Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 242 243 [244] 245 246 ... 249
3646
Off topic / Re: Here's my theory .....
« on: January 19, 2012, 05:24 am »
Don't you see whats going on? SilkRoad is the new strategy of the government to end the whole drug issue once and for all!! In a few years every real life drug markets will be completely disappeared. No dealers on the streets, no drug trafficking, no stoners, no junkies, no criminality. And this is only because everyone will order his or her drugs from home, having it shipped with the post or FedEx. Not a single bud or pill will ever see the public world again, nor will anything else that is related to drugs...

and omg, it seems that they'll get away with this!

This could mean the end the drug problem as we know it!

indeed. plus they make a nice percentage on top  8)

SR makes no where near the amount of money the government makes by fighting the war on drugs. The only people who disagree with this are fucking retards who thinks the government spends its own money to fight the war on drugs, rather than stealing money from the people to fund itself. The war on drugs is a means to an end, increased funding for government agencies and increased power for police forces. Of course it has some other goals though, like keeping religious whack jobs happy and pouring money into corporations who in turn support politicians who support the war on drugs. The war on drugs is a modern form of slavery where the freedom of some minority / subset of the population is sold to corporations for profit. The war on drugs is a campaign to round up slaves for elite private interests, the war on drugs is funded by money stole from other slaves.

3647
Off topic / Re: i had a dream..
« on: January 19, 2012, 05:19 am »
...  that in like twenty years from now everyone that's here today gets to meet up at a conference center in Las Vegas (or something) for Silk Road Convention 2032:  The Change Started Here.  and safe under some kind of crazy impossible reformed drug laws, everyone finally gets to meet the anyonomous but kewl people, even with retired law enforcement able to walk around and remember the times.
i seriously had this dream a few nights ago.  it was pretty awesome.   :)

*destiny*

I had the same dream but LE couldn't walk around because we gassed all of them after they were charged as war criminals.

3648
I think a lot more people would read the thread I am about to link to if it had this title, and it is very important for people to read it. Essentially this is what the 'what is the point of VM's' thread has turned into.

http://dkn255hz262ypmii.onion/index.php?topic=8524.0

Also I would like to point out that you should still be using virtualization of some sort to isolate network facing applications, if you don't go the physical isolation route.

3649
Read this thread to see why you should NOT be using full hardware virtualization systems like virtualbox

http://dkn255hz262ypmii.onion/index.php?topic=8524.0

3650
Security / Re: What is the point of VM's?
« on: January 18, 2012, 10:44 pm »
Hmm interesting, OpenBSD and FreeBSD devs writing correct code is the basis of all security.

Although I like both FreeBSD and OpenBSD it is insane to think that they are the basis of all security. One thing I don't like about FreeBSD is the fact that it entirely lacks ASLR. It does have one of the most awesome mandatory access control systems I have ever seen though. It also has a really good OS virtualization tool, Jails. I don't like that OpenBSD has almost no support at all for virtualization technology, because I like to isolate my network facing applications from external IP address. I could use OpenBSD on hardware and make a Tor router though, and isolate Firefox by running it on different hardware and only letting the machine it runs on have access to an internal IP address. I will probably be doing this, and I think OpenBSD is a great choice for OS in this scenario. I also don't like the fact that OpenBSD entirely lacks a mandatory access control system. This seems to piss off a substantial number of security professionals actually, although the OpenBSD devs/fanboys argue against the use of mandatory access controls as well.

I have heard the following from one security professional: 'Hardened Gentoo can certainly be used for the configuration of a more secure environment than can be obtained by using OpenBSD, however OpenBSD is more secure out of the box and the proper configuration of Hardened Gentoo is an extremely difficult and time consuming task'. I also personally think that Hardened Gentoo is the way to go if you want the best possible security and have the time and skill to configure it.

Quote
If you are using binary blobs to manipulate hardware (many linux drivers do this) then you are basically hoping that there's no bugs/overflows that can be exploited because you can't see the vendors source, so hope for the best. If the code is correct from the beginning then it enhances security. This is why OpenBSD has a notoriously slow and methodical approach to coding so they get it right the first time. They also have a very different mechanism for updating CVS whereas the Debian project has thousands of part-time developers around the world all contributing with no standards (according to BSD devs).

