Silk Road forums
Discussion => Off topic => Topic started by: alpine on July 17, 2012, 11:38 pm
-
Just wondering because I can't go back after this! I have checked the wiki but I saw a lot of shitty ones.
-
well, there's BMR, but it's much much smaller and not nearly as good as SR
5onwnspjvuk7cwvk
-
nope nothing as good as this place. BMR is full of scammers and doesnt have the selection of product.
-
:o BRM looks soooooo sketchy and wack as fuck ahaha,. seems like most ive seen are tormail based, and one or two in german only.
-
I ve got stuff from BMR and it worked out good stay in escrow and read the reviews and most of all check when was the last time the vendor longed in , There are screamer's but If you use common sense you'll be fine guns are usually scams check the forum to see if there is some thing about the vendor u planing on buying from and make a informed decision.
It is smaller but some stuff is cheaper and after all if you dont try something else you going to limit your self to only one source if SR goes down I sincerely hope it wont but then you never know.
regards
-
Keep your keyring up to date with the people you want to keep in contact with ;)
+1 "voted best idea!!! "
-
Keep your keyring up to date with the people you want to keep in contact with ;)
Good idea. I'm a total nobody but I have a friend who is a low level vendor and he/she has contacts up the wazoo.
-
Keep your keyring up to date with the people you want to keep in contact with ;)
+1 "voted best idea!!! "
That assumes that the ostensible contact information contained on the keys is valid. Many people, including vendors, do NOT put valid email addresses (e.g. tormail.org) on their keys, making contact with them other than via SR PM or Forum well-nigh impossible.
Guru
True true - i have never figured out why they don't put in real tormail addy but whatever.
However - if sr goes down - I will never answer any message on tormail that isn't encrypted period.
-
Keep your keyring up to date with the people you want to keep in contact with ;)
+1 "voted best idea!!! "
That assumes that the ostensible contact information contained on the keys is valid. Many people, including vendors, do NOT put valid email addresses (e.g. tormail.org) on their keys, making contact with them other than via SR PM or Forum well-nigh impossible.
Guru
True true - i have never figured out why they don't put in real tormail addy but whatever.
However - if sr goes down - I will never answer any message on tormail that isn't encrypted period.
That is a very sensible attitude and I tend to agree. Tor Mail is useful, but we don't know who is running it and should definitely not assume that they will protect anyone but themselves.
-
Keep your keyring up to date with the people you want to keep in contact with ;)
+1 "voted best idea!!! "
That assumes that the ostensible contact information contained on the keys is valid. Many people, including vendors, do NOT put valid email addresses (e.g. tormail.org) on their keys, making contact with them other than via SR PM or Forum well-nigh impossible.
Guru
True true - i have never figured out why they don't put in real tormail addy but whatever.
security by obscurity
-
" security by obscurity "
True but the world is suppose to quit spinning if SR goes down?
How in the world r u suppose to communicate and continue doing business then?
Not like ima run over to the Farmer's Market rofl!!
-
Any good silkroad alternatives In case it goes down? Topix anyone ;) Sends my arsehole into spasms just thinking about it...
-
If silkroad goes down, which I don't think will happen anytime soon, there's still this forum.
The community will find an alternative when it has to, and the best alternatives will be mentioned on the forums.
Or maybe it will be like the kino.to case, where two weeks after LE had taken the site down an exact copy of it appeared with the url kinox.to
All we need is a secure cms with silkroad functions, a server and some trustworthy people willing to risk their lives for a shitload of money by hosting a SR clone. I'm sure there are enough people out there with these qualifications.
-
There's Eradic's site. He usually has good bud. Haven't ordered from him yet, but a friend got some in and it was really good shit.
http://nhrugetj6vampcib.onion/default.htm
I've been there, and her bubble hash is usually excellent. I just got some of the Blue Dream budz
and they are to die for!! Dank as all hell. Stuff got here pretty quick. It's been 2 or 3 days each
time in transit. Hard to find a good dealer out here among the sketch, but Alexandra is the man!
-
wow deep that was cool i didnt even have to log in.
-
There's Eradic's site. He usually has good bud. Haven't ordered from him yet, but a friend got some in and it was really good shit.
http://nhrugetj6vampcib.onion/default.htm
I've been there, and her bubble hash is usually excellent. I just got some of the Blue Dream budz
and they are to die for!! Dank as all hell. Stuff got here pretty quick. It's been 2 or 3 days each
time in transit. Hard to find a good dealer out here among the sketch, but Alexandra is the man!
