Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 72 73 [74] 75 76 ... 249
1096
Security / Re: Hidden services security doesn't look too good.
« on: May 29, 2013, 03:33 am »
The problem is this is another theoretical attack - if it was possible they sure as hell wouldn't publish it without taking advantage of it. Many reports have shown Tor and hidden services are vunerable to traffic analysis and the likes, the problem is proving them in an entire which isn't controlled in that of simulations and what's more, LEA then have to prove it in a court of law which is a whole new ballgame.

I hear people claim that attacks against Tor are only theoretical but I never quite understood this idea. Many of the theoretical attacks against Tor have been carried out against the live Tor network with success. For example, certainly timing attacks have been proven to work against Tor. This new attack is simply a timing attack in which the attacker positions themselves at the HSDIR and hopes to own one of the clients or hidden services entry guards. From the quote I have read here on the first page of posts, it seems like the researchers are taking the wrong angle when approaching this method of attack. If the hidden service has a bad entry guard it can be deanonymized by the owner of the entry guard so long as the entry guard owner knows the .onion address. It seems the researchers are enumerating hidden service .onion addresses and then carrying out a trivial timing attack to see if one of their entry guards was selected by any of the hidden services. This is interesting, but many of the interesting hidden services are already public knowledge, in which case the attack is a simple timing attack that has already been in literature for many years. I think that more importantly, this attack allows the attacker to position themselves such that they only need to own the entry guard of a client connecting to a hidden service in order to deanonymize the client. The client connects to a HSDIR that is attacker controlled, so the attacker has half of a timing attack, if the clients utilized entry guard is also attacker controlled then the attacker can link the client to the hidden service. That is a bit more interesting, it is nothing really ground breaking though. It is also clearly not simply a theoretical attack, and indeed it could be easily carried out against the live Tor network, the only issue is owning the entry guard utilized by the connecting client, which is the hard part.

I imagine that for the most part the Tor developers will say 'meh' about this paper. None of this is really new, except for perhaps the ability for an attacker to become the HSDIR of arbitrary hidden services. Entry guards protect from this attack to the extent that they can, and we are left again with what is essentially trusting a single hop proxy.

1097
Security / Re: Hidden services security doesn't look too good.
« on: May 29, 2013, 03:07 am »
Of course, the authors of this paper are being kind of hyperbolic, because the entry guard system itself protects from this attack being fully carried out to deanonymize all clients. However, there are attacks for deanonymizing hidden services with little resources, especially if the attacker is a LE level attacker and can use court orders against targeted guard nodes (or if they don't even need to use court orders, because of  figuratively prehistoric communication privacy laws, which were mostly crafted ages ago to protect our physical mail and most recently telephone communications, and which are almost completely obsoleted when faced with modern intercept techniques). Tor started out with the goal of being a system that distributes trust in such a way that any one of the nodes you use can be compromised, and it doesn't compromise your anonymity. Using a single proxy is a single point of failure, Tor attempted to remove the single point of failure via its encryption techniques and using three nodes. Tor was celebrated for accomplishing this, but really it only superficially accomplished it. In reality, the entry node is far, far, far more important than any of the other nodes. For clients, having a bad entry guard is almost as bad as using a bad single hop proxy, in some scenarios it is essentially the same exact thing. In the case of hidden services, having a bad entry guard is in pretty much all scenarios just as bad as using a malicious single hop reverse proxy. The middle node and exit node are far less important, and for hidden services they are essentially worthless nodes.

Quote
The US government is paying 1.3 million dollars a year to the developers of TOR and the US government relies on it so much so much so I'm sure the developers will keep ahead of the curve.  I have faith.

Tor is low latency anonymity. They are at the head of the curve for low latency anonymity. But being the smartest retard is hardly an accomplishment.

1098
Security / Re: Liberty Reserve shut down by US authorities
« on: May 29, 2013, 02:54 am »
Seriously feds, pretty consistent pattern. I can tell what you are going to go after next, because it is what I was using three years ago. It is weird, like you are always trying to catch up almost lol.

1099
Security / Re: Liberty Reserve shut down by US authorities
« on: May 29, 2013, 02:51 am »
Wow they are only two or three years behind the latest trends, maybe in three more years when we are using NextCoin they will shut down Bitcoin somehow.

1100
Security / Re: Hidden services security doesn't look too good.
« on: May 29, 2013, 02:49 am »
Honestly, Tor security in general doesn't look too good.

