Silk Road forums
Discussion => Security => Topic started by: painbow on September 16, 2012, 08:49 pm
-
I'm an average buyer but I'd like to upgrade my security.
I would like to make a bootable USB that could use Tor and encrypt it with TrueCrypt.
Can someone provide a step by step guide for the SR users?
-
Sure, you can start here ---> https://tails.boum.org/getting_started/index.en.html
-
The current Tails distro allows you to use Truecrypt. Once you have Tails set up on a USB drive you can make it include Truecrypt in the Applications -> Accessories menu. At boot time, wait for the Tails menu (It will show two options: Live and Live(Failsafe)). Hit the Tab key and at the command line type in 'truecrypt' (without the quotes). When Tails boots you'll be able to use Truecrypt along with all the other apps available from the drop-down menus.
-
i think this is one of those things that if you have to ask how to do it you shouldn't be doing it at all
better to grab one of the anonymity-geared distros like liberte or aos, they were not made in a day and are generally very good at what they aim to do
-
How big of a USB drive would I need?
-
1gb should be more than enough for liberte
-
I am running on a 16g stick but it was on sale for $9. I say get as big as you can afford.
Heck, I have a case of 4g sticks I can not seem to get rid of.
-
I loaded tails on a 2gb today no problem but I think 1gb will work as the tails iso file is 763mb.
-
I loaded tails on a 2gb today no problem but I think 1gb will work as the tails iso file is 763mb.
what else did you put on the USB? just tails??
-
I loaded tails on a 2gb today no problem but I think 1gb will work as the tails iso file is 763mb.
what else did you put on the USB? just tails??
Just tails. Used the Linux USB installer to put tails on there.
-
I loaded tails on a 2gb today no problem but I think 1gb will work as the tails iso file is 763mb.
what else did you put on the USB? just tails??
Just tails. Used the Linux USB installer to put tails on there.
Can you install it straight from the windows?
-
I loaded tails on a 2gb today no problem but I think 1gb will work as the tails iso file is 763mb.
what else did you put on the USB? just tails??
Just tails. Used the Linux USB installer to put tails on there.
Can you install it straight from the windows?
Yup. Instructions here:
https://tails.boum.org/doc/first_steps/manual_usb_installation/windows/index.en.html
-
https://tails.boum.org/doc/first_steps/manual_usb_installation/windows/index.en.html
thanks man. so, are you planning on using the USB on your regular computer you use at home?
or should we still be in public Wifi type of network?
-
I am using my regular home computer. I know it would probably be a bit more secure to use a public wifi network but the chances of them watching your home network are slim to none especially if your just a buyer. Thats just my opinion though. Plus it would be way inconvienent for me to access public wifi to check sr all the time.
-
I am using my regular home computer. I know it would probably be a bit more secure to use a public wifi network but the chances of them watching your home network are slim to none especially if your just a buyer. Thats just my opinion though. Plus it would be way inconvienent for me to access public wifi to check sr all the time.
do you also use truecrypt as well?
-
Havent heard of it before now, but I'm definitley going to look into it.
-
Havent heard of it before now, but I'm definitley going to look into it.
you should use it.. it's AWESOME. it's really easy to use and you can create volumes of files (folders) with a password.
you can do a lot of things with like making hidden volumes that are password protected.
Supposedly, truecrypt is uncrackble with a strong password.
-
Just have a few questions regarding using truecrypt through tails
1. Is there anyway to actually encrypt the original USB that tails is installed into, so that when u boot into tails with the USB drive, it asks for a password?
2. Is truecrypt just used to create a secured location for sensitive files? or can it also be used to create a secure location for sensitive programs, such as TOR and PGP?
3. As a small time buyer, is truecrypt really necessary? I dont really have any sensitive information thats stored? Only thing i can think of is PGP keys, but there all things that are only used once, so keeping them is not necessary.
4. If LE got a hold of the original USB drive that tails is installed onto, but no sensitive information is held, like only thing on the USB drive is tails, tor and PGP, can they use that against me?
At this point, i just cant really see a beneficial reason to even use truecrypt
-
1 and 2. You can create an Encrypted File Container, which creates a virtual encrypted disk within a file or Encrypt a Non-System Partition/Drive which encrypts a non-system partition on an internal or external drive with the option of creating a hidden volume. Just visit the TRUECRYPT website at (clearnet URL) - http://www.truecrypt.org/docs/ to download the Beginner's Tutorial for more information.
3.It's your choice, but I would say this to you. Never be complacent about security and as the old saying goes, "It's better to be safe than sorry." Your PGP key is not only used once. You have your Public Key and your Private Key, with your Private Key needed to decrypt messages and your Public Key needed by others to send you encrypted messages.
4. It depends on how your USB Flash Drive is configured, but if not done correctly, it could potentially be a wealth of information if it was to fall into the hands of LE. If you spend some time searching through the forums, there are guides and tips on how to do this securely.
At the end of the day, we are each responsible for our own actions. You need to assess everything and make a judgement with regards to the level of risk. IMO, you can never be too safe. :)
-
1 and 2. You can create an Encrypted File Container, which creates a virtual encrypted disk within a file or Encrypt a Non-System Partition/Drive which encrypts a non-system partition on an internal or external drive with the option of creating a hidden volume. Just visit the TRUECRYPT website at (clearnet URL) - http://www.truecrypt.org/docs/ to download the Beginner's Tutorial for more information.
3.It's your choice, but I would say this to you. Never be complacent about security and as the old saying goes, "It's better to be safe than sorry." Your PGP key is not only used once. You have your Public Key and your Private Key, with your Private Key needed to decrypt messages and your Public Key needed by others to send you encrypted messages.
4. It depends on how your USB Flash Drive is configured, but if not done correctly, it could potentially be a wealth of information if it was to fall into the hands of LE. If you spend some time searching through the forums, there are guides and tips on how to do this securely.
At the end of the day, we are each responsible for our own actions. You need to assess everything and make a judgement with regards to the level of risk. IMO, you can never be too safe. :)
What im after, is a way to encrypt the original USB drive that has tails installed on it. At the moment, to access my tails OS, all you have to do is plug in the USB drive, and tails pops up. Sure I can encrypt a volume within the USB stick to store sensitive information, but what im trying to do is encrypt the original bootable section of the USB stick that has tails installed on it, so that when you first plug in the USB stick, it doesnt automatically boot up tails, instead you are prompted for a password before even entering into the OS. What would be even better is to setup 2 bootable OS's, one safe one that can be used for plausible deniability, and then a secondary OS that has TOR and PGP.
So basically what im trying to achieve, is when you plug in the USB drive, it asks for a password. If the safe fake password is entered, it boots up some stock standard safe linux distro, one that doesnt come with TOR and PGP preinstalled. But if you enter the real password, then tails boots up. Is something like this even possible to do?
I've gone through the truecrypt website back to front and cant seem to find the relevant information.
-
Hi rogerdavid,
I found this which should help you with regards to the questions you've asked.
System Encryption.
TrueCrypt can on-the-fly encrypt a system partition or entire system drive, i.e. a partition or drive where Windows is installed and from which it boots.
System encryption provides the highest level of security and privacy, because all files, including any temporary files that Windows and applications create on the system partition (typically, without your knowledge or consent), hibernation files, swap files, etc., are always permanently encrypted (even when power supply is suddenly interrupted). Windows also records large amounts of potentially sensitive data, such as the names and locations of files you open, applications you run, etc. All such log files and registry entries are always permanently encrypted too.
System encryption involves pre-boot authentication, which means that anyone who wants to gain access and use the encrypted system, read and write files stored on the system drive, etc., will need to enter the correct password each time before Windows boots (starts). Pre-boot authentication is handled by the TrueCrypt Boot Loader, which resides in the first track of the boot drive and on the TrueCrypt Rescue Disk.
Note that TrueCrypt can encrypt an existing unencrypted system partition/drive in-place while the operating system is running (while the system is being encrypted, you can use your computer as usual without any restrictions). Likewise, a TrueCrypt-encrypted system partition/drive can be decrypted in-place while the operating system is running. You can interrupt the process of encryption or decryption anytime, leave the partition/drive partially unencrypted, restart or shut down the computer, and then resume the process, which will continue from the point it was stopped.
To encrypt a system partition or entire system drive, select System > Encrypt System Partition/Drive and then follow the instructions in the wizard. To decrypt a system partition/drive, select System > Permanently Decrypt System Partition/Drive.
The mode of operation used for system encryption is XTS (see the section Modes of Operation). For further technical details of system encryption, see the section Encryption Scheme in the chapter Technical Details.
Note: By default, Windows 7 and later boot from a special small partition. The partition contains files that are required to boot the system. Windows allows only applications that have administrator privileges to write to the partition (when the system is running). TrueCrypt encrypts the partition only if you choose to encrypt the whole system drive (as opposed to choosing to encrypt only the partition where Windows is installed).
Hope that helps. :)
-
rogerdavid, here some more info written by a member which could assist you.
http://dkn255hz262ypmii.onion/index.php?topic=15383.195
-
Hi rogerdavid,
I found this which should help you with regards to the questions you've asked.
System Encryption.
TrueCrypt can on-the-fly encrypt a system partition or entire system drive, i.e. a partition or drive where Windows is installed and from which it boots.
System encryption provides the highest level of security and privacy, because all files, including any temporary files that Windows and applications create on the system partition (typically, without your knowledge or consent), hibernation files, swap files, etc., are always permanently encrypted (even when power supply is suddenly interrupted). Windows also records large amounts of potentially sensitive data, such as the names and locations of files you open, applications you run, etc. All such log files and registry entries are always permanently encrypted too.
