Silk Road forums
Discussion => Security => Topic started by: Psychonaughty on March 20, 2013, 09:42 am
-
Police came and had a package that was addressed to me with some powder in it.
Ofcourse I do not know of anything, but nobody could know I was there. There will be an investigation where it came from and who ordered it.
I did leave my phone on the table with torbot and firefox or something. Perhaps they could track this?
Any steps that need to be taken?
I of course know nothing of no drugs.
-
Shitter. Best to use a fake name and a different address if possible. Whereabouts are you?
-
swat came into my house!
but srs, just wipe ya phone. or get rid of it
-
swat came into my house!
but srs, just wipe ya phone. or get rid of it
WTF tango? pm me
-
I need a clean anything.
Strange comments here..
-
I need a clean anything.
Strange comments here..
If you do not know what the term 'clean house' means you shouldn't be ordered from SR.
Just saying...
-
We need info. Former LEO here, feel free to PM me. Did they serve a search warrant and seize your phone, or merely come to your door with questions? If they merely came to your door, did they seize your phone (we had a whole thread on the seized phone situation earlier)? Are you in the Americas, Europe, or other?
If the answer is that they didn't do a search and didn't seize your phone, then you must assume the worst. Assume that they are using that package as probable cause for a search warrant, and that you don't have long. If you don't have a shredder, that sucks. If you have any incriminating paperwork, find a way to hide it, if you must keep it. Find a way to burn it or shred it if you don't. Same with your drugs. Do a double Truecrypt setup on your computer: all the incriminating shit with a password you can remember, hidden, and a non-hidden encrypted drive with porn on it. Make the PW something obvious, like "porn".
Assuming you're in America, you may not have days; you may just have hours. You might have less than that. Or maybe they're not coming at all. But you have to get ready for a home invasion by the police. If you've never been in trouble with the law before, it won't be the SWAT team, unless it was a lot of drugs, or you own a lot of guns. If you do own a lot of guns, make sure they are all unloaded. When they come, comply fully with them, but answer none of their questions. None. They are required by law to read you the warrant. Before they ask you any questions, they will read you your rights. The next words out of your mouth should be "I have nothing to say until my attorney is present." By law, they can no longer question you. They will either arrest you for whatever they find in your house, or they will leave. Oh, and if you have balls, and they don't arrest you, you'll sue them for the damage to your door. :)
Good luck!
-
That sucks to hear my friend. Hope it all works out for you. Obviously anyone could have sent you powder in the mail :)
As for your phone, what do you mean it was on the table? They took it off your table? Or it was in the table when they came to your house?
-
I didn't know of anything and they didnt check my phone.
Everybody could have send it.
Investigation will probably start there and search for prints and lead to nowhere.
Otherwise people could just ruin other peoples lives by sending drugs through mail and then calling the cops...
They must have better things to do than to check where some grams of something came from. Like solving murders or something...
Just a bit confused because of the former cia internet detective thread where he said each time a usb stick or whatyever is plugged in is logged and screenshots are made. They can crack bitlocker etc.
Now read my thread about my 100%bitlocker encrypted drive 99.5% truecrypt without format encryption failure and now unusable.
How would they make it usable? I want my data back. And how can I see what usb thing was stuck where and when and where are those screenshots well hidden ??
-
Probably HATERS GONNA HATE send me something cheap and illegal.
But an investigations sounds like shit. Then I'd have to delete all illegal movies etc.?
Would they need a permit to search my computer/phone?
EU/NL.
-
Maybe I should ask them how they do it, so that they can show me :P
-
If they come with a warrant they will seize all of your electronic devises, phones, computers, USB's, hard drives, the lot!
You should get anything incriminating out of your home immediately (drugs, paraphernalia, empty packaging that has once contained illegal substances etc...) if you are unable to safely encrypt your computer files and it doesn't sound like you have achieved that move or redact the lot.
-
I'd physically destroy all hard drives and USB sticks you have just in case, or if you think you have time run DBAN or active kill disk on the hard drives and storage devices ASAP. Upload any data you want to save in encrypted containers somewhere on the internet, like a random email account. Computer police are much smarter than regular LE. Get any drugs you might have at your house and get them out of there, put them in a glass coffee tin, wrap waterproof tape around the seam and bury them in the nearest woods at the base of a tree you can find your way back to at a later date. I'd wipe or replace your phone too if you've been on Silk Road on that, the best way to do that quickly is to smash it and chuck the pieces in the nearest river.
