Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 98 99 [100] 101 102 ... 249
1486
Newbie discussion / Re: A simple security puzzle.
« on: February 19, 2013, 02:55 am »
This problem is kind of stupid because you don't specify any restrictions on the attacker. Can they just keep guessing cards until they have determined the correct one? If so, they will always win. Can they only guess once? If they can only guess once you could just select a card in your mind without even opening the deck, in which case the attacker has only a 1/52 chance of winning, so the odds are in your favor.

1487
Security / Re: Tor network compromised - cogent isp (dea, cia, nsa)
« on: February 19, 2013, 01:35 am »
Quote
That's part of the internal political will that I mentioned. An agency with finite resources must prioritize, and SR is not a big enough target.

I don't even think SR is on the list of potential targets for intelligence agencies. Intelligence Agencies != Police Agencies.

Quote
An agency with infinite or "unlimited" resources could attack anyone of any size.

My point stands, such an agency doesn't exist. :)

Sure such an agency does not exist. I agree. However it only takes a global passive adversary to pwn all of Tor, and although such an agency may not exist some are certainly close. And a global passive adversary in the context of Tor, rather than the entire internet, is really all that is required.

Quote
BTW, two US senators explicitly asked for US LEA to investigate SR. That's strong external political will that should have increased its priority, but it's still up.

Yes I am sure SR is quite a high priority for all kinds of international federal police agencies, DEA and USPI and ICE are certainly highly interested in SR, Interpol is probably coordinating an international operation against it as we speak, and the Australian federal police have a huge hard on for it, amongst various other international police agencies. None of these agencies are on the level of NSA or CIA. They play a different game with a different list of targets and a different list of targeted activities. They have little cooperation or collaboration with each other, and when they do it is usually with the FBI counter terrorism people, who are also not likely to be the FBI agents trying to attack SR, as SR is not a terrorist organization.

Quote
80% of internet traffic is video and a good chunk of that is porn. If they are randomly sampling at IXs, they are wasting their time.

They are almost certainly sampling at IX's, although I am not sure it is entirely random or if it is a complete waste of time. They only need one packet per stream to carry out traffic analysis against low latency flows, so that is probably what they are aiming for. If they get a lot of single packets from porn feeds, it will add up to a lot, but it isn't like they are recording the entire download of the porn movie or torrent. Also they almost certainly use various forms of filtering.

Quote
Even if they were storing terabytes of data, there's no way that humans could cull it manually. They most likely search for key words related to terrorist groups and such.

Or they identify terrorist sites and passively observe them, and then look for people sending packets through proxy services that wind up being identified at the terrorist websites. Although I am sure they also do some analysis of plaintext data looking for terrorist keywords. Most of what they are interested in is going to be encrypted, so they could start by spending more of their resources on encrypted traffic flows. They could also filter off encrypted traffic flows to known as non-interesting sites, like online stores using HTTPS.

Quote
So, if you can invent a steganographic technique that hides your Tor circuits (or email, or whatever) in porn videos, you're good to go. :)

Most forms of steganography can be detected automatically though ;).

1488
Security / Re: Tor network compromised - cogent isp (dea, cia, nsa)
« on: February 19, 2013, 01:22 am »
Quote
What I've leaned is Tor is safe as long as you use the Tor browser to access .onion sites (aka "hidden services") within the Tor network and keep your private information private. Every published paper I've read on global network monitoring and such has to do with activity at the edges - traffic into and out of the Tor network, which happens when people use Tor to access clearnet sites. Clearnet browsing IS a big risk to anonymity because your IP's traffic can be correlated with traffic leaving Tor network (often unencrypted).The connection goes something like this:

Yes the direct deanonymizing attacks against Tor require edge surveillance. No, this is not only possible in the case of connections to clearnet sites.


Quote
   User <###> (entry node) <###> (relays) <###> (exit node) <---> website

"<###>" means encrypted connection
"<--->" means unencrypted connection
"(relays)" means at least one relay, maybe a chain of relays

Correct

Quote
You can see there is considerable vulnerability from the fact that the final connection to the website is completely unencrypted, which means that exit node can see exactly what you're doing on the website. This is why Tor browser comes with "HTTPS Everywhere" installed by default - this way the exit node doesn't see unencrypted communications (assuming the site's ssl is configured securely), although it can still see the exact website you're visiting. But to monitor all traffic within Tor network would require the adversary own all the nodes/relays.

Wrong on a few counts. First of all, although you seem to understand the difference between communications security and traffic analysis, you are still somewhat confusing the issues by continuing to talk about encryption. Traffic analysis works regardless of if the communications are encrypted or not, so as far as anonymity goes it is a good bet to just pretend that all the traffic is encrypted in any case. Of course if the traffic isn't encrypted at the entry, deanonymizing would be much easier, but an attacker can still do edge attacks, aka traffic confirmation, aka end point timing correlation, even if the packets are encrypted. Almost all attacks against anonymity solutions are concerned about packet metadata, such as time of arrival, not the actual payload data of individual packets. Additionally, you are correct to say that a purely active/internal attacker must own all Tor nodes in order to see all Tor traffic. However, it is possible to see all Tor traffic without owning a single node, by monitoring the traffic into and out of nodes at ISP or IX levels. Less sophisticated attackers, hopefully the FBI and DEA falling into this category, would attack Tor by adding nodes to the network. Powerful attackers such as the NSA would monitor Tor node traffic from ISP's / IX's, passively, without having to add any nodes to the network at all.

