Rough week for the underground! Utopia has been seized by the Dutch police, BMR forums got seized by the Iranian police (anybody want to take any guesses at that one?), and now Silk Road 2.0 has been owned/possibly scammed everybody. I guess TMP will take the crown now, but for how long? I'm honestly not optimistic about the continued operation of _any_ service if Tor hidden service operators continue to operate in the manner instructed by the Tor project. There just isn't enough redundancy, servers need to be located in multiple regions simultaneously. We shall see what the future holds. R
On 02/14/2014 07:50 AM, Rich Jones wrote:
Rough week for the underground!
I honestly don't understand. Everybody knows is not hard to rent servers anonymously. And I'm not talking Bitcoin. I guess all in all, with these sites, it is more about classic police work: follow the stream of money. --mo
On 02/14/2014 10:48 AM, Moritz wrote:
I guess all in all, with these sites, it is more about classic police work: follow the stream of money.
A concrete, may-or-may not be story: I run a site, it funds itself with Bitcoin. I use hosting providers that allow Bitcoin. Wow, the infrastructure pays for itself. Happyface. You follow the stream of money, identify the hoster. Hoster willingly cooperates, or you spoof mails to me. I will eventually hit one of the embedded web bugs, images, or click a link that opens in a non-Tor browser, or open your next "PDF invoice". Oops. --mo
Decentralized hosting/computing would be nice and solve these issues. On Fri, Feb 14, 2014 at 5:20 AM, Moritz <moritz@headstrong.de> wrote:
On 02/14/2014 10:48 AM, Moritz wrote:
I guess all in all, with these sites, it is more about classic police work: follow the stream of money.
A concrete, may-or-may not be story:
I run a site, it funds itself with Bitcoin. I use hosting providers that allow Bitcoin. Wow, the infrastructure pays for itself. Happyface.
You follow the stream of money, identify the hoster. Hoster willingly cooperates, or you spoof mails to me. I will eventually hit one of the embedded web bugs, images, or click a link that opens in a non-Tor browser, or open your next "PDF invoice". Oops.
--mo
decentralized everything.... with rugged systems of laws around data protection solution yes to a degree but nothing is a guarantee... they swim around laws they no likey we need all kinds of solutions in every sector to shift out of this mass capital eating everything societal mindset On Fri, Feb 14, 2014 at 2:34 PM, Martin Becze <mjbecze@gmail.com> wrote:
Decentralized hosting/computing would be nice and solve these issues.
On Fri, Feb 14, 2014 at 5:20 AM, Moritz <moritz@headstrong.de> wrote:
On 02/14/2014 10:48 AM, Moritz wrote:
I guess all in all, with these sites, it is more about classic police work: follow the stream of money.
A concrete, may-or-may not be story:
I run a site, it funds itself with Bitcoin. I use hosting providers that allow Bitcoin. Wow, the infrastructure pays for itself. Happyface.
You follow the stream of money, identify the hoster. Hoster willingly cooperates, or you spoof mails to me. I will eventually hit one of the embedded web bugs, images, or click a link that opens in a non-Tor browser, or open your next "PDF invoice". Oops.
--mo
-- Cari Machet NYC 646-436-7795 carimachet@gmail.com AIM carismachet Syria +963-099 277 3243 Amman +962 077 636 9407 Berlin +49 152 11779219 Reykjavik +354 894 8650 Twitter: @carimachet <https://twitter.com/carimachet> 7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187 Ruh-roh, this is now necessary: This email is intended only for the addressee(s) and may contain confidential information. If you are not the intended recipient, you are hereby notified that any use of this information, dissemination, distribution, or copying of this email without permission is strictly prohibited.
At 08:39 AM 2/14/2014, Robert Hettinga wrote:
On Feb 14, 2014, at 10:34 AM, Martin Becze <mjbecze@gmail.com> wrote:
Decentralized hosting/computing would be nice and solve these issues. Need bearer cash for that. :-)
Not really - Bitcoin's sort of close enough to bearer cash for paying for hosting, but the scenario we've been looking at was - Hosting accepts bitcoins (or bearer cache or whatever.) - Narcs harass hosting provider in lieu of actual operator - Hosting provider rolls over, lets narcs bug the system and/or hosting provider's billing system - Bugged system hands the operator a bugged PDF along with the bill, or some similar trap Even a hosting provider who accepts digital bearer cash and gets paid in advance is going to do billing. I'm a bit skeptical about how you do distributed hosting adequately here, though perhaps Tahoe with enough users would work. Obfuscating the location of the hosting is easier, but somewhat-distributed hosting is going to just mean that there are a bunch of hosting providers, each of which accepts some kind of bearer payment and has some level of willingness to narc on users. Maybe 90% of the providers won't narc on their users, but that means you need to be safe against the other 10%.
Would tahoefs work to enable that? Has anyone tried? -- Kelly John Rose Toronto, ON Phone: +1 647 638-4104 Twitter: @kjrose Skype: kjrose.pr Gtalk: iam@kjro.se MSN: msn@kjro.se Document contents are confidential between original recipients and sender.
Would tahoefs work to enable that? Has anyone tried? -- Kelly John Rose Toronto, ON Phone: +1 647 638-4104 Twitter: @kjrose Skype: kjrose.pr Gtalk: iam@kjro.se MSN: msn@kjro.se Document contents are confidential between original recipients and sender.
Yes, apparently it's in use over i2p using a bunch of plugins but I've never bothered setting it up to explore. They call it the "deepnet", I think. On 14/02/14 20:54, Kelly John Rose wrote:
Would tahoefs work to enable that? Has anyone tried?
-- Please help support my crowdfunding campaign, IndieBB: Currently at 23.1% of funding goal, with 27 days left: http://igg.me/at/yourfirstgmo/x/4252296 T: @onetruecathal, @IndieBBDNA P: +3538763663185 W: http://indiebiotech.com
That's the kind of thinking I like! Something like this? [ alpha.onion ] \ [ beta.onion ] ----- [ [ tahoe1] [ tahoe2 ] .. [ tahoeN ] ] [ charlie.onion ] / Not sure if the entry points should also host Tahoe instances or if they should just be gateways. Super redundant, though! I guess the Tahoe <-> Tahoe connections would also have to be Torified as well though, otherwise if one got compromised then the rest would be exposed as well. R On Fri, Feb 14, 2014 at 1:14 PM, Cathal Garvey <cathalgarvey@cathalgarvey.me
wrote:
Yes, apparently it's in use over i2p using a bunch of plugins but I've never bothered setting it up to explore. They call it the "deepnet", I think.
On 14/02/14 20:54, Kelly John Rose wrote:
Would tahoefs work to enable that? Has anyone tried?
-- Please help support my crowdfunding campaign, IndieBB: Currently at 23.1% of funding goal, with 27 days left: http://igg.me/at/yourfirstgmo/x/4252296 T: @onetruecathal, @IndieBBDNA P: +3538763663185 W: http://indiebiotech.com
participants (8)
-
Bill Stewart
-
Cari Machet
-
Cathal Garvey
-
Kelly John Rose
-
Martin Becze
-
Moritz
-
Rich Jones
-
Robert Hettinga