Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - kmfkewm

Pages: 1 ... 245 246 [247] 248 249
3691
Off topic / Re: can I get a list of censored subjects please?
« on: January 07, 2012, 08:25 pm »
Quinone who the fuck elected you as the representative of the SR community? Why do you try to give more strength to your argument by acting like you speak for any number of people other than yourself? And if you don't give a fuck what I say why do you waste the time to make a reply.

3692
Silk Road discussion / Re: How is this place alive?
« on: January 07, 2012, 08:18 pm »
The FBI can build entire circuit by luck when they will have enough nodes. That's why Tor have "family" option in torrc.conf file. That's why there is entry nodes, Tor will always use them to avoid selecting random nodes each time who might be malicious.

And You can get to know where the SR server is located. Now You must decrypt the datastream to prove beyond reason of doubt that the content in question is served from that location. Possible? And then they will need to decrypt TrueCrypt or dm-crypt/LUKS encrypted harddrives of that poor server. Meanwhile the SR backup will be run from another server halfway across globe.

It is unlikely that they will build the entire circuit by luck, although they only need to own one out of three key nodes (entry guards) to deanonymize the server. They can find the entry guard by doing the attack I already explained the technical details of. No you don't need to decrypt the stream to prove beyond reason of doubt that the content in question is served from that location, you can just send the SR server a message with a self introduced pattern in the inter packet arrival times and then observe the line looking for that pattern. That will prove beyond a reasonable doubt that the SR server has been located. They would also have pretty good luck using a website fingerprinting attack, CCC made a classifier that can identify a website by analysis of the encrypted Tor stream with 60% accuracy. There are other traffic analysis techniques that can prove to various degrees, often beyond a reasonable doubt, that the server has been located. Another thing they could do is restart the server at the data center and then observe silk road website and see if there is a down time correlation, this is called an intersection attack. So there I gave three examples of how you are wrong, would you like me to continue because I can go on about this all day if need be.

Also they are not going to need to decrypt Truecrypt or DM-crypt because they will just flash freeze the ram and dump it into a forensic laptop, then they will recover the encryption keys. I doubt silk road is even using encapsulation material or physical intrusion detection systems on his server to try to prevent this, but if enough of a fuck was given about Silk Road the military of USA has already gotten around tamper resistant memory systems similar to this.

Anyway they will try to minimize down time as much as possible if they do an attack stemming from physical seizure of the server. After all, they would rather spy on the unecrypted addresses noobs are sending through the SR server, and possibly use SR server as a position to carry out application layer attacks against clients, etc, than they would take down such a valuble intelligence source and scare everyone away from it.

Nice try though.  Also I doubt even the FBI is stupid enough to add all of their Tor nodes to the same family, that would prevent them from being used to do a substantial number of attacks against the Tor network. Entry guards help prevent a lot of attacks if you are using them properly (if you are using a live CD that doesn't have persistence, like Amnesia, you are not properly using entry guards). However, entry guards will only slightly slow many attackers down if the target is a hidden service (or if the target has their browser taken over and has used isolation, although if the user has their browser taken over and they are not using isolation techniques they are fucked already).
If what you said is true, which it looks like it could be, wouldn't you be like, helping the fbi learn how to take down SR with that kind of information?

It isn't like it is classified. Anyway I have a collection of law enforcement training documents and other manuals and statistics relating to them, and I believe in one of the career path papers I have from FBI it says they start teaching their agents traffic analysis after 8 years at quantico if they go down the cyber crime career path. It isn't like the FBI doesn't have anyone who knows anything about traffic analysis working for them, although in 2008 they did fail to trace Tor clients that were used by a group of violent pedophiles including ones who were posting new material. Then again, tracing clients is a more impressive feat than hidden services, and they got many of the pedos who were using VPN's or posting pictures via photographic forensics.

