Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 147 148 [149] 150 151 ... 249
2221
Rumor mill / Re: Vlad1m1r
« on: August 28, 2012, 07:24 am »
He came across as a very smart guy, I doubt he'd be stupid enough to have all his information plastered over the internet through his username. It's probably someone else.

He came across as a dumbass who tried to come across very smart to me

2222
Rumor mill / Re: Vlad1m1r
« on: August 28, 2012, 07:21 am »
Vendors who received cash from him should hope that no one goes after him for retribution. If he gets beaten up or harmed in anyway, his family threatened or intimidated in the process, the Police will most definitely get involved. At this point questions will be asked and he will find himself in a whole web of shit other than with this community. Then he'll probably give up all the addresses he sent money to. To be honest any Vendor who took cash from him should consider themselves compromised, IMO.

Batten down the hatches!

/me is confused why any vendor would take cash from a dipshit who knows nothing about security

2223
Off topic / Re: Rap/hip hop original lyrics post thread.
« on: August 28, 2012, 07:05 am »
My rhymes are polished to such a sheen, you could even see them gleaming
if you weren't blind seemingly believing in the things you're dreaming
instead of harrowing knowledge, but mind your arrows and olives
or you could wind up getting barrels and buried in the foliage

2224
Off topic / Re: Rap/hip hop original lyrics post thread.
« on: August 28, 2012, 06:03 am »
You're not a messiah you're whack
 and a liar, cuz you ain't even fly
 so how the fuck can you be flyer ?
you fumble checks cuz you're broke as shit
I stumble cuz I smoke up dope and drop hits
you choke when you toke cuz ya ass a joke sap
your cocks only hot cuz it's got a spot of clap
that's why your blood rots, that's why you're leaking man
my eyes stay blood shot and I stink like I smoked some grams
I drop blots till I think I am the walrus
your rap sounds like its straight from a thesaurus
it ain't a ballad your shits a word salad man

2225
Off topic / Re: Are fags gay?
« on: August 28, 2012, 05:34 am »
Some fags are gay but most gays I have met are not fags.

2226
Off topic / Re: Who's voting for Obama?
« on: August 28, 2012, 05:30 am »
Quote
Otherwise, the only alternative is anarchy.

As an anarchist, I support this.

yes me too. However given the choice between Republican and Democrat I think it is pretty obvious that the Democrats are less absolutely-fucking-crazy. Both are horrible though and I would much prefer anarchy.

2227
Off topic / Re: Who's voting for Obama?
« on: August 28, 2012, 05:26 am »
I really hope you just don't vote, then (like me). If you really believe in Ron Paul's message (like I do), I don't see how you could bring yourself to vote for Obama.

I guess you need to ask yourself do you want to live under western European style socialism or a middle ages European style Religious dictatorship.

2228
I've seen the site before. While I like some of the info and have a serious interest in holistic methods, the delivery system of the site is a bit over the top. I will say that I think vaccines are fucked in many many instances. Definitely do NOT want any kind of argument here since I see this as a very hot topic. I've seen enough to know what I would do. When it comes to big pharma, vaccine companies, CONVENTIONAL medicine is mostly for profit. I do not trust the institutions and facilities promoting vaccines. I see the need for MOST vaccines as propaganda. Not altogether of course. Conventional modern medicine absolutely has it's place. But swine flu, HIV and AIDS and endless cases of dis info that's been going on for a long time, I don't trust the institution. What about sars? Anyone south park fans? Great episode on sars. There's toxic mercury and who knows what else in vaccines. The debate can go on for ages though. But I do think it's criminal the drugs pumped into the public. Especially children. Try raising your kids on actual foods. Not doritos, taco bell, and fried chicken. There's REAL reasons people are against vaccines. Real cases. Vaccines are part of the status quo. I see those who support vaccines and most conventional medical practices as also conventional in lifestyle. Our lifestyle, toxic planet, food, poisons everywhere are a much bigger threat than not taking vaccines IMO. And autism I definitely believe comes from them.

Dig you gu! But we'll have to have opposing viewpoints. I thought actually when you were talking about people doing what to their own bodies, I thought you were going to be FOR them taking vaccines if they want haha. Bless us all!

You may qualify for crazy. There is nothing to debate. You are probably clinically diagnosable as suffering from some paranoid personality disorder if you think modern medicine is a conspiracy (well, other than anti depressants, those are kind of a conspiracy) . You are obviously not a doctor or even remotely educated regarding medicine. Isn't it amazing how smart you must be to be a layperson with more knowledge about HIV than Ph.D holding researchers who have been studying it for decades? Don't you realize that it is probably you who has not got  a clue?

2229
Wow, If you are going to post, please do not use Natural News as a source for computational advancements.  Next of all, I find your opinion on vaccines absolutely uneducated and misinformed.  You obviously have not had family members INJURED by vaccines.  You state whooping cough outbreak? Down here in the USA the only people who got whooping cough were vaccinated against it.  The vaccine has a 50/50 chance of working anyways, its not exactly what I'd call safe.  I do not vaccinate my children and they have never been sick, and they will never get sick, because their immune systems aren't being ruined by toxins and chemicals inside of vaccines.