That does sound rather good.
-
wow deep that was cool i didnt even have to log in.
Oops. Is that your site?
-
If the unthinkable dose happen
There are only those 2 SR and BMR unless some one else has the balls to step up and develop some thing like SR and BMR but for the time being those are the only trustworthy market places.
-
While the DEA certainly aren't the most sensible bunch they've likely considered that if they shut down SR another will take it's place. I'm more concerned about some kind of bullshit legislation regarding bitcoins themself.
-
If the unthinkable dose happen
There are only those 2 SR and BMR unless some one else has the balls to step up and develop some thing like SR and BMR but for the time being those are the only trustworthy market places.
I've never had much luck on BMR, not that they're bad but they're certainly not in the same league as SR.
-
While the DEA certainly aren't the most sensible bunch they've likely considered that if they shut down SR another will take it's place. I'm more concerned about some kind of bullshit legislation regarding bitcoins themself.
Good point. As a matter of computer science, they can't easily shut down a .onion site, can they? But controlling bitcoins seems almost impossible.
-
While the DEA certainly aren't the most sensible bunch they've likely considered that if they shut down SR another will take it's place. I'm more concerned about some kind of bullshit legislation regarding bitcoins themself.
Good point. As a matter of computer science, they can't easily shut down a .onion site, can they? But controlling bitcoins seems almost impossible.
The could deploy a ddos attack and block access to the sight for an extended period of time, but this would also hurt the TOR network and bring traffic to an already slower pace.
-
Tagging this thread to see if more responses come up :)
-
There's Eradic's site. He usually has good bud. Haven't ordered from him yet, but a friend got some in and it was really good shit.
http://nhrugetj6vampcib.onion/default.htm
I've been there, and her bubble hash is usually excellent. I just got some of the Blue Dream budz
and they are to die for!! Dank as all hell. Stuff got here pretty quick. It's been 2 or 3 days each
time in transit. Hard to find a good dealer out here among the sketch, but Alexandra is the man!
Looks legit and nice but why is 112g of full melt the same price as 112 of bud?
-
While the DEA certainly aren't the most sensible bunch they've likely considered that if they shut down SR another will take it's place. I'm more concerned about some kind of bullshit legislation regarding bitcoins themself.
Good point. As a matter of computer science, they can't easily shut down a .onion site, can they? But controlling bitcoins seems almost impossible.
The could deploy a ddos attack and block access to the sight for an extended period of time, but this would also hurt the TOR network and bring traffic to an already slower pace.
I don't feel like Tor is really setup to just be ruined by a DDOS attack. You have to be ON the network to access .onion, I would hope that if it detected massive floods coming it would just drop off your connection to the network, in which case it would be near impossible to have enough machines actively hitting a .onion site to cause the load to knock it offline. I'm a network specialist and have thwarted a good number of assholes DDOSing sites, I would venture it would be highly unlikely that any sustained attack could ever take place through Tor.
And as far as controlling BTC, the feds can only regulate their own currency, the point of bitcoins are that they're deregulated, so I'm not sure I could ever see a scenario that they could honestly stop someone with minimal technical savvy from taking part in it.
-
Amen, Mr. Sandwich.
Hope you're right.
-
Yeah....The Hidden Wiki has been attacked and taken down on Tor several times, and anonymous have hit kiddie porn sites too.
SR is just as vulnerable I should imagine!!
I feel that DPR must have some kind of a backup server in case of the unthinkable (inevitable?) happening, but the template has been set and this site has set a benchmark and blueprint of how this shit should go down!! I have no doubts that other sites would appear but while there is Silk Road, why would you want to go to any other site?? BMR is too dodgy for me as it is now.....You click on a vendors page but they ain't been active for 5 months n shit, and it is basically like SR but just not as good functionality wise with fewer choices and less activity on that site. I actually found BMR before I found SR and was going to put in an order but then we came across SR....It was like HOLY FUCK!! This is the one!!!!! Never looked anywhere else since.
SR 4 LIFE!!! I don't even wanna think about goin back to the comparatively limited options I have locally!! That shit just ain't gonna fly any more!! lol
-
Agreed.
BMR is no different from UMB.
Fingers crossed DPR has a back up plan.