Next time don't order drugs with your name on them. That might be fine if you order one package at a time to your home address occasionally for personal use, but that shit just helps them build a case if they seize multiple packages from different destinations with the same name. Use drop addresses and different names. Unless you want cops coming to your house, keep that shit away from where you sleep.
-
Why would you conduct any business on SR using a mobile phone?? As far as Bitlocker encrypting my sensitive files/info, I wouldn't trust Microsoft with this important task, ever. Take the time to learn about staying safe and what it actually entails. It's more than just downloading software to your PC and logging on. There is so much info. here on the forums covering all this.
-
Why wouldn't you?
-
A lot of people are giving you some good advice and all you keep doing is questioning them. I suggest you invest some time in the security section and read up on encryption etc instead of second guessing those who are trying to help you mate.
Using a mobile is not as secure a connection as you should be using imho. Others may disagree with that but at the end of the day mate you do what you think is best, personally I would never use a mobile phone for anything TOR or SR related but that's just me.
-
Why wouldn't you?
Many, many reasons. A couple of reasons that come to mind are -
1. After the question of using a mobile device was put to SR Support, they responded by saying (I'm paraphrasing here) that Tor was not designed for use with mobile phones and at this point, they don't recommend accessing SR on a mobile phone using Tor.
2. There is an interview with Jacob Applebaum, a world renowned hacker, where he details just a few of the many techniques which can be used by a hacker to divulge the information they require from a mobile phone. There are some ingenious ideas described in detail by Jacob which illustrate how a skilled hacker can get what they want if so desired.
Another reason iOS is insecure is because the majority of users don't disable scripts and browser add-ons when browsing using a mobile device (including Android devices), meaning your real I.P Address, Location, etc can be given away very easily using Java drive by's, Javascript exploits (could be sent to your phone hidden in phone updates), etc.
Like samesame posted, do as you please mate. You could show others the courtesy of looking through the forums first for answers to your questions before asking them for the umpteenth time. A little effort goes a long way.
-
truecrypt hasn't been safe for years now.
u can decrypt with a bootbug and c everything.
-
I'm writing this on my cell and my phone has an app called orbot that makes sense and tor accessible. also it has an option to specifically run tor through certain apps. Imo I think that the tor on a computer and tor on the phone work just as good .. I mean really you couldn't even access Sr unless you were secure right?
-
truecrypt hasn't been safe for years now.
u can decrypt with a bootbug and c everything.
can someone either explain how truecrypt is not secure or offer an alternative that DOES work?
-
I'm writing this on my cell and my phone has an app called orbot that makes sense and tor accessible. also it has an option to specifically run tor through certain apps. Imo I think that the tor on a computer and tor on the phone work just as good .. I mean really you couldn't even access Sr unless you were secure right?
Imo I think that the tor on a computer and tor on the phone work just as good .
Not true. Tor apps such as Onion Browser and Orbot/Orweb are not safe IMO to prevent any chance of you compromising your anonymity.Onion Browser, for example, doesn't allow the user to disable Javascript. Most people know the vulnerabilities in Javascript can be easily exploited to do a host of things.
I mean really you couldn't even access Sr unless you were secure right?
Anyone could download Tor, run the software and connect to SR. Doing so DOES NOT make your system secure in any way. Security is so much more and should be taken seriously if you value and want to protect what you have in life.
I don't want to sound rude mate, but your comment tells me you have no comprehension of what being secure and protecting your anonymity is and are liable to make serious mistakes in your SR activities which could very well jeopardize life as you know it. Don't under estimate the Police and what they plan to do at some stage to tackle the issue of SR. When they implement certain strategies to obtain their objectives, it will be those who are complacent in their attitude who will wear the brunt of things.
What are the benefits of running Tor through certain apps? What would this achieve for you?
-
I'm surfing using a mobile browser myself, the main problems are that you're not able to quickly wipe or eject like you can with a PC. If my door was being kicked in and I was on Tails I could just reboot my laptop and I'm clean, with my phone I have to manually wipe the thing using the recovery partition.
OP should wipe his phone, throw his drugs away and never order to that address again. Also leave negative feedback for that vendor for having shit stealth that fucking ruined his ability to order.
No need to burn your house down and smash all your computers up like people here are suggesting. Secure wipe everything and don't worry to much.
And no, your operating system doesn't take screenshots every time you insert a USB disk, though it will leave a record that some disk was attached. dban and move on, don't panic.
