Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 88 89 [90] 91 92 ... 208
1336
Give me an O!

Gimme a T!

Get me a C

That's right!

OTC! OTC! OTC! Woot!


Until they start doing stings to bust both buyers and sellers of BTC.

It wouldn't stop everyone, but it would have a chilling effect on that market.

1337
Security / Re: Trusting TOR with your freedom
« on: May 15, 2013, 04:42 am »
I've wondered about this. If you read up on the main way a vendor is vulnerable in these forums it seems the most likely sequence would be for LE to intercept packages to draw a mailing radius and then see who within the radius is using Tor. Not exactly easy or definitive.

This may be easier than it looks, since the number of users who fit the behavioral profile of SR vendors (ie, logging on daily) is about 20 in a city with 100K people, and 200 in a city with 1M people:

http://dkn255hz262ypmii.onion/index.php?topic=158464.msg1124077#msg1124077

Read that post, then read the one below it where I update my estimate.


I've yet to read of a single instance where LE has caught a SR vendor based solely on hacking.

Here's what LE could do. They find a vendor who is selling a range of drug amounts, like 1 gram up to an ounce of cocaine. They check the reviews to make sure the vendor is getting sales and actually pushing that product. This would be someone with many ounces of cocaine. Then they buy 1 gram off the vendor. Only costs $150 and they know the vendor's city.

They hand the ISP a list of Tor entry guards and known bridges, and request the subscriber info of everyone who connects to those IP addresses, say 5 days out of the next 7 days. In a week they are down to a list of 10 - 200 people. They start watching those subscribers and messaging the vendor, looking at the response times, so it's basically a low grade correlation attack, similar to what they did to this guy:

http://arstechnica.com/tech-policy/2012/03/stakeout-how-the-fbi-tracked-and-busted-a-chicago-anon/

They watched his local network with a tap and trace device installed in his computer and correlated it to his IRC activity (which he accessed over Tor).

What percentage of those daily users will be online at the specific hour when a message is received from the vendor? 10%, 20%, 50%? Even in the "worst" case scenario for LE, they can exclude half the people on their list every time they receive a message. How many halvings does it take to get down to one person that they can start investigating IRL?

Even if they start with a list of 200 people, surprisingly it takes only 9 halvings, which is 9 messages. Unfortunately for them, there is a small percentage of users who stay online all the time (like on IRC), so those people will never be excluded from the list. LE would have to investigate all of them.


I should note that it's easy to defend against this attack. Use a VPN or rent a VPS and set up a private bridge.


So why hasn't this happened yet? Surely the computer experts that they employ have thought of it.

I think SS is right, LE either doesn't care, or it's too inefficient. Maybe the the last leg isn't worth it. ie, they reduce 200 users to 20 or 30 who are always online, but investigating all of them is too much work to bust someone pushing the amounts of drugs that SR vendors push.

And if anything I said is remotely true, then you can help vendors by using Tor all the time. ;)


1338
Security / Re: How to Obtain an Anonymous P.O. box.
« on: May 15, 2013, 12:46 am »
This is useful in the 5 percent of cases where you know the package was intercepted ahead of time. You can throw away the mailbox key, never visit that post office again, and you'll be safe because they won't know who are or where to find you. In the other 95% of cases, you won't have a clue that it was intercepted until you're standing in the post office with the package in your hand and a guy with a badge steps out from behind the counter (or pulls you over a few blocks away).

If you don't get mail there regularly and only visit every few weeks, but show up the day the package is delivered, or the day after, that indicates you had prior knowledge of the package.

IMO, a residential address is safer because you can passively receive the package and choose when to pull it out of the box. LE isn't going to wait around for hours or days, and at all hours of the night, for you to pick up a small amount. They will either knock on your door and see if you accept it, or not deliver it at all (in which case, it will join the ranks of the infamous missing packages). To that end, it's best not to be home when the mail is delivered.

