Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 221 222 [223] 224 225 ... 249
3331
Quote
One out of fifty thousand users dies the first time they take it from acute allergic reaction.
Is there any way to test for this so that you know if you are allergic before popping your first bean?

best practice first time you take pretty much any drug is to start with an extremely low dose to test for sensitivity and allergic reaction

3332
I love that documentary. Show it to all your friends who are skeptical. Anyone who tells you that ecstasy is more dangerous than alcohol (in other words, 90% of the fucking population) needs to be educated. Educate as many people as you can because it's really a travesty that millions of college students are dangerously drinking every weekend while a better, safer alternative is placed as a Schedule 1 drug.

I think MDMA is probably more dangerous than alcohol. One out of fifty thousand users dies the first time they take it from acute allergic reaction. It also depletes serotonin, causes hyperthermia, stress to the cardiovascular system, etc. I think it can be used responsibly in moderation for sure and have rolled a decent amount in my life, but I think it is kind of a stretch to say that it is safer than alcohol if both are being used in moderation. Alcohol used in moderation doesn't cause one out of fifty thousand people to die afaik.

3333
Shipping / Re: Bulk RC Shipment Stopped At Customs
« on: March 01, 2012, 01:57 am »
well considering you just showed who you are on SR and you are going to call customs I would say either consider yourself compromised (if you had it shipped to your address) or don't call and pick it up and just ignore it (if you had it sent to a fake ID box). If you sell illegal stuff here or really even if not I would clean up shop and quit for a long time though, you just revealed your SR identity to customs.

3334
Security / Re: Risks of Clearnet Sites?
« on: March 01, 2012, 01:50 am »
Protip: Don't login to your facebook.

Somebody got nabbed over on OVDB for logging into their personal email while in a tor session on OVDB.  That wasn't what ended up getting him nabbed, but it was enough to start the ball rolling and get them sniffing around.

First I have heard of this and also certainly not true since hidden services use a dedicated circuit (plus there is no exit node)

show docs or it didn't happen

3335
probably operation pangea four or five or whatever number they are on now. Every now and then customs goes into over drive for a few days, usually international with interpol coordination. I think they have been doing it once or twice a year for the past few years. It is primarily aimed at counterfeit pharmaceuticals, but they always end up intercepting all kinds of crazy shit. No idea if this is what is happening, but Pangea operations usually coincide with a major increase in customs and USPI mail checking that lasts for about a week.

http://www.ukmedix.com/impotence/interpol_operation_pangea_iv_leads_to_arrests_and_seizures6153.cfm


3336
Silk Road discussion / Re: Why The Armory Is A Bad Idea
« on: February 28, 2012, 10:31 pm »
this dude molested a child and got a 6 year sentence

http://myfox8.com/2012/02/25/former-pastor-sentenced-for-child-molestation/

Actually I don't quite think that was too few, the case is from early 90's by 2 guys that were TEENS, not CHILD, at such time. Lately the press is pushing to make "molestation" the "society devil". Societies seams to have a weird need to have "devils"; before WW2 it was the Jews, by the 60's the gays, by 70's the junkies, 80~90's the dealers, 2000's the terrorists, mid-2000's onwards the "molesters".

Even if some psycho could well be put to fire, some others will be suffering hell in jail for nothing. The other day I almost got sick out of how pernicious brainwashing a fucking article can be. The headline was: «18 yo man abused 13 yo child»... WTF?! Since when an 18 yo BOY is a man? And since when a 13 yo TEEN is a child? Why not put «18 yo old man abused 13 yo newborn»?

blugh I agree mostly with what you say, but I just grabbed the first article I could find for someone sentenced for molestation. People are regularly given a few years to a dozen years or so for molestation charges, and you get the same sentence for drugs in even small amounts or fairly small amounts.

3337
Security / Re: WTF is wrong with SR?
« on: February 28, 2012, 09:52 pm »
No you can't... not to the entry guard, not the ip, not to nothing at all. It's a silly theory, nothing else, because the RV isn't 1 node away of the entry guard and you can't possibly lure Tor to choose your node over a possible another.