Quote
Hidden services are within the Tor network and follow the onion router protocol so there's no exit node and everything is 100% end-to-end encrypted). The protocol is designed to ensure anonymous communication between the hidden server and the user. The way it works is the hidden service (HS) publishes a list with a number of relays it designates as "Introduction Points" (IP) that it listens to for connection requests. When a User wants to connect to the HS, he must select a different relay as a "Rendevous"(R) and create a circuit to it, then build a circuit to one of the IP's to tell the HS the rendevous point relay, which the HS then builds a circuit to. Then the user can closes the IP circuit and communicate with the HS at the rendevous point. It looks like this:

Yes everything is 100% encrypted up to the hidden service, but this doesn't mean much in terms of anonymity. Well, to be fair it means a lot, because if the traffic is not encrypted en route then the attacker could just spy on it at your entry node to deanonymize you. But as I said before, when contemplating attacks on anonymity systems, more often than not it is safe to work from the assumption that all of the traffic is encrypted, because most anonymity attacks are concerned with packet metadata which is available regardless of if the traffic payload data is encrypted or plaintext. The difference is between communications privacy and communications anonymity; although anonymity massively benefits from encryption, a large majority of anonymity attacks remain viable even if the traffic is layer encrypted end to end. Hidden service connections being encrypted end to end provides you with communications privacy, an attacker at an exit node can no longer eavesdrop on your communications. Hidden service connections being encrypted end to end has virtually no impact on your anonymity, the packet arrival timing metadata is still available and this is what is required to do the most feared deanonymizing attack against Tor (traffic confirmation, end point timing attack).

Quote
(1) User selects some relay as a rendevous point (R) and creates circuit:

    User <###> (entry node) <###> (relays) <###> (R)

(2) User connects to information point (IP) to tell HS the rendevous relay:

    User <###> (entry node) <###> (relays) <###> (IP) <###> (relays) <###> HS

(3) User connects to the HS using the circuit to the rendevous:

    User <###> (entry node) <###> (relays) <###> (R) <###> (relays) <###> HS

Yes you are correct about this. In the case of a connection to a clearnet site, active/internal timing attacks look like this:

user <###> Adversary Owned Entry <###> Good Middle <###> Adversary Owned Exit <---> Destination Server

The adversary can link the stream through the entry to the stream through the exit with statistics, using the packet arrival metadata, which exists regardless of if the packet is plaintext or ciphertext.

In the case of a hidden service, the completed circuit and internal timing attack looks like this:

User <###> Adversary Owned Entry <###> Good Middle <###> Good Rendezvous <###> HS Good Final <###> HS Good middle <###> Adversary Owned Entry <###> Hidden Service server

The attack is carried out in the same way, but now instead of having to own the clients entry and exit nodes, the attacker needs to own the client and hidden services entry node. Of course they will only see a connection to an IP address, and they cannot by this alone determine that the IP address is the hidden service. However, as they own one of the hidden services entry nodes, they can do this:

Adversary <###> (Adversaries circuit to hidden service) <###> (Hidden Service Relays to adversaries circuit) <###> Adversary Owned Entry Node <###> Hidden Service

as the adversary is connecting to the hidden service with its .onion address, their timing attack can identify the hidden service once the packets from them as a client pass through their entry guard. Now they have identified the hidden services IP address, and know when they do their timing attack against regular users in the future, that the regular users are connecting to the hidden service instead of just some IP address that is not identified as being linked to any particular hidden service.

Also, an attacker can trace up to a hidden services good entry guards in the following way:


Adversary <###> (Adversaries circuit to hidden service) <###> (Hidden Service Relays to adversaries circuit) <###> Entry Node <###> Hidden Service

every time the adversary creates a connection to the hidden service, the nodes consisting of (Hidden Service Relays to adversaries circuit) change, selected from the current pool of available Tor nodes, as determined by the Tor circuit construction protocol. The hidden services entry node is selected from one of three nodes it has selected as guards, which currently rotate about once every month to two months. The attack is simply brute force: build a circuit to the hidden service, send a packet down it, close the circuit, rinse and repeat. The adversary can select to use a rendezvous point that they own, allowing them to identify the final node from the hidden service. Eventually, after forcing the hidden service to open enough new circuits, the adversary will have one of their Tor relays on the circuit to the hidden service. Now they do timing attacks on their nodes looking to see if one of the packets they send to the hidden service travels to it through one of their nodes.  If they have the final node, they will be able to identify the middle node. If they own the middle node, they will be able to identify the entry guard, and they will know it is the middle node as they can identify the final node from their rendezvous point, and if they send a packet to a node that is not a public Tor relay they will know it is the hidden service and that they are its entry guard (which will be easy to confirm as they will see a LOT of the packets they send to the hidden service). This attack allows for quick tracing of hidden services up to their entry guards.

Additionally, it is incorrect to say that you are required to own Tor relays to do these attacks. In reality you are only required to be able to observe traffic going into and out of Tor relays. Attackers who can not gain access to ISPs / IXs will have to resort to either running relays or hacking into operating relays. Powerful attackers such as the NSA can certainly spy on good Tor nodes (especially in the USA) to observe the traffic entering and exiting from them, and thus they do not have much motivation to add their own nodes to the network, especially as active surveillance is much easier to identify than passive surveillance.

