Silk Road forums

Discussion => Newbie discussion => Topic started by: /I_Surf_Worm_Holes on June 05, 2013, 04:57 pm

Title: What Operating Systems Do You Use?
Post by: /I_Surf_Worm_Holes on June 05, 2013, 04:57 pm
just curious as to what types of critters there are running aournd here. i don't use windows, how about that. I just started using BSD recently; otherwise, i use a few forms of Linux.

I see plenty of talk about people using liveusb distros but I also wonder: do any of you use a virtual machine to access TOR? Furthermore, do any of you see any security issues in using a virtual machine to anonymously access TOR?
Title: Re: What Operating Systems Do You Use?
Post by: DarkBeauty on June 05, 2013, 05:04 pm
Why I run windows and it has always been good to... <blue screen>
Title: Re: What Operating Systems Do You Use?
Post by: thecatinthehat101 on June 05, 2013, 05:04 pm
I like Linux but its really kinda difficult to use and get used to for me. Not everything runs on it correctly. I know Windows is like horrible for security purposes for stuff like this but I keep coming back to it and try to keep decent security in place for protection.
Title: Re: What Operating Systems Do You Use?
Post by: astor on June 05, 2013, 05:16 pm
I can give you some decent stats.

Based on the 1012 vendor keys that I have imported, where the PGP version makes it obvious what the operating system is, it's about 72% Windows, 18% Linux, and 9% OS X.
Title: Re: What Operating Systems Do You Use?
Post by: DarkBeauty on June 05, 2013, 05:20 pm
I can give you some decent stats.

Based on the 1012 vendor keys that I have imported, where the PGP version makes it obvious what the operating system is, it's about 72% Windows, 18% Linux, and 9% OS X.

That is good thinking.

Do you know a way to prevent PGP from leaking what OS yo uuse?
Title: Re: What Operating Systems Do You Use?
Post by: /I_Surf_Worm_Holes on June 05, 2013, 05:24 pm
'Atta boy Astor!!!  ;D

Good question, Dark Beauty  :o
Title: Re: What Operating Systems Do You Use?
Post by: astor on June 05, 2013, 06:20 pm
That is good thinking.

Do you know a way to prevent PGP from leaking what OS yo uuse?

Yep, you can remove the Version line by adding no-emit-version to your gpg.conf.

For the sake of everyone's sanity, use a PGP program that is based on a recent port of GnuPG.

Windows: GPG4USB, GPG4Win

OS X: GPGTools

Linux: GPG itself (the original)


Then find where your gpg.conf (configuration file) is, and replace everything in it with this:

Code: [Select]
no-emit-version             # remove the version line
no-comments                 # remove comment lines

armor                       # ASCII armor all output, so it can be posted to email, forums

trust-model always          # suppress warnings about untrusted, unsigned keys

## Some lists of ciphers in order of preference
personal-cipher-preferences AES256 TWOFISH CAMELLIA256 AES192 CAMELLIA192 AES CAMELLIA128 CAST5 3DES BLOWFISH
personal-digest-preferences SHA512 SHA384 SHA256 SHA224 RIPEMD160 SHA1
personal-compress-preferences BZIP2 ZLIB ZIP Uncompressed
cert-digest-algo SHA512


## Optional
## Remove the # at the beginning of these lines to use them

#default-key <keyID>        # if you have multiple keys, this sets a default key to use
#encrypt-to <keyID>         # automatically encrypt everything to this key


#throw-keyid                # anonymize the recipients of a message by zeroing out the key IDs
#hidden-encrypt-to <keyID>  # automatically encrypt to a key and anonymize it


## You generally shouldn't use key servers, but if you want to connect to them over
## Tor, install an HTTP proxy like Privoxy and use these options. Privoxy uses port 8118
## by default, but you can change that to whatever your HTTP proxy uses
keyserver hkp://2eghzlv2wwcq7u7y.onion
keyserver-options http-proxy=http://127.0.0.1:8118,debug,verbose