Quote from: 4tron on April 11, 2013, 10:55 pmIf you connect to Wi-Fi you could use a directional antenna. Works great in high population areas. Sort of puts you outside the logical physical triangulation area, if you know what I mean.Wasn't this the Iceman's strategy? Anyway, it was the fact he choose the wrong associates that got him. It sounds like a good idea for the first hop.I think intrusion detection mechanisms (not necessarily computer related) are the best strategy. See, even if the Feds have a 1% chance of interception of your real IP, they also have infinite time to retest their assumptions. So you either make testing those assumptions really expensive and/or you have mechanisms to detect their search so you can adapt. I'm certain plenty of LE agents would work as double agents. Given my recent thread on turncoat hackers, it would be satisfying to see the shoe on the other foot. Tor does a great job of the first, making searching the search space more expensive, but we ideally need a method for the second. Perhaps a SR-Leaks database to pay off LE agents or something. That and an intelligence gathering operation to sort the signal from the garbage in open source intelligence + maybe some signals capture. At the ground level you could have custom things like license plate readers and a list of LE registrations so you can surveil them in your locale (or at the simplest level just pay the local kids to keep an eye out), but most things I can think of are either over the top and also untestable or difficult to test as to their efficiency. Unless you have some ideas, it's probably the human network that you need to hack to provide good intrusion detection consistently.Put another way, I think vendors would appreciate being approached with data that shows the sharks are circling. That would definitely be worth paying for. It could be a business model. Problem is preventing it turning into a naive protection racket. Maybe some kind of service which is part prediction market (so as to provide data for financial products to vendors like insurance in case of interception, so they have a packet + work waiting for them when they get out, or to cover legal fees), part wikileaks, part direct intelligence gathering, analysis and dissemination. Turning that into a tangible service worth paying for (not even open source wikileaks can run for free) is the key problem. We're not the Mafia, we can't beat up vendors even if it didn't go against our moral code when there is freeriders availing of protection from the information but not contributing to it's production. One way would be for advertisers of other Darknet services to pay us to make product/service placements in the literature produced, that would be quite traditional.One of the things we haven't seen yet, is a Darknet information market such as this. Sooner or later we'll have to make one in order to scale up. Connected to that is that the education of Darknet vendors needs to become more uniform and more in depth, proper training in tradecraft and black market theory. I wonder if vendors would find it worthwhile paying tuition fees for a serious grounding in a dozen technical aspects of product transport/packaging, op-sec and so on. There's a lot of really experienced people on SR who don't say very much publicly but who have serious knowledge, technical and tacit that needs to be arbitraged to create a more robust community. There's a lot of aspects to it and a lot of ideas to be tried out by different people I think. I know Wikipedia has been capable of depending on altruism and tax breaks so far, but I don't think we can register as a charity (haha!) and I don't like to produce nagware, even for a good purpose.