Quote
This whole process in accomplished by the Vidalia client and requires no input from the user beyond entering the .onion address into the Tor browser. There's also a lot of rigorous PKI trust validation of relays, key-exchanges, asymmetric crypto, etc. happening at each step throughout the process (but I'm leaving that out because it's complicated enough to explain already). They can't 'crack' PGP (unless in individual cases when it's used incorrectly), so they cannot read the actual data being transmitted within the Tor network because it's all encrypted (and signed and verified).Communucations are completely anonymized once they leave your entry node.

Someone already corrected you on this, and indeed Tor is what manages everything, Vidalia is merely a graphical user interface that allows you to control some of what Tor does. You can access hidden services without using Vidalia at all. Also, the cryptography is all but entirely irrelevant to the counter traffic analysis properties of Tor; although unencrypted traffic being sent from entry to exit would be almost completely incompatible with anonymity, the direct attacks on anonymity protocols that are studied today pretty much all work with the assumption that the traffic is end to end encrypted.

Quote
tl:dr:
As long as the entry node is not comprimised, Tor is safe. If the entry node *is* comprimised, you are still safe unless:
 A. You're using Tor browser to connect to clearnet sites, or
 B. You connect to a hidden service who's entry node is also comprimised AND the adversary knows it is used by the hidden server
In order for B to be true, the hidden service itself has to already be de-anonymized and its IP address known. But that would be the hidden service that is comprimised, not Tor itself.

A is mostly true, although I would clarify that

1. The entry guard can be actively compromised, meaning that an attacker owns it
2. The entry guard can be passively compromised, meaning that it uses an ISP or IX that spies on it
3. The entry guard and its' ISP/IX can both be good, but you can still be deanonymized if YOU are being monitored by your ISP or IX

B is true, and I guess you actually have understood that risk from the get go :). However, if you own a hidden services entry guard, it is trivial to determine that you do. Also I guess I should point out that you are less likely to use an entry guard owned by the same attacker who owns the hidden services entry guard than you are to use a malicious exit node owned by the same person who uses your entry node, because you use a new exit node roughly once every ten minutes where as the hidden services entry guard used is selected from three guards that change only once every month to two months. So you are afforded some extra protection in this case. However it is not that hard for an attacker to identify the entry guards used by a hidden service, and it is likely somewhat of a safe bet that a half decent attacker could put a hidden service under passive surveillance. Actual evidence points to the FBI not being such a skilled attacker, but this is likely due to incompetence on their part rather than the inherent security of Tor.

1489
Security / Re: Tor network compromised - cogent isp (dea, cia, nsa)
« on: February 18, 2013, 11:45 pm »
Quote
An "infinitely" resourceful state adversary would have taken down SR by now. SR is still up because such an adversary doesn't exist.

SR is still up because the very powerful adversaries that do exist don't give a shit about it. If the NSA really wanted to pwn SR I am quite confident that they could do so. First of all , tracing hidden services is not even that impressive. There are attacks for tracing them up to their entry guards in a matter of minutes. At that point they are as anonymous as someone using THREE one hop proxies, which isn't even as safe as using a single one hop proxy. If any of the entry guards are in the USA, it would only be a matter of time to passively put one of the entry guards under surveillance, with the CALEA compliant infrastructure or in the case of the NSA with their Narusinsight super computers that are plugged into split fiber optic cables moving most internet traffic in the USA through them. After locating the hidden service they could passively monitor it and wait for targets to use entry guards that they passively monitor, that would get people using USA based entry guards pretty rapidly, as having any US entry guards would mean you are deanonymized in short order.

Or they could just break out their zero day arsenal and craft an attack that can exploit Apache on Ubuntu to root the SR server, then from there exploit a vulnerability in Firefox and root DPR, possibly another exploit for breaking out of Virtualbox isolation to get to his host OS, and then steal his IP address and send it back to themselves. if he uses random WiFi locations they they have to get around that as well. I am not saying it is trivial to do, but the NSA stockpiles zero days and it is quite likely they already have a combination that could be used to cut through all of DPR's security measures, or the security measures of anyone else here. You could keep your encryption keys and bitcoins safe from them with air gaps, but not your IP address. They wouldn't even need to spend a million or two dollars to be able to do this against DPR, because they have already spent many millions of dollars to be able to do this against whatever target comes to interest them (Iranian nuclear centrifuges being a likely example of such a target).

At the end of the day you are going to be hard pressed to keep yourself secure against an elite organization with billions of dollars at their disposal, and essentially a free pass to break whatever laws they want. But also at the end of the day, this is not our threat model. We are not a hostile foreign government, we are not Osama Bin Laden and we are not trying to steal sensitive US intelligence. We are drug dealers, not even as powerful as the Mexican or Columbian cartels, and our enemies are the FBI, DEA, USPI and ICE, not the CIA or NSA. 

1490
Security / Re: Tor network compromised - cogent isp (dea, cia, nsa)
« on: February 18, 2013, 11:32 pm »
I'm with kmfkewm on this, quite frankly.  They have virtually unlimited resources

Quote
No, they don't. They have distinctly limited resources, in terms of money, manpower, intellectual capital, and internal and external political will.