System encryption involves pre-boot authentication, which means that anyone who wants to gain access and use the encrypted system, read and write files stored on the system drive, etc., will need to enter the correct password each time before Windows boots (starts). Pre-boot authentication is handled by the TrueCrypt Boot Loader, which resides in the first track of the boot drive and on the TrueCrypt Rescue Disk.
Note that TrueCrypt can encrypt an existing unencrypted system partition/drive in-place while the operating system is running (while the system is being encrypted, you can use your computer as usual without any restrictions). Likewise, a TrueCrypt-encrypted system partition/drive can be decrypted in-place while the operating system is running. You can interrupt the process of encryption or decryption anytime, leave the partition/drive partially unencrypted, restart or shut down the computer, and then resume the process, which will continue from the point it was stopped.
To encrypt a system partition or entire system drive, select System > Encrypt System Partition/Drive and then follow the instructions in the wizard. To decrypt a system partition/drive, select System > Permanently Decrypt System Partition/Drive.
The mode of operation used for system encryption is XTS (see the section Modes of Operation). For further technical details of system encryption, see the section Encryption Scheme in the chapter Technical Details.
Note: By default, Windows 7 and later boot from a special small partition. The partition contains files that are required to boot the system. Windows allows only applications that have administrator privileges to write to the partition (when the system is running). TrueCrypt encrypts the partition only if you choose to encrypt the whole system drive (as opposed to choosing to encrypt only the partition where Windows is installed).
Hope that helps. :)
That doesnt really answer my question, and the link you posted has no mention about anything im trying to achieve, it talks alot about bitcoins though.
What that is suggesting is turning your entire main system hard drive into a encryption. Thats not what im trying to do. I'm only trying to turn my USB into an encryption.
I'll try and explain things a little clearer.
The hardware I have at the moment is
1x standard HDD with windows 7 installed.
1x USB stick with tails installed
What im trying to achieve is 3 operating systems.
1x completely unencrypted windows 7 operating system which will be installed on the standard HDD. This will be used for normal day to day activies, checking personal emails, facebook blah blah.
1x encrypted fake/dummy linux operating system, installed onto the USB, so that I have plausible deniability.
1x hidden encrypted tails operating system, installed onto the same USB but hidden. This is were all the illegal activites will be done.
Ideally I would like it, so that when u insert the USB stick, instead of tails just automatically loading up, as it is now. it prompts for a password. If I enter the fake/dummy password, then the fake/dummy linux operating system will boot. But if i enter the real password, then the real tails operating system will boot for use of illegal activities.
Hope this has cleared things up a little
-
in4 this
-
Hi rogerdavid,
I found this which should help you with regards to the questions you've asked.
System Encryption.
TrueCrypt can on-the-fly encrypt a system partition or entire system drive, i.e. a partition or drive where Windows is installed and from which it boots.
System encryption provides the highest level of security and privacy, because all files, including any temporary files that Windows and applications create on the system partition (typically, without your knowledge or consent), hibernation files, swap files, etc., are always permanently encrypted (even when power supply is suddenly interrupted). Windows also records large amounts of potentially sensitive data, such as the names and locations of files you open, applications you run, etc. All such log files and registry entries are always permanently encrypted too.
System encryption involves pre-boot authentication, which means that anyone who wants to gain access and use the encrypted system, read and write files stored on the system drive, etc., will need to enter the correct password each time before Windows boots (starts). Pre-boot authentication is handled by the TrueCrypt Boot Loader, which resides in the first track of the boot drive and on the TrueCrypt Rescue Disk.
Note that TrueCrypt can encrypt an existing unencrypted system partition/drive in-place while the operating system is running (while the system is being encrypted, you can use your computer as usual without any restrictions). Likewise, a TrueCrypt-encrypted system partition/drive can be decrypted in-place while the operating system is running. You can interrupt the process of encryption or decryption anytime, leave the partition/drive partially unencrypted, restart or shut down the computer, and then resume the process, which will continue from the point it was stopped.
To encrypt a system partition or entire system drive, select System > Encrypt System Partition/Drive and then follow the instructions in the wizard. To decrypt a system partition/drive, select System > Permanently Decrypt System Partition/Drive.
The mode of operation used for system encryption is XTS (see the section Modes of Operation). For further technical details of system encryption, see the section Encryption Scheme in the chapter Technical Details.
Note: By default, Windows 7 and later boot from a special small partition. The partition contains files that are required to boot the system. Windows allows only applications that have administrator privileges to write to the partition (when the system is running). TrueCrypt encrypts the partition only if you choose to encrypt the whole system drive (as opposed to choosing to encrypt only the partition where Windows is installed).
Hope that helps. :)
That doesnt really answer my question, and the link you posted has no mention about anything im trying to achieve, it talks alot about bitcoins though.
What that is suggesting is turning your entire main system hard drive into a encryption. Thats not what im trying to do. I'm only trying to turn my USB into an encryption.
I'll try and explain things a little clearer.
The hardware I have at the moment is
1x standard HDD with windows 7 installed.
1x USB stick with tails installed
What im trying to achieve is 3 operating systems.
1x completely unencrypted windows 7 operating system which will be installed on the standard HDD. This will be used for normal day to day activies, checking personal emails, facebook blah blah.
1x encrypted fake/dummy linux operating system, installed onto the USB, so that I have plausible deniability.
1x hidden encrypted tails operating system, installed onto the same USB but hidden. This is were all the illegal activites will be done.
Ideally I would like it, so that when u insert the USB stick, instead of tails just automatically loading up, as it is now. it prompts for a password. If I enter the fake/dummy password, then the fake/dummy linux operating system will boot. But if i enter the real password, then the real tails operating system will boot for use of illegal activities.
Hope this has cleared things up a little
Sorry rodgerdavid, but this is all covered in the original Truecrypt link I provided.
Here is some reading for you to get started and familiarize yourself with the process. I understand you want Windows 7 on your main system, standard install for day to day activities, a Linux OS installed on the flash drive to "seem normal" and another OS installed on a hidden encrypted partition. Truecrypt gives you a 3 step password process as detailed below. Sorry for the long post.
Hidden Operating System
If your system partition or system drive is encrypted using TrueCrypt, you need to enter your pre-boot authentication password in the TrueCrypt Boot Loader screen after you turn on or restart your computer. It may happen that you are forced by somebody to decrypt the operating system or to reveal the pre-boot authentication password. There are many situations where you cannot refuse to do so (for example, due to extortion). TrueCrypt allows you to create a hidden operating system whose existence should be impossible to prove (provided that certain guidelines are followed — see below). Thus, you will not have to decrypt or reveal the password for the hidden operating system.
Before you continue reading this section, make sure you have read the section Hidden Volume and that you understand what a hidden TrueCrypt volume is.
A hidden operating system is a system (for example, Windows 7 or Windows XP) that is installed in a hidden TrueCrypt volume. It should be impossible to prove that a hidden TrueCrypt volume exists (provided that certain guidelines are followed; for more information, see the section Hidden Volume) and, therefore, it should be impossible to prove that a hidden operating system exists.
However, in order to boot a system encrypted by TrueCrypt, an unencrypted copy of the TrueCrypt Boot Loader has to be stored on the system drive or on a TrueCrypt Rescue Disk. Hence, the mere presence of the TrueCrypt Boot Loader can indicate that there is a system encrypted by TrueCrypt on the computer. Therefore, to provide a plausible explanation for the presence of the TrueCrypt Boot Loader, the TrueCrypt helps you create a second encrypted operating system, so-called decoy operating system, during the process of creation of a hidden operating system. A decoy operating system must not contain any sensitive files. Its existence is not secret (it is not installed in a hidden volume). The password for the decoy operating system can be safely revealed to anyone forcing you to disclose your pre-boot authentication password.*
You should use the decoy operating system as frequently as you use your computer. Ideally, you should use it for all activities that do not involve sensitive data. Otherwise, plausible deniability of the hidden operating system might be adversely affected (if you revealed the password for the decoy operating system to an adversary, he could find out that the system is not used very often, which might indicate the existence of a hidden operating system on your computer). Note that you can save data to the decoy system partition anytime without any risk that the hidden volume will get damaged (because the decoy system is not installed in the outer volume — see below).
There will be two pre-boot authentication passwords — one for the hidden system and the other for the decoy system. If you want to start the hidden system, you simply enter the password for the hidden system in the TrueCrypt Boot Loader screen (which appears after you turn on or restart your computer). Likewise, if you want to start the decoy system (for example, when asked to do so by an adversary), you just enter the password for the decoy system in the TrueCrypt Boot Loader screen.
Note: When you enter a pre-boot authentication password, the TrueCrypt Boot Loader first attempts to decrypt (using the entered password) the last 512 bytes of the first logical track of the system drive (where encrypted master key data for non-hidden encrypted system partitions/drives are normally stored). If it fails and if there is a partition behind the active partition, the TrueCrypt Boot Loader (even if there is actually no hidden volume on the drive) automatically tries to decrypt (using the same entered password again) the area of the first partition behind the active partition where the encrypted header of a possible hidden volume might be stored (however, if the size of the active partition is less than 256 MB, then the data is read from the second partition behind the active one, because Windows 7 and later, by default, do not boot from the partition on which they are installed). Note that TrueCrypt never knows if there is a hidden volume in advance (the hidden volume header cannot be identified, as it appears to consist entirely of random data). If the header is successfully decrypted (for information on how TrueCrypt determines that it was successfully decrypted, see the section Encryption Scheme), the information about the size of the hidden volume is retrieved from the decrypted header (which is still stored in RAM), and the hidden volume is mounted (its size also determines its offset). For further technical details, see the section Encryption Scheme in the chapter Technical Details.