-
The could deploy a ddos attack and block access to the sight for an extended period of time, but this would also hurt the TOR network and bring traffic to an already slower pace.
it wouldn't "hurt" the network at all, an attack similar to what you're describing is in fact the cheapest way (from both a time and computation standpoint) to deanonymize a hidden service. btw when you write "TOR" instead of "Tor" it makes it obvious that you learned about it from the media or a laypersons' forum instead of technical literature ;)
Many of .onion sites have been taken down by ddos attacks. Since the onion router is it's own network on top of the internet, placing large amounts of bandwidth on it at a general target will slow the rest of it down. I write out TOR because it's an acronym standing for The Onion Router. Tor is just the brand they slapped on it for the layperson who doesn't understand computer acronyms uses. Just like bios should be B.I.O.S. for basic input output system, but a common terms get thrown around in computer lingo the formality of an acronym gets lost on the layperson.
-
Yeah....The Hidden Wiki has been attacked and taken down on Tor several times, and anonymous have hit kiddie porn sites too.
SR is just as vulnerable I should imagine!!
I feel that DPR must have some kind of a backup server in case of the unthinkable (inevitable?) happening, but the template has been set and this site has set a benchmark and blueprint of how this shit should go down!! I have no doubts that other sites would appear but while there is Silk Road, why would you want to go to any other site?? BMR is too dodgy for me as it is now.....You click on a vendors page but they ain't been active for 5 months n shit!
SR 4 LIFE!!! I don't even wanna think about goin back to the comparatively limited options I have locally!! That shit just ain't gonna fly any more!! lol
I don't understand the technical side to this stuff one bit. But anonymous has no interest in attacking Silkroad, Silkroad is a beacon of everything they claim to stand for.
-
Yeah....The Hidden Wiki has been attacked and taken down on Tor several times, and anonymous have hit kiddie porn sites too.
SR is just as vulnerable I should imagine!!
I feel that DPR must have some kind of a backup server in case of the unthinkable (inevitable?) happening, but the template has been set and this site has set a benchmark and blueprint of how this shit should go down!! I have no doubts that other sites would appear but while there is Silk Road, why would you want to go to any other site?? BMR is too dodgy for me as it is now.....You click on a vendors page but they ain't been active for 5 months n shit!
SR 4 LIFE!!! I don't even wanna think about goin back to the comparatively limited options I have locally!! That shit just ain't gonna fly any more!! lol
I don't understand the technical side to this stuff one bit. But anonymous has no interest in attacking Silkroad, Silkroad is a beacon of everything they claim to stand for.
That is correct but during operation darknet a member of anonymous wrote a script to preform a denial of service attack on .onion sites. So anonymous may not want to hit the site but there may be others that do... DEA or other LEO's around the world. Although it may be easy to thwart a DDOS attack on the clear-net through mitigation, it's not so easy to do so within the onion system as there are no direct IP addresses to block.
-
Since the onion router is it's own network on top of the internet, placing large amounts of bandwidth on it at a general target will slow the rest of it down. I write out TOR because it's an acronym standing for The Onion Router. Tor is just the brand they slapped on it for the layperson who doesn't understand computer acronyms uses. Just like bios should be B.I.O.S. for basic input output system, but a common terms get thrown around in computer lingo the formality of an acronym gets lost on the layperson.
you're just exposing yourself more and more. tor is NOT an acronym for "the onion router," in fact, it hasn't used the onion routing technique for many years now. onion routing involves encrypting data using the public keys of many nodes in layers, with the final ciphertext (an "onion") being passed around by nodes, each removing a layer. tor is different because it builds telescoping encrypted circuits through a series of nodes and then routes data through these circuits. this achieves perfect forward secrecy, long lived circuits, "leaky pipe" routing, and several other cool things that can't be done with onion routing
furthermore it's damn near impossible to degrade the performance of the overall network in any way but if you have any ideas i'm listening
Dude her is the wiki. http://en.wikipedia.org/wiki/Tor_(anonymity_network) read the first sentence. and by the way we are using the second evolution of the onion routing system in regards to you encryption comments.
Since it is an open source software, with minor tweaking it would be possible to generate multiple circuits and flood the system during a denial of service attack. This would slow down the nodes that are within the circuit thus degrading the overall performance of the system. It will not crash the entire system but for some (depending on the amount and location of circuits) grind it to a crawl. Maybe enough to make every page time out, and make the denial of service more successful than just using one entry point.