They are limited, but they do have a shit ton of money. They also have some of the brightest computer and mathematics people in the world. They are limited by internal and to a lesser extent external policy to some extent, but it is pretty obvious that they mostly answer to themselves. On paper they are restricted, in practice they do whatever they want and good luck getting anyone to stop them. Just look at their illegal wiretapping to see that they, like many intelligence agencies, are not bound by the law. Although I believe the CIA is the only intelligence agency in USA that is officially allowed to violate the law.

Quote
An "infinitely" resourceful state adversary would have taken down SR by now. SR is still up because such an adversary doesn't exist.

The NSA is literally housed in a black box:

https://en.wikipedia.org/wiki/File:National_Security_Agency_headquarters,_Fort_Meade,_Maryland.jpg

Yes the NSA has a headquarters, they are not some omniscient omnipresent spiritual being. They also have dozens of Narusinsight super computers hooked up to split fiber optic cables at major internet exchange points in the USA, and they sample a metric fuck ton of internet traffic for analysis. They also have powerful traditional super computers, and although nobody knows for sure it is likely that they are working towards quantum computers capable of breaking most currently used asymmetric crypto systems. I know smart mathematicians and physicists who are worried about this, it is no longer in the realm of tinfoil hats to be concerned about quantum computing attacks on cryptography. They also have teams of elite hackers who have most likely penetrated into foreign computer systems not even connected to the internet in order to destroy nuclear centrifuges. The US government spends millions of dollars a year buying up zero days from private actors, and the NSA makes their own as well.

Quote
Much of their operations are secret. It is the nature of human psychology that in the absence of evidence, wild speculations fly (you need only look at the explanations for weather phenomena in any pre-scientific society). That's basically what that blog post is about.

Yes that blog post is FUD, I never disagreed with that. But it is not FUD to think that the NSA can already pwn Tor. The leaked AT&T documents and testimony from Mark Klien I believe his name is, gives us evidence that the NSA has installed Narusinsight super computers at major IXs. There are publicly available specs for Narusinsight super computers showing they are capable of sampling traffic from millions of residential internet connections. We have seen the hacking against the Iranian centrifuges which demonstrates that intelligence agencies have extremely skilled hackers, world class hackers. The research and development into quantum computing is in the public sector, and it is likely a safe assumption that the NSA has secret research going on that is a decade ahead of anything we have seen so far.

Quote
I submit that if we knew about their internal operations, they would be a lot more mundane than most people assume.

We can extrapolate from what we know, to come to the conclusion that the NSA is a world class agency of hackers, cryptanalysts and traffic analysts, with a multi billion dollar a year budget and direct access to many of the most heavily used links on the global internet. 

Quote
Also, all the resources in the world can't beat logic. While it's possible to compromise the Tor network, it is extremely difficult to do so in a way that won't get you noticed. You can spin up 10,000 exit nodes, but you can't do it without getting noticed. Take a look at the Trotsky section of this page:

From an active perspective, actually adding nodes to the Tor network, you are mostly correct. But that is not how the NSA would attack Tor, as I said before. They already have the infrastructure in place to passively monitor a huge percentage of good Tor nodes, if they so wish. There are two types of attacker, the Tor folk tend to call them active and passive in regards to their positioning, however I personally prefer the alternatively used wording of internal and external as active and passive are imo different. An internal/active attacker adds nodes to the network to observe traffic on the network, an external/passive attacker monitors nodes that are already on the network by spying on their traffic at their ISP, or IX's. It is extraordinarily difficult bordering on impossible to detect a passive attacker, and the only reason we have more than speculation in regards to the NSA's passive internet surveillance is because of the leaked documents from AT&T showing that they installed fiber optic splitters and Narusinsight supercomputers at multiple IX's.

Quote
"Between 17-23:00 (UTC) 226 exiting relays, all with largely identical nicknames ("trotsky*") and exit policies were added to the tor network. No family or contact information was set, and the IPs came from several countries (mostly eastern European) making it look like a potential botnet. They disappeared roughly a week later.

On 10/2/10 between 21-20:00 (UTC) another 383 exit relays were added, this time more gradually. Others have periodically appeared outside these windows. These relays appear to be on residential connections, most having very poor connectivity (rransom reports that some are dialup)."

Adding a lot of nodes to the Tor network all at once will get them all blacklisted. adding them with the same name but without setting them as part of a family will get them all blacklisted or possibly set into the same family by the operators of the directory authority servers. If someone at an IX passively monitors the five hundred Tor nodes that send traffic through that IX, nobody is able to tell unless something leaks out about the operation. 

This is actually why it is so unbelievable that the NSA or other US intelligence agencies would run a front ISP and actively add nodes to the Tor network. They simply don't need to do this, they can passively monitor nodes from the traffic analysis super computers they already have installed at major exchange points.

Quote
There is zero evidence that Cogent is a front for American law enforcement or intelligence agencies, and there aren't even that many relays on Cogent autonomous systems. Frankly, I'd be more concerned about Torservers.

Indeed.