When running, the hidden operating system appears to be installed on the same partition as the original operating system (the decoy system). However, in reality, it is installed within the partition behind it (in a hidden volume). All read/write operations are transparently redirected from the system partition to the hidden volume. Neither the operating system nor applications will know that data written to and read from the system partition is actually written to and read from the partition behind it (from/to a hidden volume). Any such data is encrypted and decrypted on the fly as usual (with an encryption key different from the one that is used for the decoy operating system).
Note that there will also be a third password — the one for the outer volume. It is not a pre-boot authentication password, but a regular TrueCrypt volume password. It can be safely disclosed to anyone forcing you to reveal the password for the encrypted partition where the hidden volume (containing the hidden operating system) resides. Thus, the existence of the hidden volume (and of the hidden operating system) will remain secret. If you are not sure you understand how this is possible, or what an outer volume is, please read the section Hidden Volume. The outer volume should contain some sensitive-looking files that you actually do not want to hide.
To summarize, there will be three passwords in total. Two of them can be revealed to an attacker (for the decoy system and for the outer volume). The third password, for the hidden system, must remain secret.
In the next steps, the wizard will create two TrueCrypt volumes (outer and hidden) within the first partition behind the system partition. The hidden volume will contain the hidden operating system. The size of the hidden volume is always the same as the size of the system partition. The reason is that the hidden volume will need to contain a clone of the content of the system partition (see below). Note that the clone will be encrypted using a different encryption key than the original. Before you start copying some sensitive-looking files to the outer volume, the wizard tells you the maximum recommended size of space that the files should occupy, so that there is enough free space on the outer volume for the hidden volume.
All the rest of the info can be downloaded from the link I previously posted today. :)
-
In the next steps, the wizard will create two TrueCrypt volumes (outer and hidden) within the first partition behind the system partition. The hidden volume will contain the hidden operating system. The size of the hidden volume is always the same as the size of the system partition. The reason is that the hidden volume will need to contain a clone of the content of the system partition (see below). Note that the clone will be encrypted using a different encryption key than the original. Before you start copying some sensitive-looking files to the outer volume, the wizard tells you the maximum recommended size of space that the files should occupy, so that there is enough free space on the outer volume for the hidden volume.
It still doesnt help. I've read that page you've copied about 5 times. The only thing that page explains is creating a hidden OS within the same HDD as your system drive. It specifically states you need to create a 2nd partition behind the system partition, so that it can install the hidden OS onto that 2nd partition.
Well im not trying to install the hidden OS onto a 2nd partition on the HDD, im trying to install it onto a USB.
This is where i need the help. Im relatively computer savvy, i have no problems creating hidden crypted containers and hidden crypted OS on the same disk drive.
What i cant do is install the hidden OS on the USB
I just need a guide or some help or something on how to create a hidden OS on a USB drive NOT on the main windows 7 system drive.
-
rogerdavid, this is directly from the Truecrypt FAQ section.
"How can I use TrueCrypt on a USB flash drive?
You have two options:
1. Encrypt the entire USB flash drive. However, you will not be able run TrueCrypt from the USB flash drive.
Note: Windows does not support multiple partitions on USB flash drives.
2. Create a TrueCrypt file container on the USB flash drive (for information on how to do so, see the chapter Beginner's Tutorial, in the TrueCrypt User Guide). If you leave enough space on the USB flash drive (choose an appropriate size for the TrueCrypt container), you will also be able to store TrueCrypt on the USB flash drive (along with the container – not in the container) and you will be able to run TrueCrypt from the USB flash drive (see also the chapter Portable Mode in the TrueCrypt User Guide).
Does TrueCrypt also encrypt file names and folder names?
Yes. The entire file system within a TrueCrypt volume is encrypted (including file names, folder names, and contents of every file). This applies to both types of TrueCrypt volumes – i.e., to file containers (virtual TrueCrypt disks) and to TrueCrypt-encrypted partitions/devices.
I posted the link to the TrueCrypt docs on an earlier post for you to look at. Using the free TrueCrypt software, you can create an encrypted, secure USB flash drive for use on SR.
-
rogerdavid, this is directly from the Truecrypt FAQ section.
"How can I use TrueCrypt on a USB flash drive?
You have two options:
1. Encrypt the entire USB flash drive. However, you will not be able run TrueCrypt from the USB flash drive.
Note: Windows does not support multiple partitions on USB flash drives.
2. Create a TrueCrypt file container on the USB flash drive (for information on how to do so, see the chapter Beginner's Tutorial, in the TrueCrypt User Guide). If you leave enough space on the USB flash drive (choose an appropriate size for the TrueCrypt container), you will also be able to store TrueCrypt on the USB flash drive (along with the container – not in the container) and you will be able to run TrueCrypt from the USB flash drive (see also the chapter Portable Mode in the TrueCrypt User Guide).
Does TrueCrypt also encrypt file names and folder names?
Yes. The entire file system within a TrueCrypt volume is encrypted (including file names, folder names, and contents of every file). This applies to both types of TrueCrypt volumes – i.e., to file containers (virtual TrueCrypt disks) and to TrueCrypt-encrypted partitions/devices.
I posted the link to the TrueCrypt docs on an earlier post for you to look at. Using the free TrueCrypt software, you can create an encrypted, secure USB flash drive for use on SR.
Ive had trouble doing this also
-
rogerdavid, this is directly from the Truecrypt FAQ section.
"How can I use TrueCrypt on a USB flash drive?
You have two options:
1. Encrypt the entire USB flash drive. However, you will not be able run TrueCrypt from the USB flash drive.
Note: Windows does not support multiple partitions on USB flash drives.
2. Create a TrueCrypt file container on the USB flash drive (for information on how to do so, see the chapter Beginner's Tutorial, in the TrueCrypt User Guide). If you leave enough space on the USB flash drive (choose an appropriate size for the TrueCrypt container), you will also be able to store TrueCrypt on the USB flash drive (along with the container – not in the container) and you will be able to run TrueCrypt from the USB flash drive (see also the chapter Portable Mode in the TrueCrypt User Guide).
Does TrueCrypt also encrypt file names and folder names?
Yes. The entire file system within a TrueCrypt volume is encrypted (including file names, folder names, and contents of every file). This applies to both types of TrueCrypt volumes – i.e., to file containers (virtual TrueCrypt disks) and to TrueCrypt-encrypted partitions/devices.
I posted the link to the TrueCrypt docs on an earlier post for you to look at. Using the free TrueCrypt software, you can create an encrypted, secure USB flash drive for use on SR.
I apologise if ive come across badly, and i do appreciate the help you've been putting in, but im not 100% sure you fully understand what im trying to achieve, because everytime you post something that you've copied from the truecrypt website (which ive read through about 15 times now), its never relevant to what im trying to do.
-
I totally understand what your saying mate and 100% comprehend what you are in fact looking for. The Truecrypt website explains how to create what you specified in your thread title
Re: Can someone teach me how to setup bootable USB securely with Tor & encryption?
This is what the Truecrypt option provides, and works well for me. Just for the record, here is what you previously posted, word for word, on what your trying to achieve.
What im trying to achieve is 3 operating systems.
1x completely unencrypted windows 7 operating system which will be installed on the standard HDD. This will be used for normal day to day activies, checking personal emails, facebook blah blah.
1x encrypted fake/dummy linux operating system, installed onto the USB, so that I have plausible deniability.
1x hidden encrypted tails operating system, installed onto the same USB but hidden. This is were all the illegal activites will be done.
If you can't follow written instructions, what's left to say. Truecrypt has proven to be a secure option for many people, especially if your only making occasional purchases as a buyer. Good luck to you.
-
rogerdavid, this is directly from the Truecrypt FAQ section.
"How can I use TrueCrypt on a USB flash drive?
You have two options:
1. Encrypt the entire USB flash drive. However, you will not be able run TrueCrypt from the USB flash drive.
Note: Windows does not support multiple partitions on USB flash drives.
2. Create a TrueCrypt file container on the USB flash drive (for information on how to do so, see the chapter Beginner's Tutorial, in the TrueCrypt User Guide). If you leave enough space on the USB flash drive (choose an appropriate size for the TrueCrypt container), you will also be able to store TrueCrypt on the USB flash drive (along with the container – not in the container) and you will be able to run TrueCrypt from the USB flash drive (see also the chapter Portable Mode in the TrueCrypt User Guide).
Does TrueCrypt also encrypt file names and folder names?
Yes. The entire file system within a TrueCrypt volume is encrypted (including file names, folder names, and contents of every file). This applies to both types of TrueCrypt volumes – i.e., to file containers (virtual TrueCrypt disks) and to TrueCrypt-encrypted partitions/devices.
I posted the link to the TrueCrypt docs on an earlier post for you to look at. Using the free TrueCrypt software, you can create an encrypted, secure USB flash drive for use on SR.
I apologise if ive come across badly, and i do appreciate the help you've been putting in, but im not 100% sure you fully understand what im trying to achieve, because everytime you post something that you've copied from the truecrypt website (which ive read through about 15 times now), its never relevant to what im trying to do.
Im looking for help doing this also.. and what wadozo appears to be trying to explain is how to encrypt a HDD on a PC not a bootable USB.
