Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 59 60 [61] 62 63 ... 208
901
Security / Re: Just purchased Dell Lattitude for SR use only
« on: June 27, 2013, 10:30 pm »
I just checked Tails 0.19 in VirtualBox. It uses 320 MB of RAM after TorBrowser has started. Then I started Pidgin, Claws Mail, GIMP, Scribus and Gobby and it was using 376 MB. Granted, I didn't do anything with these apps. I'm sure the RAM increases over time, so yeah to run many applications for a long time, you'll want more than 512 MB, but I think if you only use TorBrowser, 512 should be fine.

902
Off topic / Re: Hosting a Tor hidden service website/forum
« on: June 27, 2013, 10:01 pm »
Which leads me to my question - what are people's thoughts on hosting a reliable .onion website? Would a VPS in Rackspace be sufficient/ok?

Not now that you mentioned it.

You'd have to get the VPS anonymously. Pay with bitcoins or bounce real money through several exchanges. You'd have to find a provider that lets you register over Tor, or a proxy accessed over Tor.

It's easier to get a Freedom Hosting invite and run your forum there. renton sells invites on the market.

903
Security / Re: Buying new Laptop - Best Options
« on: June 27, 2013, 09:55 pm »
Someone please just post specific laptops that are good for everything you need for anonymity.

Any laptop. Your anonymity depends on the software you run on it. The specific hardware is irrelevant, except to the extent that it works with your software.

904
Security / Re: Just purchased Dell Lattitude for SR use only
« on: June 27, 2013, 08:36 pm »
I don't do it for security. I boot it in a VM to figure things out and help answer questions that people have about Tails. I don't feel like rebooting just do that.

905
Security / Re: Just purchased Dell Lattitude for SR use only
« on: June 27, 2013, 07:36 pm »
If you run TAILS you will find 1gb to be a bit tight, it has to load the whole OS into RAM you see.

I can easily run Tails in a 512 MB VM.

906
Off topic / Re: Silk Road chat via SILC now resides in IRC!
« on: June 27, 2013, 06:41 pm »
Right, you don't need to set the proxy settings with Pidgin on Tails. It works over Tor already.

907
Security / Re: Time to update TOR again my friends!
« on: June 27, 2013, 05:36 pm »
Yeah, I got the same thing. Did you do an in-place upgrade, ie extract it into the same folder? There might be some file that didn't get overwritten / updated, or it's just a bug. Happens to me on every upgrade though. Usually goes away within a few hours to a day. Don't worry about it.

908
Unless there's a specific PGP program out there that does that, which I haven't heard of, I'm not aware of a way to do it without writing a script. LouisCyphre made a script like that for vendors a long time ago, which would decrypt all the addresses in their orders.

909
Has it all been NSA threads that have been deleted? (she said, horribly ungrammatically)

As mentioned, one of the threads was about secure phone communication. Someone mentioned running I2P on a phone, I linked to the Android APK for that, a few minutes later the thread was gone.

That one is perplexing, but the common element in the others seems to be the NSA.

910
since this information is accessible by anyone, maybe some of it should be kept at least a little bit under wraps?

But that's the thing. Everything we say about the NSA is public information. Nobody here is giving away secrets.

I don't think we really have anything to be paranoid about. I mean, it isn't like the entire internet isn't talking about the NSA scandal, so it isn't like they would have any reason to try and censor it being discussed here. That is the part that has me confused, I really can't think of any reason why the threads would be deleted. We have even had threads on phone encryption in the past (albeit not anonymity), so it seems really strange that a new thread on phone encryption and anonymity would be deleted.

My sentiments exactly. I don't care that it's being deleted either. They could make an arbitrary list of stuff we can't talk about, but I'd like to know what's on the list so I don't waste my time writing posts that get deleted.

911
I can confirm. I also posted in that NSA thread in Off Topic and those posts are gone from my post history, as is the thread.

I don't see why that thread would be deleted.

912
Newbie discussion / Re: Vendor account for sale
« on: June 26, 2013, 08:00 am »
It's actually not against the rules.

http://dkn255hz262ypmii.onion/index.php?topic=162635.msg1156335#msg1156335

913
Before a dinner of pizza and fried chicken late Sunday in Hong Kong, Edward J. Snowden insisted that a group of lawyers advising him in the Chinese territory "hide their cellphones in the refrigerator of the home where he was staying, to block any eavesdropping," as my colleague Keith Bradsher reported.

Why a refrigerator? The answer does not, as some might assume, have anything to do with temperature. In fact, it does not matter particularly if the refrigerator was plugged in. It is the materials that make up refrigerator walls that could potentially turn them into anti-eavesdropping devices.

"What you want to do is block the radio signals which could be used to transmit voice data, and block the audio altogether," Adam Harvey, a designer specializing in countersurveillance products explained. Refrigerators made from metal with thick insulation could potentially do both, he says, regardless of whether it is mild or icy within.

