Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 211 212 [213] 214 215 ... 249
3181
Thantos is retarded if he thinks that it wouldn't be trivial for LE to get a list of every single shipping address tied to a pack that was checked with Tor. He is also retarded if he thinks that the set of shipping addresses that are tied to tracking being checked with Tor don't recieve drug packages in larger % than the entire set of shipping addresses that have tracked packs sent to them. For example, my grandma doesn't check her tracking with Tor and doesn't order drug packages, THANTOS orders drug packages and checks his tracking with Tor. Ancedotal evidence in this case but easy to extralopate.


3182
Quote
No way! 
It would be the farthest from "easy to do" - it would require tons of dedicated resources and built in risk-assessment software . . . it'd would be an extraordinarily expensive venture to bust buyers . . . which seems pointless, why move down the ladder??

It would require the IP log database from the tracking website and a computer to query it looking for through the list of IP addresses for known Tor exit nodes and then seeing which addresses are tied to those packages. By no means would this take an extraordinary amount of resources or expense.

Quote
The majority of packages tracked with a Tor exit node contain illegal items?  Wow - that's a leap and a half man, there is  no way know, speculating would be pointless, it'd be like me saying your name is probably either Chris or Steve - it's a baseless guess without any possibility of real determination either way.

Why would you check a shipment with Tor if you didn't want it to be traced to you? Isn't that the entire point of using Tor? Why would you not want a package to be traced to you? Even if it isn't the majority of packages, I would bet my life that a significantly higher % of packs checked via Tor contain illegal items than packs not checked via Tor. I can say that your name is probably John if you live in the United States and are male. It is also probably significantly more likely for you to fit that profile as an SR member, than for you to be a Chinese female.

Go ahead and check all of your drug shipments with Tor if you want. IMO it is a good way to get your shit flagged.

3183
Security / Re: Phone
« on: March 08, 2012, 09:39 pm »
I am not a fan of phones and consider them likely to be insecure in many cases. That said, Androids are pretty cool, and support encrypted voice, encrypted text messages, full encryption of contact lists etc, encrypted instant messages via OTR and they can have their internet traffic routed through Tor. I wouldn't even consider using anything other than an Android but I would avoid phones in general.

3184
they should all get imprisoned, cut into pieces and feed to the dogs... i can't explain myself, how such cruel animals are human beings...

Maybe you should ask yourself?

Quote
i hate that too, that there is again such a great attention on tor-network... we don't need that kind of thing, tor is meant to be like a deep water or something and not publicity like... they should better take care of other stuff!

Actually people were trading CP on Tor far before anyone was using it for drugs. SR is actually what brought all of the recent attention to Tor, not the CP sites. Fuck SR has gotten Tor more negative media attention than Wikileaks did!

3185
http://www.boston.com/business/technology/articles/2012/03/08/walpole_companys_anonymity_software_aids_elicit_deals/

Quote
A Walpole nonprofit company, largely funded by the federal government, is inadvertently providing child pornographers, drug dealers, and other criminals around the world with software that allows them to remain anonymous on the Internet.

The little-known organization, Tor Project Inc., says its free program is designed to help people protect themselves from Internet surveillance. Users include those speaking out against oppressive political regimes in other countries, corporate whistle-blowers, law enforcement officials, and domestic abuse victims.

But the software, which can easily be downloaded from the Tor Project website, also is attracting a growing number of people who trade illegal pornographic material and buy and sell drugs on a part of the Web known as the “darknet,’’ according to federal authorities, advocates for children, and Internet specialists.

Its use for illicit purposes creates new challenges for law enforcement officials hunting increasingly technologically savvy criminals, and highlights the sometimes unwanted consequences of protecting free speech online.

The darknet is “a secret Internet,’’ said Chester Wisniewski, senior adviser at Burlington computer security company Sophos Inc. “It’s free speech to the extreme. It’s really tragic there are some sickos using this same technology for their purposes.’’

The Tor Project is widely considered the largest service in the world that allows users to navigate the Internet anonymously. Andrew Lewman, the organization’s executive director, said he is approached regularly by law enforcement officials whose investigations have been frustrated by Tor technology, which hampers authorities’ ability to identify suspected online criminals and masks the origin of child pornography and drug-dealing websites.

But Lewman said Tor Project and its software can’t be blamed for aiding crimes in the same way cellphone and computer makers should not be held accountable for the misuse of those devices. He has rejected informal requests by law enforcement agencies to create a way for them to identify Tor users, saying it would defeat the purpose of the software. But Lewman said he is willing to help investigators better understand the technology, and provides a link on the Tor website for anybody to report evidence of child pornography.

