Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 108 109 [110] 111 112 ... 249
1636
Security / Re: Why can't PGP be cracked?
« on: January 11, 2013, 06:11 pm »
It is probably unknown how many primes are in 127 bits (1.7e38 numbers), but given the trend, it's a tiny percentage .
The number of primes less than any number, n, is approximated by the formula n/ln(n)
So between 0 and 2^127, there are about 1,932,770,406,530,700,000,000,000,000,000,000,000 or ~2^120 that are prime.
(it comes out to slightly more than 0.01%)

But it is not 0 ... 2^127 in practice, because you know that two 8 bit primes are not going to be multiplied into a 128 bit composite number. Although technically the key space is all primes between 0 and 127 bits, in practice I was told the key space is closer to the number of primes that are 127 bits.

1637
Security / Re: Why can't PGP be cracked?
« on: January 11, 2013, 05:38 pm »
You're talking about a symmetric key, like a 256 bit AES key. Read what kmf wrote about PGP keys.

Now that I think about it, the PGP key space must be smaller since 768 bit PGP keys have been broken but even 128 bit AES has not.

As far as I know PGP uses a symmetric-key cryptography.   PGP also compresses the data and uses a cryptographic hash function.  So I'm guessing the cracking "break" would arise from that?

OpenPGP is a standard and a collection of algorithms. GPG is an OpenPGP compliant software tool that provides these algorithms. It is not in itself an encryption algorithm, rather it is a cryptosystem. GPG is called a hybrid cryptosystem because it uses a combination of asymmetric and symmetric algorithms. There is actually quite a lot that goes into encrypting a message with GPG, although almost all of this is hidden from the user. First a pseudo random number generator is seeded with entropy from some sources (not sure exactly where, probably /dev/random on unix like machines and cryptgenrandom on windows) and outputs a pseudorandom string that is used as a session key. The session key is used in combination with a symmetric algorithm to symmetrically encrypt your communications, which are first compressed. Then the session key is asymmetrically encrypted with the public key of your correspondent. Upon receiving the message, your correspondent types in a passphrase in order to derive a symmetric key that is used for decrypting their stored private key, then their private key is used to asymmetrically decrypt the session key, which is then used in combination with the symmetric algorithm to decrypt your encrypted message. Then it is decompressed and the plaintext is made available.

From a cryptographic point of view, the asymmetric encryption is the weakest link. From a practical point of view, your private key / the system you run GPG on is the weakest link.

1638
It is a bad move to post your tracking info here.

1639
Security / Re: Why can't PGP be cracked?
« on: January 11, 2013, 02:38 pm »
So I checked with someone who knows crypto better than I do, and the answer is that technically the key space for an RSA key is the number of prime numbers that can be represented with less bits than the key strength, however practically it is the number of prime numbers that can be represented with one bit less than the key strength. So the key space for a 128 bit symmetric algorithm is 2^128 and the key space for a 128 bit RSA key is pretty much the number of 127 bit prime numbers.

1640
Security / Re: What VPN services would you recommend?
« on: January 11, 2013, 02:32 am »
The number one rule about VPN's is that you should assume they are all entirely compromised. The second rule is that you should keep in mind asking for a VPN on a site like SR is essentially asking the feds if they would like your IP address. That said, JAP seems to be above average as far as VPN providers go. They will immediately start logging as soon as they get a court order to log traffic to a particular site or from a particular user, but they give you two or three hop cascades so usually two different court orders in two different countries are required. And they are very strict about not logging anything until they get a court order forcing them to do so. That is pretty much the best you can hope for.

Or you could go search around for some sketchy Russian service and buy a VPS from them. Personally I would be more inclined to buy a VPS to exit through if I wanted to have an exit IP address that didn't identify me as someone using an anonymity service. VPN services have their IP addresses on many of the same block lists as Tor exit nodes do.