-
Ben, what are you on about? Truecrypt can encrypt a HDD (hard disk drive) and can run in so-called portable mode, which means that it does not have to be installed on the operating system under which it is run. All the info is there on how to do it BC, you just need to take some time out from tweaking and read it. Link is below for you (clearnet site)
http://www.truecrypt.org/docs/?s=truecrypt-portable
-
Ben, what are you on about? Truecrypt can encrypt a HDD (hard disk drive) and can run in so-called portable mode, which means that it does not have to be installed on the operating system under which it is run. All the info is there on how to do it BC, you just need to take some time out from tweaking and read it. Link is below for you (clearnet site)
http://www.truecrypt.org/docs/?s=truecrypt-portable
ive tried a few times with no success however im not that technically savvy but i thought a portable HDD like a USB is unable to handle a portable OS
-
ive tried a few times with no success however im not that technically savvy but i thought a portable HDD like a USB is unable to handle a portable OS
Well if a portable HDD didn't support a portable OS, then where would a portable OS go? Portable OS's or Live USB/CD's were created for portable HDD's. What OS's have you tried installing on your portable HDD?
-
im on the same page as ben cousins.
all the stuff that wadozo has been linking refer to installing a hidden OS onto a HDD on a PC, or creating a encrypted volume on a USB.
None of this information is helpful, since we're trying to create a hidden OS on a bootable USB, not on the HDD of the PC.
If i encrypt the entire USB drive following the instructions on the truecrypt website, i then cant run the USBinstaller to install tails onto the drive, because its no longer recognised, because its encrypted. Even if i was somehow able to run the USBinstaller and install it, I still wouldnt have plausable deniability, because only 1 OS would be installed and not a 2nd hidden one.
Lastly USB drives cant be partitioned, so i cant follow the instructions truecrypt says about installing a hidden OS onto a HDD on a PC, and apply that to a USB drive.
Wadozo i appreciate your help, but could you please be a little more helpful than just posting vague links that don't really seem to get us anywhere. As i've said earlier, ive read all the related guides on truecrypt about 15 times now, continously linking them isn't going to help.
I'm actually starting to think, that what were trying to achieve is not even possible. It would be nice if someone could come in here and verify that it is possible, and maybe give a run down on how to do it.
-
im on the same page as ben cousins.
all the stuff that wadozo has been linking refer to installing a hidden OS onto a HDD on a PC, or creating a encrypted volume on a USB.
None of this information is helpful, since we're trying to create a hidden OS on a bootable USB, not on the HDD of the PC.
If i encrypt the entire USB drive following the instructions on the truecrypt website, i then cant run the USBinstaller to install tails onto the drive, because its no longer recognised, because its encrypted. Even if i was somehow able to run the USBinstaller and install it, I still wouldnt have plausable deniability, because only 1 OS would be installed and not a 2nd hidden one.
Lastly USB drives cant be partitioned, so i cant follow the instructions truecrypt says about installing a hidden OS onto a HDD on a PC, and apply that to a USB drive.
Wadozo i appreciate your help, but could you please be a little more helpful than just posting vague links that don't really seem to get us anywhere. As i've said earlier, ive read all the related guides on truecrypt about 15 times now, continously linking them isn't going to help.
I'm actually starting to think, that what were trying to achieve is not even possible. It would be nice if someone could come in here and verify that it is possible, and maybe give a run down on how to do it.
rogerdavid,
You do not not need to encrypt the USB drive before you install tails. Tails is shipped with LUKS full disk encryption implemented since v.0.12.
**CLEARNET**Link: https://tails.boum.org/todo/remove_cryptkeeper/ **CLEARNET**
The tails installation is a pretty straightforward process. Their are 2 seperate ways to create a Tails live USB. The first one is where you burn a live CD then boot off of live CD and create a live USB from inside tails. The second you simply use the usb instllation tool from pendrivelinux. Keep in mind that not creating a live USB from inside tails will mean you have no persistant storage. This can be a good or a bad thing depending on your goals.
**CLEARNET** Live CD->Live USB Link: https://tails.boum.org/doc/first_steps/usb_installation/index.en.html **CLEARNET**
**CLEARNET** Tails USB Installer Link: https://tails.boum.org/doc/first_steps/manual_usb_installation/index.en.html **CLEARNET**
-
Their are 2 seperate ways to create a Tails live USB. The first one is where you burn a live CD then boot off of live CD and create a live USB from inside tails. The second you simply use the usb instllation tool from pendrivelinux. Keep in mind that not creating a live USB from inside tails will mean you have no persistant storage. This can be a good or a bad thing depending on your goals.
What is pendrivelinux?
Can we just install Tails straight onto the USB drive straight from Windows?
What do you mean by having no persistant storage by not making Tails USB inside Tails?
-
What is pendrivelinux?
Can we just install Tails straight onto the USB drive straight from Windows?
What do you mean by having no persistant storage by not making Tails USB inside Tails?
Pendrivelinux is a website that created a universal Linux USB Installer. Tails points you to their application if you wish to simply create an encrypted read-only USB Live OS.
Yes, although you must use pendrivelinux's tool and it will not include persistance.
I mean that nothing will save after reboot, all information will reset back to default installation. If you want to have persistance (encrypted folder that doesn't wipe at reboot) you must first create a tails DVD, boot into tails, then select create Tails USB from WITHIN tails.
-
What is pendrivelinux?
Can we just install Tails straight onto the USB drive straight from Windows?
What do you mean by having no persistant storage by not making Tails USB inside Tails?
Pendrivelinux is a website that created a universal Linux USB Installer. Tails points you to their application if you wish to simply create an encrypted read-only USB Live OS.
Yes, although you must use pendrivelinux's tool and it will not include persistance.
I mean that nothing will save after reboot, all information will reset back to default installation. If you want to have persistance (encrypted folder that doesn't wipe at reboot) you must first create a tails DVD, boot into tails, then select create Tails USB from WITHIN tails.
If I wanted to create a TrueCrypt volume on USB, do I have to install truecrypt on USB itself?
-
Doesn't LUKS have a backdoor? or is it not as secure as Truecrypt?
Also whats with all the Clearnet warnings? Tor works perfectly fine on non .onion sites
-
Doesn't LUKS have a backdoor? or is it not as secure as Truecrypt?
Also whats with all the Clearnet warnings? Tor works perfectly fine on non .onion sites
Not that I'm aware of. Well whether LUKS is better or worse than Truecrypt depends on what you're using it for. You cannot use truecrypt to FDE a linux OS, whereas LUKS will. This alone is why I prefer LUKS. I put the clearnet warnings so others know to browse from the unsafe browser on these sites. Yes it does, but myself and others prefer to seperate clear/dark in browsing patterns.
-
Doesn't LUKS have a backdoor? or is it not as secure as Truecrypt?
Also whats with all the Clearnet warnings? Tor works perfectly fine on non .onion sites
Not that I'm aware of. Well whether LUKS is better or worse than Truecrypt depends on what you're using it for. You cannot use truecrypt to FDE a linux OS, whereas LUKS will. This alone is why I prefer LUKS. I put the clearnet warnings so others know to browse from the unsafe browser on these sites. Yes it does, but myself and others prefer to seperate clear/dark in browsing patterns.
Thanks for helping with that.
Am i missing something? Encouraging people to open up a clearnet link with a normal browser is a great way for LE to post a link in here and then Log the IPs of everyone who views the link that was *only*posted in here, hence logging the IP's of SR users. This practice should not be encouraged and all Links posted in these forums should be encouraged to only be opened with the Tor Browser
-
Doesn't LUKS have a backdoor? or is it not as secure as Truecrypt?
Also whats with all the Clearnet warnings? Tor works perfectly fine on non .onion sites
Not that I'm aware of. Well whether LUKS is better or worse than Truecrypt depends on what you're using it for. You cannot use truecrypt to FDE a linux OS, whereas LUKS will. This alone is why I prefer LUKS. I put the clearnet warnings so others know to browse from the unsafe browser on these sites. Yes it does, but myself and others prefer to seperate clear/dark in browsing patterns.
Thanks for helping with that.
Am i missing something? Encouraging people to open up a clearnet link with a normal browser is a great way for LE to post a link in here and then Log the IPs of everyone who views the link that was *only*posted in here, hence logging the IP's of SR users. This practice should not be encouraged and all Links posted in these forums should be encouraged to only be opened with the Tor Browser
+ 1 Benny, good post.
Thanks mok i try to make up for my lack of technical knowledge with some logical thinking like the enemy
-
Doesn't LUKS have a backdoor? or is it not as secure as Truecrypt?
Also whats with all the Clearnet warnings? Tor works perfectly fine on non .onion sites
Not that I'm aware of. Well whether LUKS is better or worse than Truecrypt depends on what you're using it for. You cannot use truecrypt to FDE a linux OS, whereas LUKS will. This alone is why I prefer LUKS. I put the clearnet warnings so others know to browse from the unsafe browser on these sites. Yes it does, but myself and others prefer to seperate clear/dark in browsing patterns.
Thanks for helping with that.
Am i missing something? Encouraging people to open up a clearnet link with a normal browser is a great way for LE to post a link in here and then Log the IPs of everyone who views the link that was *only*posted in here, hence logging the IP's of SR users. This practice should not be encouraged and all Links posted in these forums should be encouraged to only be opened with the Tor Browser
I understand what you're incenuating but I don't see how that would matter. That link can't possibly ONLY be posted here. So they're going to capture all the IPs of the visitors to that site and filter the TOR users out? I don't see how this is probable. If it was a honeypot site created only to lure us in for our IP addresses, maybe. Plus they have no idea when you are going to follow that link after it was posted. Could be 5 secs, could be 5 months. I am all for security but I think you're leaning more towards the paranoid side of things with this theory of yours. Also if you were using best security practices it should be whoever's WIFI you're stealing's IP address and not yours that they find. I only use my own IP address to watch movies and tv shows so I appear to be the typical home internet user.
