Jump to content
The Corroboree

at0m

Members2
  • Content count

    903
  • Joined

  • Last visited

  • Days Won

    10

Everything posted by at0m

  1. It was originally developed for the navy, yes, but that was a long time ago and it is now a free and open source project run by the community. Here's the latest (stable) source if you want to go check it out: https://www.torproject.org/dist/tor-0.2.3.25.tar.gz or here https://gitweb.torproject.org/ EFF <3's Tor (and I <3 EFF): https://ssd.eff.org/tech/tor It's so good (which is why they still contribute funding toward the project) that the military still uses it: https://www.torproject.org/about/torusers.html.en To answer the question as to why they would release and fund it, simply put: So they can hide in plain sight. If anyone can use tor, there's no reason to assume that tor traffic is anyone important. I will, however, concede that tor is not without its issues. Tor -> clearnet is dangerous due to possibly evil exit nodes, circuits can be reversed/decrypted if enough nodes are controlled, browsers can be profiled/stained/tracked, the browser itself can have exploits and a whole host of other issues. These are NOT easy to perform though and won't be 100% successful at deanonymising/decloaking all/any users.
  2. Opposite imo. First reaction was the knee-jerk drop, yes, that was bound to happen and yes, a large attraction to bitcoin has gone but, as others have said, something else WILL fill its place. The money is just too good not to. But think about this... so they seized a couple thousand coins. Those coins can now be considered 'dead' and out of circulation (Side note: IF they get used again, we can see EXACTLY where they go) so now there's even fewer coins available (only a finite amount can be mined) meaning, in theory, the value should be on its way up once it settles. It should also be noted that, assuming you're willing to trust the FBI enough to believe the documents about DPR's arrest, he was not caught through any fault of Tor or bitcoin. It was entirely because old fashioned detective work and the stupidity of DPR.
  3. at0m

    Terence McKenna a CIA/FBI Agent?

    http://thepsychedelicist.blogspot.com.au/2013/09/my-response-to-jan-irvin-of-gnostic.html
  4. http://www.abc.net.au/news/2013-08-23/massive-drug-haul/4907052
  5. at0m

    Breaking bad last season

    I... wow... it... so good.
  6. http://www.abc.net.au/news/2013-08-29/call-for-trial-of-ecstasy-in-ptsd-treatment/4923354
  7. at0m

    Youtube vids

  8. Headline rethink: Lose weight, get high It's always amused me how the least harmful substance (in regards to illegal drugs) stays in your system for an incredible long time.
  9. at0m

    Post a random picture thread

    http://xkcd.com/1259/
  10. http://blogs.laweekly.com/informer/2013/08/marijuana_armored_truck_ban_dea.php In Los Angeles dispensaries have been victimized by violent, sometimes deadly robberies. That doesn't mean that armored cars are the solution, but some believe having armed guards pick up and deliver cash can be a deterrent. Steve DeAngelo, executive director of Harborside Health Center in Oakland: Aaron Smith, executive director of the National Cannabis Industry Association, said the move will continue to push the medical cannabis drug trade underground instead of out in the open where, he argues, it would be safer: "Look how bad cannabis is! It's causing all these violent robberies!"
  11. at0m

    Breaking bad last season

    The latest episode... wow.... Speechless.
  12. at0m

    Staying off the radar

    Far from true, to be honest. Firstly, a root kit is something used to HIDE other applications at a system level - thus keeping it out of the process monitor. MOST root kits can be detected by anyone who has a clue. The application you linked to is a completely legitimate one. It's used for remotely viewing a customer's computer so you can easily fix stuff without having to walk them through the steps they will likely mess up. It can be used maliciously, yes, but you'd be an idiot to. It'd be like wearing an enlarged version of your drivers license as a shirt whilst you rob a liquor store. Additionally, you have to download and run the application for it to do anything (unless the person sending it to you has knowledge of certain 0-days and a very specific knowledge of your setup. Webmaill or desktop client, xp or 7, etc) The "Single click" refers to a single click on the downloaded file. Though even then, it's more likely a double click. You're making them out to be a lot easier/simpler than they are but yes - there are others out there that can do far worse things. Rip stored passwords out of your browser, key log, screen view, monitor traffic, browse your files - anything you can do, it can do better. The vast majority of these though are either already detected by anti-viral software (Don't be "that guy" who doesn't use any...) or flat out don't work. In short: Be weary of the internet and it's nasties but if you use common sense and caution, you're fine. PS: Linux. Promise I'm still not a thread hijacker
  13. at0m

    Staying off the radar

    Linux on a raspberry pi with all of the data on an SD card. Never leave it running. Can easily be broken or hidden. Regarding the part in the linked post about keyloggers: If they've gotten that far, you're screwed. Sure you can encrypt images you've drawn in MSpaint but what about when you type your passphrase in to unlock your key? what if they also have screen recording/monitoring?
  14. at0m

    Staying off the radar

    As far as I'm aware, there's no vulnerabilities in tor itself - there are definitely ways to deanonymize someone using it though but they almost all rely on either the person 'leaking' connections to their real identity OR, as I mentioned above, javascript based methods. The latter is easily solved by completely disabling javascript though, which should be done anyway. The exploit in the 'sting' (which effected far more than pedo sites as FH was one of the main hosts for .onions) was pretty scary but as far as I'm aware only effected the Tor Browser Bundle running on Windows with javascript enabled. Don't entirely rely on Tor, but it's not as bad/scary/vulnerable as some agencies would like you to believe. The biggest thing to come out of that 'sting', imo, will be the fear surrounding it.\ edit: sorry OP. Despite what it looks like, I'm not here to hijack the thread
  15. at0m

    Staying off the radar

    Could you elaborate? Biggest issue with using tor to access the 'clearnet' is exit nodes can view your packets (what site you're visiting, what data you're passing through and it's passing back, etc). Perfectly fine for non-identifying stuff (Dodgy searches and such). That and Javascript. Disable that shit instantly. Regarding the topic though... it's not really possible to stay off the radar online without disconnecting entirely. Even then, others may post things about you on Facebook or something. Things like Bitcoin, VPN/proxy, Tor, GPG, using as few "cloud" services (Dropbox, Google docs, gmail, etc) as possible, and using free & open source software (see https://prism-break.org for some great examples) will make it much harder for them to link things together beyond reasonable doubt.
  16. at0m

    Breaking bad last season

    http://i.imgur.com/z5GLpdf.jpg Loved that scene with Huel. I would have done EXACTLY the same thing.
  17. http://www.globalpost.com/dispatch/news/regions/europe/130815/europe-marijuana-capital-lazarat-albania
  18. at0m

    Breaking bad last season

    Confirmed: http://i.imgur.com/nSDP9FW.jpg Blue meth in TWD.
  19. at0m

    Breaking bad last season

    https://en.wikipedia.org/wiki/Piranha_solution
  20. at0m

    Is tipz still around?

    If it's the one I'm thinking of, that was quite awhile ago wasn't it? A few months
  21. at0m

    Is tipz still around?

    Haven't heard from him in ages either :\
×