Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 75 76 [77] 78 79 ... 208
1141
Newbie discussion / Re: What Operating Systems Do You Use?
« on: June 05, 2013, 06:20 pm »
That is good thinking.

Do you know a way to prevent PGP from leaking what OS yo uuse?

Yep, you can remove the Version line by adding no-emit-version to your gpg.conf.

For the sake of everyone's sanity, use a PGP program that is based on a recent port of GnuPG.

Windows: GPG4USB, GPG4Win

OS X: GPGTools

Linux: GPG itself (the original)


Then find where your gpg.conf (configuration file) is, and replace everything in it with this:

Code: [Select]
no-emit-version             # remove the version line
no-comments                 # remove comment lines

armor                       # ASCII armor all output, so it can be posted to email, forums

trust-model always          # suppress warnings about untrusted, unsigned keys

## Some lists of ciphers in order of preference
personal-cipher-preferences AES256 TWOFISH CAMELLIA256 AES192 CAMELLIA192 AES CAMELLIA128 CAST5 3DES BLOWFISH
personal-digest-preferences SHA512 SHA384 SHA256 SHA224 RIPEMD160 SHA1
personal-compress-preferences BZIP2 ZLIB ZIP Uncompressed
cert-digest-algo SHA512


## Optional
## Remove the # at the beginning of these lines to use them

#default-key <keyID>        # if you have multiple keys, this sets a default key to use
#encrypt-to <keyID>         # automatically encrypt everything to this key


#throw-keyid                # anonymize the recipients of a message by zeroing out the key IDs
#hidden-encrypt-to <keyID>  # automatically encrypt to a key and anonymize it


## You generally shouldn't use key servers, but if you want to connect to them over
## Tor, install an HTTP proxy like Privoxy and use these options. Privoxy uses port 8118
## by default, but you can change that to whatever your HTTP proxy uses
keyserver hkp://2eghzlv2wwcq7u7y.onion
keyserver-options http-proxy=http://127.0.0.1:8118,debug,verbose

1142
Newbie discussion / Re: What Operating Systems Do You Use?
« on: June 05, 2013, 05:16 pm »
I can give you some decent stats.

Based on the 1012 vendor keys that I have imported, where the PGP version makes it obvious what the operating system is, it's about 72% Windows, 18% Linux, and 9% OS X.

1143
The hardest thing for me was figuring out which key to press as soon as my computer powered on in order that I could get to the BIOS menu to change the boot order. Any small road blocks like that can easily be resolved with a google search though.

haha, I can never remember either, so I always keep my fingers on F1 and F12, ready to press whatever pops up on the screen.


I'm playing with TAILS and have found two issues:
- when using Vidalia to configure obfsproxy bridges, these fail to work unless I remove the port address that follows the ip (X.X.X.X:port) - I have the feeling I'm doing something wrong here.

Odd. The part you need to remove is "bridge". When you ask the BridgeDB for addresses, you get a result like this:

  bridge 12.34.56.78:443

You need to enter  12.34.56.78:443 in the Vidalia interface.

- and when I try to configure a VPN, the "ADD" button is greyed out so while VPN configuration appears as an option I can"t see how I can input the information to get it going ... ?

You probably need to install a specific VPN program like OpenVPN, along with the helper apps, network-manager-openvpn and network-manager-openvpn-gnome.

1144
Security / Re: How safe is storing BTC @ SR long-term?
« on: June 05, 2013, 04:43 pm »
The risk with keeping your coins on SR is unexpected downtime. It's happened a few times already that the market went down for several days. Sure, it may not happen in the next week or the next few months, but the one time it does happen, you will experience head aches. This is not a problem unique to SR, of course. Ask the people who were storing their coins on Instawallet, or on blockchain.info the times it went offline.

I'm only comfortable with storing my coins in my own client, with multiple backups.