People have proposed using various light sensitive devices that can warn you when the package has been opened. They might be worth it for large orders, but it's also possible for LE to x-ray the package, discover that it contains such a device, and open it in a dark room to field test the drugs. They are also known to use needle-sized poking devices to sample the contents, which leave a hole so small that it probably wouldn't set off the device. To protect against that, you would have to fortify it with a hard internal package, which again isn't worth it for small amounts, when simply mailing the drugs in an envelope is much safer.

1339
Security / Re: Trusting TOR with your freedom
« on: May 14, 2013, 11:57 pm »
@d0z3r

What are you afraid can happen?

1340
Off topic / Re: What is your Autism Quotient
« on: May 14, 2013, 11:41 pm »
Wait, so you're astounded that I got a 29 which is slightly in the autistic range?

Because I originally interpreted your comment the exact opposite way (juxtaposed against the normal results you quoted).

I was like damn, SS, that's kind of a dick thing to say, lol.

1341
The Dwolla -> MtGox method had the most stringent verification requirements of any bitcoin purchasing method. If it got shut down, what hope is there for the rest of them?

1342
Another bitcoin purchasing method bites the dust:

https://bitcointalk.org/index.php?topic=205396.0

I know most people here don't use the Dwolla -> MtGox method, but I'm sure some people did. You should be aware that there's a very good chance that some or all of the transactions via that method are now being investigated.



1343
Security / Re: Truecrypt & Hidden Volumes
« on: May 14, 2013, 08:33 pm »
They will never have enough evidence to arrest you if they can't find anything on your PC

That depends on where you live.  The 5th Amendment (or its equivalent) doesn't exist everywhere and in many countries you can be forced to incriminate yourself. We're not talking about backwards third world countries either. As the Tails dev said above, key disclosure laws exist in the UK and France. In the UK, you can get up to 2 years for not providing a password. I'm belaboring this point, because we have a lot of Brits on this forum, so its relevant to them.

Now, if hidden volumes become popular, LE could assume everyone is using them. So if they find no incriminating evidence after you truthfully provide the password to the only encrypted volume on your computer, they could assume you're still hiding something. Plausible deniability becomes plausible suspicion, and grounds to keep you locked up (in the best case).

So you can simply just say FUCK YOU LE.

If you are protected from self incrimination and key disclosure, then you don't need a hidden volume. You can just say Fuck You LE when they ask for your password.

So hidden volumes are either dangerous or useless.

Well, that's their argument anyway. I don't really care one way or the other.

1344
Security / Re: Can you print anonymously via tor?
« on: May 14, 2013, 08:19 pm »
Maybe I'm misunderstanding your question, but if your printer is connected directly to your computer, it's not a networked printer or anything, and everything is on a home LAN, then what does the internet and Tor have to do with anything?


More important than that: you need to do some research to figure out if your printer is susceptible to fingerprinting. The serial number may be encoded on the paper.

https://en.wikipedia.org/wiki/Printer_steganography

https://www.eff.org/pages/list-printers-which-do-or-do-not-display-tracking-dots

http://boingboing.net/2008/10/23/howto-read-the-secre.html

On that list of printers above, note the EFF warning: "A 'no' simply means that we couldn't see yellow dots; it does not prove that there is no forensic watermarking present."

So if you want to print anonymously, you should only use a printer that you purchased anonymously, and preferably one that does not print identifying watermarks.

1345
Security / Re: Truecrypt & Hidden Volumes
« on: May 14, 2013, 05:59 pm »
That sounds epic; I think the Windows truecrypt is the only one that offers the OS encryption thingy  >:(.  I wish they'd get that for the linux distros.