3693
I have no issues with it really, its a really cool system and she is a smart security researcher. Qubes focuses on isolation, one of the three main strategies used by security professionals. The other strategies are correctness and randomization. Many people prefer defense in depth and like to layer the techniques as much as possible. I talk with some very very good hackers, and it is a bit surprising how much their opinions differ. Some are huge fans of using virtual machines for isolation, others think that it isn't going to stop a determined attacker (after all hackers are apparently penetrating through 8 layers of isolation in some cases). People who are big on correctness tend to use two main strategies, intensive code audits by experts looking for bugs (OpenBSD) and mathematical proofs of correctness (formal verification, like the sel4 micro kernel). The first technique allows for larger code bases to be audited, and is quite good at removing potential security vulnerabilities before they are exploited (and all together after a while). Formal verification apparently allows for a mathematic proof of correctness, but is extremely time consuming to do even for experts, and this has so far limited the ability to verify much more than micro kernels. In either case, only the audited or formally verified components can be expected to have a very high or perfect degree of correctness, and in most cases users are adding applications that have not been held to such high standards. There have not been extremely large code bases with such intensive auditing and very very little has been formally verified. Randomization attempts to protect from attacks like buffer overflows even if there are vulnerabilities in code, unlike isolation it attempts to prevent an attacker from gaining any access to the system (isolation attempts to contain malicious access).

Most operating systems come with a variety of tools for getting security in a few different ways, but some are better for other types. For example OpenBSD has very highly audited code in its base install, and default full address space layout randomization, but it doesn't have much support at all for virtualization solutions and it has no mandatory access control system. The OpenBSD devs are security experts who seem to think pretty lowly of most types of isolation, although they do have two tools for isolation with OpenBSD, systrace and a hardened chroot.

Likewise, Qubes has a minimized code base and probably a significant degree of correctness but they really focus more on the security benefits of isolation than on having intensive code audits. I am not sure if Qubes supports ASLR or mandatory access control systems, I will need to look into it more.

Anyway I think Qubes is great but it really is better as a framework to build something else on top of , or to copy the concepts from. I would prefer to configure things with multiple layers of isolation used.

3694
Off topic / Re: can I get a list of censored subjects please?
« on: January 05, 2012, 11:36 pm »
Well last I checked Silk Road admin self identifies as an Agorist, and has essentially called Silk Road an Agorist venture. Now I am not sure how much you know about Agorism, but Wikipedia says

Quote
Agorism is a political philosophy founded by Samuel Edward Konkin III and developed with contributions by J. Neil Schulman that holds as its ultimate goal bringing about a society in which all "relations between people are voluntary exchanges – a free market."[1] The term comes from the Greek word "agora," referring to an open place for assembly and market in ancient Greek city-states. Ideologically, it is a term representing a revolutionary type of free-market anarchism.[2] According to Konkin, Schulman integrated the idea of counter-economics, the advocacy of untaxed black market activity, into Konkin's libertarian philosophy.[3]


Agorism is revolutionary market anarchism. In ... market anarchist society, law and security will be provided by market institutions, not political institutions. Agorists recognize, therefore, that those institutions can not develop through political reform. Instead, they will come about as a result of market processes. As government is banditry, revolution culminates in the suppression of government by market providers of security and law. Market demand for such service providers is what will lead to their emergence. Development of that demand will come from economic growth in the sector of the economy that explicitly shuns state involvement (and therefore can not turn to the state in its role as monopoly provider of security and law). That sector of the economy is the counter-economy – black and grey markets.

So I think my political ramblings are at least somewhat at home here. I know not all Agorists think the state should be violently overthrown, but the sentiment does seem to be at least fairly common in such circles, with the main argument against it being closer to 'it isn't an effective method' rather than 'it is morally wrong to overthrow slave owners and gain freedom'. I know such systems as Jim Bells assassination politics are from people with strong agorist views, and Assassination Politics is a system that would be similar to SR but for the anonymous funding of assassination of political figures:

https://secure.wikimedia.org/wikipedia/en/wiki/Assassination_politics
https://secure.wikimedia.org/wikipedia/en/wiki/Jim_Bell

but that aside, I stand by my viewpoint that federal and other agents who enforce drug laws are terrorists. They may not be VNSA's (violent non-state actors), the term that military and intelligence people use to describe what lay people consider to be terrorists (in reality terrorism is a propaganda term with no agreed upon definition, in fact one mans terrorist is anothers freedom fighter). However, they certainly are violent state actors, but since I do not recognize the authority of the state I see no difference between them and what is traditionally considered to be terrorists.

There is little argument against the fact that the war on drugs has led to thousands of people becoming infected with HIV and other diseases, largely due to needle exchanges being illegal. This is force being used on the part of these assholes that directly results in biological hazards, if islamic terrorists infected thousands of people with HIV we would consider it a devestating attack. Additionally, the DEA has enforced laws that have caused many many thousands of people to overdose from impure and misadvertised substances, this would not happen in a market that could self regulate against such things, so in fact the DEA is responsible for the chemically induced deaths of thousands of innocent people. If islamic terrorists used violent force that resulted in thousands of people being killed by chemical agents we would consider it to be a horrible terrorist attack and scream for them to be brought to justice.

