Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 37 38 [39] 40 41 ... 208
571
Newbie discussion / Re: Windows 8 issue
« on: July 25, 2013, 07:21 am »
Are there any error messages when you go to onion icon -> Message Log -> Advanced?

Turn on the Info level messages by clicking Settings. A panel will pop up at the bottom. Check "Info", change Message Log History to 500, and click Save Settings.

Then try to access SR. What error messages does it show? Paste them here.

572
Newbie discussion / Re: noob OS Security questions
« on: July 25, 2013, 07:16 am »
I should also point out that Tor Browser doesn't cache your browsing activity, but if you save bookmarks or maintain a text file with passwords, then you should definitely put that stuff on an encrypted thumb drive, or switch to using Tails with a persistent volume.

573
Newbie discussion / Re: noob OS Security questions
« on: July 25, 2013, 07:15 am »
I plan on ordering bitcoins directly (cash in mail) from SR vendors, so there will be no clearnet browsing.

Be extremely careful about ordering bitcoins from SR vendors. There are a lot of scammers.

574
Newbie discussion / Re: noob OS Security questions
« on: July 25, 2013, 07:14 am »
If you plan to order larger than personal amounts, which could get you a controlled delivery, then you don't want evidence on your computer of your SR activities. At a minimum you should put Tor Browser Bundle and your PGP program on a Truecrypt encrypted thumb drive. GPG4USB is a great portable PGP program that you can run from a thumb drive (or anywhere, really). Check the link in my signature for a tutorial on how to use it.

Your ISP doesn't know what you're browsing over Tor, but they can tell that you are using Tor. This isn't a problem generally, because millions of people use Tor for many reasons, so simply using Tor isn't evidence of a specific crime. However, if you want to hide your Tor use from your ISP anyway, you can use bridges. Look through the Security forum to find out how to do that. You can also use a VPN in combination with Tor, or even a VPN + bridges.




575
Relays and bridges are run by volunteers, not by the Tor Project developers. Any of them could theoretically be run by malicious operators. There's a lot of research analyzing potential attacks based on this assumption. You're not 100% safe using Tor, you're just a lot safer than when you connect over clearnet or other anonymity networks (while still getting certain functionality). The whole point of entry guards is to minimize the threat of picking malicious nodes. The reason I strongly suggest using bridges as persistent entry guards with Tails rather than rotating guards with each session is to minimize the threat of picking malicious nodes. Using 2 bridges instead of 10, when 2 is all you need anyway, also minimizes the threat of picking malicious nodes.

576
If there are any malicious bridges, using 10 instead of 2 increases the chances that you pick a malicious one by 5 fold.

577
Whenever i try to boot from the usb, the laptop will just ignore the boot order and boot into Windows anyway! This seems to be the case no matter what i do, accept if i make the hdd first boot priority, and then, when booting, hit F12 and manually select the usb (so I am bypassing the hdd entirely in the boot order?). In this case it will just say that there are no operating system found!

In my attempt at fault finding, i have discovered that windows seem to create an error message whenever i try to boot from usb but it boots windows instead. This error message goes something along the lines of "ACPI BIOS Is Attempting to Create an Illegal Memory OpRegion starting at 0x0", and while i have been trying to seek for solutions, I cant seem to find any that is applicable for my situation (most recommend updating BIOS, but i am already at the newest version).

I doubt anyone here has encountered this problem or knows how to solve it, but by Googling the error message I found this:

http://support.microsoft.com/kb/330054

Microsoft recommends contacting the BIOS manufacturer for a possible update.

578
TAILS having amnesia doesnt save my wifi password so it doesnt sign in until i do. therefore if i write down say 10 bridges and put them in the same order everytime before signing into the wifi and im using tails. i got around the rotating issue and then i can start using tails at home correct?

Sounds good, except 10 is too many. If you know they work, use 2 or 3.

579
There's a 30 page thread where people debate the merits of his MDMA guide and not one non-expert claims to have successfully synthed anything.

BTW, does that guide you're talking about include pictures and it creates 3 grams at the end? Because you can find that on the internet for free.

580
Silk Road discussion / Re: twitter
« on: July 24, 2013, 08:06 pm »
I'm convinced now that using exit node IPs or changing IPs frequently will get an account suspended, because I've tweeted nothing, messaged no one, and my account was suspended again. So in the case of DPR, it may not have been trolls flagging the account or anything.

581
Silk Road discussion / Re: twitter
« on: July 24, 2013, 07:05 pm »
haha, they did the same thing to me. I created a Twitter account over Tor to see who the followers are, and it was immediately suspended because of "things I tweeted", which of course I hadn't tweeted anything yet. I got it unsuspended by filling out a captcha. Nice system there.

DPR's followers are entertaining, as expected. Atlantis Marketplace, Patrick O'Neill (the Weirder Web guy), Nicolas Christin (the researcher who published that paper), All Things Vice (OzFreelancer), the CRO of F-Secure, even Zooko, the Tahoe-LAFS guy and author of Zooko's Triangle. It's a who's who of the darknet and the people who follow it.

Also some random hot chick. DPR, you would have so many groupies if you weren't anon.

582
Security / Re: Anonymously use craigslist
« on: July 24, 2013, 06:55 pm »
Who knows, maybe he didn't use Tor at all. He could be an arrest waiting to happen.

Or he could have used a VPN, or pointed his Tor Browser at a web proxy and used a phone purchased in cash for the verification. But my money is on the first option.

583
Philosophy, Economics and Justice / Warrant canary against NSLs
« on: July 24, 2013, 10:18 am »
This is a brilliant idea I just stumbled across. The US government believes it can suppress its crimes through the force of law, but by publishing a weekly statement, a service provider can prove that they have received an NSL because they can no longer publish that statement.

http://www.rsync.net/resources/notices/canary.txt

They can force you not to disclose an NSL, but they can't force you publish a false statement.

Fuck them. :)

I have also heard that if Google gets an NSL, on your next login they force you to accept their terms of service again, which is a wink-wink way to tell you that they have been served an NSL. Just a heads up if you have a Google account. I do believe they are on the right side, but as a major corporation they are strangled by the law.

584
Off topic / Re: How to become a Hero Member?
« on: July 24, 2013, 09:49 am »
These categories are the defaults for a forum where people have a certain distribution of posts. On this forum, there are a lot people with 500+ posts now. They should add categories for 1000, 1500, 2000, 2500, and 3000 posts. Get creative with it. :)

585
How would exit node sniffing help SR, when it's a hidden service that doesn't involve exit nodes?

Perhaps studying fingerprinting attacks at entry nodes, or brute forcing hidden service directories, might help SR and its users, but I don't understand how your suggestion would be helpful.

Pages: 1 ... 37 38 [39] 40 41 ... 208