1101
Security / Re: SR is over for me now with 2 CD's
« on: May 27, 2013, 08:25 am »
and write "Return to Render" on all mail no matter what before u open it, only open when you're ready for it (ex, use/sell)

Yeah, it's time to dispel that myth.

http://www.reddit.com/r/SilkRoad/comments/1f1joh/things_i_learned_from_watching_my_cousin_lose_his/

"The burden of proof is on you to prove that you did not know the controlled substance [was] in [the package]. Nobody is going to believe that somebody ordered an expensive product in your name and you had no idea. Not signing for the package did not help at all."

But lots of people order stuff to random houses, in the occupants name, and intercept it before they check their mail. So it is perfectly believable that somebody ordered something expensive in the name of someone else, without the someone else being aware of it. It happens all the time.

1102
Security / Re: SR is over for me now with 2 CD's
« on: May 27, 2013, 08:15 am »
CD for cannabis seeds sounds like bullshit unless you ordered twenty thousand or something, those are almost always love letters.

1103
Security / Re: How does a signature work?
« on: May 25, 2013, 06:44 am »
Using Astors post as an example:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Astor wrote this message.

-----BEGIN PGP SIGNATURE-----
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=QqtJ
-----END PGP SIGNATURE-----

When he signed the message 'Astor wrote this message' he used the sign button on some GPG GUI, or perhaps he used the CLI command gpg --clearsign
Likewise when the signature is verified, the verifier likely either uses a verify button on a GPG GUI, or perhaps they use the CLI command gpg --verify

However, when the GPG sign command is used,

First GPG takes a hash of the message 'Astor wrote this message', as you can see from the signed text the hashing algorithm SHA512 was utilized. The hex value of the SHA512 of the signed message is:

41aef97732043975c8ba34dedb2aeb7c4419677b2fcde5d4c869184837d37a542870a136c812d5ae172b6d4b6ce7e19a07c534fef0fe0cf93ec315644347440a

next, GPG used Astor's private key to encrypt the hash of the message, and then it base64 encoded the ciphertext. The base64 encoded version of the asymmetrically encrypted (with Astor's private key) version of the previous hash value is:

iQIcBAEBCgAGBQJRn4nRAAoJENAcophwbuIHnG0P/jqZzJ+/xl54n9yNQL59wMe/
mpUFtYtQa4ZiKaUmJWdGHjNbiMIx5WnYChGQGT9Dk53jMoL5bgGzV7qEul7k8tyE
Jzkf+5KZazhOTla8DAGMwZxrnRaWN5fdPh+rNKQ1uEcbYVjBhFAyM0fhiKISfeHZ
h8/Un9FIp9Q+NYJilGkTEpV1LeGspBFCn8JG1TvqYz3cCRMAJiQNiHI05fJZW+Qh
q4ChxF6LmvZ0Mh62bv2S5YGRkt0p0Z3X2ps4Y8zB0Owz/x+UEyQu+VAKMgaCmxhJ
QJsLXGwCrr0mdGo86DluRw22A3OTs5GqDglG8di04VgXAY1ZJK/Mi0+oFxCeUX+B
SsEc9ds95qwuGuHdBk3oFnscVM/OrMZBwHnGX2M66wiE0QycIefUufWJUqyEo28y
Hac8W+m7IadVyyygKmLzjS3PRMAgmFriazLYsz0NHPekC4NpS3qo+05UvxN5Gg/o
yebB68f0omKpHf84LLU1SW24kc8GhEzn/43tgic5JUo4gS+9qohQYr0uLkPBH9dt
yKN2LH4Z0pGmPzxixBh2pLBfspjWWoEqb+r30xGdiUoaiqEvFm2KR4FzVMDq/C+7
iJiDoRBVCQl6KosC6T+SDMzSQikk2WFOpbr7EF1MQL086qm7xCJmLs/w3CErFs2l
BeQCG1rHBApEO5snBxSo
=QqtJ

which is attached to the message (note that I am skipping a padding step since I don't know the specification for it by heart):

when somebody verifies that Astor signed the message:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Astor wrote this message.