Additionally the DEA steals billions of dollars from people in seized money and other property, they are a mafia, terrorists, extortion agents. They lock up millions of people for victimless crimes, ruining countless lives, ripping apart communites, spreading disease and death everywhere they go. They are a clear and present danger to freedom and to liberty and to happiness and to the very well being of the United States and the entire fucking world. They spread lies and disinformation via propaganda and keep people stupid, they are enemies to science to logic and to honesty itself.

The DEA exists to lock up innocent people. They do this so that they can continue to divert billions of dollars of tax money to themselves, tax money that is stolen at gun point by equally evil IRS agents. They do this so they can fill prison beds and keep money flowing to the private prison industry and state and federal prisons can keep increasing their budgets. It is clearly a modern form of slavery, the freedom of everyone is limited and the freedom of particular minority groups (drug users) is stolen from them, for the profit of private industry. Of course all of the rehab and drug testing companies are equally guilty. Of course the most guilty are the corrupt politicians who are pretty much elected and kept in power by the prison industrial complex. We are all slaves to these asshole terrorists.

I am very pro freedom and I think as long as we have terrorists running around we should do everything we can to stop them. DEA agents DESERVE to die. They are soldiers in a war where THEY are the bad people, and to win a war you need to fucking kill the enemy soldiers not be an apologist or try to justify the evil fucked up things they do. Innocent people are dying and if killing guilty people is the only way to stop it then god damn it that is what needs to be done, try to see past your intensive government indoctrination they are trying to keep you as passive indoctrinated sheep, you do not need government government needs you because they are fucking parasites they give you nothing.

Now

3695
Off topic / Re: Underage Buyers
« on: January 05, 2012, 11:18 pm »
yeah well it would be very interesting to see how many vendors actually knowingly sold to anyone under the age of 18. I would say fuck all really.
Kids are jailbait when it comes to adult themes

I can see the headlines now...
"Man busted for selling drugs online to a 16 year old" as apposed to "Man busted selling drugs online" just doesnt have the same ring to it.

or "Silkroad!! Underage haven for children"......Sr has become a haven for underage kids buying drugs...

or "Child dies from a MDMA overdose from drugs she purchased online @ silkroad".....Parents of a 16 year old girl are grieving today after their little girl overdosed on MDMA she purchased from an underground site called SilkRoad. It is alleged she consumed 180mg of pure MDMA because they found a print out about  some wanker on the silkroad community forum saying  how he drops 180-220mg at a time. Her friend who purchased the drug is fighting for her life. Police are waiting for her to recover so they can speak to her, so they can pinpoint the SilkRoad vendor she purchased the drug from. The War on Drugs just became the War on SilkRoad.

Always think about the worst case scenario becoming a good possibility.
I stand by what I say and knowingly selling to a minor is fucking bad for this community and buying as a minor is fucking selfish.


I started using psychedelics I bought from people on the internet when I was a young teenager, and I turned out fine

i'm glad i always got my drugs and drug info from online instead of from irl friends, it resulted in me being a much more responsible and educated drug user than my peers. I actually think getting drugs online is much safer for highschool kids and it will expose them to intelligent drug users with experience instead of to, for example, gang bangers or retards

Psychedelics and hard drugs are 2 different things. There's difference between taking shrooms and smoking Heroin at 15 years old. "If you take shrooms you'd probably explore the world of psychedelics, but if you do Heroin at 15 you'd probably grow up a retard in prison."

Please read Novocaine's post if you are not clear.

...
What was the question again?
Oh yeah if you are underage.. fuck off... SR doesnt want you

The reason kids who use drugs end up retards in prison is because of the people they associate themselves with, and the main reason they start to associate themselves with those sorts of people is because drug use is illegal.

Who is spewing the propaganda now?

Nah the reason they MAY end up in prison is because they cannot afford a nice little habit they got going so they go hold up some poor store keeper with a rusty BUTTER knife.... or just maybe they kill 3 of their friends after they wrap their vehicle around a tree because and I quote "I drive better when I am stoned"....

You have 'I ama cop' written all over you. Oh no the horrors of cannabis abuse. LMAO. If they can get SR or vendors for selling to one person they can for selling to another do your point is entirely invalid. Expecting to be secure while breaking federal law simply because you don't think you are as big of a target as the next guy is an excellent way to lull yourself into a false sense of security and fuck yourself. You are the one spewing propaganda.

