Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 207 208 [209] 210 211 ... 249
3121
... while it did point out (correctly) that Tor is mostly used for trading drugs and CP, it also made a point of explaining that this isn't what the software is for ... 


Tor is mostly used for trading drugs and CP?  I doubt if that's true.  There are all types of people using Tor for reasons that are in keeping with the original goals of the Tor project.  See
Hxxps://www.torproject.org/about/torusers.html.en

If we let censorship zealots redefine Tor as a network used only to facilitate criminal activity then that makes it much easier to shut down Tor.  Tor administrators have made targeted efforts to help activists in China, Iran, and Syria, just to name a few countries with repressive regimes.  If I had to guess, I'd say that drug traffic on Tor is but a small minority of overall traffic.  Right now the biggest illegal use of Tor is probably for file sharing (such as pirated DVDs).

I seem to remember a research paper showing that the majority of Tor exit traffic consists of legal adult pornography. In several countries with large Tor userbases all porn is illegal, so it is not really a big surprise.

3122
If i may, add my opinion on this sensitive subject.To me CP,the very act itself is,IMO,is just not right somehow.But bear in mind that this behaviour is not a new subject to society in general!During the 70s..there was a magazine or media company called "color climax corporation".It was the first to produce commercial child pornography films!That company produced 30 over or more 10-minute films for its so called  "Lolita series".Those films featured young girls, mainly with men, but sometimes with women or other children.The girls were mainly aged 7–11, however some were younger.Now, Im in no way shape or form justifying for these acts!And in no fucking way am i freaking child lover!But there is a  read on this kind of behaviour  .wikileaks.info/wiki/An_insight_into_child_porn/index.html.
It is a sensitive issue! and I'm not saying there is already CP on the SR? I'm only saying its not a victimless crime! Is there really a debate here? These are not dead bodies! There active members of society that were exploited as children. Maybe I'm missing something here?

First of all CP is not an act or even a crime, it is information that is illegal to do things with. When you group CP related things together into one holy trinity of production possession and distribution (and all of their many forms) it makes it impossible to argue with you or even understand your position. It would be like if I said murder is always bad without expanding on it to say that okay maybe murder in self defense is not bad, etc. Concepts need to be expanded on to be properly and fully analyzed, when you crunch things together you increase your chances of coming to faulty conclusions and misunderstandings.

3123
Security / Re: Obfsproxy and bridge help
« on: March 16, 2012, 01:51 am »
What is unsafe about it?

3124
Shipping / Re: Busted. Charged.
« on: March 15, 2012, 07:02 am »
If US cops don't have time to fish and are so busy solving gun crimes why are so many people in prison for personal use amounts of drugs

3125
And one could break out typologies of CP offenders and show that only a tiny fraction of producers, extreme exhibitionists, produce CP merely because they know others will view it. Some CP is produced for commercial reasons, although this is incredibly rare today. And the payment for child pornography production is an entirely different matter than the possession or distribution of child pornography, these issues are not mutually inclusive. In some cases CP trading groups require the posting of unique material every certain period of time, in order for membership to be maintained. This sort of distribution structure does encourage the creation of new child pornography, as after a while members will have trouble finding new unique material without producing it themselves. From a strict libertarian point of view even this sort of membership structure would not be outlawed, as it merely promotes harm rather than technically ensuring it. From a risk to rights perspective it should probably be outlawed though, simply because it strongly encourages production and is not required for either the possession or distribution of CP. A significant amount of CP is also self produced and in some cases intentionally distributed.

One may also argue that viewing child pornography increases the probability of CP offenders victimizing children.
One may also argue that viewing child pornography decreases the probability of CP offenders victimizing children.
Both people will be able to cite many research papers.
The people who publish the research papers arguing for the first opinion can also quickly have many citations given for instances where they falsified statistics. I also see that they routinely falsify data in all areas in which they operate.
I don't care about whoever viewing computer generated  CP, If there isn't a child involved. But that child/person is still out there somewhere and was exploited? Its fucked up! The Holocaust needs to be seen so we will not repeat it. And its most def not good for the road!

What about pictures of murdered bodies? Bank robberies? Battered people? Bodies killed in drunk diving accidents? 'Was' is the key word in your sentence, but you are using it to argue for 'is currently being' for some reason.