1641
The biggest advantage of a virtual machine is that you can configure it so that it doesn't know your external IP address, and thus an attacker who roots it cannot determine your external IP address unless they break out of it. Virtual machines also have their own list of disadvantages though, it seems to be pretty much accepted that a system running in a virtual machine is more vulnerable to being rooted in the first place, as compared to a system running directly on top of physical hardware. There are also different pros and cons for the various sorts of virtual machine. If you are not going to use a virtual machine for isolation, it seems like it is counter productive to security without any benefit. If you use a virtual machine for isolation, you gain a lot in some ways and lose a lot in others. If you are going to use a virtual machine you should probably make sure never to type your shipping address inside of it, as long as you encrypt shipping address outside of the VM and transfer it into the VM in a secure way, I think the benefits outweigh the disadvantages. One technique is to use ISO's to transfer data into the VM from the host, so you can have your encrypted address on the host then put it on an ISO and then load the ISO to your VM. Pretty sure you can send public keys from the VM back to the host in such a way as well. Technically it breaks the isolation to do this, just as it would if you had a shared folder, but things seem to boil down to this:

A. Your virtual machine is significantly more likely to be rooted than the same setup would be if it wasn't in a virtual machine

B. An attacker who roots your virtual machine can be made far less capable than an attacker who roots your host

to me the primary risk of having your VM rooted is that the attacker could intercept your plaintext shipping address, but as long as you have that base covered then it seems like the ability to protect your IP address from hackers is a big win. Not only will isolating your network facing applications in virtual machines protect you from essentially all possible accidental IP address leaks, but it will also protect you from even pretty sophisticated hackers getting to your IP address or host machine. And just to reiterate once again, it wont matter if they cannot get to your host OS or your IP address if they can intercept your shipping address in plaintext, so make sure to cover that base if you use virtual machines for isolation.

1642
Security / Re: Why can't PGP be cracked?
« on: January 11, 2013, 01:24 am »
If we can crack a 1024 bit key today and computing power doubles every year, then we could crack a 2048 bit key in about a thousand years, since the key space is 2^1024 times bigger than for a 1024 bit key.

The thing is, our ability to brute force keys appears to be increasing faster than Moore's Law. Assuming a doubling rate of one year, we would only be able to brute force 1 more bit per year, 10 bits per decade. The largest cracked key size is increasing much faster than that.

2048 bit keys don't have 2^1024 times bigger key space than 1024 bit keys, key space only doubles with each bit for symmetric keys.


there are two 1 bit keys:
1
0

there are four 2 bit keys:
11
00
01
10

any combination of 1's and 0's can be used as a key, and thus (assuming the key is properly derived from an entropic enough passphrase), the attacker must try all possible combinations (or until they find the correct one).

With asymmetric crypto, the problem is a bit different. You are not guessing permutations of 128 or 256 bits until you get it right. Rather you have some number, perhaps a large composite number, and you need to find other numbers that are related to it, perhaps you need to find two prime numbers that are multiplied together to equal it. The difficulty of solving these problems generally does not double for each additional bit, where as the difficulty of finding a permutation of 2^x bits obviously doubles for each additional bit.

I am sure someone better at mathematics can explain it better than I can, unfortunately I am not aware of the exact algorithm used to calculate asymmetric key space for a certain algorithm / key strength. I know there have been several different algorithms of different efficiency for prime factorization, however none of them are efficient enough to be a threat to sufficiently large key spaces. But the point is that it is a bit more of a moving target I suppose. I am not sure when the last major break through regarding prime factorization algorithms was either. Here it says that 600 bit RSA is 25 times harder than 512 bit RSA, but obviously a 600 bit symmetric key is 2^88 times harder than a 512 bit key.

https://www.rsa.com/rsalabs/node.asp?id=2088
Quote
It might be argued that this historical data lies BELOW what was theoretically achievable at each data point; that the data represents only modest efforts to break large keys. For example, to do a 600-bit key is about 25 times harder than RSA-512 and would require 5 times the space.

