Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 68 69 [70] 71 72 ... 208
1036
He better start using encryption now, because I suspect he will be the target of a lot of "random" searches at the border. :)


1037
Unless the SR server is compromised before the vendor marks the order In Transit, you have nothing to worry about. The chances of that happening are extremely small.

The way I look at encrypting my address, it's like wearing a seat belt. The chances of being in a car accident in the next week or month or even year are pretty slim, but wearing a seat belt costs me nothing, and it could be extremely important in the unlikely event that I am in a car accident. So I wear a seat belt every time.

Same with PGP. It costs you almost nothing -- ok, about 30 seconds of your time -- but in the unlikely event that the SR server is compromised, they will probably go after the low hanging fruit, the people with plaintext addresses on the server. Might as well encrypt.


There are actually more dangerous aspects of this. Some vendors will send you a tracking code by SR message. That code has your address, of course, which completely nullifies encrypting it at the time of making the purchase. Further, the address is deleted from the SR server after the order is marked In Transit, so it is kept for only a day or two, but messages are stored for months after they are deleted. That's a big liability, especially for big orders that LE would be interested in. If a vendor sends tracking codes, you should instruct them not to do that, or to encrypt the codes with your public key.

1038
Silk Road discussion / Re: A threat to SR?
« on: June 16, 2013, 12:04 am »
+10. In fact the developers are doing a huge service to DPR and others who run similar illicit hidden sites by pointing out potential vulnerabilities before they are exploited by malevolent folks.

Yep. It's better that an honest researcher proves these attacks work and makes them publicly known (in fact, the Tor devs knew about this months before it was made public) than a malicious person discovers an attack and keeps it to himself.

1039
Silk Road discussion / Re: A threat to SR?
« on: June 16, 2013, 12:01 am »
Not to mention that if you kill all of the people finding attacks on Tor, nobody will work on Tor anymore, because all of the Tor developers also research how to attack Tor. Look at Roger Dingledine, he has his name on a lot of papers that demonstrate attacks against Tor. He is also the lead Tor developer. The person saying we should kill the anonymity researchers has got to be the stupidest fucking person in the world, he should get a prize or something.

Then we can live in the ignorant bliss that our network is secure. That's what I tell the I2P folks when they mention that there are few known attacks on it. That only proves that few people are looking at it.

1040
Silk Road discussion / Re: Silk Road - UPDATE (06-15-2013)
« on: June 15, 2013, 11:22 pm »
Its not a huge hassle

Which is probably why it won't be much of a deterrent. They should require depositing a certain amount of BTC before you can send messages.

On new accounts, or accounts with low stats, there could be a 3 day delay in withdrawing BTC, giving them time to identify people who are spamming. That way a spammer can't deposit BTC, send out a bunch of messages, and immediately withdraw the BTC. If someone is caught spamming, they just keep the BTC by banning the account, making it not worth it for the spammer.

Accounts with enough stats, like 10 transactions and $500 in purchases, could send messages without the BTC requirement.

1041
I have an old account that I hadn't logged into in 6 or 7 months. I was recently able to log into it, because it still had like .0001 BTC in it, because the interface used to only show two decimal places, so I couldn't withdraw everything. One interesting thing is that there was no BTC address associated with it. It looked like a new account that says "click here to make a deposit" instead of showing an address.

So I think all data associated with the account really is deleted after the time periods listed.

As for being "archived", I wonder what that means, since the account gets archived after all data is deleted. It may just be to preserve the name so someone else doesn't create an account to impersonate an old account.

1042
Great read, thanks for the article.

I thought it was going to be about newer algos like ECC, but yeah it's true the NSA can't break most standard crypto if the keys are strong enough.

It's interesting that Glenn Greenwald had trouble learning PGP. He's a journalist who receives all kinds of sensitive info from sources, and apparently he hadn't even heard of it until a few months ago. What chance is there the the rest of the public will start using it?

1043
Security / Re: Help: Steps to completely removing traces from PC
« on: June 15, 2013, 09:29 pm »
One random write over the entire hard drive should be enough to make any useful data unrecoverable. It seems to be enough in controlled studies, when the researchers know what they are looking for and where it is on the hard drive:

http://dkn255hz262ypmii.onion/index.php?topic=99520.msg699299#msg699299

It would be even harder for someone who doesn't know what is on the drive.

DBAN does three writes, two of random data and the last one is a zero write to make it look like the hard drive was not secure erased.

That's the recommend tool for this job.

http://dban.org

1044
Newbie discussion / Re: What age girls do you think are sexiest?
« on: June 15, 2013, 09:58 am »
LOL

1045
Newbie discussion / Re: What age girls do you think are sexiest?
« on: June 15, 2013, 09:50 am »
26 is too you

For sure. 26 is WAY "too you". and anything too you is sexy. So sexiest is 26.

It's funny because I am 26. :)

1046
Security / Re: What does an ISP "see" when you use Tor?
« on: June 15, 2013, 09:39 am »
Quote
I've also read that having cleanet traffic running while you use Tor helps mask the fact that you're using Tor. Can anyone verify?

I can verify that it makes no difference at all

It's funny because in other threads on the front page of this forum people make the opposite claim.


1047
Consider how carefully vendors like that treat your address / personal info when they copy it off the SR server.

There's a highly sensitive period between when they get it off the server and put it on the package. Comments like that tell you exactly how carefully they regard your info.


1048
Yes, it is insane. Recently I found a vendor with decent prices who said something like, "If enough people ask I will start using PGP otherwise use privnote".

There are a handful of orders that I would have made but didn't because the vendor lacked a PGP key. On two occasions I didn't submit orders because the keys were only 1024 bits. With so many options on the road, there's no reason to reward lazy behavior.

Quote
They replied that you can't believe everything you read on the forums as people pretend to know what they are talking about. Shame they had good prices.

They are literally lying to you for their convenience. Fuck 'em.

1049
You bring up a good point, Jack. Their few minutes of time and convenience are worth more to them than your freedom.

Fuck 'em.

Boycott vendors like that.

1050
Security / Re: Should we open clearnet pages in Tor?
« on: June 14, 2013, 08:54 pm »
I use clearnet sites occasionally while on tor. For example, if I'm on the SR forums or website and I want to check something on reddit, usually about bitcoin, I'll open a new tab and search reddit, never logging into anything and never doing anything other than obtaining information.

Is this a bad idea?

No, it's a great idea. By doing a lot of regular web browsing, you increase the diversity of users and usage of the network, giving more plausible deniability to everyone who uses Tor.

If a person with an exit node could see what I'm viewing, does that mean they can also view what I'm doing on SR?

No, SR is a hidden service. The connection is end-to-end encrypted from the Tor client on your computer to the Tor client on the SR server, and you will be using different circuits to the exit node and the rendezvous point.


Or does their ability to see my activity only apply to the clearnet sites I'm viewing?

Yeah, pretty much. If you are viewing two web sites in different tabs, you will probably be using the same exit node and it can see both of them unless you use SSL.

Pages: 1 ... 68 69 [70] 71 72 ... 208