-
truecrypt hasn't been safe for years now.
u can decrypt with a bootbug and c everything.
can someone either explain how truecrypt is not secure or offer an alternative that DOES work?
I wouldn't say Truecrypt is not secure. TrueCrypt is vulnerable to various known attacks which are also present in other software-based disk encryption software such as BitLocker. To prevent these attacks, TrueCrypt requires users to follow various security precautions. These are documented on the Truecrypt website. Here's the link - warning CLEARNET - http://www.truecrypt.org/docs/?s=hidden-volume-precautions. :)
-
I understand where your coming from but I agree that the only problem is I'd have to factory rest my phone to wipe it, I have taken the precautions to make myself safe but I feel as long as I'm not ordering pounds or hard drugs like meth heroine cracked etc.. then the cops wouldn't even bother with me. If they did on the other hand by the time they had a warrant my phone would be gone with the wind lol I also have an option on my phone through tor to disable java script... anything else that could give away my where abouts?
-
I understand where your coming from but I agree that the only problem is I'd have to factory rest my phone to wipe it, I have taken the precautions to make myself safe but I feel as long as I'm not ordering pounds or hard drugs like meth heroine cracked etc.. then the cops wouldn't even bother with me. If they did on the other hand by the time they had a warrant my phone would be gone with the wind lol I also have an option on my phone through tor to disable java script... anything else that could give away my where abouts?
Only that your phone is a modern day GPS Tracking device and that your carrier has records of everything. Wiping your device doesn't remove any of the data on it. All it does is enable your device to write over the existing data, similar to deleting files on a PC. Even though they have been deleted, they are really just sitting idle with the computer now recognizing the deleted files as free space on your hard drive.
-
I have two phones one smartphone I use soley to get on the Internet via wifi the other I have is for the usual. The first one the service is disconnected so do you think the carrier can still see all that?
-
I understand where your coming from but I agree that the only problem is I'd have to factory rest my phone to wipe it, I have taken the precautions to make myself safe but I feel as long as I'm not ordering pounds or hard drugs like meth heroine cracked etc.. then the cops wouldn't even bother with me. If they did on the other hand by the time they had a warrant my phone would be gone with the wind lol I also have an option on my phone through tor to disable java script... anything else that could give away my where abouts?
Only that your phone is a modern day GPS Tracking device and that your carrier has records of everything. Wiping your device doesn't remove any of the data on it. All it does is enable your device to write over the existing data, similar to deleting files on a PC. Even though they have been deleted, they are really just sitting idle with the computer now recognizing the deleted files as free space on your hard drive.
using BlackBerry phones helps, but everyone knows US cell carriers will readily give to police location data/texts/pics and other information without warrants/
-
Who cares about his phone, fuck.
Get back to the story
I agree. I'd be stressed if it was me, but from what you've said so far, I'd be willing to guess the "investigation" will be placed in a file and forgotten about. They can't prove it and they know it so they won't waste much time on it. If they thought they had a case, you'd be in jail already. Just know that they really do know you ordered it and they don't buy that you didn't. Always assume they know everything and then figure out how to undermine their burden of proof.
Stop using the phone though, for real. Just download Tails from the Tor site and use that. Then you don't need anything else. It's what I will be using soon.
-
Who cares about his phone, fuck.
Get back to the story:
1. How did they know what's inside the package?. ( customs order?)
Domestic orders don't get sniffed the same way.
2. Did they attempt a controlled drop?
3. What countr are you in?
Thanks
So sorry Jedi Master for straying away from the topic. ::) Thing is, if you had bothered to actually read the posts already made in the thread, you would have noticed every question you have asked has already been answered. ??? ???
-
Thank u sir for the correction :-)
I didn't read it properly at all. :-(
I hate cellphones.
-
Me too! I wish I had a light saber. Green or blue would do me. If you hear of any coming up for sale, could you let me know? (lol) :P
Seriously, I would love one.
-
I'm surfing using a mobile browser myself, the main problems are that you're not able to quickly wipe or eject like you can with a PC. If my door was being kicked in and I was on Tails I could just reboot my laptop and I'm clean, with my phone I have to manually wipe the thing using the recovery partition.
This, coming from the same bloke who on another thread claimed the best way to get bitcoins was Dwolla>Mt.Gox. And, now you're telling us you're on the Road from a mobile! Next, you'll be advertising the new SR FB page you've started, and could we all please "like" it!