“I’m not going to compromise Tor,’’ said Lewman, who works out of a small storefront office on Main Street in Walpole. “ ‘Good’ is so relative around the world. I bet the Egyptian government didn’t think their activists were good.’’

Tor stands for “the onion routing’’ project, initiated by the US Naval Research Laboratory in the 1990s to camouflage government communications by sending messages through a system of computers. The project was expanded in 2001 by two Massachusetts Institute of Technology students who made the technology more accessible to civilians. An added feature called “hidden services,’’ launched in 2004, allows people to publish and visit websites without being identified.

In 2005, federal agencies started funding the project with the goal of making the technology easier for the public to use, Lewman said. The next year, it was established as a nonprofit.

Government officials say they support the project because it provides potentially life-saving online security and privacy in places - such as Iran and Syria - where political dissidents often are dealt with harshly. The State Department and two federal agencies - the Broadcasting Board of Governors and the National Science Foundation - are major contributors.

The Tor Project currently has a $1.3 million annual budget, with about 15 full-time and contract employees. It also relies on 3,000 volunteers around the world who provide access to their computers. That allows the company to bounce data from one server to another, making it difficult to track.

“Tor is a publicly available tool. It is used by activists and bloggers, by average US citizens protecting against identity theft, and by military and law enforcement officers conducting investigations and intelligence gathering,’’ a State Department spokesman said.

Lisa-Joy Zgorski, a National Science Foundation spokeswoman, also cited the value of the software. “Any technology can be used for ill,’’ she said. “It is not a reason not to fund the science.’’

The popularity of the Tor Project technology among pedophiles gained media attention last fall when a group of computer hackers associated with the online collective known as Anonymous took aim at child porn websites hidden on the darknet. The so-called hactivists claimed to have disabled several child porn sites as part of an effort dubbed “Operation Darknet’’ or “To catch a predator.’’ As part of its campaign, Anonymous posted a video on YouTube pledging to fight sexual abuse.

“The darknet is a vast sea with many providers, however, we fully intend to make it uninhabitable for these disgusting degenerates,’’ a narrator says in the YouTube video. “We will never turn a deaf ear upon the screams of innocent children.’’

John Shehan, executive director of the Exploited Child Division of the nonprofit National Center for Missing and Exploited Children in Virginia, said its investigators first discovered Tor’s software about 1 1/2 years ago after receiving tips about pornographic images of children sent over the Internet by people who could not be identified. Center officials met with Lewman to figure out how Tor worked.

“It confirmed our suspicions that this product masks identity and it will be a major challenge for law enforcement,’’ Shehan said.

Last June, democratic US senators Charles E. Schumer of New York and Joe Manchin of West Virginia called on federal officials to shut down the website Silk Road, which they called an “online marketplace for illegal drugs’’ that uses Tor technology. Schumer and Manchin were responding to an article by the media site Gawker.com that detailed drug dealing on Silk Road using a digital currency called “bitcoins.’’

Despite the senators’ call for action - addressed to US Attorney General Eric Holder and MicheleLeonhart, the administrator of the Drug Enforcement Administration - Silk Road was still up and running Wednesday.

Representatives from Silk Road did not respond to an e-mail seeking comment Wednesday.

DEA spokesman Rusty Payne said the agency couldn’t comment on the senators’ letter because it is “is part of an ongoing investigation.’’

A Boston Globe editor and reporter were able to access the site after downloading Tor Project software and registering as Silk Road users. Described as an “anonymous marketplace,’’ the site promotes its ability to “protect your identity through every step of the process, from connecting to this site, to purchasing your items, to finally receiving them,’’ through the use of Tor technology. The homepage features pictures of various drugs for sale - including heroin and cocaine - and allows buyers to place them in a shopping cart, similar to those on Amazon and other consumer sites.

In addition to drugs, the site purports to provide access to other illegal products, including forged documents, and links to a separate marketplace called the Armory, designated for “small arms weaponry for the purpose of self defense.’’

Federal law enforcement officials acknowledge that Tor technology makes investigations of suspected illegal online activity more difficult, but they emphasize that it doesn’t mean criminals can avoid detection. For instance, they say, even though an online drug deal may be anonymous, real money eventually has to be exchanged and the buyer must receive a physical package.

Investigators also have become more sophisticated in their efforts to hunt down criminals, they said.

“With any technology, it is going to add complexity to the investigative process,’’ said Russ Brown, supervisor of the Boston Cyber Criminal Squad for the FBI. But Tor, he added, “is certainly not going to end our investigative efforts.’’

Mathematician Paul Syverson, an inventor of Tor technology at the Naval Research Laboratory in Washington, D.C., said it is unfortunate that the software is used to do harm. But while unsavory people already have various ways to disguise their identities, he said, fewer options are available for Internet users such as domestic abuse victims seeking to avoid stalkers or whistle-blowers trying to dodge online surveillance.

