Silk Road forums
Market => Product requests => Topic started by: 420SLINGER on January 08, 2013, 11:56 pm
-
I am not a PC for dummies Type of guy
but I am no expert either and would like some expert advice I want to be as safe as I can get on silk road
BEST MONEY CAN BUY. I WILL BE READING UP ON THIS TO GET A BETTER UNDERSTANDING OF THE SUBJECT BUT
I WOULD LIKE A NARROWER VIEW OF THE SUBJECT AT THIS POINT IT WOULD TAKE ME A YEAR TO READ IT ALL.
I NEED TO FIGURE THIS OUT A LITTLE FASTER THEN THAT.
SO LADY'S AND GENTLEMAN PLEASE GIVE ME YOUR EXPERT OPINION ON THE PRODUCT BELOW.
THANK YOU.
Darknet Bootable USB (8GB)
by:uglysurfer(98) STORE http://silkroadvb5piz3r.onion/silkroad/item/267cf5f1ca
Description
Version 1.1.3
This is a professionally configured secure USB bootable drive with Linux OS (ubuntu Desktop 12.04 LTS) and i2p (Invisible Internet Project) configured to launch automatically at startup. TrueCrypt 7.1a is installed and ready for use as is GnuPG. i2p-bote plugin (secure distributed email) is installed and running. Tor browser bundle is installed with Silk Road url bookmarked. Firefox configured for secure browsing.
Version 1.1.3 now provides support for running virtual machines and virtual appliances within the Darknet Bootable USB environment using the VMware Player 4, provides the JonDo proxy and JonDoFox Firefox plugin for anonymous browsing. Using the JonDo proxy connected with Tor provides an additional layer making web surfing even more anonymous than Tor alone.
This USB is configured with two 4GB partitions. The first (bootable) partion is identical to the Darknet Bootable USB (4GB) product. The second partition is a blank 4GB (ext2) partition for your data. The data partition automatically mounts and is available on bootup as /media/data. You can use this large partition for TrueCrypt protected containers to hold your sensitive data, software programs, or whatever you like.
High-speed SanDisk USB 2.0 flash drive.
This Darknet Bootable USB has undergone an OpenVAS 4 vulnerability scan (www.openvas.org). The OpenVAS 4 Full and very deep ultimate scan configuration (adjusted for Linux) performed 11,538 different Network Vulnerability Tests (NVTs) on this system. The OpenVAS 4 scan report indicates that this Darknet Bootable USB is a LOW vulnerability risk!
The OpenVAS 4 vulnerability scan report is included on the USBs Linux Desktop and is also available upon request.
This USB is designed for those who want to quickly and easily start using the i2p network. No configuration is necessary. Just boot the USB drive and start your i2p experience.
(This bootable USB drive is for standard PC computers. Not Apple Macs.)
I have started a Darknet Products blog to keep customers updated on new products, product updates, security/privacy/anonymity news and best practices. The blog is only accessible through the i2p network. The blog is located at:
http://ucy5ffkxgcoty5wre6fx6bb7z4fauqtgb6sci6nnbjywtzf7ck7a.b32.i2p/blog/
Added bonus! Security and anonymity books in pdf format (in the Computer Forensics ebooks folder on the Linux Desktop):
- Anonymous Security Starter Handbook
- Beware the Dangers of Metadata
- Computational Forensics
- Computer-Aided Forensic Facial Comparison
- Computer and Intrusion Forensics
- Computer Forensics - A Pocket Guide
- Computer Forensics Computer Crime Scene Investigation
- Computer Forensics For Dummies
- Cyber Forensics
- Digital Forensics for Network Internet and Cloud Computing
- EnCase Computer Forensics
- Forensic Computer Crime Investigation
- Forensic Computing - A Practicioners Guide
- Hacking Exposed Computer Forensics
- Handbook of Computer Crime Investigation-Forensic Tools and Technology
- Handbook of Research on Computational Forensics Digital Crime and Investigation
-Incident Response and Computer Forensics
-Incident Response and Computer Forensics Toolkit
- Privacy Protection and Computer Forensics
- Scene of the Cybercrime Computer Forensics Handbook
- The Best Damn Cybercrime and Digital Forensics Book Period
- Virtualization for Security
-
SOMEBODY GOT TO KNOW SOMEONE THAT KNOW SOMETHING ABOUT SOMTHIN ABOUT THIS
-
I've seen several reputable members warn others never to buy something like this. Maybe one of them will chime in.