-
literally nothing you said is correct, i'd expect no more from somebody whose first instinct is to run to wikipedia to try to find something to prove themselves right about an extremely technical topic. "generate multiple circuits and flood the system..." "make the denial of service more successful than just using one entry point..." do you have any idea how of tor actually works or what you're actually saying?
tor doesn't transport udp packets, tor doesn't allow bandwidth amplification, tor doesn't allow SYN flooding... it's IMPOSSIBLE to launch a bandwidth-based ddos attack through tor or against any hidden service. here, read what arma has to say on the topic instead of me:
It doesn't make any sense to DDoS people over Tor. It wouldn't work.
the only type of ddos you can do against a hidden service is a slowloris-style attack, which by its very nature doesn't consume much bandwidth at all, you wouldn't even get CLOSE to knocking off the hidden service's entry guards, much less any other nodes in the network
i award you no points, and may god have mercy on your soul
Umm I thought we were talking about DDoS a hidden service not a clearnet site through TOR. Until you can go back in time and make it so I didn't have multiple circuits generated on multiple ports on my computer while running this script
1.<?php
2.
3. /**
4. *
5. * _ __ ___ __ _
6. * | | / /__ / | ________ / / ___ ____ (_)___ ____
7. * | | /| / / _ \ / /| | / ___/ _ \ / / / _ \/ __ `/ / __ \/ __ \
8. * | |/ |/ / __/ / ___ |/ / / __/ / /___/ __/ /_/ / / /_/ / / / / _ _ _
9. * |__/|__/\___/ /_/ |_/_/ \___/ /_____/\___/\__, /_/\____/_/ /_(_|_|_)_)
10. * /\_/ /
11. * \ _ /
12. *
13. * #OpDarknet: This script checks whether an TOR onion address is online or not.
14. * This assumes your usings TOR socks 9050 and control port 9051. Uses $_GET['host']
15. * as input parameter.
16. *
17. * #occupywallstreet, #freeanons, #freetopiary, #antisec
18. * We are Anonymous.
19. * We are Legion.
20. * We do not forgive.
21. * We do not forget.
22. * Expect us.
23. */
24.
25. /* Request a new identity through the control port */
26. function tor_new_identity($tor_ip='127.0.0.1', $control_port='9051', $auth_code='') {
27. $fp = fsockopen($tor_ip, $control_port, $errno, $errstr, 30);
28. if (!$fp) return false; //can't connect to the control port
29.
30. fputs($fp, "AUTHENTICATE $auth_code\r\n");
31. $response = fread($fp, 1024);
32. list($code, $text) = explode(' ', $response, 2);
33. if ($code != '250') return false; //authentication failed
34.
35. //send the request to for new identity
36. fputs($fp, "signal NEWNYM\r\n");
37. $response = fread($fp, 1024);
38. list($code, $text) = explode(' ', $response, 2);
39. if ($code != '250') return false; //signal failed
40.
41. fclose($fp);
42. return true;
43. }
44.
45. /* A socks 4a wrapper, returns a socket through to the destination */
46. function socks_connect ( $ip, $port, $dhost, $dport ) {
47. if ( $socket = fsockopen( $ip, $port, $err, $errstr ) ) {
48. /* Ask for a tunnel through to the destination */
49. $h = pack("H*","0401")
50. .pack( "n", $dport )
51. .pack( "H*",'0000000'.rand(1,9)."00" )
52. .$dhost.pack("H*","00" );
53. if ( !fwrite( $socket, $h ) ) die ('Connection to socks failed');
54. else return $socket;
55. } else die('Cannot establish socks connection. Check settings');
56. }
57.
58. function check( $url, $proxy ) {
59. $tmp = parse_url($url);
60. if ( !isset($tmp['host']) ) $tmp['host'] = $url;
61.
62. $fp = socks_connect( $proxy[0], $proxy[1], $url, 80 );
63. $out = "HEAD / HTTP/1.1\r\n";
64. $out .= "Host: ".$tmp['host']."\r\n"; // this will have to be broken down to URL and request
65. $out .= "Proxy-Connection: close\r\n\r\n";
66. fwrite($fp, $out);
67. $response = '';
68. while ( !feof($fp) ) {
69. $response .= fgets($fp, 128);
70. }
71. fclose($fp);
72. return $response;
73. }
74. /* How to get the correct PORT to your Tor Sock:
75. *
76. * Open your Tor browser Edit/Preferences/Advanced/Network/Settings
77. * and see the SOCKS host and port
78. */
79. $proxy = array('127.0.0.1', '9050'); // Supply your SOCKS Tor credentials
80. $response = check ( $_GET['host'] , $proxy );
81. var_dump($response); // debug
82. // do whatever we need to verify (200, 404, etc.)
