Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 181 182 [183] 184 185 ... 208
2731
Security / Re: New to PGP/SR
« on: December 27, 2012, 07:26 am »
Hello SR community,
im interrested in some products to buy, but im a beginner. it seemed simple from the start but the more i read into PGP and such the more confused i become. so far i can tell, i can buy bitcoins directly from bitcoinnordic.com and as soon as i pay up they will be deposited into my sr account.
my first question regarding this, am i right about this method?

It's not a good idea to mention your exchange, or the fact that you're sending direct to an SR address. If you're buying coins under your real identity and you don't send them through a mixing service, that's a security threat. All bitcoin transactions are recorded in the block chain. If someone can identify that bitcoin address as belonging to an SR account, they can link it back to you.

If you haven't transferred coins to your SR account yet, you should send them through a mixing service. If you have already transferred coins to your SR account, I suggest you delete this thread.


secondly, where the hell do i find my own PGP key??
i am using GnuPG as far i know, and i doesnt know how to receive nor send messages properly. could you guys test me out?
heres my pgp key (I BELIEVE)

gpg: key A8100891: public key "synthex <synthex@tormail.org>" imported
gpg: Total number processed: 1
gpg:               imported: 1  (RSA: 1)


Your key is valid.

But if you're on Windows and still confused by PGP, read my tutorial: http://32yehzkk7jflf6r2.onion/gpg4usb/


2732
Do you mind if I link to your onion from mine as well?  It looks like you're going to go much deeper than I care to with your security tutorials.  I dont think I'm going to collect guides/howtos for Tails and the rest, but Would love to reference your site.

You can steal the damn thing. I don't give a fuck. Consider it public domain. :)

2733
Astor thanks for the great guide...

I am curious, what is generally the common usage for the e-mail of a key on SR?   I know it is subjective to risk, but is it more common to use username@username.com or an actual Tor account that you set up for "alternative" SR type communications.

I see some vendors use username@username, and last page or so makes perfect sense that you at least want to use something recognizable...  Do people use their tor mail address' often, doesn't seem like a huge risk outside of the fact you really should limit peoples knowledge of any permanent accounts (even if separated from your real identity).

But then again we are all communicating with SR forum accounts lol.  I would assume risk of monitoring a tor mail account is probably the same as a SR forum account.  I suppose also to avoid spam and scammers harassing you via tor mail.

Hi peeweed,

PGP was created for privacy, not necessarily anonymity. The common use case is for people who are not trying to hide their identity, so providing an email address isn't a problem for them. In fact, it's extremely useful because most PGP messages are transmitted over email. You would want the email in the PGP key to match the email address you're sending to.

For us it's different. Most PGP messages are posted to forms on SR or in forum posts. You don't have to provide a valid email. Most people will probably ignore it, but it can be useful, for example when the SR server goes down. If your vendor provided a valid email address, you can contact them out of band, and vice versa. I think it's generally a good idea to register a TorMail address and use that in your PGP key.

I've imported a lot of PGP keys and the majority of people use what I assume is a valid TorMail address.

2734
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 27, 2012, 05:43 am »
Moral of the story is, use GPG4USB. If DPR's next signed announcement doesn't check out, you're probably using a buggy Windows port of GPG.

2735
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 27, 2012, 05:13 am »

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

BlarghRawr, you are the wind beneath my wings.

-----BEGIN PGP SIGNATURE-----
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=FPVZ
-----END PGP SIGNATURE-----
Key ID: 706EE207
Status: Key NOT valid
User Name: astor <astorx@tormail.org>
Description: Uncertain signature by astor <astorx@tormail.org>

... It's literally a button on the fucking clipboard. It just says "verify", and all I needed was to have your key. I assume GPG4WIN is the problem, but if you could check your message yourself(or if someone else could also check it), that would be helpful.

gpg: Signature made Wed 27 Dec 2012 [REDACTED 4TimeZone] using RSA key ID 706EE207
gpg: Good signature from "astor <astorx@tormail.org>"



Oh! We have a winner kids. Now try to verify my sig with GPG4USB following my tutorial. :)


Edit: the time on the signature should be 04:17:36 UTC if my calculations are right.

2736
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 27, 2012, 04:18 am »
I'll take that challenge, too. :D

If for no other reason than the chance to prove myself smarter than someone I don't know. And hey, if I'm fucked by it too, that just means you've got another convert.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

BlarghRawr, you are the wind beneath my wings.

-----BEGIN PGP SIGNATURE-----
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=FPVZ
-----END PGP SIGNATURE-----

2737
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 27, 2012, 04:15 am »
EDIT: None of these security measures are worth a damn if you tell people about them. Once LE finds out about your setup (they will if you talk about it), you're fucked because they'll simply come prepared.

