Some of these people interviewed have no clue what they are talking about.
Hilariously ignorant. The fact that he needed help in development of the site showed he wasn't a top tier programmer, and it's highly possible he used insecure code.
They also could have found the location of the server once they made a subpoena for his gmail address, by simply reading his email. Derp.
I should have added, doing any of the things the ignoramus "security researcher" mentions in the paragraph I quoted could have easily been done from a remote intrusion.
lol, one shuts down, nine more open lol.
http://www.AnonBliss.tk