Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 183 184 [185] 186 187 ... 208
2761
Off topic / Re: Limetless no longer a vendor?
« on: December 26, 2012, 07:46 am »
I thought it was weird that he spammed the PGP Club Thread with that.

2762
Off topic / Re: + KARMA
« on: December 26, 2012, 06:17 am »
typtap hit +100 karma. Congrats! :)

2763
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 26, 2012, 05:44 am »
But yeah, I wasn't trying to say that kmf's knowledge is invalidated by what his character is, sorry. I was just making a, in hind sight, stupid comment. Personally, I think it worked out quite well, since we got to have this discussion and I always love a civil discussion that makes me think about what I've said or why. :)

Me too :)

2764
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 26, 2012, 05:42 am »
Hey, I am new here and was just wondering if someone could direct me to some information on sending encrypted messages and whatnot when dealing with ppl.

This is a good tutorial :) http://32yehzkk7jflf6r2.onion/gpg4usb/

2765
Security / Re: How safe is tor really?
« on: December 26, 2012, 05:35 am »
Basically, a given file (x) located on a hidden services pages (say a default image file of the forums template page or scarier still a users avatar) will have a known number of bytes when encrypted with cipher (y) (say the tor default cipher) regardless of the random seed, salt and hash etc used.

Therefore, all an adversary who is in control of the entry guard needs do is add up packet contents looking for requests of the known number of bytes and cross reference this with the IP making the request.

Web site fingerprinting attacks are well known. Researchers have demonstrated that watching the local end of a Tor connection could allow an attacker to identify a web site with 55% accuracy (under their controlled conditions) if it had static content.

http://lorre.uni.lu/~andriy/papers/acmccs-wpes11-fingerprinting.pdf


2766
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 26, 2012, 05:15 am »
Oh, also the fact that he posted a thread asking why people don't send mail-bombs to LE, and then went on to encourage the practice of trying to mailbomb LE.

Yes, he has gone on several tirades encouraging violence against the government and LE, which I disagree with as well.

I'm not trying to excuse those comments, but there's a chance he was fucked up when he made them. Lord knows I've said some stupid shit online, mostly thanks to alcohol in my case. :)

2767
Off topic / Re: + KARMA
« on: December 26, 2012, 05:03 am »
Might as well spread some more holiday cheer, so +1 to pages 121 to 130.

Is anyone else fucking GLAD Christmas is over? :)

2768
Also, if ya'll aren't using Liberte, then isn't it a concern to have your IP accessible to LE while on SR?

The vast majority of people are not using Liberte. They are running the vanilla Tor Browser Bundle on Windows, which will hide your IP. That's what Tor and the TBB are for. Liberte is just a secure operating system that also uses Tor, but Tor can be run on any operating system.

Since most people are on Windows, they are using a Windows port of GPG, mainly GPG4Win and GPG4USB.

2769
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 26, 2012, 04:38 am »
Just to be clear, your personal feelings about the guy are based solely on his opinion that people in mere possession of child porn shouldn't be prosecuted, or is there something more to it?

2770
Off topic / Re: An academic study on Darknets - I want YOUR help!
« on: December 26, 2012, 04:16 am »
1.Why do you use Tor and hidden services?

Obviously almost everybody here uses hidden services to get drugs. Some people use them for other things, like secure email. It depends on what the hidden service offers. Asking on a drug forum will give you a biased sample of Tor users.

More generally, hidden services are useful because they are very censorship resistant. An onion domain can't be hijacked by a registrar like we saw with some piracy web sites. An onion domain is the first 16 characters of a base32 encoded hash of a private key. A hidden service identifies itself to a Tor client with that private key, so the only way to hijack a hidden service is to 1) hack the server and steal the private key, 2) brute force a private key with the same hashed / encoded first 16 characters (a hash collision), 3a) trick people into believing your domain is the domain they desire, or 3b) brute force a private key where a substring of the onion domain resembles a known hidden service, which we've seen with some phishing attempts. 3a,b) are possible because of Zooko's triangle.

https://en.wikipedia.org/wiki/Zooko%27s_triangle

2. Do you think an academic study on hidden services is a good/bad idea, why?

Great idea. There's already a library of academic material on anonymity networks.

http://freehaven.net/anonbib/

Why? Because security through obscurity is a myth. The more we know about the technology we use, including threats to that technology, the safer we are.

3. Do you think that the Tor Darknet has longevity? How long can you see it lasting?

It's a decentralized network, supported by thousands of independent volunteers, spread across ~75 countries. Even if funding to the Tor Project were cut off, the relays would keep running. Eventually bitrot might down the network, but it would take years. As for "darknets" in general, there's an obvious need for privacy-enhancing technology, especially with an increased awareness of state surveillance capabilities.

