Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 187 188 [189] 190 191 ... 249
2821
Security / Re: Who on SR orders from their home computer?
« on: May 20, 2012, 03:02 am »
I think the point is it's security through obscurity - yes of course someone downloading CP could be traced to your IP address, it actually happened in London to a man I knew but the conversation with the Police lasted less than five minutes :

"I run an Apache Home Server running a Tor exit relay Officer, here take a look. "

"Thank you Sir, have a good day."

The Police understand the implications of running an exit relay as well as we do. It may well be the case that someone does something nefarious via your IP, the point is it won't be possible to single you out for LEO's attentions on that basis.

By way of compromise it's also possible to run a Tor non exit relay....!

V.

but also, why would you want to run an exit relay if you ARE doing something illegal, running an EXIT relay increases your chances of being investigated for anything that might have happened from your exit node, so why invite terrorism investigations, child porn investigations, assassination plot investigations etc into your home? if you run an exit relay, anyone could be using Tor for clearnet communications through YOUR exit relay, and that brings unwanted attention, so encrypt your hd, YES, run an exit relay...NO (at least not from a machine that also contains incriminating evidence that could be used against you.  the encryption thing was not the point of my post, the exit relay being a stupid choice while doing illegal activity was the point.

Just fyi, security through obscurity is a derogatory term in most security circles. You want to have security through correctness, security in depth, security via strong cryptographic primitives, security by whatever, but security through obscurity is not something to aim for at all. Unless you are Microsoft and don't want to reveal your source code while still pretending that you are increasing security by keeping it secret :P.

Secondly, running as an exit is bad because you might be raided over it, but running as a relay decreases your anonymity significantly as well and should also be avoided.

if you want to contribute to Tor, buy a VPS and run it as an exit or relay. I would avoid running as an exit or relay on a computer on a network that I use for anything I want to remain anonymized, and I would certainly avoid running an exit if I didn't want to chance being raided over someone elses bullshit. In some cases LE ignore Tor exit IPs entirely because they know they can't trace them and don't want to harass the exit node operator, in other cases they kick in the door and haul your ass off to jail on CP charges and it takes a few days to sort things out plus they keep your PC for a long time for evidence, in some cases people have even been raided by CIA type agencies (not in USA so not actually CIA). Police forces of the world are widely different in their understanding of Tor and their standard procedures, do you want to risk that the police agency that saw your tor exits IP downloading CP + your own local police force have no fucking clue about Tor? If they are not checking Tor exit lists and filtering those off of the lists of IPs they see downloading CP, you will be treated as anyone else who they suspect of downloading CP or sending bomb threats or whatever, and  that means you could wake up with a bunch of thugs pointing guns at your face and ripping your house apart.

2822
Security / Re: Who on SR orders from their home computer?
« on: May 20, 2012, 02:51 am »
Has the world gone mad? Am I really having to extol the virtues of encrypting your hard disk drive to someone who's ostensibly reached "Hero" status on these forums?

Of course there's a risk that your HDD can be accessed while encrypted if it's mounted - that's probably why you'd only mount it while you're there and gosh I don't know, lock your screen when you're away from the keyboard for a few moments?


V.

if.you.are.raided.while.your.encrypted.drive.is.mounted.doesn't.matter.if.it.is.encypted.or.not.

do not run as an exit relay if you have anything illegal stored.

Locking screen doesn't prevent pigs from getting FDE encryption keys. Running Tor exit is great. But I suggest not doing it unless

A. You are a University
B. You are the EFF or have good lawyers on your team
C. You are some other organization

failing the above three

D. You have absolutely nothing illegal on your PC, and do not have anything illegal in your home
E. You run it off of a server in a data center that can not be traced back to you

too many people have been raided due to what their exit node was seen doing, it just is not worth it to run an exit if you do illegal shit that will be discovered during a raid.