3126
Shipping / Re: Busted. Charged.
« on: March 15, 2012, 03:55 am »
This thread reeks of disillusionment. Of course there is a risk you can be arrested if you do illegal things. I thought that would have been obvious to people. The best you can ever hope to do is use security to lower your risk and try to minimize your priority by limiting your impact (or increase your impact to increase your profits). This is true for anyone, IRL or on the internet.

Tell me when you find an IRL dealer you can talk to over Tor and use encryption with. Also let me know when you have a massive index of reviews left on the quality of their service and products. IRL vendors tend to be much less secure, and LE could monitor their customers just as easily or plant undercovers almost as easily as online. Online LE does have a human intelligence benefit over IRL though, because they can do nym flooding attacks with single agents managing huge networks of cheap to create nyms.

3127
Security / Re: Password Security 101
« on: March 15, 2012, 03:31 am »
you can test billions of passwords per second with a high end GPU. I just learned that on wikipedia when looking up if your laptop would be capable of guessing hundreds of thousands or millions of passwords per second, I think it is hundreds of thousands though.

edit Hm appears to be low millions per second with most modern CPUs. 

I think this comic sums up secure password creation:

https://xkcd.com/936/

3128
I actually liked the article very much. IT was neutral and informative, and while it did point out (correctly) that Tor is mostly used for trading drugs and CP, it also made a point of explaining that this isn't what the software is for, and underlining how involved the US government was in its inception.

As far as media coverage goes, I don't think it gets much better than this.

I actually liked it too, I don't know why I put called out in the title it makes it seem like I didn't like the article.

3129
And one could break out typologies of CP offenders and show that only a tiny fraction of producers, extreme exhibitionists, produce CP merely because they know others will view it. Some CP is produced for commercial reasons, although this is incredibly rare today. And the payment for child pornography production is an entirely different matter than the possession or distribution of child pornography, these issues are not mutually inclusive. In some cases CP trading groups require the posting of unique material every certain period of time, in order for membership to be maintained. This sort of distribution structure does encourage the creation of new child pornography, as after a while members will have trouble finding new unique material without producing it themselves. From a strict libertarian point of view even this sort of membership structure would not be outlawed, as it merely promotes harm rather than technically ensuring it. From a risk to rights perspective it should probably be outlawed though, simply because it strongly encourages production and is not required for either the possession or distribution of CP. A significant amount of CP is also self produced and in some cases intentionally distributed.

One may also argue that viewing child pornography increases the probability of CP offenders victimizing children.
One may also argue that viewing child pornography decreases the probability of CP offenders victimizing children.
Both people will be able to cite many research papers.
The people who publish the research papers arguing for the first opinion can also quickly have many citations given for instances where they falsified statistics. I also see that they routinely falsify data in all areas in which they operate.

3130
CP and drugs, gee, I really hope they shut this Tor thing down. We need these victimless crimes to end now!
Victimless! ReallY? How about the child?

Does the act of seeing a visual historic record of victim causing crime create a victim, or must the victim already have been created for the evidence to exist? People argue that viewing CP is an act of so called "revictimization", but not that viewing pictures of the holocaust is. Then they say that it is the act of taking joy from a victim causing crime that causes the revictimization to take place, but it isn't illegal to be happy when a person has been murdered, only to commit murder.  I can not logically comprehend what differentiates images of one sort of victim causing crime from another. I can not logically comprehend what differentiates one mans experience of joy from the result of a crime from anothers. I can only use logic to see the analytical flaws  of those who do see such differentiations. However, in several cases there is no flaw, as their desire is merely to excuse the injustice that they do to people who they find to be morally disgusting, often for having a mental illness or for not conforming to the baseless and hypocritical standards of synthetically produced American political correctness. 

3131
Security / Re: How's MY Security?
« on: March 14, 2012, 11:30 pm »
Hi, I don't want to hijack this thread, but I'd not heard of Ironkey before reading this. Looking at their website, it obviously includes it's own "stealth browser" (based on FF) and it states the following:

Quote
"IronKey maintains a secure private Tor network with it's own high-performance servers (separate from the public Tor network). This improves the overall security in at least two ways:
1. Since Ironkey controls the exit-node in your encrypted Tor circuit, we can ensure that no one is injecting unwanted or malicious content into your online communications, such as ads or spyware.
2. Ironkey can also make sure that no exit-node is redirecting your web traffic by providing additional DNS protections. This anti-pharming [sic?] measure can also help mitigate phishing attacks and other threats"

Would there be any benefits, or hazards, to using their "private Tor network" for SR stuff? Seems a bit too good to be true, and an excellent way for LE to connect to a big fat pipe of all sorts of interesting stuff...