1643
Security / Re: Why can't PGP be cracked?
« on: January 11, 2013, 12:20 am »
except your computer needs more than 28 years to break 2,048 bit encryption

https://www.digicert.com/TimeTravel/math.htm

Quote
It is therefore estimated, that standard desktop computing power would take 4,294,967,296 x 1.5 million years to break a DigiCert 2048-bit SSL certificate. Or, in other words, a little over 6.4 quadrillion years. 

(this assumption is based on a 2.2 Ghz AMD Opteron processor with 2GB RAM.)

1644
Security / Re: Securing hidden services
« on: January 10, 2013, 08:52 pm »
Many hosts provide KVM over IP with their default dedicated server packages. It also isn't exceptionally rare to have two servers at a data center with one hooked up to the other on a LAN, some websites have dedicated database servers that have no reason to be directly connected to the internet.  A quick google search reveals this host, although there are several others like them:

http://www.svwh.net/kvmoverip.php

Quote
Most SVWH Dedicated servers can be ordered with "Lights Out" IPMI KVM over IP Remote Management support built into the motherboard. IPMI (Intelligent Platform Management Interface) is a hardware-level interface specification that provides remote provides remote Keyboard-Video-Mouse access to your server for complete hardware control, including reboots - even if the server is powered off. The control console provides hardware monitoring, diagnostics, and the ability to remotely load ISOs from your local PC. With IPMI server administrators can view a server's hardware status remotely, receive an alarm automatically if a failure occurs, and power cycle a system that is non-responsive.
Key Features:

    IPMI with KVM Over LAN **
    Serial Over LAN (SOL)
    VSC 2.0 supports Video Solutions up to 1024 x 768 @ 60Hz **
    Virtual Media Over LAN (Virtual USB Floppy/CD and Drive Redirection) **
    LAN Alert-SNMP Trap
    Event Log
    OS Independent
    Hardware Health Monitor
    Remote Power Control
    Management Tools - IPMIView, CLI (Command Line Interface)
    Support RMCP & RMCP + Protocols

How does it work?

IPMI defines the protocols used for interfacing with an embedded service processor. This service processor – also known as Baseboard Management Controller (BMC) – resides on the server motherboard. The BMC links to a main processor and other onboard elements via a simple serial bus.
What does it do?

A Motherboard with an onboard Intelligent Management controller monitors onboard instrumentation such as temperature sensors, power status, voltages and fan speed, and provides remote power control capabilities to reboot and/or reset the server. It also includes remote access to the BIOS configuration and operating system console information via SOL (Serial over LAN) or embedded KVM capabilities. Because the controller is a separate processor, the monitoring and control functions work regardless of CPU operation or system power-on status.
Anytime and Anywhere!

An administrator accesses the BMC by using an IPMI-compliant management application loaded on a PC or via a web interface on a management appliance that includes IPMI management and KVM. The IPMI protocol leverages an out-of-band network (typically dedicated for server monitoring and management), which provides a secure path for mission-critical applications when regular in-band connectivity is lost or is unresponsive. IPMI messages follow the same format whether they are received through an operating system or are sent and received out-of-band.
Remote OS installation from an ISO

Use SSL or the Supermicro Intelligent Management web interface to install an OS from an ISO on your local machine.
Additional Features

The IPMI 2.0 specification supports Serial over LAN to redirect serial console functionality into IPMI over IP. Administrators can then gain full remote access to text-based system information and control for BIOS, utilities, operating systems and applications. IPMI 2.0 also offers major security enhancements. In summary, SIM includes the following key features.

