Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 185 186 [187] 188 189 ... 249
2791
Security / Re: Powerline Backdoor
« on: May 23, 2012, 01:30 am »
I really am not sure how the laws would apply to such taps. I just know that they are sneaky fuckers and the laws are not anywhere near up to date with technology. They are like the police tactics version of analog drugs. GPS is illegal to put on cars without a warrant? Who cares we can follow cars with license plate cameras without warrant. License plate tracking without warrant is illegal? Who cares we can track cell phone positioning. Cell phone positioning without a warrant is illegal? Who cares we can have a mini UAV lock onto the vehicle and follow it around. Mini UAV surveillance without warrant is illegal? Who cares we can blah blah etc.

2792
Off topic / Re: omg this site is the awesomest
« on: May 23, 2012, 12:47 am »
lol you don't understand this?

Quote
your days are numbered like pages in my book of rhymes got em cookem boy

Your days are numbered, hopefully you can understand that. His rhyme book has a limited number of pages, he has people sweating ie; nervous cuz of his mad skills.

Quote
this crooked mind of mine got em all shook and scared to look in my eyes,

His corrupted mind has people nervous and afraid of him

Quote
I stole that f-ckin clock, i took the time and i came up from behind
and pretty much snuck up and butt f-cked this game up

It is his time in the limelight because he put so much careful effort and planning into it and then out of nowhere he was a hit sensation and one of the best selling rappers ever

Quote
better be careful when you bring my name up f-ck this fame
that aint what i came to claim, but the game aint gonna be the same
on the day that i leave it

He doesn't like the attention of being famous because he likes a private life, he didn't start rapping with plans of becoming such a celebrity that it would effect his personal life in negative ways, but he he totally changed the rap game in a lot of ways and is very unique in his style and others do a poor job of copying it

Quote
I swear one way or another i’ma make these f-ckin haters believe it,
I swear to God wont spear the rod, i’m a man of my word
so your f-ckin heads better nod

He is going to prove the above to anyone who still doubts him, and do whatever it takes to do so, so people better agree with him or he will pwn them severely

Quote
im gonna f-ck around in this bitch and roast everybody

He is going to do his thing and be better than everyone else at rapping

Quote
sleep on me that pillow is where your head will lie, permanently bitch it’s beddy-bye,

if you ignore his skills you will be killed by him

Quote
this world is my easter egg, yeah, prepare to die’
my head is swoll
my confidence is up
this stage is my pedastal

Not quite sure on the easter egg part actually, the world is his to find maybe? [edit: I bet it is actually he will leave his mark on the world] The rest just means he is very self confident of his rapping skills though.

Quote
im unstoppable the incredible hulk
your trapped in my medicine ball
I can run circles around you so fast your f-ckin head will spin dog,
I’ll split your cabbage and your lettuce and olives

Again, he is awesome, he is way better than you, and he will kill you. I like how he adds lettuce and olives, cabbage makes sense but he extends the slang to include other vegetables, it is a joke showing the extremity of how badly he will pwn you.

you obviously just don't know the slang man. There is way harder shit to understand than this look into hyphy sometime lol. Hard to understand the pronunciation and the slang is thick and constantly changing. The lyrics above make perfect sense to me.


here try this one ;)