Using their private Tor network is about as secure as using any other VPN, maybe a wee bit more since it is actually based on the Tor software, which protects better than most VPN software does from website fingerprinting and such. They also exit traffic through their trusted servers, so you can be more certain that traffic through the exit node wont be modified or spied on by random malicious parties. Of course it also ensures that all of your traffic can be modified and spied on as soon as the feds issue a warrant and force ironkey to cooperate. I don't know how much they have modified Tor or if they use any of its servers other than theirs. I am also not clear on if they are using Tor nodes they have added to the public Tor network or if they are using a fully private Tor network. In any case it is probably about as anonymous and secure as a VPN managed by a company like ironkey can be, which means potentially better than nothing but I certainly wouldn't rely on it. Do they even caim to not keep logs? It seems like they are selling it more as a tool to encrypt your internet traffic than as something to keep you anonymous, but in either case that is all you should really expect from it.

3132
Security / Re: How's MY Security?
« on: March 14, 2012, 11:17 pm »
visit https://bridges.torproject.org/ and pick at most three that use port 443, then tell your tor control app to use them. for obfs2 bridges I grabbed the obfs browser bundle, extracted a list of bridges from there and plugged it into arm.

Why isn't it good to select more than three bridges that use port 443? I was assuming that more bridges means possibly more speed or stability.

it does mean those things but it also means less anonymity

3133
Security / Re: How's MY Security?
« on: March 14, 2012, 11:12 pm »
Ironkey is not immune from being hacked. It has a hardware encryption system with some neat features though. It protects from being brute forced because it securely erases your encryption key if too many bad attempts are made. It also is filled with encapsulation material and has a metal skin, to make it difficult to get to the encrypted key without damaging it and erasing it from memory, although (ex)military hackers have gotten around systems like this before:

http://www.nzherald.co.nz/technology/news/article.cfm?c_id=5&objectid=10625082&pnum=0

Quote
Tarnovsky needed six months to figure out his attack, which requires skill in modifying the tiny parts of the chip without destroying it.

Using off-the-shelf chemicals, Tarnovsky soaked chips in acid to dissolve their hard outer shells. Then he applied rust remover to help take off layers of mesh wiring, to expose the chips' cores. From there, he had to find the right communication channels to tap into using a very small needle.

The needle allowed him to set up a wiretap and eavesdrop on all the programming instructions as they are sent back and forth between the chip and the computer's memory.

Those instructions hold the secrets to the computer's encryption, and he didn't find them encrypted because he was physically inside the chip.

Even once he had done all that, he said he still had to crack the "huge problem" of figuring out how to avoid traps programmed into the chip's software as an extra layer of defence.

"This chip is mean, man - it's like a ticking time bomb if you don't do something right," Tarnovsky said.

Joe Grand, a hardware hacker and president of product- and security-research firm Grand Idea Studio, saw Tarnovsky's presentation and said it represented a huge advancement that chip companies should take seriously, because it shows that presumptions about security ought to be reconsidered.

"His work is the next generation of hardware hacking," Grand said.

 

Ironkey is a nice high quality thumb drive with built in encryption and some nice difficult to defeat physical security features, but it is not the completely unhackable magic device you are making it out to be. It is FIPS140-2 level two certified, but the military probably uses level 4 certified stuff mostly.  Anything without physical intrusion detection features can only get level 1 certification, level 4 needs to be able to detect any potential physical intrusion.

3134
Off topic / Re: What makes you happy?
« on: March 14, 2012, 04:19 am »
fixing a bug when I am trying to configure a server or write a program or what not. Its the most fun text based game in the world. Bug slayer!!!! Always get a nice rush when the problem is fixed, particularly if it is one that takes a few hours and makes me want to punch a wall or something.

Being dissociated away from reality is also fun times, gotta love ketamine. Of course it is also nice to see reality in super high definition and with limitless abstraction. Really anything that involves me not having baseline perceptions makes me happy. Sober perceptions are the worst sort of prison , I feel sorry for the people who live entirely contained by them.

3135
Meh you can learn everything I said here from reading case studies. I have read the case studies of pretty much every major CP operation in USA and lots in other countries as well. There is no better way to see the cutting edge of police operations against cyber crime, the amount of documentation and level of technical detail provided is actually quite substantial.

Pages: 1 ... 207 208 [209] 210 211 ... 249