Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 40 41 [42] 43 44 ... 208
616
For a lot of people, it's a practical issue. The risk of getting pwned by an entry node if you are an end user only visiting hidden services (ie, most people here) is relatively low, since it's never been demonstrated in the wild. The risk of LE finding incriminating evidence on your hard drive or of Windows malware infecting your computer and stealing your logins or other sensitive data are much higher, because we've seen both happen many times. Some people can't do full disk encryption for various reasons, so Tails is a good option.

Plus, you can manually add bridges each time you boot, if you're really worried about it, and that's even better than monthly rotating entry guards.

617
Security / Re: check.torproject.org down?
« on: July 22, 2013, 05:03 pm »
They wrote a blog post about it the last time it went down:

https://blog.torproject.org/blog/tor-check-outage-03-and-04-july-2013

"Over the past 24 hours https://check.torproject.org has been unavailable due to excessive DNS queries to the exitlist service. It seems there are a number of individuals and companies with commercial products relying upon this volunteer service. We finally hit the point where we couldn't keep up with the queries and simply disabled the service.

This is a volunteer service offered as a proof of concept. We strongly encourage people to run their own. The code is available at https://svn.torproject.org/svn/check/trunk/.

The new Tor Browser 3.0 alpha series includes a new way to detect "tor or not" locally, without relying on a single point of failure service. This is the first step towards finally retiring check.torproject.org for good.

As of 09:00 on 04 July 2013, the service is re-enabled. We reserve the right to take it down as needed without notice."


As always, if you're on a hidden service, Tor is working for you. :)

618
Security / Re: Tails & Tor clock accuracy?
« on: July 22, 2013, 03:52 pm »
Tor won't work unless you have an accurate clock, because clients measure how long it takes to build circuits and they will fail to build them if it takes 5 hours or -5 hours, for example. That being said, all Tor clients use UTC and Tails should update the time when it starts, so changing your time zone won't affect that.

However, if you set it to some weird time zone that hardly anybody lives in, like in the middle of the Pacific Ocean, and you use a protocol that leaks time zone, like XMPP, then that can be bad for your anonymity, otherwise it's not a problem.

619
So say you are using Windows, and you have your good files on a TrueCrypt partition, and your secret files inside a hidden partition inside that. Now let's say Windows stupid 'recently used documents' list just happens to show all the files you opened recently from your hidden partition. Wouldn't that be a giveaway to LE if your computer is analyzed?

Yes, it would. I've mentioned this problem repeatedly and it's the reason I recommend against using Truecrypt files. You should use full disk encryption or Tails, which has a persistent volume but there is no unencrypted area to leak data onto, since the root partition is mounted in RAM and it doesn't touch your hard drive.

Quote
Maybe they see some of the files from the normal TrueCrypt partition having been opened in your recent file list. Which is fine, you can give them the password for the normal truecrypt partition. But then when they see other files on some other drive letter that they don't see in the TrueCrypt partition you gave them the password to, it just seems like it will be obvious to them that either (a) you have another USB drive or external storage you did not tell them about, or (b) you have a hidden partition that you are denying you have.

It probably goes without saying that Windows isn't the best choice for this application anyway.

Truecrypt can fully encrypt a running Windows system. Do that or switch to Tails.

620
Off topic / Re: I missed you so muchy baby
« on: July 22, 2013, 03:27 pm »
The shakes stop after a few posts. I'm getting there.

621
If you talk to the right person at the post office, you can convince them to give you a stack of those stickers that they are so tight about handing out. I talked to a vendor who told the lady he runs an eBay based business and doesn't have time to get the tracking stickers on an individual basis. She gave him a bunch.

622
Silk Road discussion / Re: twitter
« on: July 21, 2013, 09:58 pm »
LE loves to subpoena Twitter for IP addresses. They did it with Jacob Appelbaum's followers, Occupy Wall St protesters, Anonymous members, people engaged in hate speech, threats, etc. That's why I was concerned about this. Does following DPR's Twitter account mean you're going to be raided? No, of course not. But it's best not to get your IP address on any lists.

623
Security / Re: Onion.To
« on: July 21, 2013, 09:51 pm »
I thought onion.to is useful when you don't have an access to an computer with tor or don't want/cant install it to another computer(someone else s). Or is there better options?

If you don't have Tor on your computer, don't access hidden services. Don't take short cuts with your security. Don't let onion.to sniff your passwords.

624
Silk Road discussion / Re: Silk Road & Atlantis turf war
« on: July 21, 2013, 09:47 pm »
Atlantis is growing? Where? In what meaningful way? Curiosity seekers signing up doesn't count. Sales though, that would be something.

They claim $500K in sales a month, although it's hard to find listings with reviews.

625
Off topic / Re: Silk Road chat via SILC now resides in IRC!
« on: July 19, 2013, 11:36 pm »
Yar, she's down matey.

626
Silk Road discussion / Re: twitter
« on: July 19, 2013, 11:31 pm »
You don't see the potential upside in there being a few people get caught as a result of their penchant to do thoughtless things rather than think things through first? If you don't, nothing I say is going to sway you because you've already exited the territory of rational discussion.

This is a bullshit cop out. I repeatedly asked you what the positives to the rest of us were of dumb people getting busted and you failed to provide any. The reason is not because you're smarter than us and we fail to see them but because you yourself can't think of any, and everyone knows that.

Please enlist with your local LE if you think there are potential positives to non-violent drug users being thrown into dog cages for exercising their right to personal autonomy, no matter how dumb or ignorant they are, because you are clearly on the wrong side of this war.

627
Silk Road discussion / Re: twitter
« on: July 19, 2013, 04:36 pm »
While this is definitely true, I don't see how it's a downside for SR or DPR. Stupidity has been running rampant and accelerating at an accelerating rate. If people do stupid shit and get themselves caught, then that could very well be a long-term benefit for all of us.

Are you seriously suggesting that the admins should promote unsafe behavior in order to get their own users busted, to weed out the dumb people?


628
Silk Road discussion / Re: twitter
« on: July 19, 2013, 04:23 pm »
A majority of people in this community think that Tor is only for hidden services. Whenever they see a clearnet URL, they automatically copy it to a regular browser and connect over clearnet. Posting a link like that guarantees people here will follow you over clearnet, which puts them in danger.

629
Silk Road discussion / Re: twitter
« on: July 19, 2013, 04:19 pm »
People following you with accounts they create over clearnet.

630
Off topic / Re: Hey, come chat with us!
« on: July 19, 2013, 04:14 pm »
So are you running the browser bundle?

Did you set the proxy settings to Tor/Privacy?

Did you set them to 127.0.0.1 port 9150?

Do you have a firewall running by any chance?

Pages: 1 ... 40 41 [42] 43 44 ... 208