Quote
Tell me when to go, tell me when to go Tell me when to go, tell me when to go Go, dumb, go, dumb, go, dumb, go, dumb Go, dumb, go, dumb, go, dumb, go, dumb
Tell me when to go, tell me when to go Tell me when to go, tell me when to go Go, dumb, go, dumb, go, dumb, go, dumb Go, dumb, go, dumb, go, dumb, go, dumb
Ooh Jesus Christ had dreads, so shake 'em I ain't got none, but I'm planning on growing some Imagine all the Hebrews going dumb Dancing on top of chariots and turning tight ones
Ooh, tell me when to go (Dumb) Talking on my ghettro on my way to the store My 2nd or 3rd trip Some Henne, some Swishers and some Listerine Strips
Dr. Greenthumb lift just to ease my thoughts Not just the cops, but the homies you gotta watch The moon is full, look at the dark clouds Sitting in my scraper, watching Oakland goin' wild, tadow
I don't bump mainstream, I knock underground All that other sh**, sugar-coated and watered down I'm from the Bay where we hyphy and go dumb From the soil where them rappers be getting they lingo from
Tell me when to go, tell me when to go Tell me when to go, tell me when to go Go, dumb, go, dumb, go, dumb, go, dumb Go, dumb, go, dumb, go, dumb, go, dumb
Tell me when to go, tell me when to go Tell me when to go, tell me when to go Go, dumb, go, dumb, go, dumb, go, dumb Go, dumb, go, dumb, go, dumb, go, dumb
I'm off that 18 purple juice ***** like a mayne, labeled the Black Zeus King of the super dooper hyphy hyphy hyphy Hyphy and you wifey, you don't like me, like me, like me
From the Bay to the A Put me in the back wood, swisher sweet bud It's dope, it's just some sh** I wrote I said you couldn't be saved by John the Pope
I slid past on the gas, ******** looking at me It's good, it's good like the granddaddy Cross game, you get flipped like a burger patty Or zig-zagged, pass me the big old fatty
I drink white with a snow bunny Talkin' big sh** in a scraper going hella dumb 1800 Jose Cuervo [Incomprehensible] y'all kna' I'm saying though?
Tell me when to go, tell me when to go Tell me when to go, tell me when to go Go, dumb, go, dumb, go, dumb, go, dumb Go, dumb, go, dumb, go, dumb, go, dumb
Tell me when to go, tell me when to go Tell me when to go, tell me when to go Go, dumb, go, dumb, go, dumb, go, dumb Go, dumb, go, dumb, go, dumb, go, dumb
Ooh, now let me direct traffic for a minute (Talk to 'em) Let me tell y'all about this hyphy movement we got going in the Bay When I say somethin' you say it right back at me You smell me? We gon' do it like this here Ooh
Ghost-ride the whip, ghost-ride the whip Ghost-ride the whip, ghost-ride the whip Now scrape, scrape Scrape, scrape Scrape, scrape Scrape, scrape
Put your stunna shades on, put your stunna shades on Put your stunna shades on, put your stunna shades on Now gas, brake, dip, dip Gas, brake, dip, dip Shake them dreads, shake them dreads Shake them dreads, shake them dreads
Let me see you show your grills, let me see you show your grills Let me see you show your grills, let me see you show your grills Now thizz-face, thizz-face Thizz-face, thizz-face
Doors open, mayn, doors open, mayn Doors open, mayn, doors open, mayn Now watch 'em swang, watch 'em swang Now watch 'em swang, watch 'em swang
Go stupid (Go, dumb, go, dumb) Go stupid (Go, dumb, go, dumb)
Tell me when to go, tell me when to go Tell me when to go, tell me when to go Go, dumb, go, dumb, go, dumb, go, dumb Go, dumb, go, dumb, go, dumb, go, dumb Ooh
Tell me when to go, tell me when to go Tell me when to go, tell me when to go Go, dumb, go, dumb, go, dumb, go, dumb Go, dumb, go, dumb, go, dumb, go, dumb Ooh
Go, dumb, go, dumb, go, dumb, go, dumb Go, dumb, go, dumb, go, dumb, go, dumb, go Go, dumb, go, dumb, go, dumb, go, dumb Go, dumb, go, dumb, go, dumb, go, dumb, go

2793
Security / Re: be careful if you worked with joot
« on: May 23, 2012, 12:30 am »
Was this guys identity known before you released it here?

Did you fail reading comprehension? I would suggest that you go back to highschool but you would probably try to fuck all of the girls and end up in a sex offender prison ( jk jk ;) )

2794
Security / Re: be careful if you worked with joot
« on: May 22, 2012, 11:28 am »
So what is the point of this post? I am facing criminal charges right now it doesnt mean shit...........or is this post 2 imply that he told on someone cause if so SR isnt effected. We need the complete information for this post to be valid.