I agree that non-open source software should be avoided. I don't see the link between code being correct from the beginning and code being open source though. However code being open source may very well lead to it being more correct over time. It also lets you check it yourself for correctness, which is a big benefit but also requires that you know how to audit code. I think they are right about Debian.

Quote
Take for instance the Debian dev in 2006 who commented out two lines of code to get rid of some strange errors he was seeing. What he didn't know is that he commented out crucial random number generating code and in effect, reduced all keys generated on Debian machines (and all their clones) to 15 bit entropy. !! It wasn't discovered until 2008. For 2 years anybody could have MITM attacked any openSSL connection and ripped root/super user passwords easily. Anybody could have decrypted the id_rsa key in a couple of minutes and just logged straight in.

Yes I knew about that Debian vulnerability

Quote
Add on top of all that questionable fast release code from Xen/Virtualbox since it's primary function is testing and investigation of error prone software and not security and you have bugs stacked on top of bugs.

Xen being used for isolation/security has been established as something that expert level security researchers suggest, for example the Qubes operating system (and other expert level security people I talked with about it, all of whom said paravirtualization is the best option for virtualized isolation and all of whom said that paravirtualization based isolation is better than no isolation at all and significantly less insecure than full hardware virtualization)


Quote
OpenBSD's mantra is the simpler your setup is, the more secure.

OpenBSD's mantra is the more correct your setup is, the more secure. This is recognized as fact by everyone. However, you need to take your threat model into account when you decide on the level of complexity required to acheive it. Not using GPG presents you with an environment that has less code complexity, does that mean that you should stop using GPG and that in doing so are you increasing your security? Of course not. The security advantages that some code brings outweighs the increased risk that comes from the added complexity. For me (and everyone I talked with) the advantages of isolating applications from external IP address and avoiding windowing system EOP to root vulnerabilities outweigh the disadvantages of increased complexity, *even if the least secure sort of virtualization is used* (however I don't think they took attackers stealing plaintexts into account when they weighed in on full hardware virtualization, so I think you should use OS or paravirtualization or nothing, if you don't want to use physical layer isolation)

Quote
The more packages and pf filter rules you have the more you're decreasing security. I think it's pointless to jail or virtualize any X browser if you need maximum security when you can use lynx or w3m. A vendor certainly wouldn't need firefox to post here or log into silkroad tho I haven't tried the main site with lynx but I suspect it works fine. A bitcoin trader could just use their bot and lynx to trade securely.

I don't know if I would agree that additional pf filter rules decrease security, although you should probably be using the least amount required to achieve your goal. Is lynx even maintained anymore? I have thought of going full CLI before, I might look into it again.

For me isolation is a requirement. I will probably start using physical layer isolation since it gives the benefits I am looking for and has no security disadvantages. If not I will probably use paravirtualization or OS virtualization. I wont be using full hardward virtualization anymore though, including for live CD's. I certainly wont stop using isolation though, the very important security benefits it brings are far too great for me to stop using the technique at all.

Quote
What I meant by Tor exploit was the possibility of a buffer overflow (like the one patched in Dec)

If you use a 64 bit version of OpenBSD you are essentially fully protected from all buffer overflow attacks via ASLR. You will get the same benefit on any other 64 bit OS that has implemented full ASLR (and you will get some of the benefit if the OS has implemented partial ASLR).


Quote
so isolating Tor behind a firewall/dmz and using it as a private bridge is a must if extreme anonymity is required which that guy you quoted agreed as physically separating applications under traditional dmz and vlan rules is best. You can use OBSD redundant failover firewalls using CARP + Pfsense and NAT to isolate Tor (jailed/chrooted) in the DMZ, running intrusion detection where it only ever sees internal addresses, so unlikely priv escalation on the Tor box would amount to much unless the attack wget their own Tor malware with built in snoopwares and install it without you knowing which is likely if you follow that guy's .onion guide where he recommends running Tor as root in an Virtualbox instance.

There is little point in running Tor in a chroot or jail since if it is pwnt the attacker can get your IP address even if it is isolated. The only thing it will do is make it harder for the attacker to root the host OS on the machine Tor is being run on, but if you make a Tor router machine and Tor is the only thing you are running on it other than the OS etc there is little point to this. I will probably make a tutorial for physically isolating Tor using a dedicated OpenBSD machine in a few weeks, if you want to make it first feel free and I will make a tutorial on how to use paravirtualization and OS virtualization for people who don't have extra machines and for people who use laptops from random locations. You are right that we need to ditch full hardware virtualization and move to more secure solutions ASAP though.