-
Buying items such as this from an anonymous market located on a Tor Hidden Service, located on the Hidden Web is just plain stupidity. There are numerous straight forward tutorials on this forum detailing how to create your own USB thumb drive and be safe in the knowledge that there isn't any potential threats such as vulnerabilities able to be exploited by an attacker on command, key-stroke loggers, malware, rootkits and malicious code included somewhere in the pre-configured software applications that come installed on the drive. Too many things could go wrong IMO, including numerous other attacks not listed here, but I would never trust anyone on an anonymous market FULL STOP, END OF STORY. Learn to make your own and be confident you've done all you can to stay safe.
-
Buying items such as this from an anonymous market located on a Tor Hidden Service, located on the Hidden Web is just plain stupidity. There are numerous straight forward tutorials on this forum detailing how to create your own USB thumb drive and be safe in the knowledge that there isn't any potential threats such as vulnerabilities able to be exploited by an attacker on command, key-stroke loggers, malware, rootkits and malicious code included somewhere in the pre-configured software applications that come installed on the drive. Too many things could go wrong IMO, including numerous other attacks not listed here, but I would never trust anyone on an anonymous market FULL STOP, END OF STORY. Learn to make your own and be confident you've done all you can to stay safe.
Right on, Wadozo.
As Wadozo said, this is easy enough to do by yourself.
-
Buying items such as this from an anonymous market located on a Tor Hidden Service, located on the Hidden Web is just plain stupidity. There are numerous straight forward tutorials on this forum detailing how to create your own USB thumb drive and be safe in the knowledge that there isn't any potential threats such as vulnerabilities able to be exploited by an attacker on command, key-stroke loggers, malware, rootkits and malicious code included somewhere in the pre-configured software applications that come installed on the drive. Too many things could go wrong IMO, including numerous other attacks not listed here, but I would never trust anyone on an anonymous market FULL STOP, END OF STORY. Learn to make your own and be confident you've done all you can to stay safe.
i have looked for these numerous straight forward tutorials you talk about but i have not found any could you point me in the right place please and thank you for your advise
-
Buying items such as this from an anonymous market located on a Tor Hidden Service, located on the Hidden Web is just plain stupidity. There are numerous straight forward tutorials on this forum detailing how to create your own USB thumb drive and be safe in the knowledge that there isn't any potential threats such as vulnerabilities able to be exploited by an attacker on command, key-stroke loggers, malware, rootkits and malicious code included somewhere in the pre-configured software applications that come installed on the drive. Too many things could go wrong IMO, including numerous other attacks not listed here, but I would never trust anyone on an anonymous market FULL STOP, END OF STORY. Learn to make your own and be confident you've done all you can to stay safe.
i have looked for these numerous straight forward tutorials you talk about but i have not found any could you point me in the right place please and thank you for your advise
This guide is one of the most comprehensive I've come across and covers everything you need and more to be confident in your security set-up.
http://clsvtzwzdgzkjda7.onion/viewtopic.php?f=20&t=3564
Some ideas can be found here by other members - http://dkn255hz262ypmii.onion/index.php?topic=101780.0
Here is a list of search results for Tails on the SR forum- http://dkn255hz262ypmii.onion/index.php?action=search2
Here is a list of search results for Truecrypt on the SR forum - http://dkn255hz262ypmii.onion/index.php?action=search2 - Or search Truecrypt on the clearnet and go their web site for their own instructions and even a beginners Guide to setting up Truecrypt.
Also, install Gpg4usb on the drive rather than any other PGP software another guide may recommend. Gpg4usb is a secure version with a high key strength. You can download it from here - http://gpg4usb.cpunk.de/download.html - and a tutorial by forum member, astor, can be found here - http://32yehzkk7jflf6r2.onion/gpg4usb/
Hope this will help you as there is enough info here to get it done properly and keep you secure when on-line. Good luck. :)
-
THANK PARTNER THAT HELPED ALOT