Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 28 29 [30] 31 32 ... 208
436
Silk Road discussion / Re: Security warning and advisory
« on: August 07, 2013, 03:41 am »
Worse part of it is. I tried to get a vendor from China I deal with to start using pgp and they could not grasp the simple concept.

If one is not able to learn PGP, then one should not be transacting on SR.

Those Chinese chemical companies and drug suppliers are not transacting on SR. They are clearnet businesses, sometimes with clearnet web sites, and always with clearnet email addresses. They take fiat currency, not bitcoins. They probably don't know that the people they are selling to are SR vendors or buyers.

That is what makes unencrypted emails to these sources on the Tormail server such a big vulnerability, if it was indeed seized by LE. Sources up the supply chain will be compromised, as well as potentially the vendors who provided shipping addresses in plaintext that can be linked to them.

437
Silk Road discussion / Re: Security warning and advisory
« on: August 07, 2013, 03:37 am »
Make sure Noscript is turned off!

Hold up.  Why in the world would I want to DISABLE NoScript?  Doesn't that prevent java scripts from running?

Yeah, he meant turned on.

438
For fuck's sake, that info has been posted in 30 places on the forum. Read a little.

Also, it's the giant S in the Tor Browser toolbar. Click it and then click Forbid Scripts Globally. Works the same on all operating systems.

439
TorHost has been down for a long time. The only hosting provider I could find with a working link is AnonHosting, although I've never heard of anyone using it. It could be a scam. More importantly, there's no way to purchase an account, since their two contact methods are SimplePM, which is down, and -- you guessed -- Tormail!

Anyway, here's the address: http://wevuysiyescilvc7.onion

440
Security / Re: TOR friendly email providers?
« on: August 07, 2013, 12:45 am »
Java is not JavaScript.

441
Yeah, I have already read posts and heard personally from vendors who admitted to sending plaintext emails to their sources. This isn't just about buyers getting compromised re the BlueGiraffe fiasco, but vendor sources. Some vendors source their drugs from clearnet chemical companies and other suppliers that don't give a fuck about PGP. This has the potential to compromise a lot of shit.

442
Silk Road discussion / Re: Security warning and advisory
« on: August 07, 2013, 12:34 am »
That and I also read , if I understood correctly (I am not too computer savvy) that the feds made some kind of Trojan that will unmask your real ip that I think you get by logging into your tor mail account.

It doesn't depend on you logging into your account. It runs on older versions of the Tor Browser (specifically, Firefox version 17.0 - 17.0.6) on Windows and connects to a command and control server in Virginia that is probably run by the NSA or one of its contractors. Simply visiting a site with the malicious code under those conditions would get your IP address sent to the NSA along with cookies identifying the sites you were visiting.

I'm surprised you haven't read that, because it has been explained throughout the last 10 pages of this thread and on 30 other threads in this forum.

Quote
Worse part of it is. I tried to get a vendor from China I deal with to start using pgp and they could not grasp the simple concept.

So I figured tormail to be my next option.

I had no choice but to order from them through tormail. Then this happen. Luckily I had taken a break from ordering from them for a while before this happen. Once I got back and was ready to order again I had forgot my password. So I had to open a new User name, if they look back it doesnt look like I had much activity, thanks to the fresh account.

Did you send a plaintext shipping address in the old account? Did you delete those emails more than a month ago? If not, they are still on the Tormail server or its back up server, waiting for LE to read them

Quote
Sure enough when I ran a scan of my PC a few Trojans and a few other malicious things where on my PC.

That is likely to be unrelated to the FH exploit, which doesn't persistent on your computer for more than half an hour or until you close Tor Browser. Basically your computer is fucked from other random malware.

Quote
Is there any other thing I am missing?

Oh ya and I am looking into tails as well.

Yeah, it sounds like you should stop using Windows altogether.