Quote
I guess the simple rule is the more packages and software you run, the more chances of exploits. If running a minimalist OBSD/FBSD network segregated into firewall/dmz/vlan this should increase security exponentially. Ditching X all together and using a text based browser to do business further reduces exploits.

I think I already did a good job of explaining the trade offs between complexity and features. In some cases added features are worth added complexity. You should always aim to use as little code as required to achieve your goals. My goal is isolation of network facing applications from external IP address (and my secondary goal is isolation of windowed applications to protect from EOP to root attacks). The software based solution for accomplishing this with the least code is OS virtualization. Paravirtualization also achieves this with much less code complexity than full hardware virtualization, and also comes with its own security advantages/disadvantages as compared to OS virtualization. If you use physical isolation you can acheive this goal with no added code complexity, so this is clearly the route to go. However, it doesn't mean that it is the *only* route to go, and it doesn't mean that you shouldn't get these security advantages in other ways if you can't use physical layer isolation for whatever reason.



Quote
On not using Truecrypt in a VM this comes from Bruce Schneier's attacks on TC containers. Let's say you spawn a virtual Debian instance, plug in your TC encrypted USB key and decrypt it. Your priv keys and data are leaked all over that VM and now you are trusting buggy virtual machines to safeguard this data which was shown by him to be leaked using a variety of word processors, gmail/google docs and other programs while the TC container was opened. The VM can also leak to Dom0 through a hundred different methods, which won't matter if your primary host o/s is already full disk encrypted but if it's not forensics can recover data or malicious exploits in DomU can. Full disk should be mandatory.

Can I get a link to the article please? Anyway I will keep trying to find it. What you are saying may very well be true although I am not sure if a key is anymore likely to leak in a VM than it is on a normal OS. Not using FDE is opening yourself up to forensic teams finding your private key if it ever leaks from RAM, and there are multiple ways this could happen even if you are not using a virtual machine. If using a virtual machine increases the risk of key leaking or not is something that I do not know, and I would love to read about it. FDE should be mandatory. So should keeping your laptop on you at all times. FDE isn't going to protect you from anything but attackers who don't know you are using it or don't know shit about attacking more sophisticated targets. Is your computer by a glass window that faces outside? They will use a laser microphone to keylog you from a distance based on analysis of the sounds you make when you type. Or they will analyze fluctuations in the power grid. Or they will sneak in and use a hardware keylogger. Or they will rush in when they raid you, flash freeze your RAM, put it into a forensics laptop and dump your key. Or they will use hidden cameras. Or they will add a software keylogger to your bootloader. Or they will do one of a dozen other things to steal your encryption key.

Memory in encapsulation material
Shielded equipment and not plugged into the electrical grid to protect from transient electromagnetic pulse analysis
physical tripwire systems that cause an immediate shutdown to memory wipe
physical surveillance and intrusion detection systems to watch for intruders
keeping your machine on you at all times

a lot of additional steps go into getting much benefit from FDE, assuming that the attacker knows you are using FDE and know the (many) methods to counter it via stealing passphrases / keys. Of course most LE still power down machines during raids.



Quote
TC patched a lot of these problems but his team described it as the 'tip of the iceberg' meaning if him and a bunch of other cryptographers got together and did this on a regular basis who knows how many holes they'd discover. This is primarily why I encrypt twice. First encrypt really sensitive data with LUKS or softraid then wrap it in TC deniable containers just in case Truecrypt development isn't up to par and a major exploit is found (while I'm sitting in jail and their working on my servers).

Using two layers of encryption for file storage is the suggested practice. You should use FDE and then additionally you should encrypt your sensitive files (preferably one at a time, although less compartmentalization is still a benefit and requires you to remember substantially less passwords).

Quote
While this forum was down I read a shit ton of ebooks on BSD network security and leased myself a 1U failover rack firewall running OpenBSD for $31/mth, set up an internal DMZ/NAT firewall with a $40 comp, placed Tor by itself on a minimal openbsd installation chrooted with console only access on an old SPARCserver I had lying around from 1999 (runs awesome!) and am testing Tails live CD with it as a bridge for persistence to avoid it grabbing guard nodes everytime I reboot.

Cool

Quote
Mainly because I'm interested in plausible deniability as well as security (if Tails turns out not to fail).

