Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 164 165 [166] 167 168 ... 208
2476
Security / Re: Another teq question. For ASTOR NIGHTC AND SS...THNKS
« on: January 06, 2013, 04:57 am »
First, Nightcrawler posted an answer in the other thread. You should read that.

What do you mean by dual-booting a USB? You want two operating systems on it? Or you want one operating system on it which you can reboot your computer into? (I suspect that's what you mean)

Others may have different opinions, but I suggest going with Tails as your distro, which already comes with security apps (including Tor) and safe configurations.

The Tails web site has documentation on installing to a USB stick.

https://tails.boum.org/doc/first_steps/usb_installation/index.en.html


2477
Security / Re: Laptop Teq question! Need real teqs advice!
« on: January 06, 2013, 04:50 am »
Nightcrawler, I'm curious as to why you chose MEPIS. Why not Tails, which comes with all the security stuff by default, including features like scrambling RAM on shutdown?

2478
Security / Re: can you read my PGP?
« on: January 06, 2013, 04:05 am »
Another thing is, if you are going to combine signing and encryption, you should sign a plaintext message first, then encrypt it.

It avoids this problem:

- -----BEGIN PGP MESSAGE-----

- -----END PGP MESSAGE-----

See the dash and space at the beginning of those lines? The recipient has to manually remove them in order to decrypt the message, and that's a pain in the ass, especially for a vendor who deals with dozens of encrypted messages a day.

2479
I haven't been scammed either, but I tend to be conservative with my orders and go with highly reviewed vendors. Also, once I find a good vendor, I tend to stick with him even if better deals come along. While it's not an absolute, having a long term relationship and a lot of rapport with someone decreases your chances of being scammed. It's also a security issue for me. I want to minimize the number of people I send my shipping info to.

2480
Off topic / Re: The History of Online Drug Marketplaces
« on: January 06, 2013, 02:49 am »
Maybe it depends on where you live, but buying e-gold wasn't much different from buying bitcoins. You had to send money to a virtual currency exchange and then get it deposited to your e-gold account. Those exchanges were more fly by night, that's one difference. MtGox has been a very stable business so far.

2481
Security / Re: can you read my PGP?
« on: January 06, 2013, 02:11 am »
Of course we can't read it unless you encrypt it to our public keys.

Let me guess, you're encrypting it to your own public key. That only lets you decrypt it. Further, you don't need to sign an encrypted message. I've been seeing more and more people doing this and I wonder where they are getting that idea. Is it some shitty tutorial?

If you want to test your ability to encrypt a message, grab my public key from the link in my signature and encrypt a message to that. Then post your public key so I can encrypt a message to you and see if you can decrypt it.

Also, we have a whole thread for PGP help called PGP Club.

http://dkn255hz262ypmii.onion/index.php?topic=30938.0

You don't need to start a new thread for this.

2482
Security / Re: Securing hidden services
« on: January 06, 2013, 01:56 am »
Thanks. I'll have to look into intrusion detection switches.

One thing I didn't describe is how you access the servers for administrative purposes. Both the gateway and workstation would have hidden services for ssh, and the daemons would be listening only on localhost, so the gateway sshd wouldn't accept any connections from the public internet (the workstation of course doesn't face the public internet at all).

Further, the HiddenServiceAuthorizeClient option would be turned on and set to stealth, meaning that the admin has to include a "cookie" (basically a password) in his torrc to access the ssh hidden service. If the cookie is not provided, the hidden service appears not to be running, so it's deniable that these ssh hidden services exist at all. Connecting to the gateway and workstation would be a matter of pointing one's ssh client, over Tor, at the right onion domain.

2483
So far, five. Verifying ASCII and binary signatures are the other two.

2484
Off topic / Re: how much safer would drugs be if they were legalized?
« on: January 06, 2013, 12:21 am »
It's not like the money currently being spent on drugs would disappear if they were legalized. So instead of selling illegally, you could open a shop and sell it legally, possibly make even more money that way and without the legal risk.

2485
Silk Road discussion / Re: CAN SOME ONE HELP ME WITH IRC CHAT?
« on: January 05, 2013, 11:31 pm »
What error does it give you?

2486
Off topic / Re: The History of Online Drug Marketplaces
« on: January 05, 2013, 11:24 pm »
That was a nice, detailed overview. I remember some of those forums.

Only thing I would add is usenet. That was probably the first online place where people bought and sold drugs.

2487
Security / Re: PGP Basic Etiquette
« on: January 05, 2013, 10:56 pm »
You're doing it right, quale.

2488
Security / Securing hidden services
« on: January 05, 2013, 10:53 pm »
Does anybody want to brainstorm about securing hidden services? Here's my ideal setup.

You need two dedicated servers. One is the workstation and the other is the gateway. The workstation hosts the web and database servers. It runs the web site. The gateway hosts two Tor clients. One client is directed at the SOCKS port of the other client, so its Tor circuits run through the other client's Tor circuits. The gateway has two network interface cards. One is connected to the internet, the other is connected via a crossover ethernet cable to the workstation. The workstation can only access the internet through the gateway. The gateway contains iptables rules to force all connections from the workstation over Tor. That way, even if the workstation is pwned, the attacker can't determine the IP address. Running Tor over Tor makes certain attacks on hidden service entry guards harder.

Both servers run security-hardened kernels with patches like TRESOR to put encryption keys in CPU registers instead of RAM. They use full disk encryption and SE Linux or AppArmor with strict access control policies.

I haven't found a good example of how to do this, but I would prefer to booby trap the cases with a special lock. A specific key or code must be entered. If the case is opened any other way, it initiates a shut down sequence that scrambles RAM and overwrites the first gigabyte of the hard disk, destroying the encryption key. Alternatively, the key could be stored in the TPM, but I don't know how safe that is. Hardware manufacturers may provide backdoors for LE.

All of this is setup in a secure, private location and the servers are shipped to the data center. The technician simply installs the servers in a rack, connects the ethernet cables and turns them on.

What am I missing? How could this be made safer?

2489
Silk Road discussion / Re: Free Herb Society - For everything natural
« on: January 05, 2013, 09:46 pm »
Natural peach and cherry flavors contain cyanide while the synthetic forms don't. It's not very much cyanide, but a good example that synthetics can be cleaner than their natural counterparts.

BTW, if I ever form a band, it is totally going to be called Peach Cyanide. :)

2490
Off topic / Re: + KARMA
« on: January 05, 2013, 09:30 pm »
+1

anonman88
blueveil
typtap
JoeyGPesci007
Ballzinator
Flyerz1934
dirtybiscuitzz718
CrazyBart
samesamebutdiffernt
PrincessHIGH

Speaking of psychedelics, has anyone tried mescaline, specifically from cactus? I parachuted 2 ounces of cactus powder, farted for 6 hours, but it was a nice trip. :)

Pages: 1 ... 164 165 [166] 167 168 ... 208