2823
Security / Re: Who on SR orders from their home computer?
« on: May 20, 2012, 02:47 am »
But. If. Your. Hard. Disk. Is. Encrypted...

V.

running as an exit is a great way to get busted for drug trafficking after you are raided on suspicion of downloading child porn or sending bomb threats

The Tor Project explicitly suggests against running as an exit if you have anything incriminating on your PC, because it might be seized.

Let me know when you find a way to encrypt your stash of drugs so the police who raid you over CP going through your exit node can't find it.

2824
Security / Re: Who on SR orders from their home computer?
« on: May 20, 2012, 12:55 am »
running as an exit is a great way to get busted for drug trafficking after you are raided on suspicion of downloading child porn or sending bomb threats

The Tor Project explicitly suggests against running as an exit if you have anything incriminating on your PC, because it might be seized.

2825
- cause and effect, the men in white coats are in denial, foolishly believing they can reinvent nature, cure a disease by some other unnatural /
  untested method; they don't believe in cause and effect, believe in chemicals rather a living organism.
  OR
  continue to treat the effect there's more money to be made in that, "understanding causes effectively puts me out of work.." -current cancer
  treatment methods are a good example of this backward mentality.
- "we can rip off nature or the naturally occuring plant, reduce it down to some "active" ingredients, discard the rest cos they don't
   matter(?!)", and announce it as a new discovery and get rich off the sick.
- "if I think of humans as just a mix of chemicals i have less variables, less to consider, I might have a chance explaining why too much of one
   chemical has caused this sickness, which i would not be able to explain nor deduce as I cannot see a "soul" nor all what influences a living
   organism like humans / animals"


- the other side to this is we seek the quick fix to a problem, instead of preventative measures, eating correctly to prevent future problems
  we turn to science for the quick fix = medicine.

Real medicine works. Also good luck with your plant cures lol. Science = the win.

2826
Your right truecrypt is not the best protection, all it takes is a judge to demand your password. And sometimes even if you give it they could say you have a hidden os, say your holding out on the second password and still put you're ass behind bars. But don't get me wrong doing everything on a unprotected system with no security in place Is just dumb whether you bookmark silkroad or not. You'll just make the cops day. So if your a buyer or a seller you should still have a good plan. I guess it's just a matter of whether you think the time it takes to learn this is worth keeping your ass out of jail. I think the best thing to do is use tails or liberte Linux. If runs in your computers ram and wipes everything when your done. Also try to keep your files in a truecrypt container with a decoy container on a server in a place like Switzerland.

Truecrypt isn't the best protection because there are about ten billion ways to covertly/overtly steal a passphrase, and protecting from all of them isn't very feasible. Truecrypt is also not the best protection because by the time it offers any protection at all you are already identified.

2827
Security / Re: Do you really encrypt all your communicaton?
« on: May 19, 2012, 08:13 pm »
if you only encrypt your address then anyone who can intercept your communications will always know when you are placing an order

2828
Security / Re: Simple way to make and remember secure passwords
« on: May 19, 2012, 06:44 pm »
edit: I should preface this by saying that there are two goals when it comes to countering keyloggers, the primary goal is to protect from the attacker being able to get any keystrokes at all, a lesser goal is to protect from the attacker stealing a password that can be used for authentication. Also, I am using keystroke information interchangeably with user input.

There are two types of keylogger, hardware and software. They come in various levels of sophistication. The shittiest hardware keyloggers are just a connection piece that you place between the keyboards USB connector and the computers USB connector. They record all of the keystrokes and then forward them on to the computer. You can spot these simply by looking for them. Virtual keyboards protect from this sort of keylogger because the input comes from the mouse. There are slightly more advanced hardware keyloggers that work in essentially the same way, but which can be hidden better, inside of the keyboard itself for example. These are harder to find but virtual keyboards protect from them as well.