    Embedded microprocessor providing optional out-of-band KVM capabilities, extending the use of a single keyboard/monitor/mouse to the entire network.
    Enhanced authentication support that provides stronger processes for establishing secure remote sessions and authenticating users.
    Enhanced encryption support that allows for secure remote password configuration and protects sensitive system data when transferred over the network

Quote
These high disk density servers can be configured as either Database Servers utilizing 15,000 RPM SAS drives for faster seek times and high I/O speeds or as Storage Servers utilizing low cost SATA drives to maximize storage capacity; add to either of these server platforms a choice of multiple RAID options and you have servers designed to meet your Business Critical database and storage needs.  All SVWH Dedicated DB and Storage Server offerings have 64-bit Quad Core processors and can support up to 32GB of RAM.

Dedicated Storage Servers provide a dedicated back-up solution for web infrastructure environments that typically include web, application, and database servers. Many companies choose to have a dedicated storage server solution to maximize capacity, improve manageability, and enhance security.

If a dedicated high capacity storage server is unnecessary or is beyond your budget Silicon Valley Web Hosting also offers managed back-up services in the form of private partitions on our shared Network Attached Storage servers. These servers are redundant RAID array servers connected to our private network within our data center, and are not publicly accessible via the Internet. As part of our managed backup data storage solution, you can purchase from 10 GB to 1 TB or more of network storage for backups and data storage external to your dedicated servers. To learn more about SVWH Managed Back-up Services click here.

Dedicated Database Servers are computer systems that provide database services to other computers. A typical scenario is for web and/or applications servers to access a database server or servers over a private network.

Database servers typically allow concurrent access by end users or applications to improve performance, they maintain the integrity of the data, and handle transaction support and user authorization.  The database server manages the processor-intensive work such as data manipulation, compilation, and optimization, and sends only the final results back to the web and/or application server.

For higher levels of redundancy or availability multiple database servers can be clustered or federated letting you spread the processing load across a group of servers by horizontally partitioning the data .

So they have two standard packages, one includes KVM over IP for dedicated servers, and the other includes a server on their LAN to be used as a database server that is not connected to the internet (of course you don't need to actually use it as a database server). So that right there is exactly what you need pretty much, although I am not sure how to configure the KVM to be accessed as a hidden service I am pretty sure it can indeed be done.

Pretty much the only advantage I see to doing colocation is that you can set the chassis intrusion detection system yourself, and also you can be sure that everything is how you think it is from the get go instead of having to have any initial trust in the hosting provider. However KVM significantly reduces how much you need to trust the host, since you can remotely install the entire OS yourself etc etc.

Don't get me wrong, there are some clear cut benefits to doing colocation or even running the hardware in your own house, but I just do not think those benefits outweigh the major advantages of using a server that has no way of being tied to your real identity even if it is totally compromised. Having the server registered with fake info and unlinkable to you is a last line of defense that I personally would not feel comfortable without.

Also it doesn't look like this host offers chassis intrusion detection, but plenty do. You need to keep in mind that legitimate corporations use servers in data centers, and sometimes they have quite valuable information in the data center. There are many non-criminal reasons for wanting your server to immediately encrypt all of its persistent data / wipe its RAM if the case is breached without authorization...and thus the service is provided by plenty of hosts. The thing is though you sort of need to trust that they have properly configured things in the first place if you do not use colocation and configure it yourself, but another thing to keep in mind is that if the hosting provider is legitimate there is a high chance they are going to have things configured properly simply because they will expect that you are running a legitimate business, not a criminal website that they may someday want to assist law enforcement in attacking.

1645
Security / Re: Securing hidden services
« on: January 10, 2013, 06:52 pm »
Yep, I forgot about reboots. I guess I assumed a VNC session would be sufficient for that. I'm also assuming that the hardware is colo'd under a real identity so connecting to the machines directly is not a security threat. I was more worried about someone getting into the machines through a public facing sshd. Of course, that can be secured by turning password authentication off and only using RSA keys, but with ssh hidden services in stealth mode, you can deny there is any ssh at all.

What would make this even safer is if you hosted it in your home. The major drawback is the really low outbound bandwidth. It's possible with a forum like this, which is mostly text. Turn off avatars for even better performance. I doubt a few hundred simultaneous users create more than a few 10s of kilobytes of sustained traffic, since they are not requesting data all the time.