1491
Philosophy, Economics and Justice / Re: Socialism
« on: February 18, 2013, 11:10 pm »
"comrades?"  really?

public schools, interstate highways, unemployment insurance....all socialism.  the question is not whether or not socialism is "good," the question is in which circumstances and to what extent should it be implemented. 

but whether you like it or not, socialism is an integral part of western society.

the needs of the many outweigh the needs of the few.

Please kill yourself so your organs can be harvested and given to multiple sick people who will die without organ transplants. Because after all, the needs of the many outweigh the needs of the few.

1492
Philosophy, Economics and Justice / Re: Anarchy
« on: February 18, 2013, 11:06 pm »
and then some guy with a gun runs into your opium lounge and steals all your money.  you go to the commons house but they have no electricity because their generators ran out of gas and the oil cartels are 10x worse than the mexican drug cartels we currently know so well.   and all the volunteer programmers are trying to figure out how to get their septic system running properly since there's no public sewage.  you go to the corner party to let loose a bit, but there's a bunch of junkies laid out on the street leaving you no room to dance.  so you go to a restaurant to get some food and a drink but the food is contaminated with rat feces and you get food poisoning.  too bad ur friends still haven't got the septic system functional, so you have to experience explosive diarrhea in an alley way.  but some gang/militia claims that alley as their own and doesn't take kindly to you shitting there so they kick your ass and sell you into slavery.

yay anarchy.

And then you are reimbursed for the lost money by your private defense agency. And then they hunt down the thief and recover the stolen money for themselves, and after negotiation with the thieves private defense agency they also fine him heavily, keeping the profit from the fine as well as their yearly subscription fee from the opiate den. The commons house gets electricity from a power grid, which is owned and operated by a private industry. Partially it is also solar powered though, and it used to be powered by gas. The oil cartels attempted to price fix high, but then one of them realized he could charge less than the others and instantly got all of the customers. Then the others lowered their prices to his, and then another one of them lowered the prices even more so that he could get all of the customers. At the end the price stayed at about the lowest it could go for the producers to feel like it was worth it for them, and although they made a fortune they didn't manage to charge more than the price of oil today. The septic system works fine and it is emptied out by a private industry every now and then. You decide to go to a privately owned party house and as you are not a junkie you decide to avoid the junkie friendly establishment. Everyone is high on MDMA and LSD and nobody is worried about the police coming and enslaving everybody, because the house is protected by a private defense agency that protects its clients from slavery. Then you go to a restaurant, but first you check to make sure that they are certified by the private health certification company of your choice. You know that for them to be certified they must meet certain standards and agree to be randomly audited, and the health certification agency you have went with has it in their best interests to be as thorough as possible in their inspections, because they are well respected and make their money by auditing restaurants who pay for a chance at certification, and nobody cares to be certified by an establishment that certifies unsanitary restaurants as the sick customers will throw a fit and the value of being certified by that company will drop and they will go out of business. You don't get diarrhea from eating at the restaurant, and on your way home you are confident that you will not be stopped and harassed by any gangs or police agencies, because you are just minding your own business and you live in a city that is patrolled by multiple cooperating libertarian defense agencies. Plus you have a big ass gun.

1493
So you would prefer the workers making the million dollar cars go hungry instead of being paid to make cars? Because you are jealous of someone who is more successful than you and so you want to put hundreds of working class people out of work and kill someone for having a nicer car than you? You sound like an insane person. I am sure that, like most socialist-"anarchists" I have met, you are about 15 years old and pissed off that you are broke while your rich neighbors kid has nice things because his dad is rich. I have actually heard the two car argument from socialists, who think that having two cars means you stole one car from society. Because not many people actually need two cars, and your underlying philosophy is from each according to his ability to each according to his need. So you want to take from the person with two cars one car, as he doesn't need the extra car, and give the extra car to someone who has no car and needs one. Just look at squatting, that is huge with European socialists, and it pretty much comes down to if someone has a home and they are not using it, it should be illegal for them to keep others out of it, because others need homes and they have no current use for it. I don't claim that all squatters are socialists though, I know it is a common cultural thing in parts of Europe, and indeed I have plenty of friends who have squatted (but I certainly wouldn't stay friends with someone who burns rich kids alive in their cars, or probably even with someone who goes around making sure everyone has exactly one car!).

No taxes and socialism is pretty much a non-sequitor. Let's go over to wikipedia and see what you actually think "anarcho-socialism" is!

Quote
Libertarian socialism (sometimes called social anarchism[1][2] or left-libertarianism)[3][4] is a group of political philosophies that promote a non-hierarchical, non-bureaucratic society without private property in the means of production. Libertarian socialists believe in converting present-day private productive property into common or public goods, while retaining respect for personal property.[5]

So they believe in "converting" (ie: stealing) private property into a public good, while allowing some forms of personal property. So you can own shoes, but not a shoe factory. So they want to steal the shoe factory, most likely killing the owner, and then they want the shoes produced to be distributed throughout society. That seems pretty much in line with my claim, although they did use some mighty fine euphemisms to make it seem less horrible. Also, you are going to have a hard time stealing the means of production without a strong central government. And who exactly determines how to distribute all of the produced shoes? I imagine also a central government. So pretty much you need a government to have socialism, which is pretty much what I said, and also what makes anarcho-socialism a misnomer.