Tor was designed so that people all over the world could use the internet, even if they lived in countries that censored the fuck out of the internet. It was made with computers in mind. The browser on your phone was made with social media in mind. It was made to make your YouTube videos stream better, your FB app work better, your tweets tweet better. Tor and the browser on your phone have completely different goals. And, I doubt you can truly secure that phone's browser. And, thinking you can doesn't make it so. It's always safer to be skeptical than confident, my friend.
There are things I do on the web that would be better facilitated if I could take them on the road with me. But, that would just be damned stupid. In America, at least, your home is your castle. LE only needs reasonable suspicion to stop a car, but they need full-on probable cause to search my house. They can *have* my mobile. I won't give them a reason to search my house. You get pulled over with drugs (or an expired license, or expired plates, or the smell of weed) and a phone filled with Tor and SR and guess what you've given them? PC for a search warrant for your house. Seen it, DONE it, never want it to happen to me (when I say DONE it, I don't mean the SR part, I just mean incriminating evidence on the phone).
My advice is the same, OP. Sanitize everything. Put Die Hard in the Blu-Ray, and chill out. Either they come for you, or they don't. If they come for you, they may arrest you for attempted possession. They don't have to read you any rights until they're about to ask you any questions. They can ask you questions without reading you rights if you're not in custody. So, don't answer any of their questions, if it's just a "knock and talk," and if they arrest you, don't conversate with the cops who bring you in, no matter how "friendly" they seem. Everything you say to them will be used against you in court. If they search your house, they'll try to question you there. The only thing you should say is, "I will answer no questions without the presence of an attorney." If they bring you in, and try to question you there, you say the same thing. I hate to tell you this, but it's possible you'll spend a night or so in jail over this. Or the magistrate could release you on bond. Or on your own recognizance. If this is your first offense, that gets taken into consideration. So, have a plan for that. If you have any money set aside, cash out about $1,500, and roll it up and put it in your pocket. Keep it on you when you're at home. Also, the number of a bail bondsman. That way, you can bail yourself out, should it come to that.
Because, honestly, they don't have a case. If all they have is a package addressed to you, and they don't have any evidence that you ordered it, then it'll be damned hard to prove that you actually attempted to purchase a controlled substance. Also, check your local laws. In some states, "attempt" isn't even a crime (it is federally, btw). Either way, be mentally prepared. They are coming. And, it's going to be okay. Really, it is.
-
Tor was designed so that people all over the world could use the internet, even if they lived in countries that censored the fuck out of the internet. It was made with computers in mind. The browser on your phone was made with social media in mind. It was made to make your YouTube videos stream better, your FB app work better, your tweets tweet better. Tor and the browser on your phone have completely different goals. And, I doubt you can truly secure that phone's browser. And, thinking you can doesn't make it so. It's always safer to be skeptical than confident, my friend.
Well articulated post sleepyeyes2k2 with some great points made. +1 :). It's refreshing to read some sensible and knowledgeable advice being given to others which is accurate. As you've pointed out previously sleepyeyes2k2, you're speaking from real world experience and can offer the OP some advice on how to best deal with his predicament or at the very least, steer him in the right direction (although from different countries).
I find it a little bewildering when you have SR Support which in effect is DPR and maybe some close friends, posting in clear and concise English on the forums in response to a direct question about the issue that it is NOT safe to use Tor on any mobile device and would advise anyone against doing so. This person created Silk Road and IMO, would be in the best position to offer any advice about accessing and using the site safely. Perhaps with further development it could be used safely down the line at some stage into the future but I for one will certainly be waiting til I'm on my PC to access Tor and SR rather than using a mobile phone to do so. To be confident about the unknown is a very dangerous way of thinking IMO.
-
Please tell us what you ordered and from what vendor?
Seems like stealth isn't up to par and you don't want the same thing that's happened to you to happen to others.
-
As an aside question, I was doing cash in mail with SDM and he went dark as my payment was en route, how worried should i be? it was sent to a PO box
-
Ok. Don't use phone with some tor thing.
For all the rest I'd need to read a lot.
Even though they might know in other ways I am not a sober person, they will have this checked and then placed aside.
Why tails? I thought liberte was the better one?
What is the difference between using orbot and firefox on an android phone, and using tethering to a pc which uses vidalia and firefox? Phone goes online, makes pc be online. Pc can use tor and browser and is firewall protected.
