Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 131 132 [133] 134 135 ... 208
1981
Yeah, the big change in the latest browser bundle was moving from Firefox 10 to 17. You can't just overwrite the files like usual because of all the changes in Firefox. You have to extract to a new location.

1982
Did you extract the new browser bundle in the same place (over top of) the old one?

The Tor Project people said not to do that. You should extract it in a new location.

Otherwise, I'm not sure why the browser bundle in its default state wouldn't work for you.

1983
Silk Road discussion / Re: WHO THE **** IS DRWHITE????
« on: March 01, 2013, 05:48 am »
haha, good stuff. :)

1984
Silk Road discussion / Re: Anyone have a large silk road graphic?
« on: March 01, 2013, 05:27 am »
Now I'm interested in tracking down the original artist.

It was uploaded here on 9 April 2008 by a Gerald_G, but he doesn't claim to be the creator (that is left blank)

https://openclipart.org/detail/16274/camel-with-rider-by-gerald_g-16274

I wonder if the original artist is aware that his/her work has become iconic in cyber drug culture. :)

1985
Silk Road discussion / Re: Anyone have a large silk road graphic?
« on: March 01, 2013, 05:11 am »
You can download the icon sized graphic from WP or the marketplace and drop it into Google Image Search.

From there it's easy to find the original sources where they got it from, like this one:

http://clipartist.info/clipart/Egypt/camel_with_rider_2-3333px.png

Use a color selection tool to fill it in with the same green color.

It seems to generally be called "Camel with Rider", and there are color versions, like here:

http://clipartist.net/uncategorized/camel-with-rider-openclipart-org-commons-wikimedia-org

But they obviously modified it.

At least it's Creative Commons licensed. We wouldn't want SR to break the law! :)


1986
Security / Re: Overwriting hard drives?
« on: March 01, 2013, 03:10 am »
Yes, if you want to remove all evidence of the file, a full disk wipe is the only (reasonably) secure method.

Use DBAN  http://dban.org

Then set up full disk encryption or use an encrypted thumb drive to store sensitive files.


1987
Security / Re: TrueCrypt encrypt the system partition
« on: March 01, 2013, 02:45 am »
I'm thinking mostly on system speed, i use my computer for Photoshop and music editing, so speed is a big issue for me.

According to benchmarks, disk encryption incurs a 5-6% performance penalty, which is usually unnoticeable, unless you are doing heavy disk reads/writes. So booting up is considerably slower, but normal use of applications shouldn't be noticeably impacted.

Is there anything else to think about, any tips?

Make sure you thoroughly read the TrueCrypt documentation.

http://www.truecrypt.org/docs/?s=hidden-volume

1988
Security / Re: Article: TOR Exit Nodes Mapped with Google Maps
« on: March 01, 2013, 02:28 am »
That's a pretty cool map. :)

Keep in mind that the distribution of exit nodes is influenced by local laws and how they protect the operators. USA is underrepresented because hosting providers are scared of DMCA complaints, among other things. However, a lot of the operators of exit nodes in other countries are probably American.

1989
A Fucking GRAM Of Fucking FENT For Fucking $45?!?! What the Fuck?!?! That must be a misprint or a scam.

So I registered an account and checked it out. In case you're wondering, the registration link is the third one at the top. After that it's pretty easy to figure out the username, password and email fields.

The fentanyl appears to be mixed with some type of carrier. Here's a shitty Google translation of the listing:

Quote
Will be available on what you've all been waiting for!

Fentanyl, also known as Chinese white, on a qualitatively new sorbent. Ensures even distribution of the product and the absence of overdose!
Effect: classic gloomy thrust 20 percent less subjective than the very real nice heroin from the 90's, is approximately segodnyashemu Moscow street heroin. Duration is difficult to determine the peak effect lasts about an hour and a pleasant after-effects can pursue smile much longer than the first batch came out a little weaker than expected, as the were afraid to kill someone from the clients. Once disperse current product (and its not too much to say, attempt at writing), we can offer you a more robust version of the Chinese (with a higher concentration of active ingredient).

One gram intravenously successfully raskumarivaet three junkies with 10 years experience and a dose (ie, the veteran front 1g slow enough for four or five times). Novice in matters of opioids leisurely snyuhal shelf for 5 times to obtain a moderate relaxing effect. In the morning asked for a probe smile


The relevant word amongst that gibberish is "sorbent".  So it could be a few hundred micrograms of fentanyl on a gram of carrier.

Here's a pic if you're interested:  http://xqz3u5drneuzhaeo.onion/users/qicpic/files/8xz.jpg


BTW, that site is really low tech. It's just a FluxBB forum where people post offers in threads and work out transactions via TorMail.

Oh well, at least non-English speaking Russians have something now. :)

1990
Security / Re: Advanced PGP Help Needed!
« on: February 28, 2013, 03:59 am »
Here's what Nightcrawler always posts, and I was wrong, it was originally written by Guru, not LouisCyphre.

And yeah, like it says, if you are using OS X before 10.6, the nightly build won't work.

====================

GPGTools is highly version dependent -- depending on which version of OS X you have, it may or may not work as expected.  If you have Leopard (10.5) then you're pretty much out of luck. Your only option then will be using the command-line.

If you have Snow Leopard (10.6), Lion (10.7) or Mountain Lion (10.8), the
following instructions should be sufficient to allow you to get up and
running.

