Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 134 135 [136] 137 138 ... 208
2026
Security / Re: PGP question on decryption
« on: February 12, 2013, 01:41 pm »
More than a month later he still has this problem, because he never came back to read his own thread.

It would be really useful if you told us which PGP program you're using.

2027
Security / Re: Browser settings
« on: February 12, 2013, 01:35 pm »
There's a lot of FUD in this thread. First of all, JavaScript runs inside the browser and can't bypass proxy settings, so it can't "reveal your IP" in the same way as a plugin (Java, Flash). There are ways that JavaScript can deanonymize you, especially when Torbutton states are toggled, but you shouldn't be toggling Torbutton off in the browser bundle these days, and Torbutton blocks this malicious activity anyway. Here's what the Tor Project has to say about it:

Quote
Javascript can do things like wait until you have disabled Tor before trying to contact its source site, thus revealing your IP address. As such, Torbutton must disable Javascript, Meta-Refresh tags, and certain CSS behavior when Tor state changes from the state that was used to load a given page. These features are re-enabled when Torbutton goes back into the state that was used to load the page, but in some cases (particularly with Javascript and CSS) it is sometimes not possible to fully recover from the resulting errors, and the page is broken. Unfortunately, the only thing you can do (and still remain safe from having your IP address leak) is to reload the page when you toggle Tor, or just ensure you do all your work in a page before switching tor state.

https://www.torproject.org/torbutton/torbutton-faq.html.en

Also, the web sockets bug was fixed a long time ago.

https://blog.torproject.org/blog/firefox-security-bug-proxy-bypass-current-tbbs
https://trac.torproject.org/projects/tor/ticket/5741

The main threat to deanonymization is plugins, especially Flash and Java. Don't use them.

2028
Customer support / Re: Can only post her.....need help
« on: February 12, 2013, 02:44 am »
i think sr make a code on sr site that you put in here when you cr8 account, just linked for SR admins so 1 real account from SR site with 1 transaction at least.

That's not a bad idea, for people who don't mind linking their SR and forum accounts. After you finalize your first transaction, you are presented with a code that you can use to promote your account so you can post anywhere on the forum.

2029
Silk Road discussion / Re: GQ article - the hunt for DPR
« on: February 12, 2013, 12:31 am »
That's when they secretly coordinate with LE in some third world country that doesn't have those laws.

2030
That shouldn't happen if NoScript is completely disabled.

Do you mean that NoScript is enabled but you've whitelisted the site? It's possible if the menus and other page elements are being loaded from a domain that you haven't whitelisted, then that JavaScript won't run.

2031
Silk Road discussion / Re: GQ article - the hunt for DPR
« on: February 11, 2013, 07:01 pm »
I know for a fact, that the majority of your major drug busts, happen on a routine traffic stop where there is no other suspicion, but for the violation that the individual was stopped for. Then, a mistake is made by the citizen and boom goes the dynamite.

A majority of drug busts of large distribution organizations involve confidential informants. Ask any drug agent and they will tell you that CIs essential to their job. SR operates in a different way. We are all anonymous to each other. As long as nobody in DPR's real life knows that he runs this site, that major threat is eliminated.

2032
The highest option in Kleopatra is 3072bit for some reason, no 4096bit so this will have to suffice.

If that's the case, then I suggest dropping Kleopatra. Use GPG4USB for Windows and Linux, or GPGTools for OS X.

2033
Security / Re: This is where DPR keeps his money...
« on: February 11, 2013, 02:09 pm »
Pretty easy to cash out 10+ million dollars?

You realize there is only one legit bitcoin business in the world that pulls in money like SR, and that's Mt. Gox.

Unless DPR is running Mt. Gox (who knows?) there's just no way to cash out that much BTC.

The market cap of bitcoin is too small. There's nowhere to hide.

Starting a bitcoin exchange would be an excellent way to launder the coins out, but you're right, SR is too successful for its own good. Cashing out over $1 million in bitcoins a year is pretty difficult without getting noticed. That is why DPR is most likely NOT retired on a private island yet. :)

2034
Security / Re: This is where DPR keeps his money...
« on: February 11, 2013, 02:06 pm »
Trendon Shavers, pirateat40, is not DPR.

How do you know that? ;)

2035
Someone asked a similar question a week or two ago. The threat isn't just that SR would change the key. A vendor's account could be compromised through a phishing attack. In fact, this has actually happened.

The solution to this problem is to distribute your public key as widely as possible and through many independent channels. Make sure all your customers have your key. Some of them will be able to verify your identity.

The vendor who got phished had to prove his identity by posting a signed message to the forum and waiting for a former customer to verify it.

2036
1. http://howdoyoubuybitcoins.com

2. All purchases are automatically in escrow.

2037
Account (at top of page) -> View Feedback (on right side of page)

You can edit the feedback from there.

2038
Silk Road discussion / Re: GQ article - the hunt for DPR
« on: February 09, 2013, 01:33 am »
Considering the lengthy missives DPR has written, this should concern him.

They would need a bunch of writing that he posted on clearnet to compare it to and use that to identify him, otherwise it's useless.

As long as he never had a blog, he should be fine with regard to writing analysis.

2039
No, but you could ask them for their public key. :)

2040
Security / Re: Bridge Communities with Obfusproxy version 3+
« on: February 09, 2013, 12:27 am »
No, but you could use it to connect to a bridge.

I don't see the point of that, though. If you are confident that your VPN doesn't keep logs, you might as well connect to public relays through it.

Pages: 1 ... 134 135 [136] 137 138 ... 208