83.?>
Than I don't know what to say to you... you obviously don't understand the topic
-
keep on haxing the gibson brah...
I know they are sweet ::nipple tweak::
-
There's Eradic's site. He usually has good bud. Haven't ordered from him yet, but a friend got some in and it was really good shit.
http://nhrugetj6vampcib.onion/default.htm
I've been there, and her bubble hash is usually excellent. I just got some of the Blue Dream budz
and they are to die for!! Dank as all hell. Stuff got here pretty quick. It's been 2 or 3 days each
time in transit. Hard to find a good dealer out here among the sketch, but Alexandra is the man!
Looks legit and nice but why is 112g of full melt the same price as 112 of bud?
This is toward the bottom of the page, right below shipping;
And yeah, the buds are priced close to the hash. That's just the market, and besides, I get a really great price on killer hash!
-
i've only ever had smooth transactions on BMR. there are some obvious scammers, but they don't do any real business. BMR does recommend not to FE, and if you follow that advice, you won't have any problems. there may be less vendors and products than on SR, but prices are good, transactions are transparent and there definitely aren't more scammers than on SR or any place else for that matter (apart from the obvious hitman and kiddy scammers who require FE and have 1 feedback they wrote themselves).
here's the official link: http://5onwnspjvuk7cwvk.onion/
here's also the forum link: http://fec33nz6mhzd54zj.onion/
btw, one of these huge scams that hit SR lately never happened on BMR and it wouldn't be likely to happen even if there were more users. BMR simply expects you to use your own head, and if you follow common sense and advice given, you shouldn't have a problem. the only problems that arise are from people heading over from SR and finalize early, as they are used to.
-
i've only ever had smooth transactions on BMR. there are some obvious scammers, but they don't do any real business. BMR does recommend not to FE, and if you follow that advice, you won't have any problems. there may be less vendors and products than on SR, but prices are good, transactions are transparent and there definitely aren't more scammers than on SR or any place else for that matter (apart from the obvious hitman and kiddy scammers who require FE and have 1 feedback they wrote themselves).
here's the official link: http://5onwnspjvuk7cwvk.onion/
here's also the forum link: http://fec33nz6mhzd54zj.onion/
btw, one of these huge scams that hit SR lately never happened on BMR and it wouldn't be likely to happen even if there were more users. BMR simply expects you to use your own head, and if you follow common sense and advice given, you shouldn't have a problem. the only problems that arise are from people heading over from SR and finalize early, as they are used to.
I completely agree with this.
Except there are a lot moer users on SR than on BMR so it takes that much longer to expose scammers on BMR.
Saying that, if you stay in escrow you're fine.
-
literally nothing you said is correct, i'd expect no more from somebody whose first instinct is to run to wikipedia to try to find something to prove themselves right about an extremely technical topic. "generate multiple circuits and flood the system..." "make the denial of service more successful than just using one entry point..." do you have any idea how of tor actually works or what you're actually saying?
tor doesn't transport udp packets, tor doesn't allow bandwidth amplification, tor doesn't allow SYN flooding... it's IMPOSSIBLE to launch a bandwidth-based ddos attack through tor or against any hidden service. here, read what arma has to say on the topic instead of me:
It doesn't make any sense to DDoS people over Tor. It wouldn't work.
the only type of ddos you can do against a hidden service is a slowloris-style attack, which by its very nature doesn't consume much bandwidth at all, you wouldn't even get CLOSE to knocking off the hidden service's entry guards, much less any other nodes in the network
i award you no points, and may god have mercy on your soul
That's more or less what I was saying, you can't generate enough bandwidth to knock a modern day server. The latency time along makes it too slow to generate anywhere near the type of bandwidth needed to DDoS it all the way offline. Anything I can fathom doing in sheer force through the Tor network would be probably just hurt the Tor network itself while the attack was ongoing rather than a distribute attack against a single entity.
Also I'd like to think there are some safeguards in play the network itself to realize that one source is generating huge amounts of packets and disrupting the network.