1145
Security / Re: Important case for US crypto users
« on: June 05, 2013, 06:02 am »
Since the president can authorize the assassination of US citizens without due process, I wouldn't be surprised if the Supreme Court ruled against the Constitution in this case.

1146
http://dkn255hz262ypmii.onion/index.php?topic=5986.0

Ah you found it. The first great SR scam, in a much simpler and more innocent time.

1147
LOL.

When you find it, you will know.

1148
Gummy Stars still takes the cake for thread of all time, though.

Oh, I bet you all intrigued now. :)

1149
One of the top 10 threads of the year for sure. You know, we should have that contest at the end of each year.

1150
Security / Re: Bitcoin-qt and TOR
« on: June 05, 2013, 02:37 am »
How do I safely use my bitcoin-qt via TOR on linux?

Go to Settings -> Options -> Network.

Connect through Proxy.

IP: 127.0.0.1
Port: 9150
SOCKS Version: 5


Note: the port is 9150, not 9151, the latter is the ControlPort, which is something different from the SocksPort. Common mistake.

Also, is there a file somewhere that it stores keys and/or history of your transactions on the filesystem? I'd like to add a line in a script to erase such in the event I ever need to.

The keys are stored in ~/.bitcoin/wallet.dat

The transaction history is stored in the block chain and can't be erased. That's sort of the point of the block chain.


1151
Security / Re: eCardOne.com has been seized by the feds.
« on: June 04, 2013, 05:59 pm »
The scariest part to me is how many non .com domain names were seized. A lot of these were other countries. "Umm excuse me, official US business, we need to confiscate this shit."

Yep. LR was a Costa Rican company. Why is the United States always leading the way and being the world police?

But it is worth noting that none of the non-dot-coms that I looked at had DOJ insignias on them. Some of them are just down.

superchange.ru and absoluteexchange.eu appear to still be up, so not sure why they are on the list.


Nigeriangoldexchanger.com

That has got to be the worst name for an exchange that I have ever seen.  They might as well call themselves scammersRusExchangers.com

I noticed that too. :)

1152
Security / Re: making a computer where TOR cant work.
« on: June 04, 2013, 03:18 pm »
Ive learned now the biggest evil of SR is that its right in the privacy of your home and you can escape it....

That's an interesting observation. I bet porn addiction has gotten worse for some people for the same reason. You used to have to suffer the indignity of walking into a seedy porn shop to get porn and it was expensive. Now it's piped into your home, and there there's more free porn on the internet than you can watch in a lifetime.


Anyway, to answer your question, I would tell you to give your brother in law administrative control of your computer or router and download a blocklist that includes the Tor entry guards, but Tor offers circumvention techniques that make blocking all access to the network difficult.

Even if torproject.org is blocked, you can get the browser bundle emailed to a Gmail or Yahoo account. You can use bridges that aren't on a block list. If you are determined enough, you can get around the barriers that someone else puts up.

Maybe give him all your money so you can't buy bitcoins? Then he can give you a daily allowance for food and stuff.

1153
Off topic / Re: Game of Thrones Yesterday..
« on: June 04, 2013, 12:46 pm »
For anyone who doesn't know what the controversy is about, this Twitter account is hilarious: https://twitter.com/redweddingtears

You'd think they literally killed someone on air.


1154
Most of us who have been experiencing this for some time learn to ignore it, but I'm pretty sure the person doing this picks random newbs or new people to attack because they will start a new thread, bringing attention to it again. It's the psychology of the school bully, they do it as long as they get a reaction. If nobody responded, they would stop. It wouldn't be fun anymore.

For now, they're getting a kick out of it.

1155
There are "former cops" who do this too. It's easy to claim you were part of a super secret enemy conspiracy, because there's no way for anyone to verify or disprove the info.

The only ones I really trust are a couple of the former / current postal employees. That most recent postal employee seemed to have some useful info.

Pages: 1 ... 75 76 [77] 78 79 ... 208