Quote
Kids are jailbait when it comes to adult themes

I think jailbait age people should have the right to consent to sex also ;)

3696
Silk Road discussion / Re: How is this place alive?
« on: January 05, 2012, 11:04 pm »
The FBI can build entire circuit by luck when they will have enough nodes. That's why Tor have "family" option in torrc.conf file. That's why there is entry nodes, Tor will always use them to avoid selecting random nodes each time who might be malicious.

And You can get to know where the SR server is located. Now You must decrypt the datastream to prove beyond reason of doubt that the content in question is served from that location. Possible? And then they will need to decrypt TrueCrypt or dm-crypt/LUKS encrypted harddrives of that poor server. Meanwhile the SR backup will be run from another server halfway across globe.

It is unlikely that they will build the entire circuit by luck, although they only need to own one out of three key nodes (entry guards) to deanonymize the server. They can find the entry guard by doing the attack I already explained the technical details of. No you don't need to decrypt the stream to prove beyond reason of doubt that the content in question is served from that location, you can just send the SR server a message with a self introduced pattern in the inter packet arrival times and then observe the line looking for that pattern. That will prove beyond a reasonable doubt that the SR server has been located. They would also have pretty good luck using a website fingerprinting attack, CCC made a classifier that can identify a website by analysis of the encrypted Tor stream with 60% accuracy. There are other traffic analysis techniques that can prove to various degrees, often beyond a reasonable doubt, that the server has been located. Another thing they could do is restart the server at the data center and then observe silk road website and see if there is a down time correlation, this is called an intersection attack. So there I gave three examples of how you are wrong, would you like me to continue because I can go on about this all day if need be.

Also they are not going to need to decrypt Truecrypt or DM-crypt because they will just flash freeze the ram and dump it into a forensic laptop, then they will recover the encryption keys. I doubt silk road is even using encapsulation material or physical intrusion detection systems on his server to try to prevent this, but if enough of a fuck was given about Silk Road the military of USA has already gotten around tamper resistant memory systems similar to this.

Anyway they will try to minimize down time as much as possible if they do an attack stemming from physical seizure of the server. After all, they would rather spy on the unecrypted addresses noobs are sending through the SR server, and possibly use SR server as a position to carry out application layer attacks against clients, etc, than they would take down such a valuble intelligence source and scare everyone away from it.

Nice try though.  Also I doubt even the FBI is stupid enough to add all of their Tor nodes to the same family, that would prevent them from being used to do a substantial number of attacks against the Tor network. Entry guards help prevent a lot of attacks if you are using them properly (if you are using a live CD that doesn't have persistence, like Amnesia, you are not properly using entry guards). However, entry guards will only slightly slow many attackers down if the target is a hidden service (or if the target has their browser taken over and has used isolation, although if the user has their browser taken over and they are not using isolation techniques they are fucked already).

3697
Silk Road discussion / Re: How is this place alive?
« on: January 05, 2012, 07:48 pm »
You people have too much USA centric views. Do You really think the SR is located in US or FBI can monitor Tor network worldwide?

.onion is vulnerable to timing attacks, but that's all. I have read all the damn PDF papers, and they will be no use for some US agency to trace servers located overseas. And even if they suspect that server is located There, how will they prove anything in court? Considering the encryption and physical security of server?

As long as the administration of SR will not screw something terribly wrong, the SR will live. Seriously people, order some barbs from SR and calm down!

All I'm worried about is SR webserver getting exploited and coins stolen or administration making unpopular changes to SR policies.

Yes i should be nicer but when i spend all day correcting people online I start to get really irritated when more and more people keep talking about shit they have no idea about. I also feel obligated to correct them lest their bullshit pulled out of their ass information continues to spread and multiply. Re above poster, you are retarded, there is a difference between an active and a passive attack, please learn the difference between you ever talk about the anonymity of Tor again. You have no clue what you are talking about. FBI or anyone else can do an active attack merely by adding nodes to the network, they do not need to do a fully passive attack and they almost certainly will have better luck with an at least partially active attack.