The main benefit is that a private residence is the best legally protected location. With dedicated servers, you don't own the hardware and the provider can hijack your servers at their discretion. Even with colo there will be terms and conditions and they can cut service, block your network connection, or shutdown the server whenever LE decides to do a correlation attack.

When the hardware is hosted in your home, locked in a cage, with yourself and a few guns standing by, you can't beat that kind of protection.

Edit: It's also safer for reboots because you do it directly through a keyboard/monitor connected to the machine, and maintenance issues / hardware upgrades are a lot easier to deal with.

I would certainly avoid using a server registered to my real name, and most definitely would avoid hosting anything remotely illegal out of my house. Using Tor Via Tor should give the hidden service about the same anonymity as a normal Tor client, so it would be less of a horrible idea to host out of your house with such a configuration versus a standard hidden service configuration (which would be an absolutely horrible idea), but I would still avoid it. Having the hidden service registered to some fake identity and hosted out of some random data center in some random country brings a lot of security and anonymity advantage imo. I would be hesitant to even do a colocation unless I was dead sure I did not leave fingerprints or other forensic evidence on the server, but there are quite a lot of security benefits to doing colocation as well. The biggest disadvantages are that you could contaminate the server with biological information and also that you need to reveal your location by shipping the server. However you could perhaps use snail mail remailers to try and obfuscate your location somewhat. The nicest advantage that you get is the ability to be certain that your configuration is how you think it is, and to be able to set the intrusion detection system while it is in such a state (I believe these are powered by the motherboards on board battery and thus an attacker can not merely cut power to circumvent them).

On the other hand you can get a lot of the same advantages with a KVM switch on a non colocated server. I believe you can get servers that have intrusion detection systems already configured in them, although I believe then you will need to trust that the server was ever properly configured in the first place. With a KVM switch you can remotely install your entire OS so you do not need to trust that the preinstalled OS from the hosting provider was not root kitted. Mainly the advantage to using colocation is simply that you can have more faith in the chassis intrusion detection system, and that you can do things like protect the memory with encapsulation material. I really would spend a lot of time thinking about the best option, and honestly I would lean more toward getting a non-colocated server with a KVM switch under a fake identity.

1646
Shipping / Re: In a controled delivery what happens if...
« on: January 10, 2013, 03:01 pm »
signing for packages is bad. There are hundreds of stories of people signing for drug packages and then being arrested. Maybe try to google a little bit?

1647
Security / Re: Securing hidden services
« on: January 10, 2013, 01:36 pm »
Another way to go about it would be to use a KVM switch set up as a hidden service. Then you can use FDE with the chassis intrusion detection and something like Tresor perhaps. With a KVM switch you get remote access to the entire boot cycle, since you have full remote access to the keyboard monitor and mouse. Then you can do neat things like set bios passwords , and additionally and most importantly you can have FDE. Without a KVM switch you cannot have a remote server with FDE because if it powers off you have no ability to remotely type the password in. I think controlling the server with a hidden service KVM switch and disabling SSH all together would be the better solution.

1648
Security / Re: Why can't PGP be cracked?
« on: January 10, 2013, 12:36 pm »
PGP can be cracked by an attacker with sufficient computing resources. Once you get to 4,096 + bit keys though it is not really feasible for someone to crack in our life times without having a quantum computer. Highly parallel traditional computers can mimic quantum computers, but the resources required to crack that strong of an RSA key with traditional computing power are extremely massive.

1649
Off topic / Re: how much safer would drugs be if they were legalized?
« on: January 10, 2013, 02:25 am »
Good thing you were never arrested for drugs or else instead of being a high ranking executive at a major corporation, you would be flipping burgers , or selling drugs as your only way of making an income, and constantly in and out of prison.

And as for my IQ, generally I would not mention it, but it is funny to be insulted for having a poor short term memory when testing indicates that your short term memory is within the top 1% of the world.

