Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 200 201 [202] 203 204 ... 249
3016
Regarding Hitler there is this view that if Hitler may have gotten into the Vienna School of Arts which he applied to in 2 rounds then there would just have appeared another Hitler-figure because the German people just wanted a dictator at the time and anti-semitism was just a phenomenon that could not be dealt with rationally due to the history of anti-semitism stemming from way back to when Jesus was crucified. There actually was a kindda-nazi-party before Hitler's nazi-partiy and there were figures, can't remember their names, but who were also known for their speeches and way of exiting the crowd.

Hitler was therefore not exceptional, he was just the one carrying it out. I guess this is viewing history as deterministic.

I think the same can be said for pretty much anyone. If Jesus was never born people would be worshiping someone else, the details of the implementation would change but not the overall concept. Also if you kill Jesus it is kind of a waste since he will just rise from the dead lololol.

3017
Security / Re: Using clearnet while on TOR?
« on: April 18, 2012, 01:00 pm »
There actually is a potential risk of surfing with a browser with Tor and one without Tor at the same time, if you have a circuit to the a site via Tor and also connect to it without Tor, if your internet dies both connections will break at the same time and the site can correlate it. So in summary

*Using a Tor browser and non Tor browser at the same time? Safe.
*Connecting to the same server with each of the browsers simultaneously? Potentially not safe, if your connection to the internet dies


3018
Security / Re: Police bust online narcotics 'Farmers Market'
« on: April 18, 2012, 07:09 am »
Tor is also used by dissidents in the USA to protect themselves from Nazi agencies such as DEA and FBI

3019
Off topic / Re: They took the farmers market
« on: April 18, 2012, 07:06 am »
joot and djsfishin might have sold here but I am not sure

3020
Off topic / Re: Some lessons from The Farmers Market
« on: April 18, 2012, 06:12 am »
and finally

Quote
could have easily kept it quiet and still ran the board for entrapment but they didn't.

They couldn't have kept it up for long without it leaking, for one people would notice all of those people suddenly were not getting online anymore unless they all turned over their account info to the feds. For two I am pretty sure Adam knows people in the NL scene IRL and they would have found out he was arrested and word would have spread from them to the forums pretty quickly anyway. Many vendors know at least one or two other people from the forums IRL, we almost always learn quickly when someone is busted (at least in private scene) because someone who knows them and wasn't busted finds out quickly and it spreads from them word of mouth.

I also wouldn't be so sure that this is the last of the arrests, there very well could already be dozens of others who merely didn't show up on this indictment. It isn't like they are going to charge all of the customers with running a continuing criminal enterprise etc, but I will be surprised if there are not at least two or three dozen other arrests linked to this that didn't make the news because they were not part of the indictment against the main players.

3021
Off topic / Re: Some lessons from The Farmers Market
« on: April 18, 2012, 06:05 am »
The lessons to learn from TFM should already have been learned by previous operations

*Don't use paypal
*Don't accept CIM
*Don't use hushmail
*Your forum has feds on it

3022
Off topic / Re: Some lessons from The Farmers Market
« on: April 18, 2012, 06:03 am »
Buyers who NEVER buy over 2 oz. have NOTHING to worry about on SR.

Stop pulling things out of your ass they are stinky

3023
The SR strategy is one of exclusively taking the position of the interior.

Quote
defenders are in what military strategist Carl von Clausewitz calls "the position of the interior." They have to defend against every possible attack, while the defector only has to find one flaw that allows one way through the defenses ........ The attacker's clear advantage increases the scope of defection even further.

Being purely defensive gives extreme advantages to your attacker. They are defensive and offensive. You are not going to win a war by purely defensive tactics, you are only going to ensure that a single mistake on your part is all it takes for an attacker to defeat you. You should force your adversary to also take the position of the interior in respect to their own strategies, because then they also are forced to protect from every single possible attack, a much less pleasant position to be in than eternally waiting for one single weakness in their opponent.

With all due respect to you (and none whatsoever to "Carl von") this is horseshit. Clausewitz was a wanker officer type who made his bread and butter catering to other wanker types whose job it was to look dashing while peasant armies clashed for their edification. He was an aide-de-camp.. not a fighting general and as such his thoughts on strategy should be taken with the huge caveat that they are meant to be flattering to the mindset of the professional officer (i.e. by definition WANKERS).
  This "oh so nice" idea of the "strategy of the interior" is completely based on line formations and taking territory. It simply doesn't WORK in asymetric warfare, or any sort of guerilla action. Nor is it any sort of metaphor for law enforcement or a COIN operation.
   "..extension of diplomacy by other means" my left nut. Clausewitz can suck a dick, this is a conflict between a regime and multiple non-state actors existing embedded in a territory ideologically contested by both. As such the notions of what long dead pettifrogged wankers from the age of cannons and glory think is only relevant by accident.