I wouldn't put much faith in Tails turning out to be anything other than fail, personally.

Quote
I like the idea of removing the disk, wiping memory and having an O/S that's never been touched by biz the feds in my country won't find anything on though I could always symbolic link all logs/.bash.history and everything else to /dev/null. I'm also testing a custom OpenBSD .iso I modified instead of having to rely on linux and burn yet another new debian security update for Tails every couple of weeks. As for my now ridiculous rack stack and no doubt sudden surge in power consumptionI can always claim my private bridge is for research for democracy activists, which it sort of is with some other projects I have. Though I'm leaning towards only using lynx/w3m browser from now on and command line gpg. Less software I install and have to trust while doing this kind of work the better.

I am also considering going full CLI and ditching GUI's for good. I think it is almost a requirement for true security. You can still use virtualization without a GUI btw, one person I talk with was shocked that you don't need a GUI to use virtualization lol.

Quote
Ask your security friend what forum software he recommends. I'm leaning towards custom SMF or even some sort of perl implementation if I can avoid PHP all together. Now I'm going to attack my network to see what kind of data leaks

He would probably suggest Frost or Syndie. Frost is tied to Freenet. Syndie can be used on a number of anonymity networks but it was made by the I2P crew. Syndie actually lets you host a single forum environment over several sorts of anonymity network / server / newsgroups / etc. I have done only a little research on either of these systems, I personally much prefer Tor to Freenet or I2P and think it offers substantially better anonymity than either of those options. I personally like PunBB for a minimalist and secure php forum. Some people are working on programming a decentralized forum in Ruby right now, would you like to join us?

3651
Security / Re: What is the point of VM's?
« on: January 18, 2012, 09:32 pm »


VMs will make you sick from paranoia,  use Liberte Linux it has everything you need. Kernel hardened, storage encrypted, TOR configured and runs just fine on most computers. Installation very simple from windows, use windows formatted FAT32 pen drive run setup.bat - done. simple and very functional.

Does Liberte use a 32 bit OS? If it does you are not getting the advantages from ASLR since 32 bit ASLR can be brute forced. I also don't know if they have implemented mandatory access control profiles even though I know they have the ability to do so with hardened Gentoo. At least they use persistent entry guards, unlike Amnesia. What I am trying to say about Liberte is that even though they are using a good base OS (hardened gentoo) that has a lot of security features, I am not sure if you are actually getting the advantages it offers with Liberte because many of the security features have requirements and I am not sure if Liberte meets them (64 bit? preconfigured MAC? etc). Also Liberte has no isolation of the browser from external IP address and pretty much everyone I talk with about security agrees that it is pretty vital for some isolation mechanism to be used. If you don't isolate firefox from your external IP address your anonymity hinges on firefox not having any exploitable remote code execution vulnerabilities, I personally know that I don't want my entire anonymity to hinge on that.

By the way, running Liberte or Amnesia in a full hardware virtualization environment is going to make them less secure just as much as running OpenBSD or anything else in such a VM.

Really if you are using a windowed environment without isolation ALL of your security hinges on NONE of your applications having remote code execution vulnerabilities because the x window system and all other mainstream window systems have no isolation, if a single windowed application is pwnt the attacker can spy on all keystrokes sent to all windows. This means after any of your windowed applications are pwnt the attacker can spy on your password when you SU to root and then they can EOP to root. This is true with Windows OS as well. Graphical desktop environments themselves are insecure (although not inherently). If you run the X window system on OpenBSD you are just ask weak to this attack. Isolation protects from this, it protects you from being traced if one of your network facing applications is pwnt, there are two *huge* security benefits that I personally would like to have. When Theo is talking about OpenBSD and suggesting against isolation he is probably assuming that you are using CLI only and operating a server, ask him about his opinion on the lack of isolation in X and the EOP to root attack I just mentioned. He will probably reply saying that you should be using CLI only.

I don't know what is more important to me, the isolation of firefox from external IP address and protection from known EOP attacks or the significantly enhanced OS security that comes from not using full hardware virtualization. But I do know that I would rather take a minor hit to my OS security and get the previously mentioned major security advantages, than not use isolation at all. And I know that I can achieve this with paravirtualization or OS virtualization. I could also take *no* hit to my OS security and get the same advantages by using isolation on the physical layer.


