Quote from: NorthWoods on April 15, 2013, 01:37 am1) What do you recommend for removing meta data from pictures? I tried JPEg scrubber, but now it's asking me for a product key....2) Is there a bitcoin wallet that is better than the others? I have Bitcoin Qt and MultiBit. Are they really safe? I've heard stories about missing bitcoins, that makes me nervous.For your 1st question:If you're talking about using pictures such as the avatars we have here on SRF, or non-drug-related pictures you wish to upload from your machine and have available to Tor users to look at, then I recommend using ExifTool. It is a powerful command line program, so you'll need to be comfortable with opening a command line/terminal window and following instructions. It's not difficult, just intimidating for newbies, but it's powerful, flexible and free.If we are talking about photos for use on SR accounts e.g. pictures of product and so forth, then you need to purchase a new camera with cash anonymously, and *only* use it for this purpose. If you have multiple accounts or several nyms across Darknet markets you'll have to think about this a lot, otherwise you may be linkable.This is because the FBI can detect whether a picture on Facebook was taken with the same camera used to take a photo of product for SR.Digital photos contain tiny imperfections that are invisible to the naked eye, which correspond to certain cameras. This is sufficiently unique to create a unique fingerprint for every camera in the world. So if you use the camera for Flickr, Facebook, and then on SR, it is possible for LE agents to link the two and so find out your identity. It is almost certainly the case that for Facebook in particular, algorithms are run to establish camera fingerprints for all accounts as a method of intercepting child pornographers, but I expect the technology to generalize over time as a deanonymizing technique. If you have been using your normal digital camera to take photos of product, stop this practice immediately.It has to be understood that LE agents have very little to go on. They are certain to develop new techniques to perfect fingerprinting technologies as a result.Obviously you should use ExifTool on any photos taken with this too. You want a dumb digital camera, no geotag bullshit like a camera phone tends to do. Definitely avoid any Apple related product here. This is a good general rule for protecting your anonymity. The people who invent those products don't believe you have a right to anonymity no matter how much you pay, it's a culture thing. If you were a solider or intelligence officer you'd want to be using Apple products like you want a hole in the head. It is that bad, I can't even begin to elaborate on how fucked up it is.--As for your 2nd question:They are pretty much as good as each other, just with different features and GUI. It's a matter of style and how you use Bitcoin, so it's up to you.The key thing is much simpler (conceptually), you just encrypt the wallet.dat file (google for the location of this file with your particular client software) with PGP. Overwrite the plaintext version of the wallet.dat file with overwriting software in case somebody develops sophisticated malware. You'll need to be doing that per decryption. Decrypt the file when you wish to use the software and otherwise have it encrypted. This is for your "live" wallet. For your main store of bitcoins you want to have a entirely separate Bitcoin client on a thumb drive with a separate wallet.dat file encrypted ideally with a GPG4USB PGP software that is on a seperate usb stick. Copy that two or three times with different USB drives for back-up and then you can be sure your bitcoins are A: safe from thieves and B: safe from bigger thieves re: asset forfeiture. Just make sure you place them somewhere that cannot be associated with you. But that's a different discussion. Alternatively you could make Truescrypt volumes instead of using USB drives and upload the result to an anonymous cloud storage facility (again, you need to hide the fact you have access to the data somehow).Quote from: pongebb on April 15, 2013, 01:44 amDo you like bubbles?I was much enthused with them when I was smaller. Nowadays I don't think about them that much.Quote from: baconslab on April 15, 2013, 01:54 amIn what yr did Jean-Baptiste perform a transfusion of two pints of blood from a sheep to a manI thought it was during the first world war, but I see somebody else has googled the answer and it looks like it was earlier. Bizzare how such a practice went from weird science to a normal everyday occurrence in such a short time. I guess society is very adaptable, but it's still sort of freaky.Quote from: surripere on April 15, 2013, 04:02 am1. What are your thoughts on quantum crypto? Will it evolve fast enough to counteract the potentially privacy-destroying advent of the quantum computer?2. What are your favorite books on cryptography, cypherpunks, economics?1. I think quantum computers aren't going to have very much to say about public key cryptography in the end. If somebody is hiding a working QC with a large number of qubits at its disposal, then I am wrong. But there is so much anticipation about the impact of QC on crypto in general that I think effective solutions shall be devised to counter Shor's algorithm long before it is capable of factorizing composite numbers of a useful size. There exist lattice-based and multivariate-quadratic cryptographic systems which should defeat brute force quantum computing. So if RSA is broken, it's not the end of the world. I think diversity will defeat cryptanalysis in the end.2. Econ: The Wealth of Nations by Adam SmithCapitalism, Socialism and Democracy by Joseph SchumpeterEconomics in One Lesson by Henry Hazlitt The Nature of the Firm by Ronald CoaseNot many people appreciate it, but I would guess that Julian was influenced by the Chicago School of Economics a good deal, esp. Coase. His thought process is very similar.Cypherpunk:Any book by Daniel SuarezCrypto: Any book by Bruce Schneier