Would that be a bad scenario?
Wouldn't a policaman on an exit node still see the same (and is always bad when unencrypted stuff goes around, even messages).
Liberte on laptop wired with no harddrive using a locked usb or cd/dvd with liberte is the way to go I think 8)
-
Yeah, I hate smart phones. I've got a dumb phone and it's still a bit too "smart" for me.
I'm not sure about Liberte, never heard of it until you mentioned it. I'll have to do some research into that.
I've always seen TAILS be highly recommended and that's the setup I am working on currently for my situation. I have been using a VM Windows 7 machine, but I am going to wipe that clean and have zero incriminating info on my computer. I'm going to have a TAILS live usb, another encrypted usb with my KeyPassX database and .onion url's, and yet another encrypted usb for anything else private or personal I might need on the go.
I just actually got TrueCrypt this AM and the KeyPass USB application. Ordered a few 8GB USB's that are currently on clearance at BestBuy (You can get 3 8GB USB's for right at $20.) I think this will be the safest thing for me now. TAILS is much faster than a VM to me as well. SR loads MUCH faster using TAILS. After I get all my data transferred and encrypted on my USB's I'm going to be backing up my system and setting it up again with the clean/hidden OS setup.
Anyway, just felt like sharing all that. Hope your situation gets squared away. It's all fun and games until the cops knock on your door. Then reality arrives quickly. Good luck!
-
What is the difference between using orbot and firefox on an android phone, and using tethering to a pc which uses vidalia and firefox?
One big difference is that I can run Vidalia and TorBrowser from a mounted encrypted drive on my PC. Potentially, you're just a traffic stop away from getting your phone seized, and orbot, firefox, and who knows what else is right there, with its dick hanging out, for all the world to see.
I appreciate what the Tor Project is doing with orbot, but if you're using Tor to buy and sell drugs, it just doesn't make sense to do it on your mobile.
-
What's got me in lost right now is, why would a cop come to his house knock on the door and show him the package ask if it was his and leave? Scare tactic? No. Was it a uniform, plain clothes, or a guy in a suit? Was he alone or did he have a partner with him that was roaming around the outside of your house? You sure it was a POLICE officer and not a post office investigator? Because they too carry badges. You should of asked him for his card. This whole thing just seems odd
-
truecrypt hasn't been safe for years now.
u can decrypt with a bootbug and c everything.
can someone either explain how truecrypt is not secure or offer an alternative that DOES work?
truecrypt hasn't been safe for years now.
u can decrypt with a bootbug and c everything.
can someone either explain how truecrypt is not secure or offer an alternative that DOES work?
I wouldn't say Truecrypt is not secure. TrueCrypt is vulnerable to various known attacks which are also present in other software-based disk encryption software such as BitLocker. To prevent these attacks, TrueCrypt requires users to follow various security precautions. These are documented on the Truecrypt website. Here's the link - warning CLEARNET - http://www.truecrypt.org/docs/?s=hidden-volume-precautions. :)
oki :P
clearweb aleart!!!
hxxp://www.stoned-vienna.com/
-
oki :P
clearweb aleart!!!
hxxp://www.stoned-vienna.com/
Maybe I didn't read enough but I'm not seeing any way for that to be executed without access to the OS or the ability to physically boot from a CD or tamper with encrypted disk so I'm unsure how that would help a police investigation. Aside from that, using Windows for anything like this is generally a bad idea if you have security in mind. Also that kind of attack is possible for nearly any kind of hard drive encryption, not just TrueCrypt, in TC's online documentation they have already taken these kinds of attacks into consideration.
"The first type of attack can be prevented as usual by good security practices, e.g. avoid running non-trusted executables with administrative privileges. The second one can be successfully neutralized by the user if he/she suspects that the encrypted hard disk might have been physically available to someone he/she does not trust, by booting TrueCrypt's Rescue Disk instead of booting it directly from the hard disk and restoring boot loader in MBR."
From Wikipedia
-
i completely understand dread but dont think about how u use ur comp!
think about how most people on here use theirs!
do u really think they have a dedicated machine that they only use for the road and
follow safety protocols? or do they use it for everything? including vendors!
think about it - we are on an illicit drug trafficking site. do u think nobody downloads
on the same comp off of a .torr? do they follow the rule or do they just say fuck it.
although u wont have a prob and i wont - will they?
download the errant .pdf and what?
will they even bother to read the link i left them to read?
there are now countermeasures but will there be no future new attacks?
different code? idk cause ima not invited nor do i care to be!
i just threw it out there as food for thought!
did u notice the invite for linux help?
