1966
Security / Re: Tor accting funny
« on: March 12, 2013, 07:51 pm »
Are you using the browser bundle? It should come with Firefox.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Doesnt matter how many gateways you are away from reality, if you get just one trojan on it then your system is fucked. I mean they might not be able to deanonymize you but they can still take all your info which might have the same effect.
Live OS's > Gateways any day of the week.
I've been thinking a lot lately about the ultimate security setup for doing a variety of dodgy shit on the internet. The problem is that I do a variety of illegal business ventures that require me to access sites outside of Tor, or require me to run Tor and a clearnet browser side-by-side.
Internet Connection: I use an anonymous prepaid visa card to purchase a wireless internet dongle using fake details and have it delivered to a friends private mailbox (you can't have them sent to drop-addresses as they always require signature in Australia). I can now use the internet without the connection itself having any links to my real identity.
Computer & OS: I buy a new laptop and manually break the webcam, then use DBAN to wipe the hard-drive and OS, and then install Ubuntu with full-disk encryption.
Silk Road Access: I run Whonix through VMs that are stored on an encrypted USB stick and access Silk Road this way.
Clearnet Browsing: I use a VPN that you can pay for with BTC to access any sites that block Tor or that I need faster speeds to access.
Identity protection: Under no circumstances do I ever access anything that links to my real identity like banking, social media or personal email accounts. Any purchases I make online are done with an anonymous debit card loaded only with BTC and sent to drop-addresses not linked to me.
General programs: I use OTR for all online chat, GnuPGP for encrypting all emails and Truecrypt for secondary encryption (beyond the full-disk encryption) of any sensitive files.
Programs that require windows: For any programs that specifically require Windows I use a VM that is contained on an encrypted USB stick. Unfortunately I've been unable to find a label printer that I can run off Ubuntu so this seems to be the only workaround for this to remain secure.
Cold boot attack works against RAM no matter what device the RAM is in.
I just used the graphic you posted, did some retouching, recolored it and output a decent size. A vector graphic size would be nice for printing, but for most apparel type applications this png will work fine.
Oh yeah that looks like it. Now what to put it on without drawing attention......
I can't believe it's almost $35 USD!!
When I started in April it was around $4.75. Some people are getting awfully rich. l just hope this latest trend doesn't draw unwanted attention.
OK. That seems right, but it doesn't make sense. With the rate changing so fast lately, the SR rate could be very different than the actual rate. I'm surprised that this isn't given more attention. I wish this was more transparent.
Well i managed to get a high res camel that resembles teh fuzzey original, here it is 2560x2560 alpha png.
http://s8.postimage.org/s307akkgj/Camel_Hi_Res.png