3698
Off topic / Re: Underage Buyers
« on: January 05, 2012, 07:37 pm »
I started using psychedelics I bought from people on the internet when I was a young teenager, and I turned out fine

i'm glad i always got my drugs and drug info from online instead of from irl friends, it resulted in me being a much more responsible and educated drug user than my peers. I actually think getting drugs online is much safer for highschool kids and it will expose them to intelligent drug users with experience instead of to, for example, gang bangers or retards

Psychedelics and hard drugs are 2 different things. There's difference between taking shrooms and smoking Heroin at 15 years old. "If you take shrooms you'd probably explore the world of psychedelics, but if you do Heroin at 15 you'd probably grow up a retard in prison."

Please read Novocaine's post if you are not clear.

...
What was the question again?
Oh yeah if you are underage.. fuck off... SR doesnt want you

FIrst of all you and novocaine don't speak for SR so fuck off with your stupid propaganda spewing. Second of all, I don't care if there are underage people here or not, but I know at least two people who were running major underground drug forums before they were 18 so I think it is funny everytime I see people freak out about not being able to know buyers ages online. I also tried hard drugs a few times at a young age and didn't have any problems with them or get addicted. I don't particularly think that kids should use drugs (particularly hard drugs) and would suggest against it in the majority of cases, but in reality kids use drugs and if they want to get them online it is probably much better for them in the long run anyway. The reason kids who use drugs end up retards in prison is because of the people they associate themselves with, and the main reason they start to associate themselves with those sorts of people is because drug use is illegal.

3699
I never knew about even half the stuff kmfkewm posted here. Good go, mate! Thanks for sharing all this knowledge with us.

I feel a bit stupid that I never knew about the possibility of using chroot like this, since I use it daily for other purposes.

I know OpenbSD has a modified version of chroot that offers decent isolation, but many distros are probably still using versions with chroots that can be broken out of fairly easily. Look into the security of chroot on your distro.

Even with disk encryption, if they want to crack it they will.

Welcome to the 'says a bunch of bullshit' club, if you are using a strong encryption algorithm like AES or Serpent with a 128 or 256 bit key, nobody is going to be cracking it. These symmetric encryption algorithms are even highly resistant to quantum computing attacks that are able to break asymmetric algorithms like RSA (which is often used for session key exchange with GPG). An attacker with a quantum computer with enough stabilized qubits can use Shors algorithm to quickly break this sort of asymmetric encryption, but the best known quantum computer attack against symmetric algorithms is grovers algorithm and it only reduces key size by 1/2 (giving a 256 bit symmetric algorithm the still unbreakable key space of 2^128). Even 128 bit symmetric keys are going to be unbreakable by such quantum computers. And anyway it is likely that nobody currently has any quantum computer with such capability, and if anyone does it is the NSA and they are sure as fuck not going to reveal that they have such abilities by using them against you.

Quote
Most of the time frame quotes you here about encryption like  "it would take them over a thousand years to brute force that" are bullshit. Those time scales estimations are routinely based on trying to crack the encryption using cpu power. While this does get the job done eventually, the future is in using GPU computing(using your video card's processing power).

GPU does have more processing power for cracking things like encryption than the average CPU does but you still are not going to brute force shit when it comes to strong encryption, even with a large cluster of GPU power.

Quote
It's the same hashing method used in the bitcoin protocol itself. When people solve a block, all they have done is generate hashes until one of them matched the transactions that were being verified. Anyone who has ever mined bitcoins can tell you how much faster a GPU can do this when compared to a CPU. Depending on the encryption scheme and the efficiency of the hashing code, it can cut the time needed to crack an encrypted volume by several orders of magnatude. This makes encryption just one part of a layered defense scheme. To rely on it alone is foolish.

If GPU is so powerful then bitcoin is fucked because it relies on algorithms that could then be brute forced, or even the keyspace of the hashing algorithm it uses would be exhausted. You are right that it is foolish to rely on encryption alone, but your reasons for why it is foolish are even more foolish.

Quote
This brings me to my original point. VMs have their image files running off of the hard drive most times, so once the volume is decrypted, they can just load the VM up in its normal software and have access to everything in it.

You are entirely missing the point of using a virtual machine for isolation. What you are doing is protecting from an attacker who remotely hacks / roots your VM using whatever network facing applications run in it as the vector. If an attacker does this and you use a virtual machine to isolate the exploited applications, the attacker can not trivially get to the host system from their position in the virtual machine.


Quote
Even worse is that you can manipulate the data in a VM's image file without loading it up and completely bypass all access controls and system permissions.

Sure, if you have access to the host OS. Again, you are entirely misunderstanding the benefits of using virtual machines.