3652
Security / Re: What is the point of VM's?
« on: January 17, 2012, 03:36 pm »
It is important to note that these conversations specifically related to the security benefits of virtualization in regards to isolating applications from the external IP address. If you take other attack scenarios into account, such as an attacker pwning your firefox VM and spying on your messages when you decrypt them (assuming you decrypt messages in the same VM you have firefox on) using full hardware virtualization may actually be an overall hit to security. Yes, it will likely make you significantly harder to trace via hacking / proxy by pass attacks, but if the attacker will have a significantly easier time to pwn the guest OS (versus it being on hardware) it may not matter if they can not trace you on the appication layer if they can spy on all of your plaintexts and communicate them back to themselves via the Tor network.

When I take this scenario into account, I actually am forced to change my opinion to as follows:

1. If you use full hardware virtualization you shouldn't decrypt messages on a VM that has internet access at any point in time after you have sensitive info (plaintexts, passphrases, etc) on it

2. Failing this, you should not use full hardware virtualization and should instead use nothing (although if you want to use something you should use either paravirtualization, OS virtualization or best of all physical hardware isolation)

It should also be noted that you can probably use snapshots / cloned virtual machines to make only decrypting messages / writing plaintexts / entering key passphrases on VMs that have no internet access after / before (context dependent) they are used a lot less complicated than it sounds.

Oh yeah one more thing about virtualization solutions, if you are using guest addons and sharing folders with the host etc you are compromising your own isolation, all of that shit should not be enabled

3653
Security / Re: What is the point of VM's?
« on: January 17, 2012, 03:17 pm »
Okay, I talked to someone else who is also a high level security expert. He is probably one of the most skilled security professionals that I know, actually. He doesn't want me to post logs of our conversation, but did say I can discuss the information that I learned from him. I will include a few quotes. One thing that is unrelated but which I would like to point out is that we had to agree to terminology prior to starting the real interesting conversation. For example, he calls sandboxing what I call OS virtualization. This is common in security circles, different people/groups use different terminology to describe the same things. This actually leads to a lot of confusion and inability to properly communicate, and I think it is something that the computer security community needs to work on fixing, with more standardized terminology.

Let me think of how to organize the information I learned. How about we start with a point by point list

A. The more code complexity a virtualization solution has, the more likely it is that an attacker can find a vulnerability that allows them to break out of the isolation.

B. Full hardware virtualization has the most complexity

C. Full hardware virtualization allows for more host OS access controls to be placed on the guests, for example they can be further isolated with mandatory access control systems to a greater extent than other virtualization solutions.

D. There is a distinction between breaking out of a hypervisor and breaking into the host. Although it is easier to break out of full hardware virtualization guests it can be made harder to break into the host OS if proper access controls are used on the host

E. One issue with full hardware virtualization is that it is a waste of resources and the greatly increased complexity leads to security issues, such as increased ease for an attacker trying to break out of the hypervisor

F. He thinks using paravirtualization is probably the best choice, if you use virtualization based isolation

G. He thinks using any virtualization based isolation is better than not isolating network facing applications from your external IP address

H. OS virtualization is immune to the sort of archetecture virtualization problems that Theo was discussing, paravirtualization is not at as much risk from them as full hardware virtualization is

I. He also suggests using OS virtualization over using full hardware virtualization, and seems to indicate that he actually had trouble picking between it and paravirtualization

J. Comparing these different sorts of virtualization in general terms (full hardware, paravirtualization, os virtualization) is not the best way to go about things, because a lot depends on the specific OS you are using, the specific virtualization product you are using, etc. Talking about things as generally as we are only allows for general comparisons to be made, at some point you need to compare specific solutions instead of types of virtualization, if you want to decide what the best choice for your task is.

K. FreeBSD has really good OS virtualization built into it (I love jaiils also)

L. The security of hardware assisted virtualization is dependent on the correctness of the virtualization hardware you are using (for example vt-d, this stuff is on your CPU if you have it btw)

M. In cases where para-virtualization requires API's to be added on a kernel level, a breakout could lead to direct kernel control. He suggests against using paravirtualization solutions that require additional kernel space API's

N. OS virtualization gives anyone who roots the virtualized OS direct view of the hosts kernel, and an attacker may be able to pwn the kernel from the guest.

O. OS virtualization is the least complex of the types discussed, potentially, although many solutions are probably over complex and shit.