-
Doesn't LUKS have a backdoor? or is it not as secure as Truecrypt?
Also whats with all the Clearnet warnings? Tor works perfectly fine on non .onion sites
Not that I'm aware of. Well whether LUKS is better or worse than Truecrypt depends on what you're using it for. You cannot use truecrypt to FDE a linux OS, whereas LUKS will. This alone is why I prefer LUKS. I put the clearnet warnings so others know to browse from the unsafe browser on these sites. Yes it does, but myself and others prefer to seperate clear/dark in browsing patterns.
Thanks for helping with that.
Am i missing something? Encouraging people to open up a clearnet link with a normal browser is a great way for LE to post a link in here and then Log the IPs of everyone who views the link that was *only*posted in here, hence logging the IP's of SR users. This practice should not be encouraged and all Links posted in these forums should be encouraged to only be opened with the Tor Browser
I understand what you're incenuating but I don't see how that would matter. That link can't possibly ONLY be posted here. So they're going to capture all the IPs of the visitors to that site and filter the TOR users out? I don't see how this is probable. If it was a honeypot site created only to lure us in for our IP addresses, maybe. Plus they have no idea when you are going to follow that link after it was posted. Could be 5 secs, could be 5 months. I am all for security but I think you're leaning more towards the paranoid side of things with this theory of yours. Also if you were using best security practices it should be whoever's WIFI you're stealing's IP address and not yours that they find. I only use my own IP address to watch movies and tv shows so I appear to be the typical home internet user.
Wifi stealing has it own risks i think with them being able to see what you do. Stealing wifi to use tor is really going to raise some eyebrows and im preety sure its easy to work out who is stealing it if discovered. So what if they have no idea when you visit it all it has to is log IPs and they could see who is using SR, i reakcon everyone around here is waaaaaaaaay to paranoid but the scenario i mentioned is very easy to do
-
Wifi stealing has it own risks i think with them being able to see what you do. Stealing wifi to use tor is really going to raise some eyebrows and im preety sure its easy to work out who is stealing it if discovered. So what if they have no idea when you visit it all it has to is log IPs and they could see who is using SR, i reakcon everyone around here is waaaaaaaaay to paranoid but the scenario i mentioned is very easy to do
They would see encrypted traffic originating from a spoofed MAC address. Whose eyebrows are going to be raised? The people's wifi you're taking? Unless they happen to be skilled network engineers who constantly monitor their wifi traffic I highly doubt they'll ever notice. How can they see who's using SR? Your Public IP address would be different than the exit node IP address. I don't think you realize how difficult and expensive this little surveillance would be not to mention highly unlikely. At the end of the day if they went to all this trouble all they would know is that someone using a fake MAC address is using someone else's wireless to access a website that has been linked on SR.
-
Wifi stealing has it own risks i think with them being able to see what you do. Stealing wifi to use tor is really going to raise some eyebrows and im preety sure its easy to work out who is stealing it if discovered. So what if they have no idea when you visit it all it has to is log IPs and they could see who is using SR, i reakcon everyone around here is waaaaaaaaay to paranoid but the scenario i mentioned is very easy to do
They would see encrypted traffic originating from a spoofed MAC address. Whose eyebrows are going to be raised? The people's wifi you're taking? Unless they happen to be skilled network engineers who constantly monitor their wifi traffic I highly doubt they'll ever notice. How can they see who's using SR? Your Public IP address would be different than the exit node IP address. I don't think you realize how difficult and expensive this little surveillance would be not to mention highly unlikely. At the end of the day if they went to all this trouble all they would know is that someone using a fake MAC address is using someone else's wireless to access a website that has been linked on SR.
I guarantee the majority around here don't use spoofed MAC addresses, cracked wifi or anything more then the TBB.
The Scenario I mentioned involves posting a honeypot link on here that would only be posted here and never anywhere else meaning that only SR users would visit that site and then logging the IP address's that visit it outside of tor (my understanding was that Tor IP's were distinguishable but dont quote me on this). Very cheap and easy to do.
-
Wifi stealing has it own risks i think with them being able to see what you do. Stealing wifi to use tor is really going to raise some eyebrows and im preety sure its easy to work out who is stealing it if discovered. So what if they have no idea when you visit it all it has to is log IPs and they could see who is using SR, i reakcon everyone around here is waaaaaaaaay to paranoid but the scenario i mentioned is very easy to do
They would see encrypted traffic originating from a spoofed MAC address. Whose eyebrows are going to be raised? The people's wifi you're taking? Unless they happen to be skilled network engineers who constantly monitor their wifi traffic I highly doubt they'll ever notice. How can they see who's using SR? Your Public IP address would be different than the exit node IP address. I don't think you realize how difficult and expensive this little surveillance would be not to mention highly unlikely. At the end of the day if they went to all this trouble all they would know is that someone using a fake MAC address is using someone else's wireless to access a website that has been linked on SR.
I guarantee the majority around here don't use spoofed MAC addresses, cracked wifi or anything more then the TBB.
The Scenario I mentioned involves posting a honeypot link on here that would only be posted here and never anywhere else meaning that only SR users would visit that site and then logging the IP address's that visit it outside of tor (my understanding was that Tor IP's were distinguishable but dont quote me on this). Very cheap and easy to do.
I would still recommend using
http://ip-check.info
and make sure that anybody using Silk Road has all the Attributes' Ratings on ip-check.info with at least Medium security (most of the Attributes should be Green. If you are browsing this with any of your Attribute's Ratings with a Red (meaning Critical Security flaw) then you should seriously solve that problem ASAP or else you risk your real IP being uncovered. And nobody on Silk Road would want that, am I right?
Keep in mind that the majority of SR users are buyers, so naturally they don't need any more security than TBB although they should still make sure that all their TBB security settings, according to ip-check.info, are optimized for anonymousity.
Proxy Judge is another good site for testing your security/anonymousity settings for TOR on.
http://www.stilllistener.addr.com
-
We've seen this come up again and again.. think there is a market here for pre-setup USB drives like this? I just wanted to chime in and say that Wadozo is 100% correct and the information he posted, while written for an internal HDD, can be used in regard to a bootable USB drive as well.
For someone who claims to be 'savvy', this is a pretty simple operation to perform.
This is being typed from such a 'hidden' OS right now.
.Hades.
-
I guarantee the majority around here don't use spoofed MAC addresses, cracked wifi or anything more then the TBB.
The Scenario I mentioned involves posting a honeypot link on here that would only be posted here and never anywhere else meaning that only SR users would visit that site and then logging the IP address's that visit it outside of tor (my understanding was that Tor IP's were distinguishable but dont quote me on this). Very cheap and easy to do.
Maybe so, but this is the security sub-forum and I hope that everyone in it is doing everything they can to remain anonymous.
That is the scenario I was picturing when you were describing it. Maybe it is easy, but what does it prove? From what I understand they're more interested in following the money as seen in the case against TFM.
-
We've seen this come up again and again.. think there is a market here for pre-setup USB drives like this? I just wanted to chime in and say that Wadozo is 100% correct and the information he posted, while written for an internal HDD, can be used in regard to a bootable USB drive as well.
For someone who claims to be 'savvy', this is a pretty simple operation to perform.
This is being typed from such a 'hidden' OS right now.
.Hades.
buying hardware or software off a marketplace mainly used for illegal goods is a terrible idea as it would be easy for anyone, not just, LE to hide malicious script or software in them.
profiling and following the Money is what LE does best not trying to crack programs that were designed by them to help people in other countries whose government denies them much more then the choice to put whatever substance they want into their bodies.
BC
-
We've seen this come up again and again.. think there is a market here for pre-setup USB drives like this? I just wanted to chime in and say that Wadozo is 100% correct and the information he posted, while written for an internal HDD, can be used in regard to a bootable USB drive as well.
For someone who claims to be 'savvy', this is a pretty simple operation to perform.
This is being typed from such a 'hidden' OS right now.
.Hades.
I agree, he is not "savvy", but unfortunately, he is not the only one..... :(
-
We've seen this come up again and again.. think there is a market here for pre-setup USB drives like this? I just wanted to chime in and say that Wadozo is 100% correct and the information he posted, while written for an internal HDD, can be used in regard to a bootable USB drive as well.
For someone who claims to be 'savvy', this is a pretty simple operation to perform.
This is being typed from such a 'hidden' OS right now.
.Hades.
I agree, he is not "savvy", but unfortunately, he is not the only one..... :(
read my last post ^^^ and the thread i tore you apart in and i think anyone will agree while not great with computers, I am preety savvy
-
We've seen this come up again and again.. think there is a market here for pre-setup USB drives like this? I just wanted to chime in and say that Wadozo is 100% correct and the information he posted, while written for an internal HDD, can be used in regard to a bootable USB drive as well.
For someone who claims to be 'savvy', this is a pretty simple operation to perform.
This is being typed from such a 'hidden' OS right now.
.Hades.
I agree, he is not "savvy", but unfortunately, he is not the only one..... :(
read my last post ^^^ and the thread i tore you apart in and i think anyone will agree while not great with computers, I am preety savvy
JESUS FUCKING CHRIST BEN, What are you talking about??? This has absolutely NOTHING TO DO WITH YOU!!!! The post written by Aidoneus, in which he refers to
For someone who claims to be 'savvy', this is a pretty simple operation to perform.
He is referring to another member, rogerdavid, who wrote this
This is where i need the help. Im relatively computer savvy, i have no problems creating hidden crypted containers and hidden crypted OS on the same disk drive.
The thread you tore me apart in?? Pleeeease, give me a break. ::) Post a link Ben for others to read if your so confident!! The only thing your savvy at is pulling your dick! FUCKING Wanker!