Are you facing life without the possibility of parole? Do LE know that you have had counterfeit documents before? SR is effected, you are retarded if you think drug forums are islands that stand alone, TFM had hundreds of members who are also on SR and Joots product almost certainly has been sold on SR.

The post is valid as fuck. It is completely informative. Someone facing life without parole, who is known to have had counterfeit documents, was let out of jail. You might want to know this if he had your information, because it is strongly indicative of someone who gave information to the feds.

2795
Security / Re: be careful if you worked with joot
« on: May 22, 2012, 10:33 am »
Quote
I know another two guy facing mandatory minimum 10 years

well that guy snitched then, since the only way to get a mandatory minimum removed is to give up information. The other one possibly snitched as well.

oh noez I gave up joots information, I guess I could have leaked it to the LE who didn't read the indictment against him how insecure of me. The info posted is from the bureau of prisons and the person in question had their vendor name and real name in the fucking DEA indictment and they are facing two life sentences plus twenty years, so I think they are already pretty fucked regardless.  Thanks for neg karma though, here have one from me :).

Being let out on bond when you are facing life without parole is rare as hell, there is absolutely no reason not to go on the run especially when you have as much evidence against you as Joot does and stand almost no chance of being found not guilty. I would imagine the bail must have been several millions of dollars considering I know people who were facing much shorter sentences who had half million dollar bail set.

OJ was NOT released on bail.

2796
Security / Re: ALL LR Debit Card Merchants are offline
« on: May 22, 2012, 10:28 am »
wm-center have a good reputation. You need fake docs to get an anon reloadable debit card, or to find one of the underground providers and nobody is likely to help you with that

2797
Feature requests / Re: Forum format suggestion
« on: May 22, 2012, 10:11 am »
I agree entirely I think this forum has a poor layout , things are lumped together

2798
Security / be careful if you worked with joot
« on: May 22, 2012, 09:44 am »
in another thread someone showed this

   Name    Register #    Age-Race-Sex    Release Date                  Location
1.    RYAN CHRISTOP RAWLS    63687-019    31-White-M    05-11-2012    RELEASED

they don't release people who are facing *multiple life sentences* for no reason.

2799
Security / Re: Powerline Backdoor
« on: May 22, 2012, 06:25 am »
These things act the same as a cellphone I have read by wireless sending information, and they send all data to a central server(suppose to only be the power company, but you know how that goes).  If you look into them it specifically mentions this EMI type of data being sent as well.  Bottom line is were all fucked whether its now, or in a few years once all of the smart meters have been placed, and we should look into counter measures for safety.

Dude, in the whitepaper you provided here's a direct quote:

"The researchers did conclude, that “from a privacy perspective, we also observe that today’s utility companies are not collecting the granularity of information necessary for repeating our analyses, and the [Ubiquitous computing] technologies from the research community that could collect this type of information are not yet widely deployed.""

IOW, present day utility company smart meters don't have the sophistication to disseminate EMI like you're suggesting, and won't be until it's cost efficient to do so. That's not to say it won't happen if gov gives incentives that makes them cost efficient to deploy.

But even if the day comes along where power meter EMI taps are ubiquitous, the gov will still need to get a warrant to tap you, just like they would your phone, if they don't want to risk the case thrown out and want to use it as evidence in your prosecution. Sure if the case can be made that you're a terrorist they can circumvent getting warrant with patriot act provisions, but I doubt most people here fall into that category.

And if they have the wherewithal to get a warrant to tap your power line, why not just tap your phone and broadband line using present technology?  This would make information gained from an EMI tap largely redundant, which might be part of the reason there seems to be no rush to deploy it.

In the future if more people get a clue about security and start using VPN's with regularity, then EMI taps could be put to far better use. But I just don't see how an EMI tap now offers much advantage over a phone or broadband tap to make it worthwhile.

