Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 85 86 [87] 88 89 ... 208
1291
Off topic / Re: Help With Basic programming
« on: May 20, 2013, 12:38 am »
Oh btw, this is the highest quality version of this book that I've found :)  http://libgen.org/search.php?req=total+synthesis+strike

Most of the PDFs floating around as torrents are horrible scans.

1292
Off topic / Re: Help With Basic programming
« on: May 20, 2013, 12:30 am »
Yeah, you can share it.  It's called Learning Python, and the latest is 4th edition.

http://libgen.org/search.php?req=Learning+Python+Mark+Lutz+4th+edition

1293
Security / Re: Help finding A+ certification
« on: May 20, 2013, 12:22 am »
First Coding Challenge: write a Python script that scrapes the SR web site for all vendor keys and saves them in a text file.

1294
Off topic / Re: Help With Basic programming
« on: May 19, 2013, 11:15 pm »
libgen.org is my go-to place. Works over Tor and there's no torrenting involved. You can download straight from mirrors. :)

1295
Off topic / Re: Help With Basic programming
« on: May 19, 2013, 10:57 pm »
I taught myself, starting with Python. Did a lot of web tutorials and stuff, but to be honest, if you don't have a comp sci background, there's no substitute for a good book. I learned 10 times as much from Learning Python by Mark Lutz as I did from all the web guides combined. Understanding fundamental concepts is more important than memorizing a bunch of syntax.

1296
Keylogger lol are kidding me.... nobody comes to my house or near my computer.

You know there are software keyloggers, right? It's like any other malware. An attacker doesn't need physical access to your computer, they can infect it when you simply visit a malicious web site, for example.

It's a good reason to use Tails, especially if you are a vendor. 99% of malware is made for Windows, but even if there was some malware for Linux (which I'm not aware of any existing in the wild at the moment), your system would be wiped clean on the next reboot.

1297
At least they're dumb enough to use fake signatures, so you can prove it's a scam within 30 seconds.

1298
Growing up a bit and joining this community has changed my mind. I consider deleting my Facebook often and I think about mainly using Tor for all of my web browsing. Even though the government does not have a reason to watch me, does not mean I should not worry.

This is the natural response when people become privacy-aware, but I think when you drop "off the grid", and have no mobile phone, social network accounts, or online presence in general, it makes you stick out and can potentially draw attention to you.

You can create accounts and never use them, so the companies that make money from surveillance get nothing from you. At least you blend in better that way.

1299
Security / Re: Security Tails
« on: May 19, 2013, 07:43 am »
Yep, for onion sites, http is safe.

For clearnet sites, you must use https for entering sensitive info.

Now that you know that, disable the warning and don't worry about it. It's a dumb a warning that doesn't understand the complexities of Tor.

1300
Security / Re: Security Tails
« on: May 19, 2013, 06:40 am »
Yeah, I booted the latest tails in a VM. When TorBrowser / Iceweasel starts, it takes you to https://tails.boum.org, some page on that site., which is using SSL. Immediately I entered my favorite web IP checking site, wtfismyip.com, and got that pop up message. It's just warning you you're going from an encrypted to an unencrypted connection.

The part that Firefox / Iceweasel / TorBrowser / the Tails devs haven't fixed is if you enter an onion address, it IS encrypted the whole way. It's equivalent to an https connection, even though it says http. That's why I said don't worry about it, just disable it and keep in mind that when visiting clearnet sites, the exit node can potentially read anything you send over http, so don't send username/password.

1301
Frankly, Pine, I'm a little surprised that you haven't mentioned any suspicions about me being the same person as him and just coming back to try again or something.  Honestly I only mention it because it really does seem plausible.  I mean I'm certainly not him and didn't even know he existed, but after looking him up I'm a little surprised that not a single person has even mentioned it.

haha, how did I miss this.

I was convinced that pine and LC knew each other in real life, because they both disappeared around the same time and showed up on the same night, months later. I was not the only one who noticed this coincidence. It looked like they planned it. Also, the sexual tension in the "LC is LE" thread is unmistakable. ;)

Since then it's pretty much been proven to me that they don't know each other. And no, I never thought you were LC either. IDK,  your styles and technical expertise are distinctly different to me.

1302
Security / Re: Security Tails
« on: May 19, 2013, 02:43 am »
Is this the message:

You are about to leave an encrypted page. Information you send or receive from now on could easily be read by a third party.

[Check Box] Alert me whenever I leave an encrypted page for one that isn't encrypted.

Yeah, don't worry about that. Just uncheck the box to get rid of the warning. It's just reminding dumb people not to enter username/password over an HTTP connection. You should only do that over an HTTPS (encrypted) connection, except that's irrelevant on hidden services, because the connection is fully encrypt from the Tor client on your computer to the Tor client on the hidden service server.

You *should* use only HTTPS to enter sensitive info on clearnet sites though.