-
Haha. I actually wasn't try to dig at anyone... Simply saying that the original issue the OP posted isn't very complicated and there is plenty of documentation. Also after restating the problem 4 times, I'm positive that everyone knows what he is asking.
As far as security for people to buy such a product... I completely understand your concerns BenCousins. Too bad, though - I could buy a box of flash drives and ghost a bunch a day. Also, we're already vending illicit substances... pretty sure we are NOT LE. #justsayin :P
.Hades.
-
Haha. I actually wasn't try to dig at anyone... Simply saying that the original issue the OP posted isn't very complicated and there is plenty of documentation. Also after restating the problem 4 times, I'm positive that everyone knows what he is asking.
As far as security for people to buy such a product... I completely understand your concerns BenCousins. Too bad, though - I could buy a box of flash drives and ghost a bunch a day. Also, we're already vending illicit substances... pretty sure we are NOT LE. #justsayin :P
.Hades.
I knew exactly what you were saying Aidoneus, and so would anyone who read the posts in the thread before making a comment about it. Ben has a history of posting comments which bare no relevance to the topic at hand.
There is already a vendor, SecuritySolution, selling "Secure Pre-Configured Custom USB's and DVD's". With only 26 sales from 10 mths of vending, there doesn't seem to be a big market for them, understandably IMO. ;D
http://silkroadvb5piz3r.onion/index.php/silkroad/user/f8e1b423b2
-
I've seen their listings. I'm also absolutely inclined to agree with you about the market.
It's worth noting, however, that they don't sell anything illegal either. That kind of raises a flag IMO.
.Hades.
-
I've seen their listings. I'm also absolutely inclined to agree with you about the market.
It's worth noting, however, that they don't sell anything illegal either. That kind of raises a flag IMO.
.Hades.
That's true, hence they only have 26 sales. :)
-
Haha. I actually wasn't try to dig at anyone... Simply saying that the original issue the OP posted isn't very complicated and there is plenty of documentation. Also after restating the problem 4 times, I'm positive that everyone knows what he is asking.
As far as security for people to buy such a product... I completely understand your concerns BenCousins. Too bad, though - I could buy a box of flash drives and ghost a bunch a day. Also, we're already vending illicit substances... pretty sure we are NOT LE. #justsayin :P
.Hades.
its not just LE you have to worry about, its keylogging software that could be used to steal your coins without any sort of legal consequence as you cant exactly report your drug money being stolen.
heres the link to the thread for anyone who wants to have a laugh at wadozo:
http://dkn255hz262ypmii.onion/index.php?topic=46307.0
BC
-
Haha. I actually wasn't try to dig at anyone... Simply saying that the original issue the OP posted isn't very complicated and there is plenty of documentation. Also after restating the problem 4 times, I'm positive that everyone knows what he is asking.
As far as security for people to buy such a product... I completely understand your concerns BenCousins. Too bad, though - I could buy a box of flash drives and ghost a bunch a day. Also, we're already vending illicit substances... pretty sure we are NOT LE. #justsayin :P
.Hades.
its not just LE you have to worry about, its keylogging software that could be used to steal your coins without any sort of legal consequence as you cant exactly report your drug money being stolen.
heres the link to the thread for anyone who wants to have a laugh at wadozo:
http://dkn255hz262ypmii.onion/index.php?topic=46307.0
BC
Ben, your doing it again! Posting dribble which has NO RELEVANCE TO THE THREAD TOPIC! What does a keystroke logger and having bitcoins stolen have to do with the thread topic "Re: Can someone teach me how to seetup bootable USB securely with Tor & encryption?" Posting a link to that thread is absolutely bewildering Ben. You already look like a fool so do so at your own peril. Over 90% of your posts either don't make any sense, contain nothing of any substance and don't relate to the thread topic at all. :( ??? ??? ::) WTF!
-
Haha. I actually wasn't try to dig at anyone... Simply saying that the original issue the OP posted isn't very complicated and there is plenty of documentation. Also after restating the problem 4 times, I'm positive that everyone knows what he is asking.
As far as security for people to buy such a product... I completely understand your concerns BenCousins. Too bad, though - I could buy a box of flash drives and ghost a bunch a day. Also, we're already vending illicit substances... pretty sure we are NOT LE. #justsayin :P
.Hades.
its not just LE you have to worry about, its keylogging software that could be used to steal your coins without any sort of legal consequence as you cant exactly report your drug money being stolen.
heres the link to the thread for anyone who wants to have a laugh at wadozo:
http://dkn255hz262ypmii.onion/index.php?topic=46307.0
BC
Ben, your doing it again! Posting dribble which has NO RELEVANCE TO THE THREAD TOPIC! What does a keystroke logger and having bitcoins stolen have to do with the thread topic "Re: Can someone teach me how to seetup bootable USB securely with Tor & encryption?" Posting a link to that thread is absolutely bewildering Ben. You already look like a fool so do so at your own peril. Over 90% of your posts either don't make any sense, contain nothing of any substance and don't relate to the thread topic at all. :( ??? ??? ::) WTF!
lol dude are you still posting i understand you have a mental disability and thats not your fault but its probably best if you stopped posting to save yourself further embarrassment
-
Haha. I actually wasn't try to dig at anyone... Simply saying that the original issue the OP posted isn't very complicated and there is plenty of documentation. Also after restating the problem 4 times, I'm positive that everyone knows what he is asking.
As far as security for people to buy such a product... I completely understand your concerns BenCousins. Too bad, though - I could buy a box of flash drives and ghost a bunch a day. Also, we're already vending illicit substances... pretty sure we are NOT LE. #justsayin :P
.Hades.
its not just LE you have to worry about, its keylogging software that could be used to steal your coins without any sort of legal consequence as you cant exactly report your drug money being stolen.
heres the link to the thread for anyone who wants to have a laugh at wadozo:
http://dkn255hz262ypmii.onion/index.php?topic=46307.0
BC
Ben, your doing it again! Posting dribble which has NO RELEVANCE TO THE THREAD TOPIC! What does a keystroke logger and having bitcoins stolen have to do with the thread topic "Re: Can someone teach me how to seetup bootable USB securely with Tor & encryption?" Posting a link to that thread is absolutely bewildering Ben. You already look like a fool so do so at your own peril. Over 90% of your posts either don't make any sense, contain nothing of any substance and don't relate to the thread topic at all. :( ??? ??? ::) WTF!
lol dude are you still posting i understand you have a mental disability and thats not your fault but its probably best if you stopped posting to save yourself further embarrassment
Embarrassment! Fuck, do you even know what being embarrassed is Ben? Obviously not, as you continue to post more and more irrelevant dribble, devoid of any substance. Or is this all you've got Ben, NOTHING!! You might just have invented the Clayton's Post. It's the post your writing when your not writing a post. :(
-
Haha. I actually wasn't try to dig at anyone... Simply saying that the original issue the OP posted isn't very complicated and there is plenty of documentation. Also after restating the problem 4 times, I'm positive that everyone knows what he is asking.
As far as security for people to buy such a product... I completely understand your concerns BenCousins. Too bad, though - I could buy a box of flash drives and ghost a bunch a day. Also, we're already vending illicit substances... pretty sure we are NOT LE. #justsayin :P
.Hades.
its not just LE you have to worry about, its keylogging software that could be used to steal your coins without any sort of legal consequence as you cant exactly report your drug money being stolen.
heres the link to the thread for anyone who wants to have a laugh at wadozo:
http://dkn255hz262ypmii.onion/index.php?topic=46307.0
BC
Ben, your doing it again! Posting dribble which has NO RELEVANCE TO THE THREAD TOPIC! What does a keystroke logger and having bitcoins stolen have to do with the thread topic "Re: Can someone teach me how to seetup bootable USB securely with Tor & encryption?" Posting a link to that thread is absolutely bewildering Ben. You already look like a fool so do so at your own peril. Over 90% of your posts either don't make any sense, contain nothing of any substance and don't relate to the thread topic at all. :( ??? ??? ::) WTF!
lol dude are you still posting i understand you have a mental disability and thats not your fault but its probably best if you stopped posting to save yourself further embarrassment
Embarrassment! Fuck, do you even know what being embarrassed is Ben? Obviously not, as you continue to post more and more irrelevant dribble, devoid of any substance. Or is this all you've got Ben, NOTHING!! You might just have invented the Clayton's Post. It's the post your writing
Are you still going? You dont get it do you. The majority of people in the other thread have pointed out to you how wrong you are (all of them most likely way younger then you) and ive torn you to shreds for all too see and you continue to post attempting to use mine and other peoples lines in some sort of vague attempt to insult me but your only digging yourself a deeper hole. Give up
-
Are you still going? You dont get it do you. The majority of people in the other thread have pointed out to you how wrong you are (all of them most likely way younger then you) and ive torn you to shreds for all too see and you continue to post attempting to use mine and other peoples lines in some sort of vague attempt to insult me but your only digging yourself a deeper hole. Give up
Correct me if I'm wrong, but it's YOU that can't even follow the instructions on how to create an Encrypted USB Drive?? That is the Topic of this thread after all!! Alright champ, here's your opportunity to make a point and prove me wrong. Post for us all to see any examples of me using a line "stolen" from a post written by you?? PLEEEEASE Ben, your vocabulary consists of a few words at best. PUT UP OR SHUT UP!! I don't have to insult you Ben, you do so each and every time you post your dribble. >:( :( :o ??? ::)
-
Their is a lot of things under digital goods about this
-
This is still going? o.O lol
.Hades.