-
DDOS = distributed denial of service = a lot of different computers sending a lot of requests to a server. a modern server can't be knocked by it? even the amazon cloud had troubles with DDOS last year or so. mastercard and visa servers were DDOSed too. there are strategies against it, but most modern servers are vulnerable to that. and you might as well be DDOSed through TOR.
-
DDOS = distributed denial of service = a lot of different computers sending a lot of requests to a server. a modern server can't be knocked by it? even the amazon cloud had troubles with DDOS last year or so. mastercard and visa servers were DDOSed too. there are strategies against it, but most modern servers are vulnerable to that. and you might as well be DDOSed through TOR.
You're missing my point. Obviously servers can be DDoSed, which is making repeated connections and over and quickly so it locks up all of the available ports and/or shoots the server load high so it doesn't recover.
Tor however isn't a direct peer to peer connection when you access a website, and it tends to be slow. My point is that it would be very very difficult to reliably connect through Tor and send enough data out / make enough connections repeatedly via the Tor network to make a dent against a modern server. Maybe a shitty server from a decade ago it would be more likely, but with quad cores and 4gb+ ram, which isn't even that impressive, the amount of simultaneous connections you would need to overload it is substantial.
At the end of the day, even if you could DDoS through the Tor network, I think (a) it would significantly impact the entire Tor network, not just the site being attacked or (b) it would be a small magnitude in comparison to what standard DDoS (on things like visa / matercard as you mentioned) and the site would probably still be responsive, just slow. Tor is already slow for everybody normally, so to believe it could sustain a large number of connections to effectively DDoS a nice server doesn't seem nearly as feasible as DDoSing a regular site you can connect to via IP and with low-latency.
-
You sound like you know what you're talking about to me bro.
But then I have trouble with my programmable toaster.
-
There's Eradic's site. He usually has good bud. Haven't ordered from him yet, but a friend got some in and it was really good shit.
http://nhrugetj6vampcib.onion/default.htm
I've been there, and her bubble hash is usually excellent. I just got some of the Blue Dream budz
and they are to die for!! Dank as all hell. Stuff got here pretty quick. It's been 2 or 3 days each
time in transit. Hard to find a good dealer out here among the sketch, but Alexandra is the man!
"Cannabis products are triple vacuum sealed, using standard clean box protocol between layers. Heroin is double sealed, and pharmaceuticals are single sealed. And yeah, the buds are priced close to the hash. That's just the market, and besides, I get a really great price on killer hash! "
Looks legit and nice but why is 112g of full melt the same price as 112 of bud?
-
literally nothing you said is correct, i'd expect no more from somebody whose first instinct is to run to wikipedia to try to find something to prove themselves right about an extremely technical topic. "generate multiple circuits and flood the system..." "make the denial of service more successful than just using one entry point..." do you have any idea how of tor actually works or what you're actually saying?
tor doesn't transport udp packets, tor doesn't allow bandwidth amplification, tor doesn't allow SYN flooding... it's IMPOSSIBLE to launch a bandwidth-based ddos attack through tor or against any hidden service. here, read what arma has to say on the topic instead of me:
It doesn't make any sense to DDoS people over Tor. It wouldn't work.
the only type of ddos you can do against a hidden service is a slowloris-style attack, which by its very nature doesn't consume much bandwidth at all, you wouldn't even get CLOSE to knocking off the hidden service's entry guards, much less any other nodes in the network
i award you no points, and may god have mercy on your soul
+1 for 'I award you no points, and may god have mercy on your soul'.. fucking hilarious
-
Have meant to respond to this for a bit but always forgot but yeah, anyway, to answer the original question no, there is not. I would say that for small-to-medium bulk there is no better place than SR. Where can you find the variety or security that it provides? Not BMR lol and certainly not the other one that is just a board that frequently has listings for CP. Both are the equal of the Black Hole of Calcutta. I know there are private boards but I don't know anything about these and they seem to be a different sort of scene. For this kind of shopping experience, SR wins every time and nothing comes close.
-
Have meant to respond to this for a bit but always forgot but yeah, anyway, to answer the original question no, there is not. I would say that for small-to-medium bulk there is no better place than SR. Where can you find the variety or security that it provides? Not BMR lol and certainly not the other one that is just a board that frequently has listings for CP. Both are the equal of the Black Hole of Calcutta. I know there are private boards but I don't know anything about these and they seem to be a different sort of scene. For this kind of shopping experience, SR wins every time and nothing comes close.