P. Regardless of the type of virtualization used, nothing states that an attacker must first root or otherwise gain an account on the virtualized system before they can exploit the virtualization solution and get to the host. However, many potential ways of breaking through the isolation require the attacker to pwn the guest first.

Q. If you run an OS on hardware it is going to be a much more secure environment than virtualizing the same operating system. Virtualization decreases security of the virtualized operating environment in several ways as compared to running the environment on actual hardware.

R. In general / usually, full hardware virtualization causes the largest hit to guest OS security, followed by paravirtualization followed by OS virtualization. The hit to security correlates with the complexity of the virtualization solution, largely if not entirely because the correctness of the virtualization solution negatively correlates with its complexity.

S. Virtualization is more focused on cost reduction than security

T. The best possible solution is to run each network facing application on its own physical hardware and connect the different machines with a physical network while isolating applications from external IP address, while running Tor / Firewall / Intrusion detection systems on a dedicated machine as well and forcing all traffic to be routed via Tor. This is his number one suggestion.

U. Using full hardware virtualization will make it significantly easier for an attacker to pwn your guest OS (versus running it on hardware), but using full hardware virtualization to keep network facing applications away from external IP address will require an attacker to use more / more sophisticated attacks to trace you with a proxy by pass attack. He did ironically note that since you are significantly more vulnerable to having your guest OS pwnt (versus running it on hardware) that this will remove some of the protection from being traced: yes an attacker will likely need to pwn the VM then break out of it and into the host OS to get your external IP address (although they don't need to have an account on the guest to break out of the hypervisor and into the host OS). However, he pointed out that since you are more likely to have your (guest) OS pwnt in the first place that this may end up reducing the previously mentioned added protection against traces.

and now let's wrap it up with a list of techniques and how he rated (or apparently rated, to me) them

1. Physical hardware isolation, with Tor on one machine, Firefox on another isolated from external IP address (strong number 1)
2. Paravirtualization based isolation
3. OS virtualization based isolation
4. Full hardware virtualization based isolation
5. No isolation

I think if you take advantage of the ability to further isolate a full hardware virtualization guest OS with mandatory access control systems, he might bump it up the list. One of the main benefits of full hardware virtualization is the ability to isolate it additionally on the host OS, so that even if an attacker breaks out of the hypervisor they can't break into the host OS. It is harder to gain this protection from break INs to the host OS by using paravirtualization or OS virtualization solutions (however it is harder to break OUT of paravirtualization or OS virtualization in the first place 0_0).

Also I think in reality he would want to know specific details, specific goals, specific software programs used, operating system used, configuration details, etc before he made a list of 'best' to 'worst'


3654
Security / Re: Nothing but scamming and hacking
« on: January 17, 2012, 01:02 pm »
I have huge rolls of personal information from selling on SR.  I'm planning on blowing the doors wide open on what's happening here, one buyer at a time.

I can't even describe how fucked up this is. What a quality individual.


Seriously...

Seriously.

This is one (of the many) reasons why secure buyers swear by using fake ID boxes or shipping shit to abandoned buildings or homeless shelters or random houses after doing surveillance on them to ensure the people who live their fit in a pattern of not being home when mail is delivered or etc etc etc. Getting things sent to your own name at your own address is a huge and avoidable risk. If you go the fake ID route I suggest using in state ID because eventually the feds may start to pay close attention to boxes registered with out of state IDs (since a higher overall percentage of them are probably used for illegal things than boxes registered with in state ID).

Just a warning to any anti-drug crusaders who want to publish peoples addresses, but you really should be careful, just because LE are incompetent fuckwads doesn't mean you wont piss off a smart hacker buyer and end up deanonymized with your personal info spammed on SR as being a snitch who is attacking SR. I sure wouldn't want 100k drug users and dealers to know that I am not only a snitch but want to snitch on them. It doesn't seem like it would be safe to me. Just looking out for you of course if you didn't think of that possibility. But really you are just a troll.