The position of the interior is widely recognized as being "not bullshit" by pretty much every security expert and military strategist, and as applying to all scenarios with an attacker and a defender. It still holds true for asymmetric warfare, the defender needs to prevent all potential attacks and the attacker only needs to find one way to attack that will not be prevented. Here is the entire quote:

Quote
Network security is an arms race, and the attackers have all the advantages. First, network defenders occupy what military strategists call "the position of the interior": the defender has to defend against every possible attack, while the attacker only has to find one weakness. Second, the immense complexity of modern networks makes them impossible to properly secure. And third, skilled attackers can encapsulate their attacks in software, allowing people with no skill to use them. It's no wonder businesses can't keep up with the threat.

oops wrong one

Quote
defenders are in what military strategist Carl von Clausewitz calls "the position of the interior." They have to defend against every possible attack, while the defector only has to find one flaw that allows one way through the defenses. As systems get more complicated due to technology, more attacks become possible. This means defectors have a first-mover advantage; they get to try the new attack first. Consequently, society is constantly responding: shoe scanners in response to the shoe bomber, harder-to-counterfeit money in response to better counterfeiting technologies, better antivirus software to combat new computer viruses, and so on. The attacker's clear advantage increases the scope of defection even further.

I don't necessarily support violence being used against law enforcement (not that I give a flying fuck if they all die), but there are more sorts of attack than violent. They can be hacked and information on their agents dumped, undercovers can have their covers blown, pretty much any disruptive thing against them. One of our goals should be to be as disruptive to their operations as possible, not just to protect ourselves from them. As long as we are the only ones with anything to lose and they are the only ones with anything to gain, things are not going to go to our favor. We need to make them want us to stop compromising them, not just fend them off in the hopes that we can prevent them from compromising us. Protecting from compromise is much harder than compromising, due to the full position of the interior logic. 

Visualize yourself as being tasked with defending a home from a burglar. You need to make sure every door is locked with a lock that can't be picked, that every window is locked and shatter proof, that a tunnel can not be dug under the house and into it, that the chimney can not be used as an access point, etc etc. All the burglar needs to do is find one way to enter the home. Obviously they have the much easier job.

The same concept applies equally to us. We need to make sure we can't be compromised via financial traces, via communications interception, via network analysis, via hacking, via the mail system via dozens and dozens of potential ways to fuck up and the dozens and dozens of implementations of those ways that we could fuck up. All LE needs to do is find a single way that they can compromise us. We are clearly taking the position of the interior, and I think it is bad that we are the ones in this position while we completely ignore the fact that we should be focused on not only defending our own selves but also compromising our opponents.

3024
Product offers / Re: anonymous VISA
« on: April 18, 2012, 03:05 am »
Although a lot of these cards are scams not all of them are. Anonymous ATM cards are still the primary way that the vendors I know cash out, everything from pecunix to bitcoin, and I know that the cards work for some of them anyway and have for a long time. A lot of them are also scams though. Also I would avoid buying one on SR and instead look on places that are not directly tied to illegal activity. Also some of them require them to send in photocopies of ID and utility bill, but this is easily forged.

3025
Security / Re: Java or not java for e-wallets???
« on: April 18, 2012, 02:59 am »
Javascript and Java are entirely different things , jfyi

3026
Security / Re: GPG Help Please!
« on: April 18, 2012, 02:58 am »
You encrypt messages with the public key of the person you send them to. I could encrypt a message for you to decrypt with your private key by using your public key, but I will not be able to decrypt a message encrypted with your public key without your private key. 

3027
Security / Re: blablah i deleted the subject
« on: April 18, 2012, 02:52 am »
Im using a laptop right now...I have a couple PCs and other laptops but I think I'd rather just get a real cheap netbook and make it my SR computer.

If I run SR from a bootable OS on a USB stick/SD Card could I take this anywhere and use SR on any computer without leaving a trace?
Yeah pretty much, look into Liberte, I run it off my netbook and when I have to do a big transfer I drive around neighborhoods until I find an unsecured network and connect to it on my netbook using Liberte and then do all the illegal activity I can without a trace.



