Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - astor

Pages: 1 ... 194 195 [196] 197 198 ... 208
2926
Security / Re: Large BTC transactions, how to be safe.
« on: December 18, 2012, 12:25 am »
I think that's a hell of a transaction to make. I assume you'll be giving him cash first and then he'll send coins to a address that you specify?

2927
Security / Re: pgp encryption
« on: December 17, 2012, 08:59 pm »
You need to import the seller's public key into your PGP program. Their public key should be listed on their seller profile. It will begin and end with these lines:

-----BEGIN PGP PUBLIC KEY BLOCK-----

<bunch of gibberish>

-----END PGP PUBLIC KEY BLOCK-----

You didn't mention the PGP program that you're using, so I can't give you specific instructions. Just make sure you copy the entire thing, including all fives dashes before and after the text, in the first and last lines. That's a common mistake. A single missing dash will cause the PGP program to not recognize it as a public key.

Once it's imported you should be able to select that vendor as the person you want to encrypt the message to.

The output will be the encrypted message, which will begin and end with these lines:

-----BEGIN PGP MESSAGE-----

<bunch of gibberish>

-----END PGP MESSAGE-----

Copy that whole thing, including all dashes, and paste it into the form for submitting your address.

As a buyer you only need a public key if you want other people to send you encrypted messages. You must give them your public key. PGP is an asymmetric encryption system, where you always encrypt messages to the recipient's public key (although you can encrypt to your own key as well, if you want to be able to read your own messages; there can be multiple recipients).

2928
What attacks are you talking about? I don't think traffic analysis is really worth bothering about because it really is out of our hands and the resources required to carry out such an attack are enourmous. Also the setup required to effectively mitigate such attacks would be a nightmare and certainly go against the project being easy to setup and run (networking servers scattered across the world through Tor would be a pain, and slow). When the markets become decentralized (one of the hopeful end goals of this project), the value in compromising any particular marketplace will diminish very quickly so these types of attacks begin to become obsurd.

That's a good point.

Have these methods ever been deployed before anyway? I know hidden services have been shut down before but that's much more likely to be through the owner leaking their details/activity elsewhere on the net or IRL.

I think only on virtual models of the Tor network. No live hidden service has been identified through technical attack on the Tor network. Yes, all these attacks are theoretical, but you gotta figure that there will be a first time for at least one of them. You should never bet your security on the incompetence of your adversary.

Anyway, it wounds like an interesting project and I'll definitely be keeping up on it.

BTW, all the research on onion routing (attacks, mitigation, protocol obfuscation, etc) is listed here http://freehaven.net/anonbib/date.html

2929
You could set up your own kind of certificate-style trust mechanism for the darknet, where you list people who you trust and only deal with those certified by these trusted parties (a highly decentralized version of certificate authorities for SSL, more for certifying trustability than authenticity though). Anonymity makes trust an absolute bitch to handle, but you can still corrolate trust. If a high volume, trusted vendor on Silk Road decided to start up a marketplace (and used PGP or similar to verify their identity) then you'd be a lot more confident than random new hidden service.

A bit beyond the scope of this project, but it's a cool thing I wouldn't mind getting in to!

Actually, that reminds of the Freedombox. Are you familiar with it? It's a software stack that's supposed to run on a plug computer and provides various services (email, blog, social network) in a privacy-respecting way (distributed, versioned, encrypted back ups, etc). One cool proposal they came up with was in backing up PGP private keys securely. You could select say 5 or 6 (or 20 or 50) trusted friends and send each of them pieces of your private key. They would all have to collude to pwn you, which presumably they wouldn't because you selected people you could trust. If you lost your key, then you contact them, and after they verified who are you, you could reconstitute your private key. Voila! Distributed trust.

That would be more difficult in a truly anonymous network, but it sounds similar to what you were saying. I know you were talking about the web of trust model.

2930
A good effort. Had a nice build up. I would definitely read that to my kids at bed time :)

2931
Off topic / Re: FBI and DEA how can they can find you on Tor
« on: December 17, 2012, 05:08 pm »
We had a short discussion over here

http://dkn255hz262ypmii.onion/index.php?topic=93980

2932
I'm just wondering could it have been the saran wrap and zip locks that protected me? Or would the dogs smell right through it. It's rapped like 15 times over with 5 bags around it.

The accuracy of drug dogs is greatly exaggerated. Controlled studies have shown as high as 40% false positive rate, which you won't hear in any LE PR campaign. They want you to believe those mutts can detect residue in a bag from 100 meters away, but this is not the first case that I've heard of someone with quantity walking right past them.

2933
We want to assure you that there is demand for such apps too!  Especially the high and middle tier traders WILL NEED such apps for their private markets and dealings.