Wow that sucks for your children.

2230
Security / Re: How governments have tried to block Tor
« on: August 28, 2012, 04:47 am »
By failing mostly. Tor, while obviously imperfect as kmfkewn will inform you, is an extremely impressive piece of software. The more I examine it's capabilities, the more impressive it is.
Didn't the U.S. Defense Department create it? or at least fund it? I forgot where I read that but I always kept it in mind. I feel like the more that people use TOR the more powerful/unstoppable it becomes and of course the same goes for Bitcoin. The other day I read an article about why you should use TOR and it made a lot of sense, I hope enough to make common users use it as well.

Yes, actually the advanced military research wing of the US government (it has sponsored a great many weird and wonderful bluesky projects, for which we the public can all be thankful to them for, I wish half the maintenance on nuclear rearming was instead spent by DARPA on research projects and to help the NSF, but sadly it is not to be). Pretty much the only wing of government I'd be happy to pay much more tax to and not less, it's a pity we can't select what branches of government we commit resources to, that would be seriously innovative (and controversial lol).

Anyway, the Tor project was initially sponsored by the Office of Naval Research and DARPA (which also sponsored the Internet itself). After that it was spun out to the wider world, again, just as with the Internet technology, and the Electronic Frontier Foundation sponsored it for a while until the Tor project was out of the cradle and deployable for serious work. I'm not sure if the Tor project still receives grant money from the ONR, DARPA and the EFF, but in any case they can always do with donations if you experience good fortune.

I have some (still mewling pups/kittens) ideas for a system like Tor of my own, based on some rather obscure/poorly understood concepts from the world of econ theory which would turn the network's meta information flow into a sophisticated price system that would run itself in an organic way like the stock exchanges. The implications of being able to harness market power in service to such a network are actually terrifyingly cool.

However I know nowhere near enough about the Tor network to even have a remote possibility of  putting any of those ideas into practice, so I have a lot of work to do if any of them are to reach fruition. So many projects, and so little time ._.
Nice, was making sure I didn't just make that up cause I really don't remember where I read it. I don't think TOR is still receiving funding from them because one of the lead developers hinted that donations would make them work on bigger project and improve current project (tails, tor, etc). I donate whenever I have spare coins, we should get a sticky going so everyone can donate to the TOR developers. I keep trying to read about TOR but it's just way too complicated, I wish someone (maybe you pine?) could translate it into layman's terms about the innerworkings of TOR because as of now all I know is it's a huge network shared by people that connect to TOR and the more people that connect to TOR the more anonymous we become. I still don't understand how they can track you through exit nodes, that's the only part I'm confused/scared about. When the FBI caught the ring of pedophiles even though they were using TOR but finally got them through bad exit nodes, I still don't understand how that works. I'm assuming it was because they were sending files which we don't do on SR so I don't really worry about that.

First I think the tor developers do not want an organized effort on SR to send them money, that would be bad for their PR. Although if you do want to contribute by running a relay or donating go ahead, I just don't think Tor wants SR to be seen as sending them funding. Here I will explain how Tor works for you.

Tor is a low latency anonymity network. It gives users anonymity by routing their traffic through 'telescoping' encrypted tunnels through three nodes. The first node is the entry, the second is the middle and the third is the exit. The entry node knows who you are, but it can not see where you are surfing,  the middle node does not know who you are or where you are surfing, and the exit knows where you are surfing but not who you are. The exit node connects to the servers you communicate with. Traffic from the exit node to the destination you communicate with is not encrypted, so it can be intercepted and spied on by the exit node. This could compromise 'who you are' if you go to your facebook page for example, but it will not compromise where you are unless you leak that through the exit traffic as well somehow. The destination you communicate with can not trace you because they see the IP address of the exit node you are using, not your own IP address. In the best case scenario they will need to go back one hop at a time an. d get logs until the trail leads them back to you. Hopefully at least one of the three nodes you are using is not keeping logs or being passively monitored, in which case the trails will go dead at the first such node and you will remain anonymous.

Tor is not perfect. There are two sorts of attacker involved with traffic analysis, passive and active. Passive attackers monitor the links between nodes, such an attacker could be an ISP that several Tor nodes use, for example. An active attacker is one who adds nodes to the network and is able to view their internal state. Some attackers are combinations of active and passive. The more Tor nodes there are, the more protection you are afforded from an active attacker. After all, if there are ten nodes and an attacker owns one, they can monitor 10% of the network, but if there are 100 nodes and an attacker owns one they are only monitoring 1% of the network. It is important that nobody owns a large percentage of the nodes on the network, because Tor does not prevent traffic confirmation attacks. An attacker who can see packets at two points on the Tor network can use timing correlation attacks to link the packets together. This would be very bad if the attacker doing this sort of attack owned your entry and exit node, because then they could link the packets they see you sending through their entry node to the packets arriving at the destination, thus deanonymizing you with only two out of the three nodes on your circuit.