Quote
Libertarian socialism is opposed to coercive forms of social organization. It promotes free association in place of government and opposes the social relations of capitalism, such as wage labor.[6] The term libertarian socialism is used by some socialists to differentiate their philosophy from state socialism,[7][8] and by some as a synonym for left anarchism.[1][2][9]

The first sentence goes against the first paragraph. The first paragraph claims that the socialist "anarchists" desire to steal productive property, and this is a coercive social organization. It is coercive to force people to not own means of production. You are also apparently against free association, as you don't want to let people join companies that make million dollar cars. You most likely want to tell people where to work actually, although you certainly want to tell them where they cannot work!

Quote
Adherents of libertarian socialism assert that a society based on freedom and equality can be achieved through abolishing authoritarian institutions that control certain means of production and subordinate the majority to an owning class or political and economic elite.[10] Libertarian socialism also constitutes a tendency of thought that promotes the identification, criticism, and practical dismantling of illegitimate authority in all aspects of life.

Socialists assert that a free society can be attained by stealing everything from rich people and murdering them for good measure. They also promote identifying, criticizing and dismantling all authority that that goes against their belief system, which here is called by the euphemism of illegitmate authority. Whereas anarcho-capitalists seek to identify, criticize and dismantle all authorities that attempt to initiate force against others, anarcho-socialists wish to initiate force against those who are richer than they are in order to create a society where everyone is of equal socioeconomic status. Anarcho-capitalists claim that illegitimate authority is any authority that attempts to initiate force, socialists claim that illegitimate authority is anyone who has more economic power than others.

Quote
Accordingly, libertarian socialists believe that "the exercise of power in any institutionalized form—whether economic, political, religious, or sexual—brutalizes both the wielder of power and the one over whom it is exercised".[18] Libertarian socialists generally place their hopes in decentralized means of direct democracy such as libertarian municipalism, citizens' assemblies, trade unions, and workers' councils.[19]

But this is also contradictory. The socialists claim they are against the exercise of institutionalized economic power, yet they desire to form institutions that exercise so much power that they seize the means of production from all individuals.

Quote
Libertarian socialists are strongly critical of coercive institutions, which often leads them to reject the legitimacy of the state in favor of anarchism.[28] Adherents propose achieving this through decentralization of political and economic power, usually involving the socialization of most large-scale private property and enterprise (while retaining respect for personal property). Libertarian socialism tends to deny the legitimacy of most forms of economically significant private property, viewing capitalist property relations as forms of domination that are antagonistic to individual freedom.

They claim to be critical of coercive institutions, but what could be more coercive than handcuffing rich kids into their million dollar cars and burning them alive? What could be more coercive than stealing all economically significant property? What could be more coercive than telling people what they can produce (no million dollar cars apparently) and what they can have (again no million dollar cars, but really they take it much further and would say you can only have one car, one pair of shoes, to be changed after so much time and after putting in a request to a centralized agency, just like the socialists have always done). They act like if someone buys a car factory it is not his personal property, which is just absurd. They think that someone owning a car factory is antagonistic to individual freedom, but not torching the rich person who owns the car factory and taking it over themselves.

Quote
Libertarian socialists are anti-capitalist, and can thus be distinguished from right-wing libertarians. Whereas capitalist (and right-libertarian) principles concentrate economic power in the hands of those who own the most capital, libertarian socialism aims to distribute power, and thus freedom, more equally amongst members of society. A key difference between libertarian socialism and capitalist libertarianism is that advocates of the latter generally believe that one's degree of freedom is affected by one's economic and social status, whereas advocates of the former focus on freedom of choice. This is sometimes characterized as a desire to maximize "free creativity" in a society in preference to "free enterprise."[38]

Although it is obvious that capitalism does give more power to people who have more capital, it does not prevent people from amassing more capital. It is entirely possible to move up several positions in the socioeconomic hierarchy, as I previously stated. I know many upper middle class and lower upper class people who were born poor. It is more rare to move up from the bottom to the top, although even this happens in some cases. Many rappers are a good example of this, a lot of them were born into the worst poverty and now they are some of the richest people in the world. Sure this is exceptional, but it demonstrates that even moving from the bottom to the top is possible. It is equally possible to move from the top to the bottom, as many who win or inherit large amounts of money discover. In a socialist world they strive to make it impossible to move below or above dead center, and somehow they think that this increases freedom. In all implementations of socialism ever seen, two classes emerge. The party class and the people class. The party class is essentially what the socialists claim to be against, but in reality it is what their leaders are striving for. The people who manage seizing the means of production and distributing it to society will always distribute more to themselves and their friends than they do to the people, just look at a history book to see this. So in practice socialism turns into something horrible, and in theory it is something almost as horrible to begin with.

Quote
Many libertarian socialists argue that large-scale voluntary associations should manage industrial manufacture, while workers retain rights to the individual products of their labor.[40] As such, they see a distinction between the concepts of "private property" and "personal possession". Whereas "private property" grants an individual exclusive control over a thing whether it is in use or not, and regardless of its productive capacity, "possession" grants no rights to things that are not in use.[41]

And here is where they argue that you should have only one car. If you have two cars, one of the cars is not in use. In the eyes of socialists, this car is private property and should be seized and redistributed to society. You possessions are things that you can actually use according to them, so therefor you get to keep one of your cars if you are in the habit of using it anyway. It is funny that these idiot socialists said my argument is incorrect and that I should read wikipedia, when it says right on wikipedia that these socialist idiots actually believe what I claimed they believed in the first place.