“There are lots of different reasons why somebody wants to protect the network location of what they are doing,’’ Syverson said. “There are people doing bad things, but that is not what we made [Tor] for. There’s lots of people using it for good things, too.’’

3186
Quote
many people find even customs just sends a love letter for small amounts.

Does anyone know of a case where customs sent a love letter for something other than personal use amounts of a schedule III or V pharmaceutical, not specifically scheduled research chemical, or marijuanna seeds? Can't remember if I have ever heard of someone getting a love letter for something like MDMA or meth but I am pretty sure it is a stretch to say many people find that customs justs sends you a love letter for small amounts, unless there is a * after that

*Of drugs that are not technically illegal, certain types of pharmaceuticals, and marijuana seeds

3187
thats the thing. domestically. the 'most likely' agencies that would ever initiate an online investigation of any kind, tho likely in conjunction with local agencies, are the feds. and possibly the postal inspection service.

most busts like you mention are tipped off by a slip-up in the "real world" or a snitch..so if you can cover those bases in the real world, then do your best not to get urself under investigation by alphabet soup. be as invisible as possible. imo.

but OP, really don't worry bout it. ur good to go... :)

postal inspectors ARE feds.

3188
if it's domestic. and any thing the puppy police are trained to sniff out is vacuum sealed, then i really wouldn't fret it bro. a gazillion people check their DCN every day.

and i've yet to see any proof of the vast amounts of IT folks (who would most likely anyways currently be in the process of being laid off due to budget cuts at the usps) but who otherwise spend their days searching thru logs, actively scrutinizing the ip's of the living dead checking their dcn's online every single day, and then hunting down those suspected of using...gasp!...TORRR!!!!!

just sayin'...sa'll good..

do you really think that humans go looking through log files lololololol

3189
I have heard second hand from several people who claim to know for certain, that customs and postal agencies gather the data from package tracking and use it for intelligence. Even if they are not currently doing this, the fact is they could very easily do it, and the majority of packages that have tracking checked with a Tor exit node probably contain illegal items.

3190
well if you didn't already know they use informants and long investigations I don't think you are in the right line of work lol

3191
Security / Re: Different approach for plausible deniability.
« on: March 08, 2012, 04:20 am »
It will eventually get to the supreme court. Lower courts have held people in contempt for not giving up password to hidden truecrypt volumes, even when their own experts admited they couldn't even prove there were hidden volumes. Essentially they ordered people to make ciphertext decrypt into things that would incriminate them, when they were not pleased with it decrypting into non incriminating things.

3192
you can use mixminion with usenet groups too for very strong anonymity. And Tor / PIR to obtain messages. Membership concealment is where the weakest spot is going to be in our idealized system. Tor bridges + obfsproxy could be promising, if they are greatly expanded on / touched up on.

But I would rather make a new remailer all together. Mixminion is outdated, there are much cooler mix designs today and I want to implement one of them :P. And the requirement to have external email accounts / usenet accounts etc just make it too big of a hassle for it to ever catch on. The system needs to be designed so that it is fully contained from the get go, instead of compartmentalized message transport / anonymity away from message storage and retrieval.

I think high latency solutions are largely being disregarded today on the assumption that people need low latency. And it is true that you need low latency to do a lot of things. But the things we are doing don't really quire low latency, and it seems almost retarded to limit ourselves to it. Of course any solution needs a lot of users for it to be anonymous, but I think a mutli-latency messaging system would get a significant amount of usage, especially if people don't need to be bothered about managing SURBs and figuring out usenet etc.

The technology to do this is already there in parts that can be pieced together by people with the technical know how (and there are some groups using these systems), but the designs for systems that can do it much better are out there too.

3193
canada to USA is certainly a lot safer than pakistan to USA

3194
Off topic / Re: Retarded shit I've done in real life.
« on: March 08, 2012, 03:25 am »
why do things that piss you off

3195
Honestly the FBI could put all Tor relays in the USA under constant passive surveillance. Trap and trace / pen register does *not* require a warrant, only good faith that it will aid in a criminal investigation. The ISP level technology to passively monitor Tor relays has been in the hands of the FBI since at least Carnivore in the late 90s. And it would technically be legal for the FBI to monitor all Tor relays in the USA.

Many people think that NSA is the agency doing such attacks though, and not FBI. This case actually makes it pretty apparent that the FBI is not doing such surveillance as they would have almost certainly been able to identify these guys a lot faster if they had been. But it should be kept in mind that nothing is (apparently, please correct me if I am wrong....) preventing them from doing this, on a legal or technological level.

Pages: 1 ... 211 212 [213] 214 215 ... 249