Passive attackers are generally (but not necessarily) more powerful than active attackers. An attacker who owns the ISP used by one hundred Tor nodes is capable of monitoring the traffic into and out of those Tor nodes as well as if they ran the Tor nodes themselves. Again, if a passive attacker can monitor your entry and exit traffic they can use timing correlation attack to link them together and thus deanonymize you. Having more nodes on the network does not inherently protect from such an attacker, however having location diversity in the nodes on the network does protect from this sort of attacker. If the Tor network consisted of nodes all in one data center, the owner of the data center could deanonymize all Tor circuits without owning a single Tor node, regardless of how many nodes were on the network. However, if the nodes are in data centers distributed around the world, it becomes far less likely that the owner of a single data center can deanonymize Tor circuits by themselves. Thankfully there middle nodes as well, so even if your entry and exit are being monitored by different attackers, unless they are already colluding and sharing intelligence with each other they will not be able to identify each other to request collusion in specific cases unless they can get the middle node to cooperate to introduce them to each other. One of the most powerful sorts of attacker is called global passive, and this means that they are able to monitor the links between every node on a network (if they are global in the context of the network, some may argue that a true global passive adversary can monitor all links on the internet, but I find this definition to be irrelevant when a specific sub network is being discussed). Tor is completely incapable of offering any protection from such an attacker, but such attackers are likely very few and far between if any even exist. NSA would likely be the closest attacker to a GPA although some other signals intelligence agencies such as GCHQ may come close as well. Certainly the Swedish signals intelligence agency monitors all traffic in and out of Sweden, that is not GPA but is still a fairly powerful attacker, and it is likely impossible for Swedish people to anonymously access servers in Sweden unless they stay within their own country at entry or exit.

Connections to hidden services don't use exit nodes in the same sense as connections to the clearnet do, but the same general principles apply to them. Hidden services are actually much easier to deanonymize than clients, because clients can force them to open an arbitrary number of new circuits and send them packets + watch for the packets at malicious nodes until they trace up to their entry guards. Three entry guard nodes that make direct contact with a hidden service server can be enumerated in about a minute, and then for a passive capable attacker it is just a matter of monitoring one of them to deanonymize the hidden service. For an active attacker it is a little bit harder, they need to force the hidden service to use one of their entry guards, and the quickest way to do this involves DOSing guard nodes until you get lucky or run out of resources.





2231
Security / Re: How governments have tried to block Tor
« on: August 28, 2012, 04:12 am »
Tor is an amazing tool, if you can run a Tor relay you should. The more Tor relay's in general the more anonymous users stay: https://www.torproject.org/docs/tor-doc-relay.html.en

There are arguments that if you also run a Tor Exit that it may be more "plausible deniability"

Although a little old, there is some really good info here:  Plausible Deniability ToolKit - http://www.nmrc.org/pub/pdtk/

Running a Tor exit node is a horrible idea unless you are okay with having your internet shut off, being sued, or being raided by feds or intelligence agencies. The people who run exit nodes tend to be universities, organizations, and anonymous people using servers in data centers that can not be tied to them. Running a Tor exit from home is just asking for trouble.

2232
Rumor mill / Re: Vlad1m1r
« on: August 27, 2012, 11:19 am »
At this point it seems pretty likely that he is either a scammer or the police have gained access to his account.

2233
Security / Re: whatever happened to ecache?
« on: August 27, 2012, 11:14 am »
You might be interested in this paper

anoncvs.aldigital.co.uk/lucre/theory2.pdf


2234
Silk Road discussion / Re: SR Should support early finalisation
« on: August 26, 2012, 04:44 pm »
I think it is strange what a 180 silk road has caused in the drug scene. Prior to SR if customers expected vendors to send them product before they sent them money , they would have been laughed at by everyone. Now it is exactly the opposite. Seems like it switches the risk of being scammed from customers to vendors.

Considering the risk of arrest is borne by the buyers, that seems completely fair.

The risk of getting a life sentence is in most cases entirely on the vendor, not that I really see what that has to do with anything. I like the idea of escrow , but I am amazed that any vendors tolerate it. Prior to SR it just would not have been accepted by vendors. The fact that they can charge so much more here than on private forums, and also deal with so many more customers, makes up for having to risk being scammed by the customer. So in the end it still works out in their favor here, but it is because lots of people are placing small orders at big mark ups instead of a few people placing medium/bulk orders at lower prices.

2235
Security / Re: Seller busted - Police Visit- HELP!
« on: August 26, 2012, 04:26 pm »
Was mighty nice of the police to let you know about their search in advance like that

Pages: 1 ... 147 148 [149] 150 151 ... 249