Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 130 131 [132] 133 134 ... 208
1966
Security / Re: Tor accting funny
« on: March 12, 2013, 07:51 pm »
Are you using the browser bundle? It should come with Firefox.

1967
Security / Re: Cold Boot Attack
« on: March 12, 2013, 07:47 pm »
So in other words, COLD boot attacks work against DDR3. :)

1968
Security / Re: Ultimate Computer Security Setup
« on: March 08, 2013, 11:38 pm »
Doesnt matter how many gateways you are away from reality, if you get just one trojan on it then your system is fucked. I mean they might not be able to deanonymize you but they can still take all your info which might have the same effect.

Live OS's > Gateways any day of the week.

We're talking about different threats. Any OS can potentially be rooted, including a Live OS, including Tails. An attacker with root access can disable Tor, iptables rules, and transparent proxying. An anon middle box as a separate physical device protects against that. Of course, if you get rooted, you can be fucked in many other ways, like the attacker reading sensitive files that store passwords or customer info, but your IP address and location will still be safe with a middle box. Obviously, you should never store personal info on the dirty computer.


1969
Security / Re: Ultimate Computer Security Setup
« on: March 08, 2013, 03:55 am »
I've been thinking a lot lately about the ultimate security setup for doing a variety of dodgy shit on the internet. The problem is that I do a variety of illegal business ventures that require me to access sites outside of Tor, or require me to run Tor and a clearnet browser side-by-side.

Physical isolation of these two states is the most secure. In other words, don't do clearnet and Tor shit on the same computer.

Internet Connection: I use an anonymous prepaid visa card to purchase a wireless internet dongle using fake details and have it delivered to a friends private mailbox (you can't have them sent to drop-addresses as they always require signature in Australia). I can now use the internet without the connection itself having any links to my real identity.

Are you using random wifi hotspots? Otherwise this is irrelevant. MAC addresses are not broadcast over the internet. Only devices physically linked to your dongle know its MAC address. If you're paying for internet service, they still know your identity. If you are connecting directly from home, they know your identity.

Computer & OS: I buy a new laptop and manually break the webcam, then use DBAN to wipe the hard-drive and OS, and then install Ubuntu with full-disk encryption.

Excellent choice! Finally people are getting the importance of FDE. :)

Don't forget to disable the microphone, too.

Silk Road Access: I run Whonix through VMs that are stored on an encrypted USB stick and access Silk Road this way.

Good choice, although lately I've come to the conclusion that an anonymizing middle box is the safest setup. It's a physical device, like a computer in an HTPC form factor, with 2 network interface cards, that sits between your main computer and your home router (let the router be the gateway to the public internet, not the anon middle box). It runs a stripped down Linux or BSD variant with Tor, and transparently proxies all connections over Tor. It's basically Whonix with the Gateway on a separate physical device. Don't get me wrong, your setup is orders of magnitude safer than most, but a gateway on a separate device is safer still.

Clearnet Browsing: I use a VPN that you can pay for with BTC to access any sites that block Tor or that I need faster speeds to access.

VPNs are good for certain use cases, but I've never understood the need to pay with bitcoin. If you connect to the VPN server directly, they know your IP address. LE can deanonymize you if the VPN provider cooperates. I suppose if you live with a bunch of other people, you have some plausible deniability.

Identity protection: Under no circumstances do I ever access anything that links to my real identity like banking, social media or personal email accounts. Any purchases I make online are done with an anonymous debit card loaded only with BTC and sent to drop-addresses not linked to me.

Superficially that seems safe, but don't you think you stand out as being "a weird (presumably young) guy who does nothing of value on the internet?" I think it's safer to maintain two identities. Have one computer with Windows, unencrypted, nothing sensitive. Act normal, have a Facebook/Twitter account, buy shit online, look just like everyone else. On the side (on separate physical devices), you do your dirty work.

I don't know, though. I'm not too familiar with research on social profiling of criminal activity.

General programs: I use OTR for all online chat, GnuPGP for encrypting all emails and Truecrypt for secondary encryption (beyond the full-disk encryption) of any sensitive files.

Sounds good. Just don't use TorChat. That makes you a hidden service which opens you up to new attacks. Run Pidgin over Tor and connect to a separate XMPP server.

Programs that require windows: For any programs that specifically require Windows I use a VM that is contained on an encrypted USB stick. Unfortunately I've been unable to find a label printer that I can run off Ubuntu so this seems to be the only workaround for this to remain secure.

Not sure why you're having problems. Printer support on Linux is pretty good these days. Check out http://www.linuxfoundation.org/collaborate/workgroups/openprinting/database/databaseintro

1970
Security / Re: Cold Boot Attack
« on: March 08, 2013, 03:20 am »
Cold boot attack works against RAM no matter what device the RAM is in.

But kmf, I've heard a lot of people say that CBA doesn't work against DDR3. What's your opinion?