EDIT: let me know u other guys - do u check ur master boot all the time???
please respond on this thread!
-
i completely understand dread but dont think about how u use ur comp!
think about how most people on here use theirs!
do u really think they have a dedicated machine that they only use for the road and
follow safety protocols? or do they use it for everything? including vendors!
think about it - we are on an illicit drug trafficking site. do u think nobody downloads
on the same comp off of a .torr? do they follow the rule or do they just say fuck it.
although u wont have a prob and i wont - will they?
download the errant .pdf and what?
will they even bother to read the link i left them to read?
there are now countermeasures but will there be no future new attacks?
different code? idk cause ima not invited nor do i care to be!
i just threw it out there as food for thought!
did u notice the invite for linux help?
EDIT: let me know u other guys - do u check ur master boot all the time???
please respond on this thread!
I agree but if folks aren't taking the time to acknowledge the many security guidelines that so many people on this website and others have helped to provide for them then that's their own fault, not TrueCrypt's. People wishing to be more secure have to make a considerable effort on their part or they'll probably just fool themselves into thinking they can install some single program and never worry about security again. There will always be new types of attacks and new ways to prevent such attacks. As it's been said, security is a journey, not a destination.
-
I'm surfing using a mobile browser myself, the main problems are that you're not able to quickly wipe or eject like you can with a PC. If my door was being kicked in and I was on Tails I could just reboot my laptop and I'm clean, with my phone I have to manually wipe the thing using the recovery partition.
This, coming from the same bloke who on another thread claimed the best way to get bitcoins was Dwolla>Mt.Gox. And, now you're telling us you're on the Road from a mobile! Next, you'll be advertising the new SR FB page you've started, and could we all please "like" it!
Tor was designed so that people all over the world could use the internet, even if they lived in countries that censored the fuck out of the internet. It was made with computers in mind. The browser on your phone was made with social media in mind. It was made to make your YouTube videos stream better, your FB app work better, your tweets tweet better. Tor and the browser on your phone have completely different goals. And, I doubt you can truly secure that phone's browser. And, thinking you can doesn't make it so. It's always safer to be skeptical than confident, my friend.
There are things I do on the web that would be better facilitated if I could take them on the road with me. But, that would just be damned stupid. In America, at least, your home is your castle. LE only needs reasonable suspicion to stop a car, but they need full-on probable cause to search my house. They can *have* my mobile. I won't give them a reason to search my house. You get pulled over with drugs (or an expired license, or expired plates, or the smell of weed) and a phone filled with Tor and SR and guess what you've given them? PC for a search warrant for your house. Seen it, DONE it, never want it to happen to me (when I say DONE it, I don't mean the SR part, I just mean incriminating evidence on the phone).
My advice is the same, OP. Sanitize everything. Put Die Hard in the Blu-Ray, and chill out. Either they come for you, or they don't. If they come for you, they may arrest you for attempted possession. They don't have to read you any rights until they're about to ask you any questions. They can ask you questions without reading you rights if you're not in custody. So, don't answer any of their questions, if it's just a "knock and talk," and if they arrest you, don't conversate with the cops who bring you in, no matter how "friendly" they seem. Everything you say to them will be used against you in court. If they search your house, they'll try to question you there. The only thing you should say is, "I will answer no questions without the presence of an attorney." If they bring you in, and try to question you there, you say the same thing. I hate to tell you this, but it's possible you'll spend a night or so in jail over this. Or the magistrate could release you on bond. Or on your own recognizance. If this is your first offense, that gets taken into consideration. So, have a plan for that. If you have any money set aside, cash out about $1,500, and roll it up and put it in your pocket. Keep it on you when you're at home. Also, the number of a bail bondsman. That way, you can bail yourself out, should it come to that.
Because, honestly, they don't have a case. If all they have is a package addressed to you, and they don't have any evidence that you ordered it, then it'll be damned hard to prove that you actually attempted to purchase a controlled substance. Also, check your local laws. In some states, "attempt" isn't even a crime (it is federally, btw). Either way, be mentally prepared. They are coming. And, it's going to be okay. Really, it is.
+1 for making me laugh for the first time all night, Officer! I cant wait to join the facebook fan page once it's up lol!!