It's true.
There are a number of DN Vendors... but half of them are scams.. and how much are you willing to risk to find the legit one?
Not to mention, if you feel safer reading feedback and getting some good reviews under your belt SR "Wins every time."
BMR is a joke.
FM got raided because obviously they were a joke to the DN Vending Machine.
There are a few boards that have a MINISCULE amount of legit vendors... half of them are scams.
To make a long story short.. SR reigns supreme over the Darkness that is the Net.. and DPR is God amongst men.
-
literally nothing you said is correct, i'd expect no more from somebody whose first instinct is to run to wikipedia to try to find something to prove themselves right about an extremely technical topic. "generate multiple circuits and flood the system..." "make the denial of service more successful than just using one entry point..." do you have any idea how of tor actually works or what you're actually saying?
tor doesn't transport udp packets, tor doesn't allow bandwidth amplification, tor doesn't allow SYN flooding... it's IMPOSSIBLE to launch a bandwidth-based ddos attack through tor or against any hidden service. here, read what arma has to say on the topic instead of me:
It doesn't make any sense to DDoS people over Tor. It wouldn't work.
the only type of ddos you can do against a hidden service is a slowloris-style attack, which by its very nature doesn't consume much bandwidth at all, you wouldn't even get CLOSE to knocking off the hidden service's entry guards, much less any other nodes in the network
i award you no points, and may god have mercy on your soul
+1 for 'I award you no points, and may god have mercy on your soul'.. fucking hilarious
Yea it was pretty funny, but too bad he was wrong ???
-
If silkroad goes down I'll just head over to the new silkroad. If you registered after the big rush of 2011 you won't know what i'm talking about, but the real OGs amoung us have the new site address already, and your not invited, FAG.
-
^^ Well, that's just hateful.
That's no way to treat fellow roadies...
-
If silkroad goes down I'll just head over to the new silkroad. If you registered after the big rush of 2011 you won't know what i'm talking about, but the real OGs amoung us have the new site address already, and your not invited, FAG.
LOL
-
i don't get all this "Not BMR lol" and "BMR is a joke" talk. i understand everyone has their preferences and SR definitely is the #1 site in terms of numbers, but BMR - while being a much smaller community - is a great tool for people who are still able to use their brains. those who don't will get ripped off both on SR and BMR anyway.
-
i don't get all this "Not BMR lol" and "BMR is a joke" talk. i understand everyone has their preferences and SR definitely is the #1 site in terms of numbers, but BMR - while being a much smaller community - is a great tool for people who are still able to use their brains. those who don't will get ripped off both on SR and BMR anyway.
+1
chill the fuck out guys, this is a pretty legit question if you think about it..
-
BMR sells Nuclear Warheads and AIDS infected needles.
I will stay as far away as need be.
-
and DPR is God amongst men.
+1 - lol
-
Haha! He is! He is! They are! We are!
-
There's Eradic's site. He usually has good bud. Haven't ordered from him yet, but a friend got some in and it was really good shit.
http://nhrugetj6vampcib.onion/default.htm
I've been there, and her bubble hash is usually excellent. I just got some of the Blue Dream budz
and they are to die for!! Dank as all hell. Stuff got here pretty quick. It's been 2 or 3 days each
time in transit. Hard to find a good dealer out here among the sketch, but Alexandra is the man!
That does sound rather good.
Humm, site down for a while now, made a test order and it looks like it's MIA. Also, no response to any emails about status update and all. I even donated to her "cancer" fund... Maybe I'll wait a little longer but if it was shipped priority as it was suppose to then it should have made it to me but no luck... Huh... I'm keeping my fingers crossed as I would hope that there can be honest people on the darknet without having to be supervised, just an honest person trying to make a living... I hope...
Regards
-
I feel bad for all the new people who don't know the official silkroad 2 backup site.
-
I feel bad for all the new people who don't know the official silkroad 2 backup site.
Hey slightly off topic but, WTF is the deal with your signature? :o
-
religious satire.
-
I am clearly too stoned lol very deep and dark ;)
-
So is there really a second site or are they just shiting With me like I think? I have been on silkroad since summer of 2011 and heard of no such thing
-
So is there really a second site or are they just shiting With me like I think? I have been on silkroad since summer of 2011 and heard of no such thing
There wasn't when that smart-arse comment was made, but there is now:
http://dkn255hz262ypmii.onion/index.php?topic=32771.0