-
Aidoneus, I was intending on letting it go but the this dickhead has now accused me of (In Ben's words) " attempting to use mine and other peoples lines in some sort of vague attempt to insult me." This bloke is not the full quid. ::) So I have asked him to PUT UP OR SHUT UP!! If he posts evidence of this, I'll gladly apologize and move on. However, it's just complete bullshit and a lie from a wanker who in his hey day, would have trouble spelling the word goat, still puts any teeth that fall out under his pillow for the Tooth Fairy and writes to Santa every year and complains he never gets a reply! ???
-
Are you still going? You dont get it do you. The majority of people in the other thread have pointed out to you how wrong you are (all of them most likely way younger then you) and ive torn you to shreds for all too see and you continue to post attempting to use mine and other peoples lines in some sort of vague attempt to insult me but your only digging yourself a deeper hole. Give up
Correct me if I'm wrong, but it's YOU that can't even follow the instructions on how to create an Encrypted USB Drive?? That is the Topic of this thread after all!! Alright champ, here's your opportunity to make a point and prove me wrong. Post for us all to see any examples of me using a line "stolen" from a post written by you?? PLEEEEASE Ben, your vocabulary consists of a few words at best. PUT UP OR SHUT UP!! I don't have to insult you Ben, you do so each and every time you post your dribble. >:( :( :o ??? ::)
So im not great with computers, never said i was and thats the reason ive posted in this thread to gather some information. You on the other hand cant even work out how to reply to a post without going off on some incoherent tangent about god knows what and embaressing yourself for all too see. Many people in this thread have said your reply to the topic at hand has fuck-all to do with what we are trying to achieve once proving that you dont have a clue whatsoever of what is going on.
-
Are you still going? You dont get it do you. The majority of people in the other thread have pointed out to you how wrong you are (all of them most likely way younger then you) and ive torn you to shreds for all too see and you continue to post attempting to use mine and other peoples lines in some sort of vague attempt to insult me but your only digging yourself a deeper hole. Give up
Above is your post where it clearly accuses me of "attempting to use lines written by YOU and OTHERS" taken from your posts in a vague attempt to insult you!!! Again Ben, let me be absolutely clear for you as I asked you to do this in my last post and was ignored.
IT'S TIME FOR YOU TO PUT UP OR SHUT UP. PLEASE BEN, POST AS MANY POSTS HERE AS YOU LIKE WHERE I HAVE PLAGIARIZED ANYTHING YOU HAVE EVER WRITTEN? FEEL FREE TO INCLUDE ANY POST FROM ANY MEMBER WHERE I HAVE STOLEN THERE WORDS AND PASSED THEM OFF AS MY OWN.
It's a simple exercise Ben. You can put me to shame if your correct in what you wrote, however, I know I am telling the 100% truth and would never plagiarize what others have written in their posts and use it in mine. Looking forward to what you post here Ben. ::)
-
Are you still going? You dont get it do you. The majority of people in the other thread have pointed out to you how wrong you are (all of them most likely way younger then you) and ive torn you to shreds for all too see and you continue to post attempting to use mine and other peoples lines in some sort of vague attempt to insult me but your only digging yourself a deeper hole. Give up
Above is your post where it clearly accuses me of "attempting to use lines written by YOU and OTHERS" taken from your posts in a vague attempt to insult you!!! Again Ben, let me be absolutely clear for you as I asked you to do this in my last post and was ignored.
IT'S TIME FOR YOU TO PUT UP OR SHUT UP. PLEASE BEN, POST AS MANY POSTS HERE AS YOU LIKE WHERE I HAVE PLAGIARIZED ANYTHING YOU HAVE EVER WRITTEN? FEEL FREE TO INCLUDE ANY POST FROM ANY MEMBER WHERE I HAVE STOLEN THERE WORDS AND PASSED THEM OFF AS MY OWN.
It's a simple exercise Ben. You can put me to shame if your correct in what you wrote, however, I know I am telling the 100% truth and would never plagiarize what others have written in their posts and use it in mine. Looking forward to what you post here Ben. ::)
once again Wadozo your making yourself look more and more retarded with every post. I dont know what posting in ALL CAPS with massive gaps between each words like you have nodded out on the space bar after typing each word was meant to achieve but once again you've made yourself look so silly that im convinced your either LE or a troll.
Seeming your so deadset on wondering whose insults you have attempted to copy then seeming i cbf going through looking for them im gonna have to just allow my memory to serve me correctly and quote the "1.5 hrs to watch 60 minutes" line originally quoted by Lim somewhere and the "should have been left as a cum stain on your mums bedsheets" line which im also sure was a line quoted by Lim at some stage. I've made a mental note of others as i have said every time i read your posts i cringe inside, but i cant be fucked digging the rest up. Your memory doesnt work too well? Like i said before, dont blame me, blame your parents or the years of drug abuse you have inflicted on your brain.
BC
-
I just... can't... turn... away 8)
.Hades.
-
I just... can't... turn... away 8)
.Hades.
His like e horrific car wreck isn't he Hades lol
-
LOL I'm not taking sides! Just enjoying the show ;D
.Hades.
-
Are you still going? You dont get it do you. The majority of people in the other thread have pointed out to you how wrong you are (all of them most likely way younger then you) and ive torn you to shreds for all too see and you continue to post attempting to use mine and other peoples lines in some sort of vague attempt to insult me but your only digging yourself a deeper hole. Give up
Above is your post where it clearly accuses me of "attempting to use lines written by YOU and OTHERS" taken from your posts in a vague attempt to insult you!!! Again Ben, let me be absolutely clear for you as I asked you to do this in my last post and was ignored.
IT'S TIME FOR YOU TO PUT UP OR SHUT UP. PLEASE BEN, POST AS MANY POSTS HERE AS YOU LIKE WHERE I HAVE PLAGIARIZED ANYTHING YOU HAVE EVER WRITTEN? FEEL FREE TO INCLUDE ANY POST FROM ANY MEMBER WHERE I HAVE STOLEN THERE WORDS AND PASSED THEM OFF AS MY OWN.
It's a simple exercise Ben. You can put me to shame if your correct in what you wrote, however, I know I am telling the 100% truth and would never plagiarize what others have written in their posts and use it in mine. Looking forward to what you post here Ben. ::)
once again Wadozo your making yourself look more and more retarded with every post. I dont know what posting in ALL CAPS with massive gaps between each words like you have nodded out on the space bar after typing each word was meant to achieve but once again you've made yourself look so silly that im convinced your either LE or a troll.
Seeming your so deadset on wondering whose insults you have attempted to copy then seeming i cbf going through looking for them im gonna have to just allow my memory to serve me correctly and quote the "1.5 hrs to watch 60 minutes" line originally quoted by Lim somewhere and the "should have been left as a cum stain on your mums bedsheets" line which im also sure was a line quoted by Lim at some stage. I've made a mental note of others as i have said every time i read your posts i cringe inside, but i cant be fucked digging the rest up. Your memory doesnt work too well? Like i said before, dont blame me, blame your parents or the years of drug abuse you have inflicted on your brain.
BC
It's as plain to see as the nose on your face Ben, that you are without doubt the silliest cunt I've ever encountered!! I have never used anything written in a post by Lim in my own posts, EVER!! These are sayings that were written and used by millions around the world to depict dickheads like you! Lim certainly didn't create them (no offense Lim), although you probably think he may have. ???
As I said champ, you can't produce anything in response to my post because there is nothing to produce!! Your a fucking LIAR who accused me of something knowing it was bullshit to begin with. I put extra space between the words Ben, because I'm thinking maybe English is not your first language and the words written with CAPS LOCK ON is me emphasizing what I'm posting. Metaphorically speaking, I'm raising my voice at you because you keep ducking and weaving, avoiding the SIMPLE QUESTIONS I HAVE ASKED YOU, WHICH WOULD END THIS BEN. However, as we both know, you'll never find something that was never there to begin with!! ::) Twice I have asked you to PUT UP OR SHUT UP. That means Ben, post any evidence you have to corroborate your accusations or FUCK OFF. As I previously posted, I'll gladly apologize to anyone who's post I plagiarized and used as my own but I know for a fact and am 100% certain of, I haven't and would never do such a thing. I am an educated person Ben, capable of writing my own posts based on my own thoughts, knowledge and beliefs, which ever the case may be. You, on the other hand, are clearly not the sharpest tool in the shed, maybe a beer short of a six pack or perhaps just best described as a real life dumb cunt. :-[
-
Are you still going? You dont get it do you. The majority of people in the other thread have pointed out to you how wrong you are (all of them most likely way younger then you) and ive torn you to shreds for all too see and you continue to post attempting to use mine and other peoples lines in some sort of vague attempt to insult me but your only digging yourself a deeper hole. Give up
Above is your post where it clearly accuses me of "attempting to use lines written by YOU and OTHERS" taken from your posts in a vague attempt to insult you!!! Again Ben, let me be absolutely clear for you as I asked you to do this in my last post and was ignored.
IT'S TIME FOR YOU TO PUT UP OR SHUT UP. PLEASE BEN, POST AS MANY POSTS HERE AS YOU LIKE WHERE I HAVE PLAGIARIZED ANYTHING YOU HAVE EVER WRITTEN? FEEL FREE TO INCLUDE ANY POST FROM ANY MEMBER WHERE I HAVE STOLEN THERE WORDS AND PASSED THEM OFF AS MY OWN.
It's a simple exercise Ben. You can put me to shame if your correct in what you wrote, however, I know I am telling the 100% truth and would never plagiarize what others have written in their posts and use it in mine. Looking forward to what you post here Ben. ::)
once again Wadozo your making yourself look more and more retarded with every post. I dont know what posting in ALL CAPS with massive gaps between each words like you have nodded out on the space bar after typing each word was meant to achieve but once again you've made yourself look so silly that im convinced your either LE or a troll.