Quote
So knowing this, what I did was invest in a device called a ramdisk. How does this help? Well RAM don't hold data after the power cuts out. If you VM is stored and run from a ramdisk, when the police show up, you just pull the plug and no more data for them to screw you with. I have my rig interfaced with a garage door remote on my keyring. One button push and my rig cuts off and all the data in the ram disk goes bye bye.

The RAM can be flash frozen for a significant period of time after power is cut, although the exact time frame depends on the specific sort of RAM.



Quote
Sorry but it you who is wrong.

I do not know if all RAM can be flash frozen, but I know a lot of it can. I also know different sorts have different data decay rates. However, considering the fact that you have already demonstrated willingness to talk out of your asshole instead of your mouth, I am inclined to think you have no idea what you are talking about. Please show me a citation.

Quote
There's only one type of DRAM chip used for actual computer RAM and it is stateless without power being supplied to it.

This I know is not correct, cold boot attacks have been demonstrated against several different sorts of RAM. It is a fairly common misconception that RAM is stateless without power being supplied to it, but it has been demonstrated with several sorts of RAM (all tested afaik) that state decay is not instant upon power being cut, taking as long as ten plus minutes in some cases. I believe this sort of attack was first shown by Jacob Appelbaum.

Quote
The actual "memory" in your computer is not like NAND memory used in usb sticks and flash drives. Data stored in NAND is in a persistent state until until altered and requires no power to hold data once it is written. Actual RAM holds nothing persistently.

You obviously have some understanding of computers, but your understanding is that of a 'computer guy' not a 'security expert'. It is a common misconception that RAM instantly loses its state upon power loss, but security professionals have demonstrated and proven that this is not true several years ago now.

Quote
This is why RAM constantly has to have the data refreshed every few nanoseconds. Freezing the ram with liquid nitrogen would do absolutely nothing as the only thing moving in the ram is electrons.

Please stop saying as fact things that you have no real idea about. Yes, you are technically correct that the only thing moving in RAM is electrons, however freezing the RAM with liquid nitrogen (or other things, some of which are far easier to work with) will indeed make the state of the electrons persist in RAM for an extended period of time. It also takes a substantial period of time, usually a few minutes, before the state of the RAM decays after power is cut.

Quote
It takes quite a bit of time to reach absolute zero (the point at which atoms stop moving as well as their components such as electrons) even using liquid Helium. So lets see here. Power goes off and data is GONE in lets say 25 milliseconds.

Why are you wasting your time making shit up and talking about things you don't know about? Let's try to keep the information here high quality and accurate instead of pulled out of our assholes please.

Quote
If the feds have people who can somehow alter the laws of physics and timespace I'm sure we would have heard about it by now so it's not even logical to expect human or machine to be able to remove a physical ramdisk device in that timeframe.

Your entire hypothesis is incorrect so you should stop basing your argument off of it.

Quote
On top of that, even liquid hellium could not cool it down fast enough to stop the electrons from dissipating before that data was gone forever. And let's not forget that you'd be shorting out the device by submerging it into Liquid Helium(i keep using helium because liquid nitrogen can't freeze electrons in place so is useless for the scenario you mentioned). So whoever told you that line of bullshit needs to go back to school and get their MS in Comp science as I did and would know what they were speaking about.

Blah blah blah more wrong information. This attack has been demonstrated, you can see the entire thing carried out on youtube for fucks sake not to mention the attack has been in published papers for a few years now. Any computer security should know about this attack by now, so maybe it is you who should go back to school in computer security instead of unrelated computer science fields.

Quote
Let's also point out the fact that all modern operating systems use memory address randomization to help counter buffer overflow attacks in poorly written software. Even if by some miracle the data got preserved in ram, once the OS is off there is no way to tell what bits were places where in RAM. All that would be left is jumbled masses of binary values with no real way to correlate them to what they belong to. 16 gigabytes = 17 179 869 184 bytes so if you think anyone could solve that jigsaw puzzle then I've got a really nice bridge in SF I'd love to part with very cheaply.

Not all modern operating systems use ASLR (freebsd comes to mind) and many of the operating systems that use any ASLR do so to a limited extent (thus not having full ASLR). Well, you know the key size of encryption is 128 bits of randomness or 256 bits of randomness, so I guess you could just filter out everything that isn't random and then make a dictionary of all 128 and 256 bit strings of randomness that are left. ASLR doesn't randomize the content of ram it randomizes where data is stored in RAM. Stop talking out your asshole.

