Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 17 18 [19] 20 21 ... 208
271
Off topic / Re: Hero member
« on: August 18, 2013, 09:58 am »
It's happened on several occasions. Adrien Chen quoted SR forum members in some his Gawker articles, and there was this:

http://www.forbes.com/sites/andygreenberg/2013/04/16/founder-of-drug-site-silk-road-says-bitcoin-booms-and-busts-wont-kill-his-black-market/

272
Off topic / Re: Hero member
« on: August 18, 2013, 07:40 am »
Saving someone's life is a requirement?

Why else would you be called a hero?

273
A Second Life hidden service. Now that would be an interesting use of Tor. I have no idea if it would be secure.

Is there any open source software that does the same thing as Second Life?


274
Off topic / Re: Hero member
« on: August 18, 2013, 05:51 am »
500 posts and you have to save someone from dying of a drug overdose. Then you get hero status.

275
Feature requests / Re: Feature Request: Buyer Page
« on: August 18, 2013, 05:05 am »
often i have vendors send me messages out of the blue, and i've even had vendors send me DCN's unrequested, in plain text. I want a vendor to see my page, see that i take encryption seriously, and save my key before he even thinks about sending me a message.

Tracking numbers are an issue that nobody seems to be talking about except me. I've brought it up a few times. It's pointless to encrypt your address if the vendor sends you a plaintext tracking number in an SR message. In fact, it's much worse, because addresses are deleted from the server when the order is marked in transit, but SR messages are stored on the server for 3 months, even after you delete them.

You can include a statement along with your encrypted address to tell the vendor not to send a tracking number, but they might forget or not care or confuse your request with another customers and send it anyway. Ultimately vendors should just stop doing it. You only need a tracking number if the product didn't arrive, and vendors will save time by not messaging everyone with their tracking numbers.

276
Wait, what drug user does not already have this movie as well as the movie "Waking Life" already downloaded or purchased?

And Requiem for a Dream!

I agree with the poster above that an easy way around this would be to find a DVD copy for a couple bucks and pay in cash. Problem solved.

277
Security / Re: Let's talk about security
« on: August 18, 2013, 03:28 am »
LOL, thanks. If you have any questions, don't be afraid to ask.

278
Philosophy, Economics and Justice / Re: Bitcoin banned in Thailand
« on: August 18, 2013, 02:12 am »
It is easy to outlaw gold, but bitcoins are not to stop. Tails leaves no traces and a sd-card is small. You can make a law against the bitcoin, but you can not maintain that law.

They can't completely stop the use of bitcoin, just as a century of drug laws hasn't stopped the use of drugs, but they can make bitcoins difficult to obtain. You would have to buy them surreptitiously and risk going to jail, just like with drugs. That would put a lot of people off from using bitcoins.

279
Security / Re: noob wants to learn pgp
« on: August 18, 2013, 01:56 am »
The tutorial is temporarily up here:  http://nfm5tbykjg6oijbm.onion/gpg4usb/

The zip file is here: http://nfm5tbykjg6oijbm.onion/gpg4usb/gpg4usb.zip

Grab it while you can. :)

280
Security / Re: Let's talk about security
« on: August 18, 2013, 01:53 am »
Weird, I was reading that page the other day and had the same thought.  If there are gazillons of dollars being made by hidden service providers (SR, etc), it's odd that nobody's funding one of their key ingredients.   Either they don't view it as a significant risk or they can't fund it in a clandestine enough manner.

I suspect it's the latter. The FBI would very interested in someone who gave the Tor Project $100,000 to fund improvement of the hidden service protocol. They have anonymous sponsors, but only in the sense that they are not publicly known. The IRS certainly knows who they are, and the FBI could if they wanted to find out.

You can build your own defenses, of course. At the network layer, you could use persistent entry guards by way of private bridges. Even better would be layered entry guards, or layers of proxies before you get to your entry guards. You could even calculate the descriptor IDs in advance and run relays on anonymous VPSes with identity keys whose hashes closely match the descriptor IDs, so you would always be publishing your hidden service descriptor to service directories that are under your control.

At the application layer, you can harden your software and isolate it in VMs. I'm learning a lot about Xen at the moment, and I plan on experimenting with VM isolated LEMP stacks. :)

281
Security / Re: noob wants to learn pgp
« on: August 18, 2013, 12:41 am »
Astor's PGP tutorial is still the best one out there.

http://32yehzkk7jflf6r2.onion/gpg4usb/

That was hosted on Freedom Hosting and it's gone. If anyone wants to host the tutorial, I can give you a zip file with the HTML and images.