1650
Off topic / Re: how much safer would drugs be if they were legalized?
« on: January 10, 2013, 01:00 am »
Quote
I am not sure where in this argument you give any reasoning for an OTC system being superior to a licensing system, which is what I advocated; but I suppose that someone who has been doing meth since they were 14 instead of letting their brain fully develop and who has been hanging out with drug addicts his entire life might have a hard time following or responding to an argument using logic.  (SIDE NOTE: Awesome having the balls to call someone you don't know a drug addict when you've been a meth head since 14).

First of all I will admit that I responded too harshly to you, mainly I am irritated at the wanker known as Limetless (whose name is somewhat of an oxymoron as it is not spelled correctly), I should not have snapped at you. In fact, your proposed system is not that bad at all. Mainly I hyper focused on one particular statement of yours

Quote
and move to a model of discouraging use and helping those in trouble instead of punishing them.

I disagree with this. First of all I took it to imply that you consider drug users to be in trouble, although this may have been reading into what you said. However I also disagree with discouraging drug use, you seem to be of the opinion that drug use is inherently bad and I highly disagree with this. We should not discourage drug use, rather we should encourage responsible drug use. I suggested that you go to rehab not because I think you are a drug addict, but because you are a drug user who advocated discouraging drug use, thus making yourself somewhat of a hypocrite.


Quote
I never said our current system is beneficial to anyone.  I said we need to move away from it (short term memory already forgot that part?).  I agree with some of the things you say in this paragraph, but you also display a shocking amount of ignorance for the fact that other people in the world don't hang out in the same crowds as you do.

Actually according to the professional IQ testing I have taken my short term memory is in the 99th percentile, so nope short term memory has not already forgotten that part. Your argument in your second post is that one reason for drugs to remain illegal is because children will use them, my counter argument was that children are already using drugs. You particularly named methamphetamine as a drug that children will use if it is legalized, I countered this by saying the fact of the matter is that when I was a child I and my peers already had ready access to methamphetamine.

Quote
Sure, whether drugs are prohibited, licensed, legalized, or whatever, you and your druggy friends will continue doing meth and feeding it to your children.  But whether or not you want to admit it, the current system of prohibition does discourage and prevent many people throughout society from partaking in these drugs.  Some of it is simple fear of breaking the law, others just don't do it because everyone around them see it as morally wrong.  It is always going to be possible for people to obtain drugs, but that doesn't mean we should just give unlimited access to everyone without any education and pretend like it's a regular part of life for everyone to do them.  This is just asking for trouble.

Fortunately for me I never became addicted to meth despite trying it some dozen or so times at a young age, although indeed I do have quite a lot of druggie friends! However none of my friends have fed meth to their children, although some of them were fed drugs by their parents as young children :(. The thing is, whether or not you want to admit it, children who want to use meth are going to use it regardless of what the law is. Trust me, I know this. I remember being young and although I knew plenty of people who didn't want to use meth, I cannot recall a single person who said 'Well I would love to use meth guys, but it is illegal so I better not!" , and in my opinion you are living in somewhat of a fantasy if you think this is at all a common occurrence. You say that we should not give unlimited access without any education, but that is exactly what you are arguing for. See, there already is unlimited access. Anyone can get hard drugs, even young children can without challenge. By making the drugs illegal you are clearly not stopping children from having access to them, but you are ensuring their exposure to the criminal world, you are ensuring that they are not properly educated and you are ensuring that there is a lack of quality control. The only thing you are failing to do is prevent children from gaining access to drugs.