Quote
Anarchist communism (also known as anarcho-communism and occasionally as free communism) is a theory of anarchism which advocates the abolition of the state, markets, money, capitalism and private property (while retaining respect for personal property),[5] in favor of common ownership of the means of production,[113][114] direct democracy and a horizontal network of voluntary associations and workers' councils with production and consumption based on the guiding principle: "from each according to his ability, to each according to his need".

No surprise there, the communist slogan "From each according to his ability, to each according to his need". This means that you don't get that extra car if you don't, in the eyes of the implicit state, need it. Also, if the state thinks you have the ability to make shoes, don't be surprised when they come with guns and tell you that you are now a shoe maker. Again they want to abolish private property, but not "personal property", which although it doesn't at its face value make any sense at all, can be analyzed to mean "You only get one car". The communists want to abolish money, although one of their implementations uses time dollars. In such a system everyone is given money from the centralized government according to how many hours they work. An hour working as a janitor is rewarded with one hour dollar, and an hour working as a neurosurgeon is rewarded with one hour dollar. Now it is quite obvious that a great many people would not desire to do demanding work when they are paid as much for their work as people who are doing much less demanding work, so you may wonder how the hell is anything other than unskilled labor going to get done in such a society. Well the answer is that the state-by-any-other-name decides who is skilled enough to do demanding work, and then they pick a job for them and tell them that is the job they must do. So there are still neurosurgeons, they are just working with guns to their heads, and they are paid an hourly wage equal to the janitors. Sounds like a totally free society to me!!


Well I think that is enough Wikipedia reading for now. I would comment on the entire article but it is massive and really I think I have already shown that my understanding of the subject was correct prior to you suggesting that I read more about it, and also have demonstrated that I probably actually have a much better understanding of it than you do.



1494
Philosophy, Economics and Justice / Re: Anarchy
« on: February 17, 2013, 06:00 am »
sounds good

1495
Security / Re: Tor network compromised - cogent isp (dea, cia, nsa)
« on: February 17, 2013, 01:39 am »
You need to forget the training we've all had to believe in the supremacy and general omniscience of "government intelligence" (oxymoron). It's a bunch of propagandized crap.

Tor is secure as long as there is at least ONE non-malicious relay in the connection chain. Even in the extraordinarily rare circumstance that an attacker managed to control both randomly chosen entry and exit nodes, he would only able to use timing attacks as a means to guess which initiators are connecting to which responders (ie, which users are connecting to which sites).

BUT, if you actually read up on "HIDDEN services" (which Silk Road is one) you'll discover they don't use exit nodes and thus aren't even susceptible those attacks and none of these concerns apply!  :D   8) The only way a connection to a hidden service could be compromised is if the hidden service was being run by the attacker himself (or if somebody is careless/sloppy  ::) and accesses the hidden service through a non-Tor connection  :P ).

Seriously, Tor is SAFE - as long as you browse the right way - use the Tor Browser Bundle, don't open downloaded PDF's or other files while connected, no virus/spyware on computer...and DON'T EVER SEND UNENCRYPTED personal information through it!!!!!  :-X :-X :-X

First off , NSA is widely recognized as being an elite agency of cryptographers, hackers, and traffic analysts. If you think they are not extremely skilled, I strongly believe you are only fooling yourself. Additionally, Roger Dingledine, the lead developer of Tor, got his start working for the NSA in the first place. Second of all, Tor is not able to provide you anonymity if your entry node and exit node are compromised, there is no guessing involved on the part of the attacker, they are able to use packet timing characteristics to statistically prove that both parts of the traffic flow are related. Third of all, despite being correct in saying that Hidden Services do not use exit nodes, strictly speaking, they are still just as susceptible to end point timing correlation attacks as circuits exiting to the clearnet are. In such a case the attacker would need to own the hidden services entry node and the connecting clients entry node, incidentally this is possible for an attacker with a single node in the case of hidden services, but not in the case of connections to the clearnet where the attacker would need to own or be able to passively monitor at least two nodes. The hidden service does not necessarily need to be owned by the attacker, it merely needs to be identified by the attacker and put under passive surveillance, or under active surveillance in the case that the attacker manages to own one or more of the hidden services entry guards.

1496
Seriously anarcho-socialists have the most backwards ass logic I have ever heard. "If you own two cars you are a thief, because you are using force to deprive someone who has no car from having your extra car, and thus you have stolen a car from him!" I don't see how people can say that with a straight face. In their world it is righteous for violent criminals to use force to steal your extra car, because in their twisted minds you are the one who has stolen the car from society by having an extra of something while some people have none. They think that means you are a car thief, and they are collecting stolen property by using force to take your car from you and give it to someone who has no car. The best word to describe these people is completely mind fucked.

Wow,

To be fair, reading your last two posts, it would be very very evident to anyone who understands even the very fundamental types of politics out there, that you absolutely haven't a clue as to what socialism or communism is, seriously. Not a clue. Its laughable and the posts are emitting a fine example of the ignorant stereotype you people have on it too, it was funny enough to put me in good form even!

Im just glad im not so limited as that.

