Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 27 28 [29] 30 31 ... 208
421
It seems like this is a huge market opportunity for some tech oriented person.

It's also a huge risk. This is why noone else has really picked up the slack in regards to .onion hosting.

You hit the nail on the head. Unless there is a big financial incentive in it, who wants to risk decades in prison because idiots upload millions of CP images to their free image hosting site and the admin is incapable of controlling it?


422
Security / Re: TOR friendly email providers?
« on: August 07, 2013, 06:52 pm »
Turns out Tormail was no safer from LE than safe-mail.net.

This is why I've always argued it doesn't matter which clearnet email provider you use, as long as you encrypt every email.

They can still get metadata about who you communicated with, and sometimes in aggregate that metadata can tell a story, but that will always be a risk as long as we are using email.

423
Off topic / Re: is Hack BB website down for good?
« on: August 07, 2013, 06:48 pm »
Yes, it was hosted on FH, so it's gone unless the admins don't get busted and decide to recreate it somewhere else.

That site was heavily watched by the FBI. I have heard of someone who used a username on that site that they linked to his clearnet identity (not much of a hacker, I guess), and the FBI paid him a visit. This was before the FH fiasco and unrelated to it. I'm just saying, the feds were all over that site.

424
Silk Road discussion / Re: SIMPLE NEW IMAGE UPLOADING SITE
« on: August 07, 2013, 06:44 pm »
This was posted 7 months ago and the site is down anyway. It was probably hosted on FH.

Move along. :)

425
Silk Road discussion / Re: Security warning and advisory
« on: August 07, 2013, 06:36 pm »
Yes the address was in plain text. I will NEVER make that mistake again. But luckily the order I made was very small it could pass as a user ordering stuff for personal use.

And luckily the package arrived without and problem. That I know of yet. It was to a drop address I never order to my house.

As for the old emails on there I did not get a chance to delete them a full month before the indecent but luckily there was talk of only a couple transactions. They have one small transaction. And talk of a few hundred g's from a past transaction.

Now considering that what do they have on me? If anything?

What would they be able to do with that information?   

We're still not 100% sure that the server is in the hands of LE. They could have injected an exploit without taking physical control of the server, but the fact that the server was offline for a couple of days before coming back online with the exploit, and this happened after the presumptive admin was arrested, is pretty good evidence that LE had physical control of the server.

For security reasons, we should operate under the assumption that they have physical control of the FH server, including the Tormail email database. That hard drive has a massive trove of data for them to sift through. Besides all the CP, there must have been tens of thousands of Tormail accounts, and potentially millions of emails. They will likely prioritize the biggest targets: major CP and drug distributors.

If I was tasked with sifting through the data, I'd go through the list of SR vendors, starting with the highest percentage rank, and see if they have Tormail addresses. Conveniently, StExo's archives are on that hard drive with all vendor profiles, so they don't have to crawl the SR server. Email addresses will be listed in the profiles or their PGP keys. About half of SR vendors had Tormail addresses, so they wouldn't be hard to find.

That may not be how LE sifts through the data, but it seems logical to me, so if I was a top SR vendor, I would be extremely cautious right now, if I had a Tormail account with unencrypted emails in it.

As for you, it could take months to years, or possibly never, before they get around to reading your emails, but to err on the side of safety, I would never use that shipping address, and probably never use that Chinese source again. Consider them both watched.

426
I'm rather nooby but I'm pretty sure you'd just encrypt the body of a message.  In order to encrypt your password, you'd need a public key from the provider...  It's a cool idea.

These are really two separate questions. A service provider could replace passwords by requiring you to upload a public key and encrypting a one time code to it, which you decrypt and give back to the service to log in. This would stop the insane amounts of phishing we see in onionland dead in its tracks, because the only way to compromise an account would be to steal a user's private key.

The reason it hasn't been more widely adopted is because it creates a huge barrier to adoption of the service. Something like 80% of SR users don't use PGP. If SR switched to this more secure system, it would be massive head aches and a massive user exodus.

But the vast majority of email providers don't offer this feature anyway. You only need to encrypt the body of your message.

Quote
My question is:  considering thousands of people use the exact same password all over the web I would assume that le wouldn't really look at that.  But what if several TORmail accts have the same obscure, rather complex passphrase?  Would le be able to put 2 and 2 together?  Do you guys know if the LEOs that have the TORmail severs would be able to see users' login info?

Why does LE need the account passwords if they have the hard drive in their possession and can read unencrypted emails right off the disk?

427
Silk Road discussion / Re: Security warning and advisory
« on: August 07, 2013, 08:17 am »
Are there any other precautions that need to be taken?

The best thing you can do for your security is switch to Tails or Whonix. There are other ways a browser can be exploited besides JavaScript, and the next payload that LE delivers may target Linux and OS X as well, but at least with Tails, if you are not running as root, it would be more difficult to bypass Tor.

Whonix is even more secure than Tails, because bypassing Tor requires breaking out of the VM, and I haven't heard of an exploit for that in the last few years, although there have been privilege escalation exploits to gain root access on Linux (which would affect Tails). The downside is the VMs obviously exist on your hard drive so it's not a "leave no trace" solution like Tails, and the Workstation VM does not have disk encryption out of the box, so you'd have to store it in an encrypted volume yourself, or install a custom OS with full disk encryption of the virtual hard disk. So making it safer in that regard is more difficult. Tails is more of a plug-n-play solution.