I would need to do some more research to determine if this sort of attack would require a warrant. I believe wiretaps that are only capable of gathering illegal communications are somewhat of a gray area, there used to be a lot of discussion about carrying out Bayesian traffic classification at ISPs and looking for traffic patterns consistent with child pornography. Some distinction between viewing *communicated data* to find illegal data and viewing *communications metadata* to get a warrant to view data that is determined to be illegal. Unfortunately it has been quite some time since I was looking into traffic classification at ISPs, and I am not certain of the actual laws regarding wiretaps in this instance.

However, I am aware of other subtleties of the wiretapping laws. For one they only apply to payload data, not routing metadata. The government does not need a warrant to see which IP addresses you communicate with and when, only to see what you actually send to those IP addresses. They can also see which IP addresses communicate with you without a warrant, just not what they send to you. Sometimes knowing this information is enough to determine the payload data of the communications, however it is not technically a wiretap and doesn't require a warrant.

There are a lot of "loopholes" in the wiretapping laws that allow for people to be essentially wiretapped in some instances, without the requirement of any warrant.

2800
Off topic / Re: Czech republic
« on: May 22, 2012, 06:07 am »
You might as well get it shipped to you considering if it is personal use amounts you wont be breaking the law there, unless maybe you will break the law for importing small amounts.

2801
Security / Re: Who on SR orders from their home computer?
« on: May 22, 2012, 12:56 am »
There's some interesting facts in this thread. But it's important to keep perspective too.

Security is like buying insurance. It comes in handy IF you need it. Purchasing life insurance is usually a good idea because some day you are going to die. But there's a reason why accidental dismemberment insurance is optional. You'll probably wish you had it if you lose a leg in a car accident, so to compensate perhaps you'll drive a little more cautiously/defensively and hope for the best.

In this example, think of traditional security practices such as cryptography, technical boundaries, network access, access control, etc. as life insurance. If you don't have the budget to increase the security of any of these services by acquiring new technologies then the best you can do is securing what you have to the best of your abilities. You can spend thousands of dollars to secure your operations but there is a fairly low ceiling where the cost provides diminished returns.

The goal of security is (surprisingly) not to be 100% secure. The goal is to reduce risk to an acceptable level. Everyone has a different risk tolerance. It's up to the individual to determine what their risk tolerance is, assess whether or not their security operations are aligned to that, and if not, apply compensating or mitigating controls.

Secondly, given enough time, resources, and money anything is crackable. Money, again, is the key attribute. It's insane to think that virtually anyone here is worth the time, resources, and money required to nail with such sophisticated (and expensive) methods. The average user here is simply not that important. The only one here who may be worth it is DPR himself.

It's good to be on the forefront of security knowledge and interesting to see that knowledge shared on an online forum, but it's irresponsible to create FUD. Governments and government agencies are businesses too, with finite budgets, limited resources, increased volumes of work, and typical bureaucratic bottlenecks. The average buyer who purchases personal amounts is not going to be anywhere near the radar of the NSA or DHS. They are likely going to be caught due to poor packaging from a vendor - which all of the computer security in the world can't protect.

100% agree, of course NSA doesn't care about SR. DHS is a different story though, people have a lot of misconceptions about DHS. DHS consists of several sub-agencies including customs. When vendors are busted, it is not rare for DHS to play a role.

