Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 48 49 [50] 51 52 ... 208
736
Security / Re: GPG4USB Security paranoia
« on: July 12, 2013, 03:30 pm »
i'm not the brightest guy in the world in terms of being computer literate but if all the encryption companies had to give US Fed law enforcement back doors to their encryption software, then
how is GPG4USB safe?

any assist here would be really appreciated - my paranoia level just hit defcon 5

GnuPG and GPG4USB are open source, so people can see what it's doing: http://cpunk.de/svn/src/gpg4usb/branches/0.3.2-1/

You probably shouldn't trust proprietary software for your security, because it might be backdoored. Skype is definitely backdoored.

737
Security / Re: Some Public Keys Won't Save? Mac (gpg tools)
« on: July 12, 2013, 03:20 pm »
I had this issue and nearly tore my hair out trying to find a solution then someone on here gave it to me.

Save the PGP public key as a text file in whatever program you use with your GPG, I use TextEdit then open your key chain and add the public key manually by selecting the text file and voila it works and it listed in your key chain.

Sounds like a character encoding issue. By saving it in a text file, the text editor saves it with the correct character encoding for Macs.

738
Security / Re: bitcoins going crazy
« on: July 12, 2013, 03:15 pm »
This is it guys. This time it's for real. We're going to $200 and never coming back. ;)

739
When a man hits a woman, even if she was assaulting him, feminist groups go into uprage all over the world and jump on the bandwagon about how he should be locked up etc, however then they shout that they want equality and womans rights. If women and men are the same, should it not matter if a man hits another man or a woman? Well, shock to the system, there actually are differences, whether it be physical or mental, there are differences and they just dont want to admit it.Its fact end of.

If a woman hits you and you report it, she will be prosecuted just as easily as a man. However, there is a huge disparity in reporting domestic abuse between men and women, mostly because of male culture that says you're a pussy if you complain about it or don't handle it yourself. So women get away with beating on men until they snap and hit the women, then they report it and the men get prosecuted.

It happened to a friend of mine. His girlfriend would get in his face, shove him around, slap him, so finally he snapped and hit her. She called the cops and they pressed charges. It was only because everyone came to his defense -- even her parents said she did that shit -- that they dropped the charges. He got lucky, it doesn't usually turn out that way.

But it wasn't just his girlfriend that got him in trouble, it was the fear that male culture instills in men that you shouldn't show vulnerability or seek help.

Don't blame them for our stupid rules.

740
Off topic / Re: Has anyone used "OnionWallet"
« on: July 11, 2013, 02:45 am »
What's wrong with opening a blockchain.info account over Tor? At least you know they're not scammers.

741
We already have that. It's called Philosophy, Economics and Law.

742
+1 - Damn Astor - how do you remember all of this shit?

I'm an encyclopedia of useless knowledge. ;)

743
Off topic / Re: Has anyone used "OnionWallet"
« on: July 11, 2013, 01:11 am »
You really need to do a little research before you send your money to random bitcoin addresses operated by unknown and untraceable hidden services.

744
Off topic / Re: Has anyone used "OnionWallet"
« on: July 11, 2013, 01:09 am »
Based on the site theme I can tell that's one of the Tor Shops. They are all scams.

Look at Tor Shops: http://shopsat2dotfotbs.onion

Read this article about it: http://wvk32thojln4gpp4.onion/wiki/index.php/Tor_Shops

745
Security / Re: GPG4USB for MAC ?
« on: July 11, 2013, 01:00 am »
GPG4USB doesn't exist for Mac, only Windows and Linux.

I believe most people on Macs use GPGTools.

746
Security / Re: Tor and state surveillance
« on: July 11, 2013, 12:46 am »
As for hiding TOR, is this obfuscating bridge thing hard to set up?  Does it look like 'normal' traffic to these spies we're paying for every day with our hard work and sacrifice?

You need a special browser bundle for it, which you can get here: https://www.torproject.org/projects/obfsproxy.html.en

They are listed under "Download the Pluggable Transports Tor Browser Bundle".

These special bundles will become the regular browser bundle in a few weeks (they are still experimental).

Then go here: https://bridges.torproject.org/bridges

Copy the "obfs3 <IP address>:<Port>" lines and add them in Onion Icon -> Settings -> Network -> My ISP blocks connections to the Tor network -> Add a bridge.

747
Security / Re: Brainstorming the ideal anonymity network
« on: July 10, 2013, 10:17 pm »
Figured I would add this here, or maybe we should create a separate thread for publishing literature about anonymity network security. AnonBib is focused mostly on Tor.