443
Security / Re: Short and simple: how to prevent future hacks.
« on: August 06, 2013, 09:03 pm »
Also, a VPN offers zero security if the attacker is LE. Once they root your operating system, phone home to their server, and determine you are accessing the internet from a VPN IP address, they simply subpoena the the provider to get your identity.

Oh, your provider promises they don't log? Right.

I don't want to base my security on a "promise".

444
Security / Re: Short and simple: how to prevent future hacks.
« on: August 06, 2013, 09:00 pm »
I'm really interested to learn about whonix , It sounds like it can be a really good setup but is it that you have to configure routes for different applications and just isn't too user friendly to the noob,

No, everything is transparently proxied over Tor by default. There's no way to disable it from within the Workstation VM.

There is an option for stream isolation, but you don't have to worry about that starting out.

Quote
I'm no genius but am quite a tech person so would be interested to know  for starters how is it better than me running linux in a standard VMware VM with anonymous vpn.

If that VM is rooted, the attacker can bypass Tor. In the Whonix setup, Tor runs in a separate VM, called the Gateway, so the attacker would have to break out of the VM, which seems to be much harder than rooting an operating system, even Linux. I've always heard it's possible, but I've never seen a single article, blog post or security advisory about it happening in the wild.


445
Security / Re: Will TorMail Come Back Online?
« on: August 06, 2013, 08:48 pm »
I hadn't heard of Amped Market. Thanks for the pointer. Glad somebody is working on it. I remember when one of the Bitwasp developers started a thread on this forum over a year ago. Naturally people weren't too excited about a service that renders SR obsolete, but the way I envision it, there will be a need for escrow services in the future.

Here's what I wrote a few months ago: http://dkn255hz262ypmii.onion/index.php?topic=157711.msg1112047#msg1112047

Back on topic: we need something other than email. BitMessage is very insecure, and there aren't too many other decentralized messaging systems.

446
Security / Re: Short and simple: how to prevent future hacks.
« on: August 06, 2013, 07:51 pm »
With Whonix, you run two virtual machines on any operating system on any computer. You don't have to use Tails, and it's more secure than Tails.

However, the reason I took the tutorial down is because I decided newbies shouldn't be running any random OS in the Workstation VM. Yes, it's safer at the network layer in that Tor can't be bypassed, but that's like 20% of what can deanonymize you. Your behavior online can deanonymize you. Leaving unencrypted emails on a server that is seized by LE can deanonymize you. An operating system update that sends your license to Microsoft can deanonymize you. I think random newbs should run the Workstation that Whonix supplies.

https://whonix.org/wiki/Main_Page

447
Off topic / Re: I'm Just Gonna Pull The Trigger
« on: August 06, 2013, 07:46 pm »
You have 78 posts. Nobody knew you existed, but now they do.

448
I don't think Tails can remember an admin password because /etc/passwd is on a read-only system image. You shouldn't generally be running as administrator anyway. If malware used some exploit to gain your user privileges, it would literally root you because you are running as root. It could do anything, like bypass Tor.


449
Security / Re: Computer has slowed down recently...
« on: August 06, 2013, 05:38 pm »
I'm thinking I have a fuckload of viruses. This is a new computer, or was months ago and I was too lazy to get any sort of antivirus program. Can someone recommend me one that I could find online for free? Additionally are there any other ways to increase my computers speed? Thanks a lot guys.

Antivirus programs suck. They are snake oil. I recommend getting a pirated copy of Win7 (you can buy one for a couple bucks off SR), download it to a different computer, not the infected one, burn it to a DVD and do a clean reinstall. It's the only way to be (almost) 100% sure you got rid of all viruses.

Also, stop visiting free pron sites. ;)

450
Security / Re: TOR friendly email providers?
« on: August 06, 2013, 05:35 pm »
A thread about this topic just slipped onto the second page. You gotta dig a little deeper.

http://dkn255hz262ypmii.onion/index.php?topic=196538.0

Pages: 1 ... 28 29 [30] 31 32 ... 208