2776
Security / Re: one reason why online is safer than IRL drug dealing
« on: May 24, 2012, 06:46 am »
did the enter key fuck your mother?
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
However, I have it hard time accepting that FBI/CIA/Local Police would invest that much money into catching a low-mid level dealer. I'm not disputing the fact that it is possible, just that it is not monetarily justifiable.Speculation here, but given the use of informants, I think that catching a "low-mid level dealer," or the right buyer, is a valuable source of information and then leverage up the chain.
Based on multiple accounts, LE appears to recycle their informants again and again [because why not? the informants have *no* power from which to bargain - I do not understand why Litz etc. are surprised when this happens] til they get something they consider worth their time/effort. So it seems to me that the cost/benefit ratio is pretty good, and, if not, they'll just flog that informant pony til they get something they want. Right now the cost in terms of workload/involvement on cell phone data is really, really low - Guru beat me to the links. It's close to free data for them in terms of manpower. There are just starting to be rumblings about this practice, and LE is already fussing about the increase in 'cost.'
In forfeitures alone, I would guess it's monetarily justifiable, but I would not even know where to begin to look. Give me a bit.
If someone was using a lap top and every time they accessed SR they went war driving and found an open network making sure all information coming from their computer was properly encrypted and their mac masked. what then?
-----BEGIN PUBLIC KEY-----it produces ciphertexts that are much smaller also (it is also much faster), so easier to type things across with airgaps. Using airgaps prevents 100% of pure hacking based intercept technology, and that is the sort of shit the FBI is probably developing with this unit.
MIGbMBAGByqGSM49AgEGBSuBBAAjA4GGAAQBmnrL42AZNRYiEfspsY0KUaYqD5CS
B92lMtm5J/XkqCaOuTihy1qhIf0vMNTW0XAFybJQ6N0RYzNoXQonPmeCnNIBV2ox
XmELJk3ZCphttb4yl+1n9swIplnFAIzt5aJQ/wP8ZVm0aUPC70Yl9ql5+su2N6oS
e8bNTcoYoRq4T58heVg=
-----END PUBLIC KEY-----
MIGbMBAGByqGSM49AgEGBSuBBAAjA4GGAAQAa/hNYXvgZjpra1WKiJ6b/RuCjKDk
0HfaMXyzZmrp7RpB8fvkL2juNRjpAeaypxtwS36Q+QpT90lB37L5ZwlQgt0BY06j
mClDoTgqunJ1kGJNL5zzQ7tOrh4VQB3SsX4WVb0pYQIXsT0BgOY8dggKtZvSKJUh
Cqe1CZjD3IeOmVdtQTQ=6DtmhEdsf91yIhrS9ylNVX9Q42WkNOoIJejKc+/drdrY93
mULRJOSDZYo6Y9fsnkftBbtXJMyXgFBfguJl0V9P7tVpuxdQPMOWvi56SWKY
O8RHNz9j7DeHtG0CFZJcKCepT0EEe/UtGwUMC2/mqVo/P8DHn4l+pRaJOrkSfbX25
PsiBJMiHQeycXMn0mWpqhC/L8i6kaFj4cSPuyLgTzQQ1w8C3tL8azcEo1ZwPN
lBjqG0gmU2U9Nq91pyWz9QiCigKdg2UHaMkAYQtG8lqt4K8pNbfpxLnLspWPV
2PAmM5EBWYDWQQ2lokLcyxUHtjN9FtofzLuS77/h5RB4meBgvJrLv4OkCtpexYUF7IE
The other thing to worry about is them hacking you and discovering your IP address. Then they can get your plaintexts also, potentially with local TEMPEST or other fancy 'keylogging' technology. The best bet against FBI being able to deanonymize you by hacking is to use hardware based isolation techniques, run Tor on one machine (it can be cheap as hell) with a connection to the internet. This machine should be a very minimalist installation of a very secure OS, I would suggest OpenBSD. You then connect to the Tor machine with the machine that you use for browsing the web, and it forwards all the traffic it gets on to Tor and returns the reply. Now if your browser machine is rooted the attacker can still be prevented from getting your real IP address unless they can also pwn Tor running on a minimalist OpenBSD box, of course with full ASLR. I believe you can even isolate Tor with software techniques and make it so even if Tor is compromised the attacker can not get your real IP address unless they break the isolation (I have heard others talk of this technique but never implemented it myself), although they will always be able to trace you to your entry guards in this case. You will also need to use firewall rules to prevent them from just switching to entry guards they own to get your real IP address. Not the best to be traced to your entry guards, but essentially the same security as provided by a hidden service so maybe not so bad.
ME4wEAYHKoZIzj0CAQYFZysBBAwDOgAEb/149f4sGZWr01HDDOpG0y0aJPz8i7RC
3Nx5bJe0BgpzEGEU7AZXxaz8XxzORW0EQB6pdjFJE+I=WLjxfdXZjFT9n7xfGPcNL
XhcJHOeiwggfOTesT9RZ/8JxKhOdUrF+DtNWcrP4ZtU/mxDsDqSO4ASCSG/
Mc4+VHuMOOPzIgqm5M6FsRd1o3nXHLIqGHjc47F5M/+U6eAs366JErdf3ac3oOXbs
AG8i8cniMoCQw2q6c7MB4GImNNK579GPHGIuGqcGtdgdtZJoZnbSBzCBNbw5
N4rd8nNyRioPS7+du05DVTqq16VJgFhGC7VqfDTUA20YwBj84yZzoCQjqfnR1Bwg
PFJ59eXMfFRJ2nYUchp3HnL4EIF7yyRW4pHBEQDJli0gTYQGPOt3e0lZ
4v3eu5x2mmQNTroaFhgWkJO+ieM24jAdHHk
and 2,048 bit RSA key strength equivalent public key
-----BEGIN PUBLIC KEY-----
ME4wEAYHKoZIzj0CAQYFZysBBAwDOgAEb/149f4sGZWr01HDDOpG0y0aJPz8i7RC
3Nx5bJe0BgpzEGEU7AZXxaz8XxzORW0EQB6pdjFJE+I=
-----END PUBLIC KEY-----