Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 98 99 [100] 101 102 ... 208
1486
@Vegeta

-----BEGIN PGP MESSAGE-----
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=/OfI
-----END PGP MESSAGE-----

1487
@Vegeta

-----BEGIN PGP MESSAGE-----
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=8err
-----END PGP MESSAGE-----

1488
Security / Re: Skype Google video question
« on: April 24, 2013, 03:00 am »
Have you ever looked into mumble as a hidden service with TLS and OCB-AES128? I read about it from a link of astor's in another thread. I was able to get a server and client configured and working, but as expected there were some latency issues.

So you got it working over Tor? Pretty cool. I say the more hidden services, and the wider the variety, the better.

BTW, you don't need TLS encryption for a hidden service, since the connection is end-to-end encrypted with AES-128 (1-3 layers) by the Tor clients, but I suppose it doesn't hurt.

1489
atlantis announced its opening on bitcointalk.com about a month or so ago. thats how i heard of it anyway....

I thought you were joking, so I checked. It's true: https://bitcointalk.org/index.php?topic=154138.0

Not sure what to think of that.

1490
Silk Road discussion / Re: failed to connect the SR for 3 days now
« on: April 22, 2013, 05:51 pm »
Im using google chrome

and yes it ends in onion.to

as for the proxy Im not too sure as im not an expert

but all I know is that I ve been using SR for 3 months now simply by entering silkroadvb5piz3r.onion in google
and then follow the steps
but i never downloaded tor

Out of curiosity, who taught you to access SR this way? Obviously I don't want a name, but was it a friend, the reddit subreddit, some forum?

If it was a web site, can you post the link?

1491
Another Mac user who can't import keys or see the keys they have imported.

Last one was 2 days ago: http://dkn255hz262ypmii.onion/index.php?topic=150106.0


This thread might help you: http://dkn255hz262ypmii.onion/index.php?topic=144403.0

1492
Never use more than two days in a row

That's good advice for a lot of drugs.

1493
You did nothing wrong. That's a common occurrence. I puked or felt sick the first few times I did opiates.

In fact, I felt that way the last time I did an opiate, after not having done any for over a year.

1494
Security / Re: Obfspoxy - Is it worth it?
« on: April 22, 2013, 05:07 am »
Sure, you can put it on Amazon or any VPS.

1495
Security / Re: Obfspoxy - Is it worth it?
« on: April 22, 2013, 04:58 am »
Let me give you another example. A few weeks ago, I was talking to someone online who was using the ExcludeNodes feature to exclude all relays in his country and several other countries that host some of the biggest relays. He was having trouble connecting to sites, especially hidden services. Well, what do you expect when you tell your Tor client to ignore half the network?

I understood the logic behind what he was doing, but also why he was wrong. He believed that it was easier for LE in his country to watch domestic relays and potentially identify him. He also believed that LE in those other countries were more likely to be watching their relays.

I pointed out to him why excluding huge swaths of nodes was a bad idea. Imagine one of your entry guards is malicious, and the operator is watching all the IP addresses that connect to it, and the relays that they connect to on the other side. If he sees a Tor client in country X that never connects to relays in country X, that's very suspicious. By changing the default Tor behavior, you make yourself stick out. You want to look like everyone else.

He thought about that for a minute and replied, "Like a school of finish."

Exactly. Walk up to a pond and pick a fish. Come back an hour later and see if you can find the same fish. Unless it has marks that make it stick out, you won't be able to do it.

The safest behavior is the default behavior, 1. because the Tor Project people know more about anonymity than we do and pick those defaults for a reason, and 2. because most people stick with the defaults. Once you start doing uncommon, exotic, and complicated things, you make yourself more identifiable, but more importantly, you draw attention to yourself.

1496
Torhost and TorShare are different sites.

You can get a free Torhost site  http://torhostg5s7pa2sn.onion/

Or like I said, I can give you an FH invite.

1497
Security / Re: Obfspoxy - Is it worth it?
« on: April 22, 2013, 03:36 am »
Am I correct in thinking in this case a VPN would be useful as a further barrier between me and any malicious bridges?
Now this is drifting off topic a little would it be of any use to move to running tor in a VM or with a live version of tails would that be entirely redundant?

People have different opinions about this. I also think most people don't understand how to be anonymous, but maybe I'm wrong and they are right. Here's my opinion, anyway.

Unless you are a high value target -- unless your adversary is actively looking for you, and they know you use Tor, so that can be used as circumstantial evidence against you -- you're better off using Tor like everyone else, and looking like everyone else. You're better off mixing into the crowd. As such, there are 500K daily Tor users (connecting to regular relays) and only 30K daily bridge users. Even fewer of those bridge users are going through VPNs or doing other complicated things to hide their Tor use. If you are not an existing target, but you don't want to be picked out of a fishing expedition, then you should act like everyone else. Use regular relays. Sure, somebody could see that you are using Tor, but so what? So are millions of other people. It's the ones who are taking extra precautions to hide that will stick out to our adversaries.

And no, I don't think a VPN will protect you, because legal businesses rarely fight LE demands for data. And all this stuff about VPNs that don't log? Yeah, that's a promise that can be revoked (thanks to an LE demand) at any time without your knowledge. The whole point of the Tor design is that you don't trust any entity that can see your whole circuit. That's privacy by design, rather than privacy by policy.

Oh that reminds me, I was looking through some old posts on the topics of bridges (they look to have been before obfsproxy) and it was recommended to set up your own private bridge to avoid that scenario of having your IP harvested by a compromised bridge. This seems eminently sensible to me but would using another computer of mine accessing the net through the same access point do the job. I think it would if my understanding of the bridges is correct but every time I think I have a grip on the infrastructure of tor I read something and it slips from my fingers.

No that's bad, because then your "bridge" or entry point is effectively the middle hop in your circuit.

1498
Didn't you get a Torhost site? Put it on there. Or I can give you an FH invite and you can put it on there. It's far less likely to disappear.

1499
Security / Re: Obfspoxy - Is it worth it?
« on: April 22, 2013, 02:34 am »
You should stick with as few bridges as possible. Assuming that some are run by our adversaries, the more bridges you "sample", the more likely you are to get on someone's list.

Bridges are supposed to be for censored users in places like China and Iran. No western countries block access to Tor, so you gotta figure that local bridge users will be interesting to LE in these countries. Trying to hide their Tor use, they must be up to no good.

So it's entirely possible that they are running some bridges and enumerating the IP addresses that connect to them. To mitigate that attack, connect to as few as possible.

1500
Security / Re: Obfspoxy - Is it worth it?
« on: April 22, 2013, 02:07 am »
In other news the switch over to tails was very very very easy. If anything it tries a little to hard to hold my hand at every stage (while oddly having the usual excessive degree of complexity of linux systems just below the user friendly service). All that pales into nothing in comparison to the ease of setting up obfsproxy bridges which is so easy I was certain I had done it wrong but I can see no issues in the log.

Glad it worked out for you! :)

A word of warning though - obfsproxy bridges seem very...flighty, I got 5 to start with and the log shows a change from one about 20 minutes after starting use of them (though this could well be an intentional changing of bridges).

What do you mean by "change from one"?

But yeah, bridges can go down quickly. The first time I tried to use the obfsproxy protocol, I got two bridges and neither of them worked. I thought maybe I had misconfigured something, but after requesting two new bridges, it worked. Best thing is to have a few extras on hand.

Pages: 1 ... 98 99 [100] 101 102 ... 208