3301
Silk Road discussion / Re: How many users in SR and forum?
« on: March 02, 2012, 12:24 pm »
I think it is safe to assume 10% are active. So 15,000 active seems like a better guess than 1,000 to me.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Forensic methodologies, generally fall into two broad camps.
The first is the “pure” pull-the-plug traditional forensic methodology advocated for many years by
most of the law enforcement community. This method is great for preserving data on disk, but you
lose allot of volatile data which may be useful. A skillful attacker may never even write their files to
disk. A real world example of this is the code red worm.
The second methodology, live forensics, recognizes the value of the volatile data that may be lost by
a power down and seeks to collect it from a running system. As any such action will in some minor
ways later the system, it is not pure in forensic terms. Many people, including the author of this
presentation, feel this is an acceptable tradeoff given the value of the data that can be collected from
a running system (with minimal impacts).
Thanks mate! So its on the clear net?IF it's not .onion, it's clearnet.
Pine, my understanding is that a malicious Tor exit node can decode the traffic sent between the server and the client. However, because there are so many hops between the client and the server, it's extremely difficult to trace it back to the original IP. It's possible, but it's very sophisticated. VPN and public Wi-Fi hot spots are compensating controls.
Must do moar research to get a firmer handle on this stuff. I keep looking for a nice reference book on TOR, but none seem to exist -.-
Also; computer illiterate lawyers FTW!
I can't find the link to the Tails site that referenced a very similar vulnerability, but, from memory, here's the summary of what was written: If you have multiple tabs open in your browser and are using an exit node that's being monitored, then the sites you are accessing can be used to correlate who you are.
Let's say you have your Intersango.com account open in one tab & open another tab to check your email. Then a correlation can be made between the name on the email account & the Intersango.com connection. So, even if you used a fake name on your Intersango account & only accessed that account via Tor, the people doing the monitoring can guess who actually owns that Intersango account.
From what I remember from this Tails document, the suggestion was made to actually close your browser entirely before going to another site, just to be safe.
So just to get this straight, you're fine using tor (multiple tabs, clearnet, etc..) as long as you aren't concurrently going to sites that implicate you or your personal info directly?
How would they associate two connections to one person being that an exit node, presumably, has many people's traffic passing through it?
In your example- CaptainSensible - you mention email. Does that mean everyday email? Or is going to your tormail and SR in the same browser in some way compromising your security?
Edit: Also, using an everyday browser and apps like bittorent without tor connections, while also at the same time browsing SR on tor is still perfectly safe, correct?
There are private military corporations. I suppose there could be private NSA/cyber-command type corporations. Are there any tech-heavies interested in a mercenary gig?
gpg public key can also be mitmed though which is why it isn't a bad idea to send it through multiple channels or through a channel where the sender can verify it anonymously
yes - privnote can be mitmed. but pgp can't. if someone "mitms" your pgp public key, who cares? that's why it's public!