They made it with half-dozen nodes but if Tor was half-dozen nodes long nobody in that network would be anonymous for starters.

blah why even waste my time to argue with your stupid ass what the fuck is an RV even for starters, you use a lot of acronyms that I have never heard before , and you brute force the hidden service to make it open a ton of circuits and your nodes will be used on some of them, and the attack is still entirely feasible against the network, you are the one who has no idea what you are talking about so fuck off calling it a silly theory lol you are the silly one to try to argue about things you have zero understanding of

edit: looked up rv, you might want to just say rendezvous instead of use terminology that is not ever used in any of the literature

and you of course are not understanding how this attack works. Yes my Tor client opens a circuit to a rendezvous point when it communicates with the Tor hidden service. Yes. The hidden service also opens a circuit to the rendezvous. A hidden service opens a new circuit for every single client that connects to it. A malicious client can make a hidden service open as many new circuits as it wants to as many rendezvous nodes as it wants. The hidden service uses new nodes for its circuits. If the malicious client that forces it to open arbitrary circuits has some nodes on the network, eventually the hidden service is going to use those nodes on its path to the rendezvous. Now the malicious client sends the hidden service packets with self created timing delay pattern and at its malicious nodes it looks for this pattern to identify traffic that is being routed to the hidden service from the malicious client. Doing this for long enough (not that long) traces the fucking hidden service as soon as the first node the actual server sends data to is owned by the attacker. Tor sort of tried to fix this by adding entry guards, nodes that Tor always tries to enter traffic through if they are up selected from a much smaller pool of randomly selected nodes (3 randomly selected nodes from the total list of nodes with the entry flag, changed every 30 to 60 days by default). Unfortunately this attack is still perfectly fucking fine for tracing the hidden service to its entry guards at which point a simple trap and trace order (with a MLAT if required) is enough to deanonymize the hidden service.

Please try to read the fucking paper before making me waste my time to type an abstract of it

3338
Rumor mill / Re: 'envious' Discussion
« on: February 28, 2012, 07:44 pm »
I would be more than happy to sell you guys sheet sizes tabs of 100ug blotter but you need to pay the same cost per sheet as usual ;)

3339
Security / Re: WTF is wrong with SR?
« on: February 28, 2012, 07:37 pm »
You don't need to own many nodes to do this attack. You can force a hidden service to open an arbitrary number of circuits. If you own even a trivial amount of nodes eventually one of the +1 circuits you can force a hidden service to make will have a node that you own be part of that circuit. This attack is still entirely effective for tracing hidden services to their entry guards.

3340
Security / Re: WTF is wrong with SR?
« on: February 28, 2012, 07:11 pm »
You should start to read the articles about vulnerabilities starting by the date, and that document (and outdated attack) dates from May 2006.
That attack could succeed out of a small Tor network, as it states: «It is currently the largest anonymity network in existence, with about 450 server nodes».

ATM your server keeps "changing location" at random time by itself. The only traffic analysis was if the network was small enough for you to be able to spot it at the DS, like IP1 online last 24h, IP2 online last 8h offline now for 1h; IP1 is the server, IP2 is the client... but the network is way too big for it.

this attack is out dated in what sense? They added entry guards so now the entry guards are traced instead of the actual server. Before this was published the actual hidden server could be traced to its IP address with this attack. Now it can be traced to its entry guards, which can be monitored to trace to the hidden server once they are identified.

3341
but do we have access to any people who have access to the requird things in their day to day work? We really are not properly utilizing the human resources at the disposal of SR.

3342
this attack only trace/profiles people using p2p, but it deanonymizes non p2p traffic that goes down the same circuit, via linkability at the exit node

3343
it actually isn't that hard to train a drug dog

3344
Security / Re: WTF is wrong with SR?
« on: February 28, 2012, 01:25 pm »
Change the server location?  ;D
Love the theory, but Tor doesn't work that way, you never connect to the server, you connect to the meeting point. Tor is actually too well designed to be much of a concern, just some apps can drop the real IP and be a problem.

Actually hidden services can be traced up to their entry guards with this attack:

http://freehaven.net/anonbib/cache/hs-attack06.pdf

and then deanonymized by anyone who compromises one of the guard nodes (easily done with a court order if they are in USA, still easily done if they are in a foreign country via a MLAT although might take a bit longer).

Hidden server should change its location periodically

3345
Silk Road discussion / Re: Why The Armory Is A Bad Idea
« on: February 28, 2012, 12:49 pm »
yeah but they have a much higher chance of getting a broomstick up the ass than someone who is doing a sentence for having weed does

Pages: 1 ... 221 222 [223] 224 225 ... 249