2802
Security / Re: Who on SR orders from their home computer?
« on: May 22, 2012, 12:46 am »
Quote
Where did you get this gem from?

all it would take to pwn most of the people on SR is a remote code execution vulnerability for SR + a non-javascript code execution vulnerability for Firefox. Tor itself has had plenty of remote code execution vulnerabilities. OTR just patched a remote code execution vulnerability. Even the people who are using isolation are just an SR/Apache/Tor exploit + firefox/Tor exploit + hypervisor exploit away. People using airgaps can protect their encryption plaintexts from hackers but not their IP addresses, and once located a really good hacker will know how to carry out a TEMPEST attack to spy on plaintexts. Hackers routinely sell mutli-zero-day combination exploits, for hundreds of thousands to millions of bucks, but they can be reused on all vulnerable targets until they are patched. Hackers of that skill level can penetrate damn near anything that isn't formally verified and I am under the impression that there are even highly advanced physics based attacks against these systems (this stuff is beyond my level). Look at Stuxnet for fucks sake they infected nuclear centrifuges that were not even connected to the internet via a worm that spread from USB device to USB device until they got lucky enough that someone working on the centrifuges exposed a contaminated USB to their network. We would not have any luck against that level of attacker.   

Someone using ASLR, airgaps, mandatory access control profiles, dedicated hardware critical process isolation, nx bit, IDS/IPS, fully patched everything on some minimalist OS (preferably on top of a formally verified microkernel) with a hardened browser and OS who is connecting to a similarly secure server....would make a very hard target for a hacker.  But even this level of security has been penetrated in the past and can be penetrated by some attackers still.

All of this is the realm of Intel agencies and their large corporate and LEO customers. If your average hacker was capable of this every SR BTC wallet would have been emptied long ago.

Stuxnet (although never confirmed) was most probably a joint effort between US and Israeli Intel. Not a Black hat from Hack BB :)

BTW I found this earlier: http://www.wired.com/dangerroom/2010/07/code-cracked-cyber-command-logos-mystery-solved/

Although you are right that this level of attacker is usually in the realm of intelligence, there are non-government affiliated hackers out there who are just as skilled. HackBB is pretty much noob central as far as the hacking scene goes. 

2803
Security / Re: Who on SR orders from their home computer?
« on: May 21, 2012, 11:24 am »
Quote
Where did you get this gem from?

all it would take to pwn most of the people on SR is a remote code execution vulnerability for SR + a non-javascript code execution vulnerability for Firefox. Tor itself has had plenty of remote code execution vulnerabilities. OTR just patched a remote code execution vulnerability. Even the people who are using isolation are just an SR/Apache/Tor exploit + firefox/Tor exploit + hypervisor exploit away. People using airgaps can protect their encryption plaintexts from hackers but not their IP addresses, and once located a really good hacker will know how to carry out a TEMPEST attack to spy on plaintexts. Hackers routinely sell mutli-zero-day combination exploits, for hundreds of thousands to millions of bucks, but they can be reused on all vulnerable targets until they are patched. Hackers of that skill level can penetrate damn near anything that isn't formally verified and I am under the impression that there are even highly advanced physics based attacks against these systems (this stuff is beyond my level). Look at Stuxnet for fucks sake they infected nuclear centrifuges that were not even connected to the internet via a worm that spread from USB device to USB device until they got lucky enough that someone working on the centrifuges exposed a contaminated USB to their network. We would not have any luck against that level of attacker.   

Someone using ASLR, airgaps, mandatory access control profiles, dedicated hardware critical process isolation, nx bit, IDS/IPS, fully patched everything on some minimalist OS (preferably on top of a formally verified microkernel) with a hardened browser and OS who is connecting to a similarly secure server....would make a very hard target for a hacker.  But even this level of security has been penetrated in the past and can be penetrated by some attackers still.

2804
Security / Re: Who on SR orders from their home computer?
« on: May 21, 2012, 11:15 am »
I think NSA calls their hackers network assault teams or something

2805
This new research paper is scary. They can with substantially high accuracy remotely test a given IP address and determine if it is browsing a particular site (in the case of some types of website, forums are one type that is particularly vulnerable) , even if they are using Tor or other low latency solutions. This is the state of the art in website fingerprinting attacks and I believe this is the first time it has been shown possible to do them remotely, previously this sort of attacker had to have access to your ISP or entry guard, now they only need your IP address.

http://freehaven.net/anonbib/papers/pets2012/paper_53.pdf

Pages: 1 ... 185 186 [187] 188 189 ... 249