The more sophisticated hardware keyloggers can not so easily be defeated. They use extremely tiny cameras and position them so they can view the keyboard as it is typed on. Or they analyze transient electromagnetic information and use it to pull the entire monitors display from a substantial distance, or to determine keystrokes based on the sounds of typing, also from great distance. Maybe they plug into the power grid and gather keystroke information that leaks into it. Protecting from this sort of attack is much harder, and requires a combination of surveillance technology to detect physical intrusions (or keeping your laptop on you 24/7) and shielded equipment/rooms to prevent information leakage.

Software keyloggers  also come in various forms. The least sophisticated of them will be defeated by a virtual keyboard because they monitor input from the keyboard and ignore the mouse. However most people use much more advanced software keyloggers that also monitor mouse position. Even the mouse/keyboard monitoring software keyloggers can be defeated by using a virtual keyboard that randomly rearranges the position of the keys every time one is clicked. However, even more advanced software keyloggers will take a screenshot every time a mouse button is clicked, and many of them just constantly record what is happening on the screen. You can even get around software keyloggers that monitor everything on the screen by using one time password systems, the password is good for authentication exactly one time and then a new one needs to be generated. The server and the client both have a piece of secret information that allows them to keep synched up with what the appropriate password should be, but the attacker can not guess future passwords from current passwords so they are still screwed. banks use technology like this quite a bit, but it is possible to implement these systems without specialized hardware.

https://en.wikipedia.org/wiki/One-time_password

OTP pretty much defeats a keyloggers ability to steal a password that can be used for authentication at a later point in time.

In the grand scheme of things I think that virtual keyboards are a waste of time. Theoretically they can protect from some simple keyloggers, but in practice no significant attacker uses such primitive keyloggers. IMO virtual keyboards are largely just a marketing gimmick because they make people feel more secure. OTPs can be effective at preventing keyloggers from stealing a password that can be used for future authentication, but they wont protect you from the attacker spying on your keystrokes.

2829
Having an encrypted disk makes you more suspicious than having a disk filled with traces of criminal activity? 

2830
You should certainly encrypt your entire disk. It is more important to use GPG for communications and Tor to protect from traffic analysis, but FDE can protect from sloppy attackers in certain circumstances. At the end of the day if you are a primary suspect and your attacker has the slightest clue what they are doing, Truecrypt will not protect you much, but if they have no clue what they are doing it could save your ass, and if you are a vendor it could save the asses of all of your customers. Usually they have no clue what they are doing too :).

2831
Off topic / Re: Some Retarded Buyers
« on: May 19, 2012, 06:03 am »
I would be more concerned about the fact that you seem to be driving to post offices to mail drugs

2832
Security / Re: GPG, do i need it?
« on: May 19, 2012, 05:49 am »
I doubt FM only had 3,000 transactions, and it was actually one of the oldest internet drug markets ever if you consider all of its previous incarnations. SR is probably one of the biggest (in member numbers) named drug networks in the history of the world, if not the biggest. But TFM was the biggest online drug market prior to it. It used to be that a forum with a few thousand members was considered enormous, before that a forum with a few hundred members was. The online drug scene is experiencing a truly exponential growth rate.

2833
Off topic / Re: UK Sellers - "No Pakis" policy?!
« on: May 19, 2012, 03:41 am »
i have heard of several counterfeit document vendors refusing to work with people who look middle eastern because they are afraid they might sell to terrorists and get CIAPWNT

2834
Security / Re: Simple way to make and remember secure passwords
« on: May 19, 2012, 03:39 am »
good keyloggers can see the screen too

2835
Off topic / Re: Someone please describe a xanax high for me.
« on: May 18, 2012, 09:38 pm »
They are all similar but also have their own uniqueness. Xanax is particularly prone to causing amnesia and blackout and is one of the "harder" benzos imo. I have not tried kolonopin but I hear it is very very very strong. Others are more mild in effect, like Valium.

Pages: 1 ... 187 188 [189] 190 191 ... 249