There's a trade off in moving from centralized to distributed markets. If you look at the Hidden Wiki right now, you'll see that it's spammed by a "vendor" named Eris. You can follow the links to his hidden service. Nobody knows anything about this vendor. Would you send BTC to him? The big value add of SR is that it's a central repository of ratings and reviews that builds confidence in making transactions. If you run your own private market, who should believe your reviews? Will there even be any? Will the whole thing depend on an independent review system?

The social and behavioral economic aspects of anonymous markets are another hard problem, but this one can't be solved by math or coding skills.

2934
http://dkn255hz262ypmii.onion/index.php?topic=93469.0

2935
What do you plan to do about some of the well known attacks for discovering hidden services?

2936
There are a number of awesome security features already in BitWasp that SR or other competitors don't yet have, like using PGP as a second level of authentication (i.e. you must possess the *private* key to decrypt the secret given to you by the site to login/change shit). These features aren't mature yet, but when they are they will benefit everybody.

That would stop phishing attacks dead in their tracks, which the community has been having problems with lately. It would be like multi-sig bitcoin transactions. Maybe you need to PGP sign every bitcoin spend too. Well, security is hard, and that would make the barrier to entry into these markets much higher. It would work great until the first person loses their PGP key, and then we're back to relying on the good will of an anonymous admin somewhere in cyberspace.

I could make a locked down, multiple layers of security, hacker-proof web app, but I couldn't make one that was easy for regular people to use.

That's the hard problem.

2937
Security / Re: package was opened by us customs, advice please!
« on: December 17, 2012, 05:04 am »
If they didn't raid your house within a few minutes of delivering the package, you're fine. They won't give you a chance to get away with it. I'm also pretty sure if they planned a raid, they wouldn't put a big sticker on the package warning you about it. Perhaps methylone doesn't come as anything on field tests. They didn't know what it is, but they knew it wasn't a (known) controlled substance, so they let it go.

2938
Rumor mill / Re: Anyone recieve from SuperTrips?
« on: December 17, 2012, 03:06 am »
Apparently really pure coke can be cut a fairly large amount and still be good street coke, so yeah, typical user could totally fuck up and take too much pretty easily if it were too pure.

This is why anyone who says they have "90% pure coke" is full of shit. I've read DEA reports that the average purity of cocaine seized during importation (in other words, off-the-boat coke) is like 79%. Everything on the street is less than that. Average street coke is probably 30-50% pure.

2939
Security / Re: Question about TOR nodes
« on: December 17, 2012, 01:44 am »
Of course they can do that, but they wouldn't do it with the Browser Bundle running on their DEA office computer.

There is a command line version of Tor with no Vidalia, which is what most Tor relays are running. It's possible that LEA in various countries are operating some of these relays. The easiest attack is simple timing / traffic analysis. If LE controls your entry guard and exit node, they can see who you are and what site you are accessing. The probability of picking two malicious nodes like that is (c/n)^2, where c = number of malicious relays, n = total number of relays. It's more complicated than that, because your client picks relays with a probability weighted by bandwidth, but lets go with that as a first approximation.

If the DEA operated 50 relays, the chances that you pick 2 of them for your entry and exits is (50/3000)^2 = 1/3600. That's a relatively small chance for a rather large number of relays that they would have to operate, however, if you picked different entry nodes every ten minutes (when you build a new circuit), you would quickly get pwned (on the order of weeks). But that's why entry guards exist. You stick with three of them for a few months at a time, so it would take years to cycle through them until you picked from the DEA nodes.

That's on average. Some people would get pwned faster than others. It's the luck of the draw. But the point is that the entry guards greatly improve your safety, which is why you should not follow the advice of some "improve your Tor performance" guides that say to increase the entry guards to 8. That can potentially get you pwned faster.

All of this only applies to visiting clearnet sites. There are no exit nodes with hidden services. LE can't do a traffic confirmation attack because they don't know where the other end of the circuit is (although there are some well known attacks for identifying hidden services).

2940
Silk Road discussion / Re: Personal plea from vendor Asylum
« on: December 17, 2012, 01:18 am »
This fiasco is another reason why you should always encrypt your address, no exceptions, and it blows my mind that 80% of SR users send their addresses in plaintext, according to stats provided by some vendors.

We usually think of the main threat as being LE compromising the server, but mundane shit like this more likely to happen, and you never know who it's going to happen to. A vendor got phished. Luckily this time no addresses were stored on the account, but next time the phisher may try to blackmail everybody whose addresses he gets. Oh, don't want me to turn this info over to your local police department? 50 BTC please. And that's assuming the phisher isn't LE.

Pages: 1 ... 194 195 [196] 197 198 ... 208