1303
Security / Re: Crypto migration plan for hidden services
« on: May 19, 2013, 12:23 am »
Found some great info on the difference between RSA and AES, straight from RSA Laboratories.

https://www.rsa.com/rsalabs/node.asp?id=2004

It's a long article and well worth a read. Here's a table of how RSA keys compare to symmetric keys like AES, and the approximate year when they are expected to become unsafe:

Code: [Select]
1024 RSA    80 sym      by 2010
2048 RSA    112 sym     by 2030
3072 RSA    128 sym     beyond 2030

So in 2003, when the article was written, they thought 1024 bit RSA keys would have been cracked by now. Apparently, computational power hasn't increased as much as they expected, but it's about time to upgrade Tor's crypto now. 2048 bit keys will be safe for another 20 years, and if you use a 4096 bit PGP key like me, you should be good for the rest of your life.

Along with the private key size increase, onion domains may become longer. This is pretty much inevitable to prevent brute forcing. For example, taking the first 120 bits of the SHA1 hash and base32 encoding that, you'd get a 24 character onion address instead of the current 16 characters.

So if Silk Road updates to the new system, their address would look more like:  silkroadvb5piz3rugc6xecq.onion  :)

Phishing sites are going to have a field day.


Also, someone on the mailing list offered petnames as a third option in the migration plan:

============

I think you were heading in the right direction with the petname idea.
What if we deployed a potentially shitty naming layer that "probably"
won't break within the next 6-12 months, but *might* last quite a bit
longer than that, for backward compatibility purposes.

This naming layer could allow interested parties to sign registration
statements using their current onion key with an expiration time,
satisfying our deprecation desires for the 80 bit name. If the naming
layer actually survives without visible compromise until that point, we
could allow it to store signed statements about translations between the
new keys and their desired name (first-come, first-serve; names are
reserved for N months until resigned).

A more specific version of this question is: How readily could we hack
Namecoin or some other similar consensus-based naming system[1] into
Tor?

Such a mechanism would obviously provide enumeratability for hidden
services that chose to use it, but hopefully it would be optional: you
can still use IP addresses in browsers, after all.


In terms of verification, it would be trivial to alter the browser UI to
display the actual key behind the hidden service (ie: through a control
port lookup command and some kind of URL icon that varied depending on
consensus naming status).

We could also provide a hacked version of CertPatrol that monitors the
underlying public keys for you, and it would also be relatively easy to
add a "second-look" authentication layer through the HTTPS-Everywhere
SSL Observatory, similar to what exists now for SSL public keys.

In fact, if we can agree on a solid consensus-based naming scheme as a
valid transition step, I think it is worth my time to let the rest of
the browser burn while I implement some kind of backup authentication +
UI for this. After all, memorable hidden service naming would be a
usability improvement.


Should we try it?

The major downside I am seeing is PR fallout from the hidden services
that chose to use it.. They might be a unrepresentative subset of what
actually people need hidden services for. I think the real win for
hidden services is that we can turn them into arbitrary private
communication endpoints, to allow people to communicate in ways that do
not reveal their message contents *or* their social network. There
probably are other uses whose promise would be lost in the noise
generated from this scheme as well...



1. https://en.wikipedia.org/wiki/Namecoin.

We don't have to choose Namecoin, though. Another alternative is for the
dirauths to add a URI for an "official" naming directory file as a
parameter in the consensus consensus, and also provide its SHA256/SHA-3.
A flatfile might be less efficient than Namecoin in terms of storage and
bandwidth requirements, though. It's probably also easier to censor
(unless it is something like a magnet link).

For all you Zooko's Triangle[2] fans: The Namecoin mechanism attempts to
"square" the triangle with a first-come first-serve distributed
consensus on the pet names document, but still fall back to
"Secure+Global" at the expense of "Memorable". The interesting bit is
that in this case, the browser UI can help you on the "Memorable" end,
should the consensus mechanism fail behind your back.

2. https://en.wikipedia.org/wiki/Zooko%27s_triangle

1304
We're all waiting for kmf to dazzle us with the secret messaging system that he's consulting on. :)

1305
Are you sure those connections belong to Tor?  netstat -an doesn't show you that info. netstat -ano will show the process IDs, but then you have to find them in the list of running processes, so you might try something like TCPView. Also, have you confirmed that the outbound connections are going to Tor relays?

It's puzzling, because the Tor that's included in TBB hasn't changed since December, so it shouldn't have magically stopped working. Maybe Vidalia isn't writing the Tor options to torrc correctly? You could manually add them by shutting down TBB, opening torrc with a text editor adding either,

for Socks5 proxy: Socks5Proxy <host>:<port>

for HTTP proxy: HTTPProxy <host>:<port>

Maybe Vidalia isn't forcing Tor to reload its configuration file, so try simply restarting it first.

Also, you're not trying to run Tor over Tor are you? That's bad when connecting to clearnet sites, because your entry and exit node could be the same relay.

Pages: 1 ... 85 86 [87] 88 89 ... 208