Quote
Also forgot to respond to this. The registers in your cpu hold data exactly as long as RAM cells do man. They also have to be refreshed like RAM or they also lose their data.

This is true. The only way I have heard of protecting from a cold boot attack when the attacker actually has physical access to the machine is to use encapsulation material to slow their ability to access the RAM, and intrusion detection systems to begin a wipe process in RAM as soon as physical penetration of the case is detected. Even systems that use encapsulation material and similar systems for protecting RAM have been defeated by military hackers, I read about one hacker who worked for the united states government using a combination of I believe liquid helium and an acid wash to remove the encapsulation material from flash frozen RAM, and then he used a highly precise tool with a tip on it about the width of a human hair to obtain the state of the memory. Sorry I can't explain this attack in more technical detail, it is beyond my level of expertise, but I will try to find the article.

Quote
Seriously, pick up a book and actually read up on this.

Given the large amount of bullshit that you have said I think you have no place in lecturing other people on reading up on anything.

Quote
Also you're arguing with someone with a masters in computer science based on shit you read on fucking wikipedia? You just served yourself son. I can cite thousands of goverment papers and studies claiming weed is as addictive as heroin and causes everything from crime sprees to phsycosis. Does that make them true? Hell no because even idiots get bullshit papers published. The things I've stated here come from actual learning, hands on experience working in this field, and basic damn common sense when it comes to the laws of physics.

If you have a masters in computer science I really am impressed with myself that I have managed to become self educated past the point of a masters degree so quickly! It really is hard to determine my skill level considering that fact, but I routinely do find myself pwning the shit out of anyone who has recieved their computer/security training from a school or corporation. He is basing his argument about RAM on a paper / attack discovered by Jacob Appelbaum, a well known security professional and one of the Tor developers. You really have pwnt yourself very hard if you are not trolling.



3700
Off topic / Re: can I get a list of censored subjects please?
« on: January 05, 2012, 06:31 pm »
You think wanting to end your own enslavement is trolling? Is it living under a bridge to want to lock people up for harming nobody? When islamic terrorists create biological and chemical hazards that kill thousands of people they are killed, what issue do you have with the same logic being applied to other terrorist organizations?

It's not a very wise idea to argue with a forum moderator, don't you think?

He can delete whatever he wants, and he actually bothered to reply to you to tell you why he deleted it.  Most mod's don't have the time/interest in informing every person of why their threads were altered.  Here the guy explained it to you .. did say a bit of a snarky thing at the end, but that's his .. right to free speech !

Then you respond with some non-sense that bored me so much in the first 5 words I didn't read it.

I think this thread is just about done, maybe?

So he has a right to free speech but I have no right to free speech? Although it is true enough that he is a moderator and can tell me to go fuck myself and delete all my posts if he wants to, unlike you I wont try to backseat mod, last I checked I merely asked for a list of topics that I shouldn't waste my time making due to the potential of them being deleted. I equally don't give a fuck if you read what I write or not. Just a word of advice for you but trying to ass kiss moderators doesn't make you look cool. I have no issues with anything the said moderator did either, although I am mildly surprised he thinks that wanting to kill those who wish to send us to die in cells for the profit of the prison industrial complex and the continued power of the police force is equal to trolling.

His postings make me believe that he has at the very least a high probability of being a snitch. It would seem that he is very knowledgeable about security to the point that he should be able to hack or maintain employment in a comp security related field. If he hacks then the likelyhood of him being a snitch is higher than any other type of criminal. I would hope he isnt but its weird to type that shit about a fed agency.

Digital, how do we know what is trolling? WTF is trolling?

That is some excellent logic. I am so knowledgeable about security that I must be a snitch. Uhm, okay. You are a drug user so the probability of you being a snitch is probably far higher than any given hacker, of course you could reference that article about 1/4th of hackers being a federal informant but if you do I will just post a link to the articles that discredit it and show how they used flawed methodologies to make that propaganda piece. Not trusting any security experts because they might be snitches is a great way for you to use shitty security and end up in prison though. Why is wanting my freedom and the death of those who wish to take it from me a strange thing to say? DIsconnect yourself from the matrix already.

I have read a ton of kmfkewms' posts and I think that person sounds like LE. If anyone has dealings with him just becareful until you know he isnt working for a federal agency. This guy is prolly posting from an FBI building lol.

I have read only one of your posts afaik, and I think you are probably a federal agent or maybe just one of the scammer disinformation assholes like rater.