Download and install GPGTools: http://nightly.gpgtools.org/GPGTools_Installer-trunk.dmg

Once you have installed GPGTools,  what you want to do is to go into
System Preferences --> Keyboard --> Services.

Scroll down until you find the following entries. Be sure to put a check mark in the boxes to activate each keyboard shortcut.

Keyboard shortcuts:
===============

OpenPGP: Decrypt Selection:             Shift-Command-D

OpenPGP: Encrypt Selection:             Shift-Command-E

OpenPGP: Import Key from Selection:     Shift-Command-I

OpenPGP: Insert My Fingerprint:         Shift-Command-F

OpenPGP: Insert My Key:                 Shift-Command-K

OpenPGP: Sign Selection:                Shift-Command-R

OpenPGP: Verify Signature of Selection: Shift-Control-V

Remember, these shortcuts only operate on highlighted or selected text.

N.B.: To properly be able to import PGP into GPGChain (via TextEdit) you need to change the default on TextEdit from .rtf to plain text. You can do that through the Format menu, or you can go through the main configuration menu, accessible by using Command-comma. Ensure the plain text radio button is selected.

Also ensure that the following are UNCHECKED in TextEdit preferences: smart quotes, smart dashes, smart links.

To select text within TextEdit, use Command-A to highlight the entire document, or use your mouse to selection the section that you want to
verify/sign/encrypt/decrypt. It is highly recommended that you use only plain-text, as opposed to Rich Text (.rtf) format. Use Command-comma to
bring up Preferences and ensure that the plain text radio button is checked.

Once your text is highlighted in TextEdit, (by pressing Comand-A) you then encrypt using Shift-Command-E. You will then be presented with a list of keys to encrypt to, that you have added to your PGP keyring:

Other Commands You May Need:
=========================

OpenPGP: Decrypt File:                   Control-Command-D

OpenPGP: Encrypt File:                   Control-Command-E

OpenPGP: Sign File:                      Control-Command-S

OpenPGP: Verify Signature of File:       Control-Command-V


Once you have setup these shortcuts, you can begin using GPG.

To encrypt a message to someone using GPG, you first need a copy of the recipient's PGP public key.

Once you have located someone's PGP public key, you should copy and paste it into TextEdit. Save the PGP key to a file; you can call the file,
import.asc (or import.txt), for example. This saved file will usually be found in the Documents folder.

Launch GPG Keychain Access from the Applications folder. click on the Import icon in the upper left hand corner. GPG Keychain Access will then
prompt you for the name of the file which contains the key to import. It will usually show you a list of files in the Documents folder. Click on the
file named import.asc (or import.txt), and click ok. The PGP public key will then be imported into your PGP keyring.

To encrypt a message to a person, the message must be contained in a TextEdit document. Use Command-A to hightlight the entire document. Then use Shift-Command-E to encrypt. GPG will pop-up a list of public keys in your PGP keyring. Each key will have a little checkbox beside it which you can check, to select that particular key. If you were encrypting a message to me, you would put a check in the box beside my PGP key (Nightcrawler@SR).

When you click on OK, the plaintext (unencrypted) message in TextEdit will be replaced with the encrypted message. You can then copy and paste the encrypted message to enter it into a form on Silk Road, or anywhere else that it needs to go.

To decrypt a message sent to you by other people, you need to copy that message to the clipboard, and paste it into a TextEdit document. Again use Command-A to highlight all the encrypted message. Then use Shift-Command-D to decrypt the message. If the message is encrypted to your PGP public key, you will be prompted to enter your passphrase. Once the correct passphrase has been entered, and you click OK, then the message will be decrypted, and the decrypted text will be placed in the TextEdit document, replacing the encrypted message that was there previously.

Nightcrawler (original tutorial written by Guru)

1991
Security / Re: Scripts message at bottom of TOR
« on: February 28, 2013, 02:24 am »
Blocking JavaScript will break a lot of clearnet web sites. It's fine for Silk Road and forum, though.

1992
Security / Re: Ubuntu LiveCD only reading 3.2GB Ram??????
« on: February 28, 2013, 02:04 am »
1. How much RAM do you actually have?

2. Do you have a graphics card, and how much RAM does that have?

3. Are you absolutely sure it is the 64 bit version? What is the name of the iso file?

1993
Security / Re: Advanced PGP Help Needed!
« on: February 28, 2013, 01:59 am »
Try a nightly (or development) build of GPGTools.

If you read through posts by Nightcrawler or LouisCyphre, this issue has been addressed dozens of times, and that seems to be the solution.

1994
Security / Re: Scripts message at bottom of TOR
« on: February 28, 2013, 01:55 am »
It's just the NoScript notification. To disable it, go to the NoScript icon -> Options -> Notifications, and uncheck "Show message about blocked scripts."

Or you can disable NoScript

1995
Mine always clears SR in about one hr.   other people it takes hours and some it takes days?  What gives with the differences. 

Confirmation time can vary widely depending on transaction size (in kilobytes) and transaction fee paid.

If you (or the service you are using) send a large amount of coins from multiple addresses, miners will expect a larger transaction fee, like .0015 rather than the standard .0005. If you (or the service) pay no transaction fee, it can take over 12 hours to get the first confirmation.

Of course, I'm only talking about bitcoin transactions viz the block chain. With SR there's the further complication that the money in your account has to be added to a separate database under SR's control, and lots of unknown things can happen to delay that.

Pages: 1 ... 131 132 [133] 134 135 ... 208