Silk Road forums
Discussion => Newbie discussion => Topic started by: /I_Surf_Worm_Holes on June 05, 2013, 04:57 pm
-
just curious as to what types of critters there are running aournd here. i don't use windows, how about that. I just started using BSD recently; otherwise, i use a few forms of Linux.
I see plenty of talk about people using liveusb distros but I also wonder: do any of you use a virtual machine to access TOR? Furthermore, do any of you see any security issues in using a virtual machine to anonymously access TOR?
-
Why I run windows and it has always been good to... <blue screen>
-
I like Linux but its really kinda difficult to use and get used to for me. Not everything runs on it correctly. I know Windows is like horrible for security purposes for stuff like this but I keep coming back to it and try to keep decent security in place for protection.
-
I can give you some decent stats.
Based on the 1012 vendor keys that I have imported, where the PGP version makes it obvious what the operating system is, it's about 72% Windows, 18% Linux, and 9% OS X.
-
I can give you some decent stats.
Based on the 1012 vendor keys that I have imported, where the PGP version makes it obvious what the operating system is, it's about 72% Windows, 18% Linux, and 9% OS X.
That is good thinking.
Do you know a way to prevent PGP from leaking what OS yo uuse?
-
'Atta boy Astor!!! ;D
Good question, Dark Beauty :o
-
That is good thinking.
Do you know a way to prevent PGP from leaking what OS yo uuse?
Yep, you can remove the Version line by adding no-emit-version to your gpg.conf.
For the sake of everyone's sanity, use a PGP program that is based on a recent port of GnuPG.
Windows: GPG4USB, GPG4Win
OS X: GPGTools
Linux: GPG itself (the original)
Then find where your gpg.conf (configuration file) is, and replace everything in it with this:
no-emit-version # remove the version line
no-comments # remove comment lines
armor # ASCII armor all output, so it can be posted to email, forums
trust-model always # suppress warnings about untrusted, unsigned keys
## Some lists of ciphers in order of preference
personal-cipher-preferences AES256 TWOFISH CAMELLIA256 AES192 CAMELLIA192 AES CAMELLIA128 CAST5 3DES BLOWFISH
personal-digest-preferences SHA512 SHA384 SHA256 SHA224 RIPEMD160 SHA1
personal-compress-preferences BZIP2 ZLIB ZIP Uncompressed
cert-digest-algo SHA512
## Optional
## Remove the # at the beginning of these lines to use them
#default-key <keyID> # if you have multiple keys, this sets a default key to use
#encrypt-to <keyID> # automatically encrypt everything to this key
#throw-keyid # anonymize the recipients of a message by zeroing out the key IDs
#hidden-encrypt-to <keyID> # automatically encrypt to a key and anonymize it
## You generally shouldn't use key servers, but if you want to connect to them over
## Tor, install an HTTP proxy like Privoxy and use these options. Privoxy uses port 8118
## by default, but you can change that to whatever your HTTP proxy uses
keyserver hkp://2eghzlv2wwcq7u7y.onion
keyserver-options http-proxy=http://127.0.0.1:8118,debug,verbose