-----BEGIN PGP SIGNATURE-----

iQIcBAEBCgAGBQJRn4nRAAoJENAcophwbuIHnG0P/jqZzJ+/xl54n9yNQL59wMe/
mpUFtYtQa4ZiKaUmJWdGHjNbiMIx5WnYChGQGT9Dk53jMoL5bgGzV7qEul7k8tyE
Jzkf+5KZazhOTla8DAGMwZxrnRaWN5fdPh+rNKQ1uEcbYVjBhFAyM0fhiKISfeHZ
h8/Un9FIp9Q+NYJilGkTEpV1LeGspBFCn8JG1TvqYz3cCRMAJiQNiHI05fJZW+Qh
q4ChxF6LmvZ0Mh62bv2S5YGRkt0p0Z3X2ps4Y8zB0Owz/x+UEyQu+VAKMgaCmxhJ
QJsLXGwCrr0mdGo86DluRw22A3OTs5GqDglG8di04VgXAY1ZJK/Mi0+oFxCeUX+B
SsEc9ds95qwuGuHdBk3oFnscVM/OrMZBwHnGX2M66wiE0QycIefUufWJUqyEo28y
Hac8W+m7IadVyyygKmLzjS3PRMAgmFriazLYsz0NHPekC4NpS3qo+05UvxN5Gg/o
yebB68f0omKpHf84LLU1SW24kc8GhEzn/43tgic5JUo4gS+9qohQYr0uLkPBH9dt
yKN2LH4Z0pGmPzxixBh2pLBfspjWWoEqb+r30xGdiUoaiqEvFm2KR4FzVMDq/C+7
iJiDoRBVCQl6KosC6T+SDMzSQikk2WFOpbr7EF1MQL086qm7xCJmLs/w3CErFs2l
BeQCG1rHBApEO5snBxSo
=QqtJ
-----END PGP SIGNATURE-----

first their GPG program notes that the hashing algorithm used was SHA512. Then GPG takes the SHA512 value of the message:

41aef97732043975c8ba34dedb2aeb7c4419677b2fcde5d4c869184837d37a542870a136c812d5ae172b6d4b6ce7e19a07c534fef0fe0cf93ec315644347440

next it unbase64s the signature, and then it decrypts the signature with Astor's public key, revealing the hash value (again I am skipping the step that removes padding). Next GPG compares the hash value of the message to the value it obtained after unbase64ing, decrypting and removing padding from the signature. If they both match, then it verifies that the message was signed by Astor, otherwise it says the signature is not valid.

41aef97732043975c8ba34dedb2aeb7c4419677b2fcde5d4c869184837d37a542870a136c812d5ae172b6d4b6ce7e19a07c534fef0fe0cf93ec315644347440
==
41aef97732043975c8ba34dedb2aeb7c4419677b2fcde5d4c869184837d37a542870a136c812d5ae172b6d4b6ce7e19a07c534fef0fe0cf93ec315644347440

When it compares the two strings, it must do so in constant time to avoid the possibility of a timing attack. Normally when two strings are compared, the comparing algorithm breaks on the first mismatch. In this case we need to compare every single character, even if there are mismatches, so that successful or unsuccessful verification takes exactly the same amount of time.

This is just a rough sketch of what GPG is doing when signing and verifying signatures with RSA, I definitely missed at least one step.




1104
Security / Re: How does a signature work?
« on: May 25, 2013, 06:17 am »
It is pretty simple really. Given an RSA keypair, anything encrypted with one key can be decrypted with the other. When you use RSA for regular encrypt/decrypt , you encrypt a random session key with the public key and then it is decrypted with the private key. When you use 'plain RSA' for signatures, you encrypt the message with the private key, and it is verified by being decrypted with the public key. However, using plain RSA for signatures is weak to all kinds of attacks. Instead you need to use the hash of the message, padding, and all kinds of other things need to be taken into consideration. But at a fundamental level, RSA sign/verify is the same thing as RSA encrypt/decrypt , but with the private key used for encryption and the public key used for decryption.

1105
Security / Re: best harddrive wipe software
« on: May 25, 2013, 02:43 am »
You can also do full disk encryption, low-level format from boot/startup disk, then install OS, again, I have done this plenty and tried to use EnCase to recover any files, not possible.

You can research this method a little more and find some great results. It will be helpful to other SR user if they know how LEO goes through your HDD when they seize your equipment. A good place to start is the most LEA agencies use, EnCase.


Cheers

That is a bad way to try to wipe your HD because it relies on the implementation of the FDE system. Pretty much when you wipe your drive with FDE, you are hoping that the FDE implementation you are using utilizes a Full Disk Wiping system of its own. Much safer to use something actually designed to wipe the entire disk in the first place.