On the data-transmission front, thick metal walls can create a sort of electromagnetic barrier, which enables the device to function as something known as a Faraday cage. A true Faraday cage is a space where radio waves cannot pass and therefore data cannot be transmitted. Although all fridges don't function this way, those constructed with more metal have the potential to serve this purpose.

A Faraday cage is a metal shield that protects anything inside from electrical charges. This means a person wearing a Faraday suit, as pictured here, is protected from the high-voltage arcs of a Tesla coil.Peter DaSilva for The New York Times A Faraday cage is a metal shield that protects anything inside from electrical charges. This means a person wearing a Faraday suit, as pictured here, is protected from the high-voltage arcs of a Tesla coil.

Another household object that functions similarly, Mr. Harvey has learned through his research into cellphone data transmission, is a stainless steel martini shaker.

"It's a perfect Faraday cage – it will block all radio signals unless you decide you need to pour yourself a martini," he said. Although this sounds like a plot point in a James Bond movie, Mr. Harvey has actually done extensive tests on the shaker in the process of developing a surveillance-blocking cellphone case called the OFF Pocket.

Blocking data transmission, of course, is a different issue from muffling audio. Although a thick refrigerator door is good at masking sound (as anyone who has lost a cat inside one knows), soundproofing is not necessarily integral to its design. An ideal refrigerator for a person on the run would be one that functioned as an acoustic anechoic chamber — a sort of Faraday cage for sound — meaning that not one hint of a syllable could make it from the Pepsi-laden kitchen table to the phone in the veggie crisper. Given that refrigerators' insulation levels vary, however, from an audio perspective, burying the phone in a pile of clothes one room over, Mr. Harvey suggested, might be a more reliable solution for someone seeking to subvert prying ears.

Those new to these issues are most likely asking the question – why not just ask everyone to turn off his phone and remove the batteries? Beyond the fact that many phones these days do not easily enable battery removal, identifying a pure off is complicated.

"A lot of modern devices (not just phones) do have states that are somewhere in between fully on and fully off, where some circuits are powered up and others are powered down," Seth Schoen, senior staff technologist at the Electronic Frontier Foundation, a civil liberties group that focuses on rights in the online world, explained by e-mail. (Snowden appears to be a supporter of the organization, as he was photographed with an E.F.F. sticker on his laptop.) "These modes often allow the device to wake up autonomously if certain conditions are met, such as pressing a certain key or even receiving certain data over the Internet on a wired Ethernet connection (known as ‘wake-on-LAN')."

Battery removal can be equally deceptive. Even once one figures out how to extract the primary battery, there may be additional power sources within the apparatus. "Some phones use an additional battery for memory management; it's unclear whether this battery could be used by logging and/or tracking systems such as Carrier IQ," Mr. Harvey explained, referring to software that monitors mobile phone users.


http://thelede.blogs.nytimes.com/2013/06/25/why-snowdens-visitors-put-their-phones-in-the-fridge/

914
Security / Re: Tails and using a VPN
« on: June 26, 2013, 05:01 am »
I started using Tails today. My question is this:

when using Tails, can my ISP **potentially** see that i am using TOR?

Yes. All they'd have to do is grab a list of the entry guards, which are public, and see if you are connecting to any of those IP addreses.

Quote
Before Tails, i had TOR on my HD. I would always first access a trusted VPN, then log into TOR.

Does Tails offer the same degress of protection as using a VPN?

The Tails devs are against VPNs. You can search tails.boum.org and you'll find threads about it. It's also hard to get OpenVPN running on the same machine as Tor, because of the way it changes the networking settings. Plus you would have to reinstall it each time.

If you wan to hide your Tor use, an easier way is to use bridges, but honestly if you're a buyer, nobody cares enough about you to be watching your internet connection.

Quote
When i use Tails i often get the message, 'the information you have entered is to be sent over an unencrypted connection and could easily be read by a third party.'

Is this message supposed to appear?

It is, but it's a false alarm. It happens when you start on an https connection and switch to http, like when accessing hidden services. Your connection to a hidden service is encrypted end to end, so you don't have to worry about that. You can disable the warning.

915
Newbie discussion / Re: How to alternate your writing style?
« on: June 26, 2013, 02:35 am »
It's actually easy for even amateurs to link writing styles if the target has some unique patterns or quirks in their style. A few people on this forum have been linked, such as mtljohn and Chaosforpeace.

The best thing you can do is spell correctly and use proper grammar. Make your writing style as normal as possible. There's a tool called Anonymouth that's supposed to help you write more anonymously by analyzing your writing and identifying words and phrases with low frequency, or that are unique to you, but it's hard to use and extremely buggy.

Pages: 1 ... 59 60 [61] 62 63 ... 208