Here's the technical reason why hidden volumes don't exist for LUKS/dm-crypt:

https://code.google.com/p/cryptsetup/issues/detail?id=7

But here are the philosophical reasons why many people don't think it's a good idea, straight from a Tails developer.

https://tails.boum.org/forum/Plausible_deniability_of_encrypted_storage/

===============

Regardless of TrueCrypt's "less than open nature" and other issues there might be very real security reasons to not include it exactly because it supports plausible deniable encryption. Below I will detail some thought I've been entertaining for the last couple of years that I feel are ripe for venting now:

While a very cool idea, simply possessing tools supporting plausible deniable encryption could be dangerous in itself if you live in an area where the "law" either practices rubber-hose "cryptanalysis" (i.e. torture), or has a key disclosure law (which includes countries like UK, France, Canada). As you know, it's precisely these practices and laws that plausible deniable encryption is intended to protect against. So, imagine that you live in such an area, get suspected or arrested for some crime, that the authorities seize you computer as a result, and that they find your TrueCrypt installation on it.

Problem 1: If a TC volume indeed is indistinguishable from random junk, then any file that looks like random junk may be considered as TC volumes by your adversaries, even those that in fact are not TC volumes or encrypted data.

Hence, even if you hand out keys and passphrases to the real TC volumes, your adversaries may demand keys and passphrases for the other random looking (but non-TC volume) files. You can truthfully deny that they are TC volumes all you want, but they will torture you, or throw you in jail. You're screwed.

As have been pointed out, it may still be possible to determine whether a file is a TC volume or not by using analyzers such as TCHunt. However, after learning TCHunt's technique I must say it looks pretty weak and simplistic, and that it very easily can produce false positives. In fact, I did a simple test:

Code: [Select]
TMPDIR=$(mktemp -d)
for X in $(seq 1 100); do
    dd if=/dev/urandom of=${TMPDIR}/test.${X} bs=1b count=20000 2> /dev/null
done
echo $TMPDIR
# run TCHunt on ${TMPDIR}, i.e. the directory printed above

So, I generated 100 files of ~10 MB (but divisible by 512 bytes) of pseudo-random data generated from Linux' PRNG and then ran TCHunt on these. Every single one of them was incorrectly identified as a TC volume, so we have a 100% false positive rate. There may be better commercial alternatives to TCHunt, though. If not, the problem with false positives just strengthens problem 1. Personally I generate such files from time to time for various reasons, so I would be screwed.

Problem 2: Since TC supports hidden volumes, even if you disclose all your keys and passphrases to your adversaries they may insist that you have hidden volumes when you in fact don't.

This could for instance happen if your adversaries didn't find what they were looking for in the "normal" TC container that you supplied them keys and passphrases for. Or perhaps they found what they wanted, but the prosecutor (naturally) just wants to fuck you even more by adding a few additional years on your prison sentence for refusal of (non-existing) key disclosure. You're screwed.

The essence, or generalization, of these two problems is that plausible deniable encryption gives your adversaries "plausible suspicion" (in lack of a better term). Since there are so few encryption tools that allow plausible deniable encryption, choosing a tool that supports it (like TC) instead of a tool which doesn't (like dm-crypt/LUKS) may give them strong reasons to believe that you are indeed using that specific feature, and thus that you're not cooperating with them even when you really are cooperating as much as you can.

For the above reasons it seems like plausible deniable encryption will only work as intended if either one of the following statements are true:

1. You live in a sane country with no practice of rubber-hose cryptanalysis/torture, and no key disclosure laws. (Note that if you do, you really don't need plausible deniable encryption -- "undeniable" encryption is enough.)

2. The implementation of plausible deniable encryption you use is completely secret; it isn't public, widely used or documented anywhere. You and everyone else using it must be able to keep that secret even under torture and serious legal threats/implications.

3. You live in a future where more or less all encryption software supports plausible deniable encryption, so it's nothing out of the ordinary. (OTOH, in such a future key disclosure laws may just be upgraded to a complete ban on encryption. Who knows?)

Let's see how these statements pan out with Tails:

We distribute Tails globally, and since there are countries for which 1 isn't true, 1 wouldn't be true for all Tails users. Hence inclusion of TC (or similar tool) would make Tails potentially dangerous for those users. 2 is trivially untrue for TrueCrypt in particular, and tautologically untrue (per definition) in general for any other such encryption tool we ever would ship with Tails. And 3 is not the case (yet?) as you probably know.