1106
Security / Re: Deleting Encrypted Documents
« on: May 25, 2013, 02:38 am »
You should definitely shred files you are no longer using, even if they are encrypted. If you use an encrypted volume, the non-shredded files can still be recovered even after they are deleted, if the volume is mounted when you are attacked. Shredding files removes them entirely, and they can no longer be recovered even if the attacker gets you with the encrypted volume mounted. In the case of singly encrypted files, shredding them removes your ability to decrypt them if you are court ordered to do so, whereas if they are not shredded you could face being held in contempt of court for not decrypting them.

1107
Security / Re: How does a signature work?
« on: May 25, 2013, 02:16 am »
With RSA, signing is the same as encrypting, it is just you encrypt with the private key and decrypt with the public key. As it is implemented in cryptosystems, you take a hash value of the message to sign, then you encrypt the hash with the private key to get the signature. Then to verify the signature, the verifier takes the hash of the message, then they decrypt the signature with the public key and compare it to the hash value.

In addition to only operating on hash values, I believe you also need to use padding for it to be secure. Also, you need to make sure to use constant time comparisons in order to protect from timing attacks. However, the abundance of small (and highly important) details aside, at a core level, sign/verify is the same thing as encrypt/decrypt, just with the utilized keys reversed.

Of course you don't need to know any of this to use GPG, because they package it all up for you. But you were technically pretty much correct at a low level, just not from the high level perspective of using GPG to create and verify RSA signatures (in which case it is not the same thing as encrypt/decrypt, but rather is sign and verify).

1108
BitMessage doesn't have good enough of a specification for a proper Audit, even the code is apparently changing very rapidly. I started a thread on their forum addressing some concerns I have with it, apparently some of my concerns are not issues because of unspecified behavior protecting from them though.

https://bitmessage.org/forum/index.php/topic,1666.0.html

1109
Security / Re: laptop suggestions
« on: May 22, 2013, 10:27 am »
Some who made the posts suggestions Lenovo, have somewhat a sense of whats a good laptop. I would say the same also.

Here a link to a Lenovo already set up for SR.

eddiethegun
http://silkroadvb5piz3r.onion/silkroad/item/2a8c69213f

If you are not from US, you are taking a chance with duty and tax, this can add a hefty sum in addition to what you already paid, so BE AWARE!

Wow somebody already extracted Tor Browser Bundle onto it?!

1110
Security / Re: laptop suggestions
« on: May 22, 2013, 01:44 am »
Security is in the software not the hardware and any computing purchase is a balance of requirements

Sort of, but some hardware supports security features that other hardware does not support. For example, K series intel processors allow for overclocking, but non-k processors have support for IOMMU which is required for strong isolation. Newer processors support a range of security features not available on older processors. Different motherboards have different security features as well. Then there are things like Tresor, which requires AES-NI I believe. Software plays a big role, but it needs hardware support and not all hardware supports all security software. Thankfully laptop hardware tends to support pretty much everything, for desktops it is a bit more specialized.

Quote
Want something cheap? Get a deal from an electronics outlet. Expect it to be the same as a top-end model from 2 years ago, but easy to break, full of bloatware, middle of the road everything but good enough to do most things.

My advice is to get a laptop from a custom builder, not a major retailer like Newegg. Then you can automatically save a hundred dollars by not getting it bundled with Windows or other bloatware. You can also customize the hardware etc.

Quote
Want a gaming machine? Buy Alienware. Expect it to pull 45w of power and be huge, heavy and noisy. The battery will last 2 hours and you'll pay a fortune for it.

Yuck Alienware is like the Mac of the Windows laptops. Overpriced as hell and largely a marketing company. You can get an equal laptop for much less, Alienware is all about the brand name. The only real advantage of Alienware laptops is they seem to support overclocking the CPU a bit more than other laptops,but honestly you are not going to overclock your laptop CPU much anyway. Alienware laptops also weigh a metric fuckton compared to similar offerings from other companies. 

Quote
Want something white middle class coffee shop bling? Get a Mac. Expect to pay top dollar for mid-range hardware and crummy software but get a really nice screen and case.

Mac laptops are like Alienware, way overpriced for what you get. At least they have really nice screens.

Quote
Want something for your business that is robust? Get a Lenovo. Expect it to come with a 4 year warranty, a million USB ports and look like shit.

I can recommend Lenovo. They have the highest overall build quality of all laptops that I have seen. They do tend to be more business oriented though, usually they do not have gaming GPU's but rather workstation GPU's. One good thing about Lenovo laptops is that they support manual GPU switching from BIOS instead of the Optimus nonsense, so you can easily use the dedicated GPU with Linux.

Pages: 1 ... 72 73 [74] 75 76 ... 249