Silk Road forums

Discussion => Security => Topic started by: bedtime666 on September 02, 2013, 07:37 pm

Title: Shopping for dw-only machine, what to get?
Post by: bedtime666 on September 02, 2013, 07:37 pm
So all of these things should preferably be able to be bought irl with cash. I need a machine strictly for surfing anonymously on the deep web. I am also looking into things like full disk encryption, virtual machines to operate a disk-OS off of.. I already have a tails DVD, the only thing that bugs me about this is I can't save my PGP keys.. On that thought, is there a way to operate an online keyring? Hosted, that way I can access it from any computer.. I also need help picking a main OS, I don't want to use windows..

Also this is my first post in the main forums :) Glad to be here yall, hope to find some like minded peeps.
PEace!
Title: Re: Shopping for dw-only machine, what to get?
Post by: Bazille on September 02, 2013, 08:46 pm
Dual core or quad core AMD or Intel notebook with 64-bit Xubuntu 13.04 or better. Select full disk encryption during installation. Install VirtualBox and import Whonix appliances.
You can test this type of system by completing my Whonix on 8GB USB stick tutorial, but it doesn't use full disk encryption. Only the virtual machines are encrypted.
http://dkn255hz262ypmii.onion/index.php?topic=209572.0

Xubuntu because it's quite easy to use even for Linux novices, and because the desktop is not as ugly as the standard Ubuntu desktop. It also needs less resources than Ubuntu.
Xubuntu 13.04 will not get security updates for long however, so you will have to upgrade to the next version in 2014. That's not an issue though, as you don't have to reinstall anything. Xubuntu 12.04 will get security updates until 2017, but it doesn't have the full disk encryption option during installation, unless you use the alternate installer. That's not as easy to install as Xubuntu 13.04.

Whonix because of complete persistence, virtual machine isolated from network access and because it supports Tor entry guards, unlike Tails. Not sure if Qubes would be a better alternative.

It may be better to not use SSD's in the notebook, though with newer SSD's there may be no issues with encryption? Spinning hard drive is enough anyway. Activate AMD-V or Intel VT-x in BIOS if possible. Don't use Intel Atom, due to 64-bit compatibility issues.
Title: Re: Shopping for dw-only machine, what to get?
Post by: bedtime666 on September 02, 2013, 10:27 pm
Cool dude, I was reading your tutorials earlier.. Thanks for the info.
Title: Re: Shopping for dw-only machine, what to get?
Post by: bedtime666 on September 02, 2013, 11:21 pm
Shameless self bump along with a new question; is there any advantage to accessing Tor via a public wi-fi connection? Want to obfuscate my identity and location as efficiently as possible..

Thanks :)
Title: Re: Shopping for dw-only machine, what to get?
Post by: Nightcrawler on September 03, 2013, 03:19 am
So all of these things should preferably be able to be bought irl with cash. I need a machine strictly for surfing anonymously on the deep web. I am also looking into things like full disk encryption, virtual machines to operate a disk-OS off of.. I already have a tails DVD, the only thing that bugs me about this is I can't save my PGP keys.. On that thought, is there a way to operate an online keyring? Hosted, that way I can access it from any computer.. I also need help picking a main OS, I don't want to use windows..

Also this is my first post in the main forums :) Glad to be here yall, hope to find some like minded peeps.
PEace!


Backing Up Your PGP Keys in Tails
============================

Tails is a wonderful Linux distribution aimed at the security-minded. One of its security features is the fact that when Tails is powered-down, all data created during your Tails session is erased. This is fabulous for those who do not wish to leave traces of their activities for others to find.

However, that poses a problem for anyone using PGP in Tails, as any keys that are created  (or other people's keys that are added to your PGP keyring) during your Tails session are lost when the session ends.

Accordingly, it is necessary to backup your PGP keyrings to a USB stick BEFORE shutting-down Tails.

Here's how to do it:

* Double-click on the folder labeled "Amnesia's home" on the Desktop.

  A new window will open up, with two panes: the left-most pane will contain a list of places that are accessible.

* Plug-in your USB stick that you wish to backup your PGP keys to.

  Within a few seconds, you'll see an new entry in the left-most pane; this will be your USB flashdrive.
 
  Press F3 to open-up an extra pane; key Control + H to make the hidden files visible.
 
  You will now see the contents of the 'amnesia' folder in both panes.
 
* Click on the entry for your USB stick in the left-most pane.

  You will now see the middle pane with the contents of your USB stick.
 
In the right-most pane, locate the .gnupg folder (Note the dot "." in front of gnupg)

Drag-and-drop the .gnupg folder to the middle pane (i.e. to your USB stick).

Your PGP keyrings, GPG configuration file, and trust database are now all backed-up to your USB stick.

* When you go to use Tails again, repeat this process, only this time, you drag the .gnupg folder from your USB stick to the amnesia folder, thus restoring your PGP keyrings. (In other words, you drag the .gnupg folder from the middle pane (your USB stick) to the right-most pane, the Tails Amnesia folder).

Originally written by Guru

Nightcrawler
4096R/BBF7433B 2012-09-22 Nightcrawler <Nightcrawler@SR>
PGP Key: http://qtt2yl5jocgrk7nu.onion/pks/lookup?op=get&search=0xB8F1D88EBBF7433B (IndyMedia .onion keyserver)
PGP Key: http://dkn255hz262ypmii.onion/index.php?topic=174.msg633090#msg633090     (Silk Road Forums PGP Key Link)
PGP Key Fingerprint = 83F8 CAF8 7B73 C3C7 8D07  B66B AFC8 CE71 D9AF D2F0

Title: Re: Shopping for dw-only machine, what to get?
Post by: Bazille on September 03, 2013, 06:55 am
Shameless self bump along with a new question; is there any advantage to accessing Tor via a public wi-fi connection? Want to obfuscate my identity and location as efficiently as possible..

You may want to use a VPN at a public wifi. Send all the Tor traffic through the VPN to obfuscate that you are using Tor. Download some torrent at low speed at the same time through the VPN (but not through Tor) to create some cover traffic. Wait until the torrent download starts, then start using Tor. Using a VPN at home to download porn torrents is also not suspicious. It's probably one of the main uses of VPN, apart from accessing company networks. When you use it from home the VPN provider will know you real IP adress though.

The VPN should be in a different country, which is not a Five Eyes country (USA, UK, Australia, New Zealand, Canada).