Here's a new paper about deanonymizing I2P users: http://wwwcip.informatik.uni-erlangen.de/~spjsschl/i2p.pdf

There's no date in the paper, but a thread was started about it 2 weeks ago here: http://zzz.i2p.us/topics/1414?page=1#p6850

It also references papers from 2012. So, I think it was published in the last month or two, and it was definitely published this year.



Practical Attacks Against The I2P Network

In this paper, we describe an attack that can be used to break the anonymity of a victim who is using anonymized resources in I2P – for example, a user browsing eepsites (I2P’s terminology for anonymous websites) or chatting. We are able, with high probability, to list the services the victim accesses regularly, the time of access, and the amount of time that is spent using the service.

We first show how an attacker can tamper with the group of nodes providing the netDB, until he controls most of these nodes. This is possible because I2P has a fixed maximum number of database nodes (only a small fraction of nodes in the entire network host the database). The set of nodes can be manipulated by exploiting the normal churn in the set of participating nodes or by carrying out a denial of service (DoS) attack to speed up the change. We show how a Sybil attack [6] can be used as an alternative approach to control the netDB.

By leveraging control over the network database, we demonstrate how an Eclipse [7, 8] attack can be launch. This results in services being unavailable or peers getting disconnected from the network.Finally, our deanonymization attack exploits the protocol used by peers to verify the successful storage of their peer information in the netDB. The stor age and verification steps are done through two independent connections that can be linked based on timing. Using the information gathered by linking these two interactions, an attacker can determine (with high probability) which tunnel endpoints belong to specific participants (nodes) in the I2P network, and, therefore, deanonymize the participant.

Experimental results were gathered by tests performed both on our test network and on the real I2P network (against our victim nodes running the unmodified I2P software; no service disruption was caused to the actual users of the network).

In summary, the main contributions in this paper are the following:

1. A novel deanonymization attack against I2P, based on storage verification
2. Complete experimental evaluation of this attack in the real I2P network
3. Suggestions on how to improve the I2P to make it more robust


748
Silk Road discussion / Re: commission stuff
« on: July 10, 2013, 07:12 pm »
One thing, Listings pegged to USD from time of purchase to time of finalization would move commensurately with BTC value. So while the fee would also move with BTC valuation, so would the amount received in BTC at time of finalization (for unhedged orders).

Unhedged items would have a consistent commission, because the vendor gets whatever BTC was put in escrow. Not sure how hedged items work. They could base commission on the BTC at the time the buyer submits the order or the BTC the vendor gets when the buyer finalizes.

Quote
I just wish I could figure out some static percentage points along this new sliding commission schedule that can be relied upon. Any ideas how?

List all your items in BTC. :)

Quote
Looking at your pic, not only does the percent change at certain points along the sliding scale relative to BTC, but the delta (rate of change) accelerates or decelerates with change in BTC.  Am I seeing that right?

Yeah, but it's somewhat deceptive. You want to look at the difference between the blue and black line vs the difference between the black line and the bottom of the graph (which is below zero because I was lazy). That's the percentage difference between the two exchange rates.

749
Security / Re: phished...
« on: July 10, 2013, 06:35 pm »
More importantly, what could have been done so that this didnt happen?! I cant think of anything i couldve done to put my account in jeopardy.

Scan your computer for malware. If a keylogger was planted on your computer, they could steal your password and pin when you made an order. This happened to someone I know. He lost all the BTC in his account.

750
Silk Road discussion / Re: commission stuff
« on: July 10, 2013, 05:51 pm »
6.7 x e^(-p/6) + 4

where p is the price of the listing in Bitcoins. 

The interesting consequence of this is that the commission rate will be a floating amount for items pegged to a fiat currency, and it will actually go up as the price of a bitcoin goes up. Here's a graph of the commission at the current exchange rate of about $77 vs if it was $200.

http://32yehzkk7jflf6r2.onion/comm.png

The reason is because as the price of a bitcoin goes up, a dollar becomes a smaller fraction of 1 BTC. In the simplest example, an item costing $1 would make the p term 1/77 at $77, and 1/200 at $200. Compare e^(-3/6) to e^(-1/6) to see how it goes up if the p term decreases.

Also, the light gray dotted line is the (cumulative) old rate.

So the rate is pretty much the same for items costing $50 to $300 at the current exchange rate, otherwise it's higher.


Pages: 1 ... 48 49 [50] 51 52 ... 208