That said, I'd love to have the above proven wrong as I see plausibly definable ecnryption as a very desirable feature.


1346
Intersection attacks and other electronic methods designed to identify particular users on Tor are potentially useful tools for LE, but they'll never lead to a conviction in a court of law unto themselves.

Of course, but they could lead to an investigation. So they start following you around and see you drop packages into blue boxes every day. They combine all that evidence and present it to a judge to get a warrant to search your home. And the actual stash they find is what they convict you on.

You don't want to get on their radar in the first place, especially when it's totally avoidable.

1347
Off topic / Re: What is your Autism Quotient
« on: May 14, 2013, 03:11 pm »
Huh? Those aren't my results. I didn't take the second test.

1348
Off topic / Re: What is your Autism Quotient
« on: May 14, 2013, 05:08 am »
http://www.rdos.net/eng/ has a more comprehensive Autism test may be a bit more resistant to the selection bias that Astor thinks is influencing the results.

You mean because the simple quiz is too focused on social stuff? Possibly.

Once you collect enough results on the second one, do a paired t-test with the two sets of scores and you'll know if there's a statistically significant difference between them. You'll have to normalize the two sets of scores, because they have different ranges, means and standard deviations. You do that by converting each score to a "standard deviation unit".

If they're not different and/or we score higher on the longer quiz too, find 30 random people on the street and give them the quiz, then do a t-test to see if that difference is real. On a small sample, like 30 people, a 6 point difference could be a fluke, ie not a real difference, especially given that huge range from 6 to 42.

This is science! :)

1349
Off topic / Re: What is your Autism Quotient
« on: May 14, 2013, 04:48 am »
Neurotypical with respect to autism. There are a thousand things that test doesn't test for. ;)


BTW, look at the nice normal curve in the poll results. As expected. We're just shifted up by 6 points compared to controls.

1350
Once you have it narrowed down to 120 you can do an intersection attack trivially against I2P users. You just need to continuously route data through their nodes waiting for them to disconnect, and try to correlate the online activity of the vendor to the up time of the I2P router. ie: if you see the vendor responded to your private message at 8 AM, you can rule out any of the 120 nodes that were not online at 8 AM. That will let you whittle down their anonymity set size even more.

If you're LE, you don't even need to route data, just watch their connection.

Earlier I was thinking about a potential correlation attack when the "vendor last online" feature is updated, but messaging them directly provides a more accurate time.

It seems to me from reading that metrics page that they still have not implemented directory guards. That makes it substantially easier to enumerate Tor clients. For a long time clients directly connected to the directory authority servers, the first time the client ran Tor and anytime that Tor had not been connected for about 24 hours or longer. Only after that did they use the directory mirrors, of which there are a few hundred. Quite a while ago they proposed adding directory guards, and having Tor users always connect to the DA's or mirrors through a set of random Tor nodes selected from a list of nodes included with the original download of Tor (optimistically trying nodes until you find some that are currently up). I thought they had implemented this by now but now it seems to me that they have not. That means watching the directory authority servers is a good way to enumerate Tor client IP addresses still. No matter what watching the Tor download page could do this though, unless users download Tor with open WiFi from a random location or similar. The best bet would be if they used directory guards + Tor starts coming bundled with popular Linux distros (even if it is out of date and doesn't include TBB, it could be used for the initial download of TBB from the centralized download site). I2P is still much weaker to client IP address enumeration though.

All of this can be avoided with obfuscated private bridges (since you don't touch any part of the Tor network until after a bridge), or a VPN. While a VPN won't protect you if LE is specifically targeting you, discovering all the VPN users, given the large number of VPN providers in the world, and private VPNs on VPSes, and then analyzing all those users, makes a fishing expedition orders of magnitude harder.

Pages: 1 ... 88 89 [90] 91 92 ... 208