3655
Tails doesn't have persistent entry guards. This is a *major* anonymity vulnerability and puts you at a *much* higher risk of being deanonymized by even fairly weak attackers, particularly if you use it for an extended period of time. If you boot tails once a day for a month your risk of being deanonymized by an attacker engaging in a profiling attack is about the same as it would be had you used Tor with persistent entry guards for two and a half years. If you want to be as likely to be deanonymized by a profiling attack in a month as I am in two and a half years feel free to keep using Tails. IMHO Tails is actually probably more of an asset to people who want to trace Tor users than to people who want to avoid being traced. It makes it very easy for its users to greatly increase their vulnerability to one of the most dangerous and widely known attacks against the anonymity of Tor users. And it does this while acting like it is a security focused distro. In all honesty it isn't even that impressive of a configuration, even if you ignore the absolute deal breaker that it doesn't have persistent entry guards. It is a security toy with critical flaws in it. That it is suggested by the Tor devs is absolutely stupid, particularly since they will be the first to admit that it indeed *greatly* decreases user anonymity if it is used how it is intended to be used (as a live CD and not loaded from a persistent state via snapshots or similar). They may not admit that it is a security toy though, but it really isn't at all the ideal configuration. The only place Tails has in your security kit as for use as a live CD if you use random WiFi access points and don't want your sessions to be linkable to a single entity via the fingerprint your entry guards leave in the logs of the WAP (not many people use the same combination of entry guards, so by using that combination persistently you essentially leave a fingerprint at every WAP you use that will allow for an attacker to link all of your sessions to one entity). That is the only advantage of not having persistent entry guards, and for probably 99% of people using Tails it is entirely outweighed by the extremely real risk of reducing your protection from profiling attacks and making it *much* more likely that a given attacker manages to trace one of your Tor sessions to your actual location. Decide what is more important to you I guess, not having WAP sessions linkable to each other based on entry guards (btw you better also be using a MAC address randomizer between every session, in addition to some other things, or your sessions will be linkable even without an entry guard fingerprint) or not having your location traced in the first place. 

Quote
As long as you hide your usb flashdrive well, and remember to change your boot priority after using this setup, there is absolutely no trace of you being on a computer. Tails already has solid encryption, and you shouldn't have to save anything to your usb anyway to merely use Silk Road.

If your security requires that you physically hide things you can rest assured that your security is absolute fucking shit. Hiding flash drives is suggested as a security technique by (estimated) 0% of security experts.

3656
Security / Re: Homeland security watches social media, reads Wired...
« on: January 17, 2012, 06:23 am »
The government loves to go after low hanging fruit, but it does take time for them to chase after you. Hell, look how long JWH-018 was available in head shops!

The governments inherent hierarchial / command and control organizational structure ensures that they will be slow, inflexible and otherwise ineffective as compared to networked organizations where all nodes operate as their own command and control. This contrast between hierarchial and networked organizations is explained very well in the paper 'Netwar: the future of crime terror and militancy'.

3657
Security / Re: making a encrytpion and security programn standards
« on: January 17, 2012, 06:15 am »
first is there a programn for this that is free? PGP BY SYNAMTEC cost 120 bucks a year???is this the programn you all use??

what are some ways to protect my PC and my use of SR ?? any free software online? i saw linux but kno NOTHING ABOUT LITERALLY NOTHING
ways of cleaning out your system?? i have norton 360 so i believe that protects my identiy a bit extra.. any tips? what security procautions do you expirenced members have that protect.

i havent ordered yet im a FEW days new
thanks guys

Anti-virus programs (at least the ones civilians have access to) have a security value that approaches zero in regards to preventing you from being entirely pwnt by any attacker who targets you. They exist entirely to prevent you from being pwnt by a dragnet attacker who isn't targeting you in specific, and they even do a poor job at that. All anti virus scanners really do is prevent botherders from getting twenty million node botnets (instead they might get only a few hundred thousand before the virus is detected and the anti virus product can prevent it from infecting you). In short, anti virus program protects you if you are insanely shitty at computer security an launch random attachments etc, and they protect you from being the 1,000,000th infected node (of course they don't protect you if you are one of the 1,000,000 infected nodes). Anti virus programs give you an almost entirely false sense of security. I still suggest them for windows users, but if your security is coming from anti-virus scanners you are pretty much insanely fucked and not at all secure.

3658
Security / Re: Security for buyer
« on: January 17, 2012, 06:07 am »
I use TrueCrypt with a hidden volume, and in that I run a VMWare VM running stripped down Windows 7 running under 1.7GB in space on a 32 GB jump drive.

So you are insecure, nice to know

3659
Security / Re: What is the point of VM's?
« on: January 17, 2012, 04:50 am »
Also can I please get a link to that thing about truecrypt not being secure in a virtual machine? I can not find anything about it anywhere. I think you may have misinterpreted something talking about hidden containers as being related to virtual machines.