1971
Silk Road discussion / Re: Anyone have a large silk road graphic?
« on: March 02, 2013, 01:38 am »
I just used the graphic you posted, did some retouching, recolored it and output a decent size. A vector graphic size would be nice for printing, but for most apparel type applications this png will work fine.

Oh, I misinterpreted your comment before. That's pretty cool that you made that.


Oh yeah that looks like it. Now what to put it on without drawing attention......

Bumper sticker, of course. ;)

1972
Silk Road discussion / Re: SR BTC Rate
« on: March 02, 2013, 12:36 am »
I can't believe it's almost $35 USD!!

When I started in April it was around $4.75. Some people are getting awfully rich. l just hope this latest trend doesn't draw unwanted attention.

It's funny because a few weeks ago, people were saying that $20 was a bubble. :)

The difference between now and the June 2011 bubble is that the bitcoin economy is much bigger. There's a lot more trade and a lot more people with stakes in the game. Legit sites like Wordpress.com and Reddit are accepting BTC and that will continue to expand.

Also, MtGox is partnering with Coinlab to make bitcoin purchases much easier for US citizens, who are the biggest demographic.

Unless something catastrophic happens, like governments banning bitcoin exchanges, I don't see it going below $20 ever again.

1973
Silk Road discussion / Re: SR BTC Rate
« on: March 02, 2013, 12:30 am »
OK. That seems right, but it doesn't make sense. With the rate changing so fast lately, the SR rate could be very different than the actual rate. I'm surprised that this isn't given more attention.  I wish this was more transparent.

Don't you want it to be smoothed out over a larger time frame? Sure, it sucks when BTC is rising, but when it's dropping, lots of people buy the bare minimum BTC for their order and end up a fraction of a BTC short (check out the Official Spare Coins Thread). Averaging over a larger time frame protects against that.

From SR's perspective, those are lost or delayed purchases, and therefore commission.

1974
Silk Road discussion / Re: SR BTC Rate
« on: March 01, 2013, 10:35 pm »
Like everything else, it is determined by the supply-demand ratio, and since the supply is fixed (well, it changes, but at a known, fixed rate), it is basically determined by demand.

More specifically, it is determined by all the standing bid/ask orders at the exchanges, and since MtGox handles 80% of that trade, it is basically determined by the bid/ask orders at MtGox.

Take a look at this: http://mtgoxlive.com/orders

The green line is the USD exchange rate for a bitcoin, and the orange and blue lines show how much BTC would have to be converted to USD, or vice versa, in order for the exchange rate to change to that point.


The value of BTC listed on SR depends on where they are scraping the info. That source could lag behind MtGox by several hours (or SR may only scrape every few hours), so it will be slightly different.


1975
Off topic / Re: Supporting cartels
« on: March 01, 2013, 10:30 pm »
Think of it this way. Aspirin is a drug, but it doesn't empower any cartels. None of the over the counter drugs do, because they are legal and freely available.

So drugs per se don't create organized crime, the drug laws do. Prohibitionists are to blame for organized crime and its associated violence.

1976
Off topic / Re: Supporting cartels
« on: March 01, 2013, 10:24 pm »
Also, just as alcohol didn't make the mafia rich, alcohol prohibition did, drugs don't create cartels. Drug laws do.

The solution is not to boycott drugs, but to legalize them.

1977
Off topic / Re: Supporting cartels
« on: March 01, 2013, 07:28 pm »
If you're that worried about it, you should stop driving, because oil money funds terrorism.

1978
Silk Road discussion / Re: Anyone have a large silk road graphic?
« on: March 01, 2013, 07:04 pm »
Well i managed to get a high res camel that resembles teh fuzzey original, here it is 2560x2560 alpha png.

http://s8.postimage.org/s307akkgj/Camel_Hi_Res.png

Nice find. That's probably the exact image that DPR used. The different shades of green are exactly the same.


I think the font is Verdana Bold or something very close to it.

Here is my attempt at a high res version of the logo with Verdana Bold:

http://xqz3u5drneuzhaeo.onion/users/qicpic/files/au.png


1979
Update: what you are experiencing may be unrelated to what I mentioned earlier. Keep an eye on this bug report:

"is this ticket the explanation for all those other TBB users who are reporting "The proxy server is refusing connections" issues too?"

https://trac.torproject.org/projects/tor/ticket/8336


1980
For the benefit of others, please report back if this solved your problem.

Also for the benefit of people reading this, if you start Tor Browser Bundle and check.torproject.org says there's an update, it's a good idea to check the official blog:  https://blog.torproject.org

They always make a blog post for a new update, sometimes with relevant information. In this case, they posted this:

https://blog.torproject.org/blog/new-tor-browser-bundles-firefox-1703esr

"Very important: if you've been using the Tor Browser Bundles with Firefox 10.0.x, you must not attempt to overwrite it with the new bundle. Open these into their own directory and do not copy any profile material from older TBB versions."

That's where I got this info.

Pages: 1 ... 130 131 [132] 133 134 ... 208