282
Security / Re: One way LE could potentially nab a vendor
« on: August 18, 2013, 12:38 am »
Like a lot of the LE attacks that we theorize about, this one is possible but expensive.

If localbitcoin transactions become more popular, I think we will see stings, especially on people who violate financial regulations, like the FinCEN limit of selling $1000 of BTC a day without a license. Some of those investigations could include drug dealing with BTC.

283
Security / Re: Let's talk about security
« on: August 18, 2013, 12:30 am »
Here's another thought.

Why not use tor to connect to a remote shell sponsored by PRQ (clearnet: http://en.wikipedia.org/wiki/PRQ (http://en.wikipedia.org/wiki/PRQ) )

Then connect to your drug dealing site.  You can subscribe to PRQ anonymously and pay with bitcoin...

I don't think the DEA or the FBI could get access to their logs and the Swedish courts have more important things to worry about.

One of the Tor developers draws the distinction between "privacy by design" and "privacy by policy". Tor gives you privacy by design. It's difficult for someone to know who you are and what you are doing, because of the design of the network. VPN provides offer privacy by policy. They "promise" not to log what you are doing. You have no way to verify their claim, they could change their minds, or they could be compelled by their authorities to start logging.

What you seem to be promoting is privacy by red tape. :)

Julian Assange is not confident in the Swedish government's ability to resist the US government's demands, so I don't know if I would base my safety on that.

284
Security / Re: Let's talk about security
« on: August 18, 2013, 12:21 am »
Thought about this some more.  Assuming you're talking about identifying users accessing hidden services, the key is the attackers' ability to successfully deanonymize the hidden service.   They have to be able to monitor the traffic going to the hidden service to correlate it with monitored user guard node traffic.

And if they can deanonymize the hidden service (AND intercept traffic directly to it for correlation) they'd just be choosing not to bring it down in order to perform traffic analysis.  Or they'd perform that analysis while they were waiting to bring it down.   I think I'm finally understanding your theory about the FH attack.

It's a fairly difficult scenario, though.  They'd need to be able to monitor the traffic to the hidden service, but not be able to bring it down.

Most of the attacks on the Tor network that I've heard about involve surveillance at the edges. You have to run one of your target's entry nodes, and then you can pursue several different attacks.

There are more complex attacks, like brute forcing a relay identity key so it is close to the descriptor ID, so you can become a service directory for the hidden service. That's what Donncha did and it allowed him to count the number of descriptor fetches for Silk Road and other hidden services. That's how we know that Silk Road is about 100 times more popular than Atlantis, because it got 100 times as many descriptor fetches in the 24 hours that Donncha counted them. ;)

If you run the service directory, you still need to become an entry node for your targets. Tor clients keep entry nodes for a month and semi-randomly select new ones. That's why most of these attacks are statistical in nature. They depend on randomly being selected by the target. They are expensive and time consuming if you have a specific target in mind, like a hidden service, but if your target is "all Silk Road users", it's easy to pwn a small random sample of them, because out of tens of thousands of people, some of them will choose your entry guard very quickly.


Quote
The payoff from a LE perspective would depend on the target.   For something like SR, I'm not sure they get any value from long-term traffic analysis if they have the option to just bring it down and calling a press conference

I don't think LE would be satisfied with simply bringing the site down. For one, DPR almost certainly has backups and could redeploy the site elsewhere within hours. They would want first to identity DPR and other admins, and second to identify top vendors. That seemed to be their MO in the FH attack -- to identify as many people visiting CP sites as possible, but more importantly to identify the admins of those sites and perhaps accounts that posted a lot of content (ie, major CP distributors).

Quote
Long-term, the solution is better hidden service anonymization (which is difficult). 

Yes, definitely. The Tor developers had said that hidden services are experimental. They are a proof of concept. Nobody is getting paid right now to improve the hidden service protocol and make it robust against attacks. The Tor developers work on things that people pay them to work on. They have sponsors who give them specific deliverables. Mostly they are getting paid to work on things that help people in censored countries. That's why they push for more bridges and they've create the obfsproxy protocol. We need to pool money or find someone with deep pockets to anonymously sponsor hidden service development.  :)

285
Security / Re: Let's talk about security
« on: August 18, 2013, 12:00 am »
I just started playing around with Qubes OS and am quite impressed by it. There's an option for full disk encryption during installation, which I had not realized. Some of the info I read about it were complaints that it didn't have full disk encryption, so those complaints are out of date. You can even install it on a thumb drive and run off that, so you can test your hardware before installing it on the hard drive.

I will probably create a separate thread with a review of Qubes.



Pages: 1 ... 17 18 [19] 20 21 ... 208