428
I don't have this philosophy of feudal security, and not everybody reading these forums is totally clueless. Said random newbs can now research how to build lighttpd, or gentoo.

You are clearly new here and have a poorly calibrated sense of their competence. People have a hard enough time with extremely basic things like getting NoScript turned on, let alone getting Tails setup. If you stick around, you will see in time how ridiculous this suggestion is.

They are a tiny minority of people here who can do this, but they already know how.

Quote
I think offering feudal security services like Tormail and FH are far more dangerous. Those were centralized law enforcement magnets that drew the ire of the FBI and their sophisticated heap spraying decloaking payload delivery due to being a highly illegal CP distribution network. I bet if every recommendation for Tormail here to the totally clueless was also followed by "btw: server is full of CP" nobody would've used it. I would rather set up my own tiny hidden service that doesn't attract FBI 0day poorly over tor than use an email service or space on a server that's hosting CP, attracting all the resources of federal LE which ends up with my MAC, IP and hostname (and all my emails) stolen and added to a list beside sex offenders. Information is never bad

I agree that services need to be decentralized, but that should happen through frameworks that are developed by competent individuals. I'm not saying Torchat and Bitmessage are safe, but they are examples of what I'd like to see in more secure forms. I have mentioned before that I'd love to see a Qubes Server Edition, which would be an out of the box solution for VM isolated servers, like a Whonix version of hidden services. It would be developed by security professionals and could be rolled out by a larger number of users. However, telling people to run and harden their own hidden services is extremely dangerous.

If everyone was running their own hidden service, a lot of people would have been pwned a lot sooner than this FH bust. If those pedo sites had been individually run by their administrators, some of them would have been taken down much longer ago. Same goes for vendors who would have hosted their own drug sites.

BTW, the reason so many people may have been pwned by the FH exploit is they didn't know to disable JavaScript and update their browser bundle in a timely manner, but you expect them to run hidden services. Think about it.



429
Off topic / Re: I'm Just Gonna Pull The Trigger
« on: August 07, 2013, 05:49 am »
He wrote a similar all caps rant in the Security forum about how he's been trying to figure out PGP for months and still doesn't understand it. He's clearly not cut out for the darknets.

430
comsec, we need to have a talk.

You are a smart guy, but I've noticed a pattern with you, that you vastly overestimate the competence of the average SR user. I'm not knocking them, not everyone can be a tech expert. Weeks ago you recommended against using Tails, when it's pretty much the safest out of the box way random newbs who know nothing about technology can use Tor. Instead you recommended rolling your own hardened Gentoo build. Now you are recommending to random newbs that they should run a hidden service, when they've probably never worked with a web hosting provider, much less configured a web server or a Tor client, especially to security harden it.

People here need advice that makes them safe at the level of knowledge that they have. They shouldn't be persuaded into getting way over their heads, because it's going to get them in a lot of trouble.

431
I setup a hidden service for image hosting a few days ago. It had security features to prevent IP leaks and entry guard identification, though I won't mention the specific features for obvious security reasons. I still took it down though. Honestly, I'm not comfortable running a hidden service until we find out how Marques was identified. I also don't have the resources to host the entire Tor or even SR community's images if it became the default image host. I also don't have the time or energy to police it for the massive amounts of CP it would get if it became the default image host.

Most people here are not technically savvy enough to run their own hidden services safely. Honestly comsec, it's a bad idea to suggest it to random people. They are going to get themselves into trouble. However, there are technically savvy users here who could consult anyone who has the resources to take on the challenge of running (potentially large) hidden services.

432
Silk Road discussion / Re: Security warning and advisory
« on: August 07, 2013, 04:54 am »
i'm getting confused. is it advised to enable the 's' icon in tor so forbid scripts globally is selected (eg there's a red cross through the icon)

It is advised to click the option that says Forbid scripts (as in JavaScript) globally. That should be pretty obvious.

And yes, then there will be a circle with a bar through, the universal symbol for "no", on top of an S, the symbol in this case used for "scripts". :)

433
Five fucking years? I quit!

Just kidding, but we can't get any good news this week, can we? :)

434
Thank God you answered it, because I'm fucking tired of answering this question. :)

Nobody bothers to read or search the forum before posting. There are like a hundred threads about VPNs, which is why I'm fucking tired of talking about VPNs too. They aren't safe. End of discussion.

435
Security / Re: Short and simple: how to prevent future hacks.
« on: August 07, 2013, 03:49 am »
Devils advocate here, I should know more but what if my anonymous vpn provider did by acident have logs then all LE would have is a list of everyone sharing the same VPN node as that time.
Hypothetically there is 50 users online sharing my node right now, Does LE then have to bust all 50 or take their investigation form there or can they just see who viewed what.

That depends on the level of logging they are doing. LE could ask them to log source and destination IP addresses, then they look at who sent requests to LE's server.

Pages: 1 ... 27 28 [29] 30 31 ... 208