I think mrgrey can offer something that will make that process easier, check em out.  You can basically steal wifi anywhere in a ~3 mile radius(the high end one can at least)

http://silkroadvb5piz3r.onion/silkroad/user/16aa08e0ed

Why not just buy a high end directional antenna and an amplifier from the local electronics store? Just make sure to keep the antenna and amp combo in the legal limit, you don't want to get FCC agents knocking at your door. Not that you want to use WiFi from a static location in the first place (although this is still better than using your own internet connection).

3028
Security / Re: Using clearnet while on TOR?
« on: April 18, 2012, 02:22 am »
Can you show me a citation of this? Doesn't sound correct to me, and I am pretty sure I have heard them say that it is safe to do. One of the browsers will be configured for Tor and the other will not, so it shouldn't pass to Tor. Also unless you are accessing the site through Tor it will be (well, in practice) impossible for it to send data to Tor in reply to you, since it will have your IP address and not an exit nodes IP address. So the issue would need to be poor isolation between browsers, but I have not heard of this being a problem and have in fact heard the opposite (that it is not a problem). I think Tor button will isolate cookies well enough even if the browser has some issue (at least if you have it configured to isolate Tor cookies).

Anyway maybe it should be avoided, but I have not seen any examples (with technical details) of how it could lead to problems. I can imagine a problem arising if there is not isolation between the browsers, but I think Torbutton will come to the rescue in these cases. Should probably wait for a more definitive answer before doing it though because I am not 100% certain and it is always better safe than sorry.

this thread in Tor dev mailing list from 2008 indicates to me that it is probably safe to run both simultaneously, particularly since now the browser bundle does allow for it

http://archives.seul.org/or/dev/Dec-2008/msg00027.html
Quote
A long running problem with the Tor Browser bundle is that it cannot
be run at the same time as a non-Tor Firefox. There have been attempts
to fix this (e.g. [1]) while still using the FirefoxPortable launcher,
but they haven't worked too well.

So I've been experimenting with launching Firefox directly from
Vidalia. This now works (more or less), so I'd be interested in other
peoples' experiences of it. It's not ready for wide-scale use though,
as it's using an old version of Vidalia and might leave more traces
than the current Tor Browser Bundle.

3029
Security / Re: Using clearnet while on TOR?
« on: April 18, 2012, 02:15 am »
Ah I totally misread your post, sorry. There should not be an issue with surfing with a torified browser and a non-torified browser simultaneously.

3030
Security / Re: Using clearnet while on TOR?
« on: April 18, 2012, 02:13 am »
Nothing wrong with using Tor to access the clearnet, that's what it was designed for after all. There are some things to take into consideration

1. Never use Tor to do things that can be tied to your real identity, for example checking your facebook with Tor or logging into your bank with Tor
2. Understand that the exit node can see everything you send through it in plaintext, and take proper precautions when needed, like only sending encrypted messages or making sure to use SSL when it is available and preferably check fingerprints
3. Exit node can modify the content that you download, so never launch programs downloaded through Tor unless you verify them by comparing their hash value against a public hash value, or downloading things through multiple exit nodes and comparing hash of all of them to make sure it matches up (still can fail but less likely to), or verifying the things you download are signed with the appropriate key of the publisher.
4. Circuits to clearnet sites are not necessarily isolated, you could and very likely will end up loading multiple sites simultaneously through the same circuit, and the exit node can link all of those streams to the same initiator
5. exit node operators can gather lists of sites that people access through Tor, even if SSL is used, and filter out things they already know to not be interesting, this is a good way to gather lists of interesting sites that people feel the need to access through Tor (ie: a good way to get the url of a bunch of clearnet CP / drug / etc websites that think they are private and underground because they are invite only....oops!) (ironically enough, Tor is used extensively as a tool to locate underground servers that are not hidden services)

If you keep these things in mind, surfing the clearnet with Tor can be very safe. Tor was designed for surfing the clearnet in the first place, hidden services are just a tacked on addition.

If you don't use Tor to check links you find on SR you are putting yourself at serious risk. What is to stop me from making a fake website and linking to it on SR only, and then harvesting all of the IP addresses that connect to it and filtering off the ones that are Tor? I could even keep track of who is viewing my thread with the link in it an try to do various intersection attacks to link a SR username to its probable real IP address.

Same thing is true for posting links to news sites that you find on the clear to SR. Do this enough times and if I can get logs from all of those sites I could intersect them and if a unique IP address remains I can assume it is the IP address of the person who posted all those links on SR....they are at least in the crowd size, if they don't use Tor or another anonymizer with rotating exit nodes. If they are a vendor I can filter even more.

Pages: 1 ... 200 201 [202] 203 204 ... 249