Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 217 218 [219] 220 221 ... 249
3271
Security / Re: How do know new Seller accounts are not the FBI?
« on: March 05, 2012, 04:00 pm »
Operation Raw Deal had more to do with a technical vulnerability than LE busting any given vendor. Everyone on the steroid forums during that time period was using Hushmail for their encryption. Hushmail of course was not good enough to protect them from having their messages intercepted, and LE harvested shipping addresses from Hushmail (they had 7 DVDs worth of decrypted e-mails handed over to them).

3272
Security / Re: How do know new Seller accounts are not the FBI?
« on: March 05, 2012, 03:52 pm »
Damn a lot of people on this site are naive as hell when it comes to the drug game. I think a lot of people here must have never even been involved with drugs prior to finding SR. Seeing people try to argue that the cops don't care about personal use or even pound traffickers because they only really care about the people moving tons just makes me want to burst out in laughter. You guys know that well over half of the people who are currently incarcerated for drug crimes were arrested with personal use amounts, right? You guys are seriously presenting with an almost clinically significant amount of reality denialism. There are people in prison for having bags with meth residue on them and you seem to think that unless you are busted pumping out ten tons of meth in a mexican super lab that LE just are not going to be bothered with it. Please come back to reality !!

3273
Security / Re: How do know new Seller accounts are not the FBI?
« on: March 05, 2012, 03:44 pm »
Government agents don't worry themselves with the legality of any particular action or situation. They will do whatever they want to bust people. Anyways, much of the legal ramifications of their law-breaking actions get softened if they actually do manage to bust people.

Really? Because I can't count the number of times I've heard cases getting thrown out of court because the police forgot to sign the right paperwork, or gave the wrong information, or...

We're not talking about small fry stuff here, murderers have walked free on slip-ups of bureaucratic procedures.

A decent lawyer would have a field day if it were known that the police posted real drugs to people on the Silk Road.

If you look at the rules that govern controlled deliveries, you'll notice that they deliberately replace 90% of the drug with a substitute. This is despite the fact that ten minutes after delivery, there's a team with a door hammer smashing into the house. Apart from the law, they know the press would have wall to wall coverage if the police delivered drugs and didn't manage to retrieve them later.

No, although there may be some sellers who are FBI/DEA/other three-four-five letter acronyms, there are not using real product, that would defeat their purpose. They might try to collect names/addresses to scare the crap out of buyers though.

I don't think it would be illegal for them to post drugs. And it certainly wouldn't be illegal for them to get an informant to post drugs and decide not to charge them for it in return for gathered addresses.

3274
Security / Re: [intel] web drug dealers rattle cyber cops
« on: March 05, 2012, 03:36 pm »
This is from 2002. ><

so what

3275
Shipping / Re: Having a package intercepted
« on: March 05, 2012, 03:20 pm »
Wondering about interceptions + not having anyone at your house for two hours after the mail arrives = you are a child?


3276
Off topic / Re: A story of a PRIVATE Board
« on: March 04, 2012, 06:35 pm »
Yeah he still owes you but give him time to pay back if he needs it cops could have seized his money. I had someone go to jail  who owed me a bit and when they got out it wasn't like they could pay back very quickly since their entire stash and all of their money was seized.

Sounds like he snitched to me, which is why I am curious the name of the forum it happened on. Maybe he gave up his accounts for a lighter sentence or something. Plus if he was raided it could very well mean the person he bought off of was a fed or someone else the feds pwnt.

3277
Security / Re: As some of you know im selling bitcoin and
« on: March 04, 2012, 12:47 pm »
You are helping people launder money

3278
wouldn't allowing such a device to connect to a cellular network or some other form of long distance communication be an absolute necessity? an otherwise limited range of 100 ft wouldn't do that much good if the package gets intercepted at customs, where it could be removed. although if that were to happen, the shear lack of a signal broadcasting could itself be the red flag?

if it were intercepted you'd also have to assume they would very quickly possibly modify and use the technology to their advantage, no? like making it broadcast a false signal to fool the otherwise brave soul? or am i missing something here? absolutely love the concept tho! ;)

You could take the reading while it is in the box you pick it up from. For example, a fake ID box with no ties to you. Lack of broadcast is the red flag to not attempt pick up. They will not be able to make it broadcast a false signal without the seed from volatile memory, which is wiped as soon as one of the sensors is triggered.

3279
For one it is dumb to assume you wont be raided and sent to pound me in the ass prison for a small personal use interception, people go to prison for personal use amounts of drugs on a regular basis and you are not special just because you get your drugs shipped to you.