3701
Off topic / Re: Underage Buyers
« on: January 04, 2012, 08:21 am »
I second that. Taking illicit drugs at a younger age will wreck one's brain cells (plus life & relationships) once he got older, over those who use it at an older age. If you work in prison or hospital you will know this is true.

If you work in a prison you are probably retarded but if you work in a hospital you should know the difference between corelation and causation.

3702
Off topic / Re: Underage Buyers
« on: January 04, 2012, 08:08 am »
I started using psychedelics I bought from people on the internet when I was a young teenager, and I turned out fine

i'm glad i always got my drugs and drug info from online instead of from irl friends, it resulted in me being a much more responsible and educated drug user than my peers. I actually think getting drugs online is much safer for highschool kids and it will expose them to intelligent drug users with experience instead of to, for example, gang bangers or retards

3703
Security / Re: interception detection technology thread
« on: January 04, 2012, 07:17 am »
It is a good idea but the person who made such a chip would have to be someone you trust. LE could create such a device and then hope that it makes it to sellers. They could use the device to gain information that they may not have access to otherwise. Its always a bad idea to use something created by someone you dont know or dont trust..........even drugs............even technology.

Obviously you would want to make them yourself. You can buy all the components for it with out any problem, but putting them together and making them do what you want is the part we haven't done yet. Enelysion was talking with some people about making an open source design and software required for people to make these themselves.

3704
In an ideal world you would be using multiple layers of isolation as well. Virtualbox being used in this way is merely one layer of isolation. Mandatory access controls are another sort of isolation that can be used for similar goals. jails style virtualization can also be used,application virtualization essentially. chroot also offers isolation. systrace is another isolation tool. You want the attacker who pwns your browser to have to go through as many additional isolation layers as possible before they can get your external IP address. Unfortunately isolation isn't perfect, I have heard of security critical chips that use 8 isolation layers being penetrated by skilled hackers.

So what can we  do to protect ourselves? If you have time I would love to hear in a PM. You are very intelligent on these subjects and I am eager to learn.

There is no known method of fully protecting yourself from application layer attacks other than having 100% unexploitable code, layering isolation techniques can slow down some attackers (to be fair, most attackers) from getting IOIs (items of interest, in this case your external IP address). Phyiscal isolation (airgaps) can protect you from having your encryption system bypassed on the application layer, but nothing can prevent you from theoretically being traced on the application layer other than correct code. I am not quite educated on the matter enough to say if it is literally impossible to protect from such attacks, but I have heard as much from one extremely skilled hacker friend. I have also heard some whispers about various experimental operating systems and kernels that attempt to make hacking at least a lot harder, and I believe there is some sort of 'provably correct' system formally verified code correctness or something. I wish I knew more about this matter to share knowledge on it, I will look into the formal code correctness methods thingie some more and report back. Oh yeah systems like ASLR can also make it harder to be attacked in this way, but a skilled hacker can by pass ASLR and break through as many layers of isolation as you throw at them, code correctness is the only way to be secure from such attacks but code correctness may very well be more of a perfect ideal than something that can be fully formally verified (this is what im going to follow up on).

As far as secure operating systems go, I would def keep your eyes on some of the research projects of various universities / research groups...qubes is the first that comes to mind but it isn't the most interesting (although it does automatically put every application you launch into its own virtual machine and other cool things)

https://secure.wikimedia.org/wikipedia/en/wiki/Formal_verification


sel4 is a formally verified kernel

In general, security professionals tend to fall into a few sorts of group in regards to what they think the best overall strategy / technique is. I prefer defense in depth and am a fan of isolation, although some hackers I talk with think isolation like this is over rated enormously. Others think isolation like this is essentially a requirement for security. The general strategy with isolation is to add as many layers as possible for the attacker to defeat before they can root the host or gain access to IOIs, and use intrusion detection and prevention systems like snort to try and detect and remove the attacker before they breach the final layer of isolation keeping the host or IOI secure.

3705
In an ideal world you would be using multiple layers of isolation as well. Virtualbox being used in this way is merely one layer of isolation. Mandatory access controls are another sort of isolation that can be used for similar goals. jails style virtualization can also be used,application virtualization essentially. chroot also offers isolation. systrace is another isolation tool. You want the attacker who pwns your browser to have to go through as many additional isolation layers as possible before they can get your external IP address. Unfortunately isolation isn't perfect, I have heard of security critical chips that use 8 isolation layers being penetrated by skilled hackers.

Pages: 1 ... 245 246 [247] 248 249