Silk Road forums
Discussion => Security => Topic started by: awhiteknight on August 04, 2013, 12:54 am
-
With the owner of Freedom Hosting arrested, what does that mean for The Silk Road? Do we now believe that the FBI have the ability to find the real addresses of Tor hidden services and is SR at risk?
I hope we get a statement from DPR about the site's security, if done properly closing SR would be a whack-a-mole exercise with no funds risked.
-
Hopefully they haven't found a way to take silkroad down.
Act like it's comprimised anyway so it shouldn't matter.
-
Anonymous easily broke into Freedomhosting to mess with the server, they did this numerous times so stands to reason that's all the FBI did. That or they also had informants because this guy was working with for-profit CP dealers (lowest forms of life) and they probably sold him out. Since they found his bank accounts, I'm thinking what happened is the FBI privately contacted him, offered him a huge amount of money because that's all feds have, lot's of money, and then followed the money trail. He probably didn't accept bitcoins
-
my only concern is that my PGP key is tied to Tormail, but I never used the Tormail service itself. I know there's a lot of people who's PGP key is tied to a Tormail addy
Even if Tormail goes down forever or are compromised, would that in any way affect future use of the PGP key?
-
just dont use tormail when it comes back up.....there are other ways to get an anonymous email addy....research it :)
-
Also, as long as you didnt incriminate yourself in any msg's on tormail...you're ok.....and if you dont go to other .onion sites hosted by FH...you're ok....stay away from CP and use your head.....be smart...be safe :)
-
heck no....you have a key set to at least 4096 it would take 90 years +
to crack your
PGP msg's ...unless you've been an idiot and leaked stuff somewhere...or ...unless your pc has been compromised...do more research.....educate yourselves....dont rely on people to tell you all this stuff...look where we are?? there are fucking idiots all around you that want nothing more than to see you go down....period...
research and educate...
;)
Peace & Hugs to you All
ChemCat
O0
-
allright, thanks. Silk Road is about the only reason I use TOr and didn't use my Tormail account except for a few times.. Didn't have any reason to as long as I could message people here. I didn't think it would be too much of a problem as long as they don't have the private key
Maybe it'll be one of those legacy things where people have PGP keys tied to an old Tormail account that doesn't work anymore
-
and if you dont go to other .onion sites hosted by FH...you're ok....
ChemCat, how does one know which sites are/were hosted by FH?
-
Make a master PGP key, use said master PGP key to sign your other keys. Master key should have no working email address "ksjdlfjkdnobody@ksljdfk3498.com". Now if Tormail goes down, you can just sign a new key to use a different email service, such as privatdemail.net or Tor PM, or your own email service.
Read what Bruce Schneier has to say about passwords and PGP encryption, 2048 is what you should be using for a variety of reasons according to him. Hashcat forums also a good resource for password breaking like the guy who cracked crypto.cat and Lastpass (useless password safe).
There's plenty of Tor mixmasters around for sending encrypted emails, or you can setup on a nymserver for free and even have it sent to Usenet and just download alt.binaries.messages to retrieve mail anonymously.
-
allright, thanks. Silk Road is about the only reason I use TOr and didn't use my Tormail account except for a few times.. Didn't have any reason to as long as I could message people here. I didn't think it would be too much of a problem as long as they don't have the private key
Maybe it'll be one of those legacy things where people have PGP keys tied to an old Tormail account that doesn't work anymore
You should have no problem. The people who ARE going to have problems are those who did not use PGP to protect their message
traffic, and/or were less than careful in what they revealed about themselves.
It's almost a given that LEA is going to be conducting relationship analyses on the database: they're intereseted in who is talking to
whom, regardless of whether or not they can read the message traffic proper. Those who failed to use PGP will be doubly-screwed.
Nightcrawler
4096R/BBF7433B 2012-09-22 Nightcrawler <Nightcrawler@SR>
PGP Key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xB8F1D88EBBF7433B (MIT clearnet keyserver)
PGP Key: https://keys.indymedia.org/pks/lookup?op=get&search=0xB8F1D88EBBF7433B (IndyMedia https: clearnet keyserver)
PGP Key: http://qtt2yl5jocgrk7nu.onion/pks/lookup?op=get&search=0xB8F1D88EBBF7433B (IndyMedia .onion keyserver)
PGP Key: http://dkn255hz262ypmii.onion/index.php?topic=174.msg633090#msg633090 (Silk Road Forums PGP Key Link)
PGP Key Fingerprint = 83F8 CAF8 7B73 C3C7 8D07 B66B AFC8 CE71 D9AF D2F0
-
does anyone know what tormail's data renetion policy was and/or account expiration (after not receiving/sending mail or after not logging in for x number of days?)
i may have created some accounts years back, as well as an account recently, i cant remember if i used it for anything really... i never used pgp on it so im just praying i never left any personal info on there, i cant imagine i would but feeling like youre unsure sucks.