Quote
How many people do you know over the age of 21 that haven't tried alcohol?  How about meth?  Well, maybe you're a bad example since it seems that all of your friends are druggies but hopefully you see my point - the free access to alcohol, not to mention all of the marketing around it, has caused our society to be one in which it is almost unheard of that a normal person hasn't at least tried alcohol at some point in their life.  Do you truly believe that society would be better off if every person experimented with heroin and meth and cocaine?  All this is likely to do is turn out more addicts in the world as people with addictive personalities try something they want to keep doing.  There is no reason to encourage this sort of behavior.  People should be able to seek out mind altering experiences if they wish.  And that is why I am in favor of a licensing system that allows those that are interested to fulfill their wishes, so long as they are responsible citizens of society and not bums or criminals who either can't afford it or have proven themselves to be irresponsible already.

Do you seriously think that the only reason meth has not been tried by as many people as alcohol is because meth is illegal? Maybe in your world people give half a fuck about the law, but in my experiences things being illegal does not prevent people from trying them. Also your hypocrisy continues to show by accusing me and my friends of being druggies, because although this is true you are obviously a druggie yourself. I mean, you have admitted to using MDMA multiple times as well as DMT, four drug experiences in a year comes down to once every three months (assuming that this is all you have done), and in the eyes of mainstream society this enough to qualify you as a druggie. Also, I have experimented with heroin meth and cocaine and I do not feel as if my life is much worse from it. Meth I tried at the young age of 14, I didn't keep track of how many times I used it but I would say under two dozen. Cocaine I tried multiple times over a few months when I was 17, and heroin I partook in several times over the course of two weeks when I was 22. I did not become addicted to any of these substances, I did not resort to stealing to fund my 'habit' , pretty much nothing bad happened to me. Now I do know that bad things can happen to users of these drugs, just a few days ago a friend of mine overdosed and died from heroin. You know what I blame for this? I blame the fact that he was fresh out of prison for a failed piss test and he had no tolerance. I blame the fact that end users never know the purity of the heroin they are taking and he couldn't have known the exact dose he was taking. Maybe he would still have died if heroin was legal, I guess nobody really knows, but I think that if heroin was legal and pure and not cut that he would probably still be alive today. I also know plenty of people who have become addicted to meth and heroin and coke and turned into thieves to support their habits, of course I believe that if these drugs were legal they would be more affordable and people would be less likely to turn to crime to support their habits. Cigarettes are quite addictive, alcohol is quite addictive, and I do not see people stealing to support their alcohol and cigarette habits. 

Quote
You completely failed to respond at all to the comment about unemployment, something I am guessing you will end up filing for at some point in your life if all you do is hang out with meth heads and people going to prison.   There are also the healthcare costs to consider.  But of course that doesn't matter to someone like you probably as you're probably not paying back into the system anything.  In your eyes, we should just let you do your drugs and then pay for your unemployment and healthcare after you've lost all your jobs and destroyed your body I suppose?

Aha now I see the type of person you are. It makes sense to me that you would be one of the liberals who are quite concerned with the lives of all others, simply because you feel some need to 'help' drug users. See I do not think there should be any taxation or social safety nets, so there is no worry about unemployment or health care of drug users being paid for by society. Now I know that socialist liberals are really at odds with drug legalization because they want to steal money from everyone and use it to fund things like health care and unemployment, but if you stop supporting thievery and start supporting total freedom you will see that these things are actually not issues at all. Additionally, yes I have a great many druggie friends, some of them are even pretty bad people unfortunately. A lot of them are not though. A lot of them have been to prison simply because of the fact that they have been arrested with drugs, and indeed after this happens they tend to become more and more a part of the criminal world. That is one of the side effects of drugs being illegal after all, children are not prevented from using drugs but they are forced to associate with criminals, they become part of the criminal world when they go to jail for drug charges, and then eventually they overdose on impure heroin and die. Of course I have to put the blame on them, but really the blame falls just as much on the prohibitionists.

See you really have me entirely misunderstood, but it is nice to see your prejudice against drug users and people who have been incarcerated for drug crimes, it really makes me feel less bad about earlier calling you a hypocrite, and once again I feel the need to ask; why the fuck are you here instead of at rehab?

Pages: 1 ... 108 109 [110] 111 112 ... 249