Beyond that, people increasingly understand the liberating value of this and other technologies (cognitively, financially, and otherwise). Take bitcoin as an example. When governments don't control the money supply, an American can safely do business with a Cuban or Iranian. Let's say you're a publishing platform, like Wordpress. You need to make money as a business to survive, and an Iranian dissident is willing to pay for your service, but he can't because of embargoes between your two governments. This is where superficially well-meaning policies go wrong, but transactions in the bitcoin network are subject to no global policies, except the math that protects the integrity of bitcoin transactions. The coins in your wallet are yours, like actually yours, not just a(n easily revoked) "guarantee" from your government or a bank.

The cat is out of the bag on "darknets" and other privacy-enhancing technologies. A growing number of people understand the value of these technologies and there's no turning back, so no they won't go away, even if Tor isn't the final answer on secure anonymity networks.

Finally, is there anything you would like to see included in an academic study on Tor? (I.E more about the positive sides of the Tor community etc?)

I'd like to know if your colleagues in the CS department can identify a random hidden service of my choosing. :)

2771
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 26, 2012, 03:17 am »
Ok, that's an ad hom from left field. If lead Tor developer Roger Dingledine were a pedophile -- and I'm not suggesting he is -- would that make him any less of an expert on anonymity networks? Would his opinion be any less valid?

2772
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 26, 2012, 03:10 am »
And if you don't mind spending hours digging through kmfkewm's 2000 posts, he has a lot of verbose but incredibly detailed, and in my opinion, expertly informed comments on the subject. :)

2773
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 26, 2012, 03:05 am »
There is some controversy regarding the safety of TOR, but I have friends on Wall Street that are very proficient in computers / hacking and they claim that TOR is practically iron clad when used in combination with encryption and common sense safety measures. This is only there opinion of course

You don't have to rely on their opinion. The Tor developers themselves have summarized the known attacks on Tor along with references to published research. Spend a few weeks reading the papers and you can make an informed, expert decision about it.

https://lists.torproject.org/pipermail/tor-dev/2012-September/003992.html

Also, http://dkn255hz262ypmii.onion/index.php?topic=95305.0

2774
@stiffneck

-----BEGIN PGP MESSAGE-----

hQIMA1ewgXaB/e6sARAAlEBg7+0WPR6lY6M9XfseETF2i/5JGb8/+NXv2tKkLcRp
a1ZeEuc2/B71wR7y8cPRPZ6BjmKEehiENXGX7p0OBSRPUVEvdHDoL3ZMItXqtyFw
I9Aqlq27V0rcKDEPhLsufsY0o7KCCXb6MaB9bCaRkq/v8SgXBHSgQdI9N+7IyyH/
fPtbQBrTkO072vzcofGaEuVwJBBFEK5fxQ77AxcGYV99lbdaJcDlw/1wQ/S+m1br
rMFIswMBviObNhCMqwUZCEDkOpnsd5IRs2QqGCBoj0FHvtGXIjl0eIxJQOm6LfYb
iEsvLbxsRa3GlxBNlIrCrqt4faHsg+UCOE8bXFwBy+LaujM5Rvlu7+rAR+CoYWP2
wZImk6+4sz+VXyilCUwMdSPFu4ZuiXlXeKJ9BF1lP4ozaUIx0E1RaWQiWnvLdgff
m8MpsoKNfbjIKz830FEiOmLf5MWeFdLPp/nSrpElZoJ3DH/VM9MWDjjZXyFwk2bo
Y//jL4Co1OMgDqJ7/8RhWP0vuHtgFXLpOfrnmiiYAK5VyPS8iq+BA1e8YlZRwjVa
wtU61MmatkWBqbxv1ClKOe/w9ZXzKGKxhIIE+Lnxn6UqrnAYNNFzI9u8jYYductr
ZjgjkhIka1D+tOwXaYT4zCmafjrZ81TM6iaA/rw2wTq9vOWlcJtvFj7SA/W7Xx3S
wGcBcPvZRdQbfoO7IuN6Ed3/5mCWFQkoO9Anfv0RTsSXKmsFc3WYHJXaDg0zMmil
eciElWh7A1PpvVpdLxLE9uscLR5D1XP4uBkg+KXHVaOVqZc9cAWKcxWD0zlINaCB
sqDXoYb9AuYVi/44qseC/4XWHFobbPWAENMKSpZhotPS0ZaV1W1kMoxz0AwM2aoX
L8wQO79ktxdRxtPkJJ0lyNGpQJXF+Q+vDgdzSkuj9vOILo0JzrN9iCTyEMD/OfnZ
fmHVl22LZoOoKhcFJP76kJ10mN3ca6WAyMmndBfikLzjBG+ej/0G0Dfnbhct6HKb
3TpmhxscqYHocfSPWXeiWyUSCnwMGr/BpNiyvBZSnQp048b1pIsJUi0lbaPEg5IH
/fM8dBHI/Off
=XD+X
-----END PGP MESSAGE-----

2775
Silk Road discussion / Re: BUSTED THREAD!!! Please contribute
« on: December 26, 2012, 02:22 am »
Hey bro this dummies guide to pgp that a retard could understand. Any chance you could describe where to get it?

This has received great reviews: http://32yehzkk7jflf6r2.onion/gpg4usb/

Pages: 1 ... 183 184 [185] 186 187 ... 208