I have to dissent on the $1500 on your person, because it's indicative of sales. Not damning evidence, but remember we want zero evidence. A friend or family member can have cash in a lock box for you. Even better is to have an atty on retainer who should have no problem holding your future bail. He'll have his own bondsman at the ready upon first hearing of your lockup.
-
+1
just food for thought for others :)
-
truecrypt hasn't been safe for years now.
u can decrypt with a bootbug and c everything.
can someone either explain how truecrypt is not secure or offer an alternative that DOES work?
truecrypt hasn't been safe for years now.
u can decrypt with a bootbug and c everything.
can someone either explain how truecrypt is not secure or offer an alternative that DOES work?
I wouldn't say Truecrypt is not secure. TrueCrypt is vulnerable to various known attacks which are also present in other software-based disk encryption software such as BitLocker. To prevent these attacks, TrueCrypt requires users to follow various security precautions. These are documented on the Truecrypt website. Here's the link - warning CLEARNET - http://www.truecrypt.org/docs/?s=hidden-volume-precautions. :)
oki :P
clearweb aleart!!!
hxxp://www.stoned-vienna.com/
Firstly, it doesn't work on 64 bit systems (although they are looking at changing this through the next update)
The Stoned Bootkit for Windows has the potential to bypass Truecrypts Full-Disk Encryption, but only if the user is lax in their knowledge of security and he/she doesn't understand the basics. This is the case for most targeted attacks being successful.
The Stoned Bootkit is able to bypass Full-Disk Encryption by attaching itself to the Master Boot Record (containing the Decryption Software which asks for a password and decrypts the drive) and over-writing it with Stone's own boot software. The MBR is NOT encrypted which is what allows this to happen.
It can only be installed three ways. Running an executable file (.exe), Physical access via a live CD / USB or through a PDF exploit, which can be overcome by either using a VM or opening the PDF on a PC never connected to the internet, since the exploit used only installs a small dropper and downloads the infector from the internet when the PDF file is opened. Better still, this can be easily avoided by not opening the file at all.
By not running any executable files or downloading and opening any PDF's, there are two options eliminated. Using a Live CD or a non-partioned encrypted USB stick to access SR will eliminate the bootkit trojan being physically installed as they don't have a MBR and should never be left behind when not in use, thus eliminating access to them by LE. The Stoned Bootkit will only work when a user is operating from an encrypted HDD installed on their PC, which is not something anyone with any brains would ever do, especially a vendor. Even then, some basic mistakes would still have to be made for the bootkit to work.
If you stick to some basic fundamentals, this bootkit should never come into play, especially for those smarter users who operate from a laptop with NO HDD installed and run a live CD to access Tor and SR. :P
-
kmf I'd like to hear you weigh in on whether or not truecrypt is effective against attacks.
-
If they took your laptop and you had tor closed, could they still get into your SR account somehow?
-
It depends. If they were to seize it immediately after you shut down Tor, your passwords could be extracted from your RAM. This is based on a very short time frame after the PC is shut down from memory. They could launch a brute force or dictionary attack in the hope of uncovering your passwords which is why your password strength from the get go is SO IMPORTANT. Your passwords could be easily seen if LE were able to install a key-stroke logger on your keyboard or PC, which would log and then send your key strokes to the attacker, uncovering a wealth of information such as passwords, personal information and even back account login's and PIN numbers. This could all be made much tougher for LE if encryption was used on your drive (not 100% secure by any means) or better still, a Live-CD or encrypted USB flash drive was used to run Tor off (better option than an encrypted HDD).
-
Hey guys !
The tormail server seems to be down and I need to get some bitcoin in. Does anybody know any other good anonymous mail ??? Sorry its off topic !
Tor Mail is not down for me. It's working as per usual. There are other methods where you don't need to use an email address to purchase coins. Try again mate, you should be fine. Here's the link I use - http://jhiwjjlqpyawmpjx.onion/
-
Hey guys !
The tormail server seems to be down and I need to get some bitcoin in. Does anybody know any other good anonymous mail ??? Sorry its off topic !
Tor Mail is not down for me. It's working as per usual. There are other methods where you don't need to use an email address to purchase coins. Try again mate, you should be fine. Here's the link I use - http://jhiwjjlqpyawmpjx.onion/
I removed my post cuz it was off topic :p want to be respectful :)
Thank you for the reply tho ! It's a go for me as well :D
I'll have to look into it, just got used that method and this issue just caught me off guard :p
Peace and LOVe