BTW, the "higher" classes and bourgeois are absolute fucking parasites, they depend on an entire class (the working class) to do literally 99% of all their work while they rack in profit. While the worker has no choice only to accept the pittance said parasite pays them every week to get by, in comparison to the wages of the parasite, so there is no chance of social mobility, get it?.

I / We believe in equality. Not watered down slavery. Is that simple enough?

First of all I know that there is social mobility. My grandparents and my parents were born poor, and now my grandparents are quite rich and my parents are well to do as well. I also know that this is a common theme, because I know a lot of people from upper middle class / lower upper class families and it is not at all uncommon  that their parents were born poor and became wealthy. A grandparent of one of my friends ran away from an abusive home when he was a teenager, and worked his way up to being a multimillionaire, and a job provider! His grandchildren have been quite wealthy for their entire lives, and all of them have high paying jobs and received excellent educations. Going from living on the street as a run away from a poor abusive family to having millions of dollars sure seems like quite a lot of social mobility to me, so I really have not got a clue where you get the idea that there is no social mobility from? In a socialist world he would not have been rewarded for his work as much, because he would be forced to fund other people with his money.

There is social mobility if you are a hard worker or if you are skilled / intelligent. If you are not willing to work hard or if you are not above average intelligence / skilled at some specialty, then there is not as much mobility. In a free market people are paid for their abilities, it is called a job market. Rewarding skilled people only makes sense, why should someone with rare and sought after abilities be paid the same amount as someone who hasn't got rare and sought after abilities? When the government forces this to happen it just takes motivation away from people who have skills that are in high demand and short supply. It is bad for society as a whole.

I am well aware of socialism and communism, although they do have many different forms. Basically socialism is a watered down version of communism. Socialism is a collectivist leaning ideology that puts 'the good of society' over the good of the individual, hence the name socialism. Socialists believe in wealth redistribution, they think that healthcare should be paid for by society for society rather than by individuals for individuals. This is accomplished with high tax rates, which essentially boils down to by shoving guns in peoples faces (particularly rich people) , taking their money, and using it to fund social programs. Communism is the epitome of collectivism, it is socialism taken to its most extreme. In a communist society there is not even money, rather goods are distributed by a central agency 'from each according to his abilities to each according to his needs'. There are no longer owners of shoe factories hiring people to make shoes which are sold to consumers, rather the armed communist gangs raid the shoe factory and kill the owner, then they force people to make shoes which are then distributed through out the society. That is communism in a nut shell. It is impossible to have communism without initiating force because nobody in their right mind wants to be a slave to the collective, it is also impossible to have communism without a strong centralized government to manage the redistribution of wealth, which makes anarcho-communism a complete misnomer.

1497
Seriously anarcho-socialists have the most backwards ass logic I have ever heard. "If you own two cars you are a thief, because you are using force to deprive someone who has no car from having your extra car, and thus you have stolen a car from him!" I don't see how people can say that with a straight face. In their world it is righteous for violent criminals to use force to steal your extra car, because in their twisted minds you are the one who has stolen the car from society by having an extra of something while some people have none. They think that means you are a car thief, and they are collecting stolen property by using force to take your car from you and give it to someone who has no car. The best word to describe these people is completely mind fucked.

1498
Socialist ideology is based entirely on entitlement and thinking that it is morally acceptable to use violence to rob rich people of their money and distribute it to the poor. Nothing prevents poor people in a free market capitalist world from moving up in the socioeconomic hierarchy, lots of rich people today were born into poor families. Tons of people have the next generation of their family better off than they were, just look at any middle class neighborhood and see where the people came from. A lot of them were born into poor families and worked hard to become middle class. And their children have an even easier time to get even more rich than their parents, and the same for their children as well. There is no reason to work hard particularly in a communist world where working hard just means that you support more people who you don't really even give a shit about.

1499
Security / Re: Tor network compromised - cogent isp (dea, cia, nsa)
« on: February 16, 2013, 09:43 pm »
Tor's fine. Lets take a look at Tor's own page on the issue.

https://www.torproject.org/about/overview.html.en

Quote
Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination.

In other words, all a compromised server knows is that some other node on Tor asked it to relay some encrypted data (if a relay) or visit whichever site (if an exit relay). It has no way of knowing if it was your computer or any other node.

Also, it's all encrypted (as illustrated as green arrows on tor's page) except potentially between the exit relay and final destination. This means that the actual data isn't accessible to any node, except potentially an exit relay communicating to a non-secure server. But this is fine, sense even if the exit relay knows what the data is, it can't identify you for the reasons described above.

Unfortunately if multiple relays on your circuit are owned by the same attacker, they can start to do some serious damage, if they own your entry and exit relay they can deanonymize you.

1500
Shipping / Re: DIY DRONES
« on: February 15, 2013, 05:42 am »
Not really because a long range drone would be quite expensive to build. With the FPV gear available today you can set gps co ords to return to home if you lose signal but i don't think it possible to set gps drop offs and returns plus you are limited to range if you are going to fly the thing fpv yourself. To build a fully autonomous drone would cost a fuckton and just wouldn't be practical not to mention if you lose it you're "payload" would be compromised if still onboard and you prints and DNA would also be all over the thing if you built it yourself like i would.

It is possible for GPS drop off and return, you could build it with gloves on, you will lose your payload if any shipment method is compromised.

Pages: 1 ... 98 99 [100] 101 102 ... 249