Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 2 3 [4] 5 6 ... 208
46
Off topic / Re: Hey, come chat with us!
« on: September 20, 2013, 02:47 am »
OP updated.

47
Security / Re: F.B.I Admit Taking Down Tor
« on: September 20, 2013, 01:30 am »
It's weird though. You'd think that if the FBI got the "largest facilitator of child porn on the planet", they'd publish a press release. LE is all about PR. Like that methylone bust, Farmers Market, and thousands of others.

Maybe they are waiting until his extradition is guaranteed.

48
Security / Re: F.B.I Admit Taking Down Tor
« on: September 20, 2013, 01:19 am »
Oh, he said Tor, that's even more retarded.

49
Security / Re: F.B.I Admit Taking Down Tor
« on: September 20, 2013, 01:19 am »
An FBI agent made some statements during Eric Marques's hearing on September 12 which the media spun into the FBI "admitting" to taking down FH.

This whole fiasco shows how the media plays telephone with news stories. The only reliable source of info is the Irish Independent reporter who was in the courtroom. Everything else is a retelling on top of an interpretation on top of a retelling.

Presumably anything inside direct quotes has not been botched, and so far nobody has attributed "Freedom Hosting" to direct quotes coming from an FBI agent's mouth, so they haven't quite admitted it yet. Although it's probably true.

50
Security / Re: Practice using PGP here
« on: September 19, 2013, 04:53 pm »
And the original PGP Club right here in this subforum:

http://dkn255hz262ypmii.onion/index.php?topic=30938.msg347557#msg347557

51
Silk Road discussion / Re: Looks like a potential scam????
« on: September 19, 2013, 01:58 pm »
gpg: Signature made Sat 04 May 2013 09:19:18 AM GMT using RSA key ID 67B7FA25
gpg: BAD signature from "Silk Road <staff@silkroadmarket.org>"

The sig was copied from a post made on May 4.

It's funny how scammers go out of their way to include proof of their scam, knowing that 99% of their targets won't check the signature.



52
Security / Re: Opening files
« on: September 19, 2013, 01:28 pm »
Remember a few months ago when someone was sending PMs to people, claiming they had video of them pulling drugs out of their mailbox, and posting a link to a video site? The site had a Java applet that installed a trojan downloader. I was able to examine that malware in a disposable WinXP VM running behind the Whonix Gateway without compromising my computer.

53
Security / Re: Opening files
« on: September 19, 2013, 01:25 pm »
You should use a disposable VM to view untrusted files. Simply disconnecting your computer from the internet prevents a malicious file from phoning home and revealing your IP address to an adversary, but that file could be malware that infects your computer and phones home later. It could also get your MAC address (like the FH exploit did) or hardware serial numbers. A disposable VM with no networking protects against all these things, because it uses virtual hardware with fake MAC addresses and serial numbers. Install a Linux distro, which on its own will protect against 99% of malware, and if you think the file is malicious or has infected the guest OS, destroy the VM and the malware is gone.

There is still a threat from malware that can break out of VMs, but you're increasing the difficulty a lot compared to the common malware that we see. A Linux VM running over Tor would have provided multiple layers of protection against the FH exploit, for example.

54
Security / Re: help with PGP`
« on: September 19, 2013, 03:21 am »
whats wrong with GPG4WIN?

It's more buggy than GPG4USB. The tutorial that I wrote almost a year ago is actually here now: http://dkn255hz262ypmii.onion/index.php?topic=206998.msg1487769#msg1487769

55
Security / Re: Tails .20.1 Release
« on: September 18, 2013, 08:59 pm »
Which exit node injected a different cert? That should be reported.

56
Security / Re: Tails .20.1 Release
« on: September 18, 2013, 08:55 pm »
nightly.tails.boum.org is a different server (or IP address at least) from tails.boum.org. The cert that I get over Tor is also for www.lizard, serial numbers starts with 00:92:34.

You might have been MITMed, but it's still a self-signed cert for that server, which is the error most people will see. Weirdly, it asks for authorization over HTTPS but not over HTTP.

They should upload a PGP signature and then it wouldn't matter.

57
Security / Re: completely removing tor from computer
« on: September 18, 2013, 03:44 pm »
If you think someone is going to perform a forensic analysis of your hard drive, you should DBAN it. Tor can leave all kinds of subtle traces that you may not be aware of: http://dkn255hz262ypmii.onion/index.php?topic=148291.msg1152452#msg1152452

They will still know that you wiped your hard drive.

58
Security / Re: Tails .20.1 Release
« on: September 18, 2013, 03:30 pm »
Hah, I tried https:// over Tor and was promptly MITM attacked with a fake cert. Guess download these clearnet, or ask on their IRC channel if torrents are available for nightlies, probably are.

It's not an MITM attack, just a self-signed certificate. You can verify by changing identities and seeing that it's the same certificate serial and fingerprints no matter which exit node you use.

59
Security / Re: TOR and its recent issues (and impact on SR)
« on: September 18, 2013, 03:21 pm »
How does the Tor version affect a TAILS user? I can't even find what version I'm running. Will it automatically be updated in the next version of TAILS?

You can find the version by opening a terminal and running "apt-cache policy tor". I get 0.2.3.25. That will slow down your Tor use. Whonix suffers from the same problem. It hasn't bee updated in 6 months though.

They should upgrade to 0.2.4 in the next version of Tails.

60
hmmm, apparently there was a 23.0.1, probably an important security fix for 23, that came about 2 weeks after version 23, but they are on a 6 week release cycle, and no minor versions come out after the next major version. You can see it in their release history:

https://ftp.mozilla.org/pub/mozilla.org/firefox/releases/

There was a 19.0.1 and 19.0.2, but no more versions of 19 came out after 20 came out. 20 was the next version and got all the security fixes. 24 got all the security fixes for 23(.0.1).

You can also see it in their release notes from today. They say to upgrade to 24 or 17.0.9 ESR. Those are the only versions getting security fixes. There won't be a 23.0.2.

Pages: 1 2 3 [4] 5 6 ... 208