Second of all, it would be primarily for importers. RFID would be able to send the signal 100 feet away if it is battery powered, you should be able to covertly get a reading on it. Also could use chips that send signal via cellular network for even more distance.
Again, I'm just expressing what I perceive to be the consensus of Americans here (I'm European): My intuition tells me the same as what you're saying: If they really decided to go after a small (or not so small) order (maybe factoring in criminal records), a case could be started around circumstantial evidence. Now look around the threads here, everybody seems to have a fixation with not signing anything and upholding plausible deniability. I would opt to be much more careful living across the pond. But this perceived loophole has almost become an axiom of some sort. Can somebody with a law background chime in? 
As for your second point, I agree it needs to be developed for importers. We need original ideas like these to stay ahead of the system ;)

The consensus of Americans here is the result of people who want to pretend they are not breaking the law so they can sleep more soundly at night

3280
Security / Re: WTF is wrong with SR?
« on: March 04, 2012, 12:08 pm »
The 'new analysis' is a technique for detecting packet streams that have had interpacket timing patterns intentionally added....not really a worry for Tor. The counter is XORed with the keystream block, and then the result of that is XORed with the plaintext to get the ciphertext, so there is no increase in size.

You really are either entirely clueless and refuse to admit you are wrong (so many people like this!) or you are a troll.....

3281
Security / Re: WTF is wrong with SR?
« on: March 03, 2012, 09:07 pm »
Tor uses AES in CTR mode, keystream blocks are XORed with the plaintext to get the resulting ciphertext. https://en.wikipedia.org/wiki/Keystream

....so yes I guess I do think that Tor XOR's data????


Hm this paper looks interesting, from december 2011.

http://freehaven.net/anonbib/cache/acsac11-backlit.pdf

Quote
                                                                     
Traffic watermarking is an important element in many network se-       
curity and privacy applications, such as tracing botnet C&C com-       
 munications and deanonymizing peer-to-peer VoIP calls. The state-         
of-the-art traffic watermarking schemes are usually based on packet   
timing information and they are notoriously difficult to detect. In     
this paper, we show for the first time that even the most sophisti-     
cated timing-based watermarking schemes (e.g., RAINBOW and             
SWIRL) are not invisible by proposing a new detection system         
called BACKLIT. BACKLIT is designed according to the obser-           
vation that any practical timing-based traffic watermark will cause     
noticeable alterations in the intrinsic timing features typical of TCP
flows. We propose five metrics that are sufficient for detecting         
four state-of-the-art traffic watermarks for bulk transfer and inter- 
active traffic. BACKLIT can be easily deployed in stepping stones       
and anonymity networks (e.g., Tor), because it does not rely on           
strong assumptions and can be realized in an active or passive mod-   
e. We have conducted extensive experiments to evaluate BACK-           
LIT’s detection performance using the PlanetLab platform. The         
results show that BACKLIT can detect watermarked network flows         
schemes, such as RAINBOW and SWIRL with high accuracy and few false positives.                         

3282
Security / Re: WTF is wrong with SR?
« on: March 03, 2012, 08:27 pm »
Tor uses encryption mode that does not increase data size with encryption. No Tor can use up to 8 hops if you make changes to it, but it has limitation built into the network itself though preventing longer circuits. The pattern can be picked out even with others using the nodes. I don't waste any more time to argue with you about this, go do some research or keep living in your fantasy world makes no difference to me. I am fine knowing that all published research papers agree with what I say and your opinions come from some incorrect 'facts' that you have made up in your own head.

3283
Silk Road discussion / Re: SR in the news!
« on: March 03, 2012, 08:04 pm »
I seriously think that Osama Bin Ladens ghost could make a global announcement that he will be trafficking opiates to children through SR to fund global jihad, and some how people on SR would find some way to convince themselves that LE doesn't care and will still not become involved.

3284
Yeah it happpens on some pages I just realized. I tried loading a random SR page and didn't see it, but then using the one Pine suggested it happpened. It also opened a Tor circuit to those pages. It is happening because the icons displayed are hotlinked from those servers. This opens substantial anonymity and security holes and should be immediately taken care of. For one you are exiting the Tor network when you load those pages, and getting all the risk that comes with that. For two even if you assume that the SR hidden service can not be traced and monitored, I bet AIM and ICQ will hand over their server logs, so if feds own your entry guard they could correlate your entry traffic with AIM / ICQ server logs of Tor exits that loaded those images, to deanonymize people without actually watching traffic arrive at the SR server.

Also you might end up opening those hotlinked images via a circuit you are using for other things, and end up linking your actions together (for example maybe you were talking in an IRC when you loaded that forum page, and the hotlinked icons were loaded through the same circuit that you were using for IRC. Now your presence on that IRC server is linked to your activity on SR.)

3285
I do not have that happening in my browser either. Plus no Tor circuit is opened to those servers.

Pages: 1 ... 217 218 [219] 220 221 ... 249