I feel the same way about encrypted hidden volumes. If everyone starts using them, then LE can assume you have one, even when you honestly supply the password to the only volume and it is clean. In certain regimes, it will guarantee a rubber hose treatment rather than prevent one.

But we don't run the server so we're not giving up secrets. We're just shooting the breeze because security shit is fun. :)

2738
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 27, 2012, 04:10 am »
Too many problems with GPG4Win. Since I created that tutorial and started posting in the PGP Club thread, you would not believe how many people have contacted me on the thread, in PM, and via TorMail, and 90% of the time, when they are having a problem with PGP but using a program other than GPG4USB, simply switching to that program (following my tut) solves their problem.

Just today I challenged someone to learn how to verify a signature (because DPR signs -- some -- of his announcements and people think that's important), so I sent this person a signed message and he couldn't verify it. He was using GPG4Win. Told him to switch to GPG4USB, he came back an hour later and said if verified.

The Wiki needs to be changed to recommend GPG4USB.

2739
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 27, 2012, 03:44 am »
Also, having the device off when LE arrives isn't 100% safe, either. Some data can be recovered from ram up to something like 2 minutes after it loses power(with corruption)

Scrambling the RAM on shut down protects you from cold boot attacks.

I've also heard of just pouring glue or plastic materials around the RAM sticks so it takes too long to extract. Not every security problem needs a math solution. :)

2740
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 27, 2012, 03:43 am »
Actually yeah, the safest way to secure the SR server would be to colocate and supply your own hardware rather than renting a dedicated server. Install the OS at home, set up ssh access, then rig the chassis so if it's opened or tampered, it triggers an emergency shut down procedure that scrambles RAM. Then ship that to the data center.

2741
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 27, 2012, 03:37 am »
Oh, I don't know if the server does it or anything, it was just an idea of how to keep "the key" secure from LE-intervention, caused by seeing what you said. I am, however, going to go suggest it to DPR because that shit is bawlin'.

LOL, actually I don't know if that's possible. The encryption key has to be accessible for the server to continue doing en/decryption, like for all the database reads/writes. I'm not aware of a way to protect an encryption key from an adversary who has physical control of the device. You can trigger a dead man's switch for emergency shut down and scramble the RAM in the process, hopefully before the adversary can extract the key, but the only 100% safe defense against a physical adversary is to have the device off when they arrive.

2742
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 27, 2012, 03:26 am »
What about storing the key in a fully encrypted, only touched once pre boot-cycle USB(or some such), and giving it temp-storage on an also-encrypted RAM-drive which gets frequently accessed when said key is needed, before said key is religiously scrubbed from the non-encrypted ram?

That is to say, wouldn't that protect from an event such as the server getting pwned and LE trying to snag the key from RAM?

That's a great idea. If you can prove to me that the SR server does this... I'd still PGP encrypt my address, because the cost (in time, work) of encrypting is negligible compared to the security benefits. :)

2743
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 27, 2012, 02:50 am »
SR automatically encrypts information in the checkout section an everywhere else I'm reasonably sure. You only have to worry if the site or your vendor is compromised which as we have seen recently is possible.

I'm 100% sure the SR server uses full disk encryption, but as you said, that doesn't matter if the server gets pwned and LE steals the encryption key from RAM. This is why you should PGP encrypt your address.

2744
Off topic / Re: An academic study on Darknets - I want YOUR help!
« on: December 27, 2012, 12:48 am »
Astor - I'm aware of the bias issue of just asking around on the Silk Road, however I'm currently just doing some homework to get a sense of what people think about things and I thought I'd rather start by speaking to the crowd I'm more familiar with. I'll be posting up the same questions in other places over the next few days to get a better sample.

Do you know where to ask? Have you found other forums? I can help point you in some useful directions.


Also when you asked me:

 
Quote
I'd like to know if your colleagues in the CS department can identify a random hidden service of my choosing.

Do you mean identify as locating geographically? Cos if so I doubt it haha, but I'm willing to speak to my various CS friends and colleagues and see if I can get the ball rolling on this one. PM me with more details and I'll see what I can do :)

The IP address would do. I was being facetious with the request, but it is the big outstanding question for all of us. :)

2745
Silk Road discussion / Re: Do you think the lsd here is expensive?
« on: December 27, 2012, 12:37 am »
I remember when 10 strips cost $40 and sheets were like $175. Supply dropped drastically after William Leonard Pickard got busted in 2000, and prices went way up. I haven't tried the LSD on SR, but the reviews indicate that you can get a good trip (actual visuals) off a single hit of most of the stuff sold there, which is better than the street acid I've done. I usually had to eat half of a $40 ten strip to get visuals. :)

Pages: 1 ... 181 182 [183] 184 185 ... 208