Also I do not think you are a retard. I am glad to see people who know a thing or two about computers and security here. However, I disagree with your opinion, even though it is based on the opinion of a computer security expert. My opinion regarding virtualization is also based on the opinions of computer security experts. In the end you should do what you think is best. I think using *any* isolation to keep network facing applications away from the external IP address is a good idea, even if it means using full hardware virtualization. I also think you are  going to be better off if you use paravirtualization or OS virtualization to accomplish the same goal.

Thank you for teaching me something new about computer security and giving me the information/motivation required to improve my security (because now I recognize that I should be using paravirtualization instead of full hardware...I never really thought of this before because I never realized full hardware virtualization had these security issues before, although I did recognize by myself that paravirtualization and OS virtualization would largely/totally avoid the security risks Theo/you pointed out to me, and I also got this realization confirmed by experts).

It is very rare for me to learn something new about computer security on underground forums these days. So good job you presented evidence and documented information / citations and you managed to increase my security and get me to suggest others increase their security as well. If we still disagree on the technique (virtualization) in general makes no difference to me, because I am still in support of it and now I know how to do it even better than before :) (even if you and Theo still think it is a technique only used by retards, at least I know several other expert level computer security people share my opinion as well!).

This is the type of debate I want to see on this forum. This is constructive. I don't want to argue with fucking retards who say you shouldn't use GPG, I want to argue with people who know what they are talking about and can help me to increase my security even if I disagree with their strategy / the conclusion they come to after examining the documented objective information related to the topic. When people come to different conclusions based on documented objective information, it is much better than when people make random shit up without even attempting to analyze/understand any material and talk out of their assholes.

3660
Security / Re: What is the point of VM's?
« on: January 17, 2012, 03:53 am »
Quote
And now you've entered into the layered approach where *any error* in
the PC model exposed to the client operating system is not just a
crashing bug -- it is now exploitable.

Also nobody I talked with knew what he was talking about in regards to how all crashing bugs are exploitable if you use full hardware virtualization. Nobody claimed that this isn't true, but they all say that without technical details explaining the claim that they can not come to any conclusions regarding it. These are people who I think know enough about computer security that they would be aware of full hardware virtualization causing all crashing bugs to be exploitable if it was widely known in the computer security community. Theo really needs to substantiate this claim with technical details. Also, assuming this problem is related to mistakes in architecture virtualization, the risks will (very likely) be greatly reduced with paravirtualization and it shouldn't apply at all to OS virtualization.

If anyone has any questions or comments feel free to ask. I still need to do a lot more research on virtualization, everything I have said is correct to the best of my knowledge and I talked with numerous people who know their shit regarding security, but again I am personally not an expert regarding virtualization. I do know a thing or two about computer security though, and compared to corporate security people I am a boss imo ;).

In regards to all of the non-definitive terminology I am using (likely, probable, most likely, maybe, etc), a lot of the discussion is based on theory and a lot of the conclusions are based on probability (it is probable that a given full hardware virtualization has these security issues, although it may not be something that is inherent to full hardware virtualization. Also paravirtualization may have some of the same issues, but since a lot less is being virtualized it is likely that a given paravirtualization solution has a much higher degree of correctness than a given full hardware virtualization solution). For example, full hardware virtualization is much more complex than paravirtualization, so even if there are no currently known flaws in a given full hardware virtualization system or in the hardware that supports them, the potential for flaws is much higher simply because a lot more is taking place. I guess it is even possible that none of the issues Theo is talking about are true (maybe virtualbox did everything right!), it just isn't very probable at all. More academic level research needs to be done regarding many of these things before some of the claims can be definitive instead of just various degrees of 'probable', if that makes sense. Although it is generally accepted as true that complexity is roughly equal to insecurity. On the other hand, the people I talked with suggested that the added insecurity from the complexity of virtualization based isolation does not outweigh the added security of isolating network facing applications away from the external IP address, so in the end more things than simplicity need to be taken into consideration, although you should always use the least complex solution that allows you to acheive your stated goal (hence why paravirtualization is almost certainly better than full hardware virtualization, but full hardware virtualization is better than doing nothing at all).

Pages: 1 ... 242 243 [244] 245 246 ... 249