Seeming your so deadset on wondering whose insults you have attempted to copy then seeming i cbf going through looking for them im gonna have to just allow my memory to serve me correctly and quote the "1.5 hrs to watch 60 minutes" line originally quoted by Lim somewhere and the "should have been left as a cum stain on your mums bedsheets" line which im also sure was a line quoted by Lim at some stage. I've made a mental note of others as i have said every time i read your posts i cringe inside, but i cant be fucked digging the rest up. Your memory doesnt work too well? Like i said before, dont blame me, blame your parents or the years of drug abuse you have inflicted on your brain.
BC
It's as plain to see as the nose on your face Ben, that you are without doubt the silliest cunt I've ever encountered!! I have never used anything written in a post by Lim in my own posts, EVER!! These are sayings that were written and used by millions around the world to depict dickheads like you! Lim certainly didn't create them (no offense Lim), although you probably think he may have. ???
As I said champ, you can't produce anything in response to my post because there is nothing to produce!! Your a fucking LIAR who accused me of something knowing it was bullshit to begin with. I put extra space between the words Ben, because I'm thinking maybe English is not your first language and the words written with CAPS LOCK ON is me emphasizing what I'm posting. Metaphorically speaking, I'm raising my voice at you because you keep ducking and weaving, avoiding the SIMPLE QUESTIONS I HAVE ASKED YOU, WHICH WOULD END THIS BEN. However, as we both know, you'll never find something that was never there to begin with!! ::) Twice I have asked you to PUT UP OR SHUT UP. That means Ben, post any evidence you have to corroborate your accusations or FUCK OFF. As I previously posted, I'll gladly apologize to anyone who's post I plagiarized and used as my own but I know for a fact and am 100% certain of, I haven't and would never do such a thing. I am an educated person Ben, capable of writing my own posts based on my own thoughts, knowledge and beliefs, which ever the case may be. You, on the other hand, are clearly not the sharpest tool in the shed, maybe a beer short of a six pack or perhaps just best described as a real life dumb cunt. :-[
Im sure in your mind you have never used anything used by Lim as you are a drug fucked junkie whose brain ceases to function in a normal manner, but to the rest of us in reality you have, whether you remember or believe you have is irrelevant.
All of your insults, saying that Im 3 years old, cannot speak english and some vague attempts at using euphemisms to insult my intelligence are only backfiring on you as if this is so, then you are being torn apart and have been for the last week by someone you consider inferior, therefore by default placing you even lower down the food chain, not that any person with a half functioning brain couldn't work it out but your just highlighting the fact. Good work son :D
The answers to the simple questions are right in front of you. There in your memory, but seeming it has already been confirmed that your a junkie who has fried his brain i expect this to be a difficult task for you to access them. This is not the fault of myself, Limetless, The two brothers in Esperance or any of the other SR users who continually have to read your irrational posts about nothing. This could of ended a long time ago however you continue to ramble on with statements such as "im an educated person" something so far from the truth that you must be trolling, and if you are then you are doing a good job at it. Give up champ this thread was over a week and abit ago and you had a chance to leave with the tiniest bit of dignity still intact,but instead your now continuing to make a further spectacle of yourself for all too see. I really do hope for your sake you get some help IRL before its too late. Good Luck.
-
Are you still going? You dont get it do you. The majority of people in the other thread have pointed out to you how wrong you are (all of them most likely way younger then you) and ive torn you to shreds for all too see and you continue to post attempting to use mine and other peoples lines in some sort of vague attempt to insult me but your only digging yourself a deeper hole. Give up
Above is your post where it clearly accuses me of "attempting to use lines written by YOU and OTHERS" taken from your posts in a vague attempt to insult you!!! Again Ben, let me be absolutely clear for you as I asked you to do this in my last post and was ignored.
IT'S TIME FOR YOU TO PUT UP OR SHUT UP. PLEASE BEN, POST AS MANY POSTS HERE AS YOU LIKE WHERE I HAVE PLAGIARIZED ANYTHING YOU HAVE EVER WRITTEN? FEEL FREE TO INCLUDE ANY POST FROM ANY MEMBER WHERE I HAVE STOLEN THERE WORDS AND PASSED THEM OFF AS MY OWN.
It's a simple exercise Ben. You can put me to shame if your correct in what you wrote, however, I know I am telling the 100% truth and would never plagiarize what others have written in their posts and use it in mine. Looking forward to what you post here Ben. ::)
once again Wadozo your making yourself look more and more retarded with every post. I dont know what posting in ALL CAPS with massive gaps between each words like you have nodded out on the space bar after typing each word was meant to achieve but once again you've made yourself look so silly that im convinced your either LE or a troll.
Seeming your so deadset on wondering whose insults you have attempted to copy then seeming i cbf going through looking for them im gonna have to just allow my memory to serve me correctly and quote the "1.5 hrs to watch 60 minutes" line originally quoted by Lim somewhere and the "should have been left as a cum stain on your mums bedsheets" line which im also sure was a line quoted by Lim at some stage. I've made a mental note of others as i have said every time i read your posts i cringe inside, but i cant be fucked digging the rest up. Your memory doesnt work too well? Like i said before, dont blame me, blame your parents or the years of drug abuse you have inflicted on your brain.
BC
It's as plain to see as the nose on your face Ben, that you are without doubt the silliest cunt I've ever encountered!! I have never used anything written in a post by Lim in my own posts, EVER!! These are sayings that were written and used by millions around the world to depict dickheads like you! Lim certainly didn't create them (no offense Lim), although you probably think he may have. ???
As I said champ, you can't produce anything in response to my post because there is nothing to produce!! Your a fucking LIAR who accused me of something knowing it was bullshit to begin with. I put extra space between the words Ben, because I'm thinking maybe English is not your first language and the words written with CAPS LOCK ON is me emphasizing what I'm posting. Metaphorically speaking, I'm raising my voice at you because you keep ducking and weaving, avoiding the SIMPLE QUESTIONS I HAVE ASKED YOU, WHICH WOULD END THIS BEN. However, as we both know, you'll never find something that was never there to begin with!! ::) Twice I have asked you to PUT UP OR SHUT UP. That means Ben, post any evidence you have to corroborate your accusations or FUCK OFF. As I previously posted, I'll gladly apologize to anyone who's post I plagiarized and used as my own but I know for a fact and am 100% certain of, I haven't and would never do such a thing. I am an educated person Ben, capable of writing my own posts based on my own thoughts, knowledge and beliefs, which ever the case may be. You, on the other hand, are clearly not the sharpest tool in the shed, maybe a beer short of a six pack or perhaps just best described as a real life dumb cunt. :-[
Im sure in your mind you have never used anything used by Lim as you are a drug fucked junkie whose brain ceases to function in a normal manner, but to the rest of us in reality you have, whether you remember or believe you have is irrelevant.
All of your insults, saying that Im 3 years old, cannot speak english and some vague attempts at using euphemisms to insult my intelligence are only backfiring on you as if this is so, then you are being torn apart and have been for the last week by someone you consider inferior, therefore by default placing you even lower down the food chain, not that any person with a half functioning brain couldn't work it out but your just highlighting the fact. Good work son :D
The answers to the simple questions are right in front of you. There in your memory, but seeming it has already been confirmed that your a junkie who has fried his brain i expect this to be a difficult task for you to access them. This is not the fault of myself, Limetless, The two brothers in Esperance or any of the other SR users who continually have to read your irrational posts about nothing. This could of ended a long time ago however you continue to ramble on with statements such as "im an educated person" something so far from the truth that you must be trolling, and if you have you are doing a good job at it. Give up champ this thread was over a week and abit ago and you had a chance to leave with the tiniest bit of dignity still intact,but instead your now continuing to make a further spectacle of yourself for all too see. I really do hope for your sake you get some help IRL before its too late. Good Luck.
STILL WAITING for you to post evidence of me plagiarizing Ben. But it's an impossible task when there is nothing to post. >:( I never said you were 3 yrs old dickhead. I said talking to you is like having a conversation with a 3 yr old, it's called an analogy Ben. Believe what you will champ, I don't give a fuck, but for you to believe you've torn me apart or torn me to shreds is fucking hilarious. Like I have said before, you must be a Seinfeld fan. You know the episode where George Costanza says to Jerry "It's not a lie if you believe it!" I see your a crack head Ben, who found himself being constantly ripped off by street vendors not supplying you with the correct weight. It seems another piece of the puzzle has fallen into place!! Never mind Ben, that will give you something to work on moving forward. Good luck with that. ::)
-
Are you still going? You dont get it do you. The majority of people in the other thread have pointed out to you how wrong you are (all of them most likely way younger then you) and ive torn you to shreds for all too see and you continue to post attempting to use mine and other peoples lines in some sort of vague attempt to insult me but your only digging yourself a deeper hole. Give up
Above is your post where it clearly accuses me of "attempting to use lines written by YOU and OTHERS" taken from your posts in a vague attempt to insult you!!! Again Ben, let me be absolutely clear for you as I asked you to do this in my last post and was ignored.
IT'S TIME FOR YOU TO PUT UP OR SHUT UP. PLEASE BEN, POST AS MANY POSTS HERE AS YOU LIKE WHERE I HAVE PLAGIARIZED ANYTHING YOU HAVE EVER WRITTEN? FEEL FREE TO INCLUDE ANY POST FROM ANY MEMBER WHERE I HAVE STOLEN THERE WORDS AND PASSED THEM OFF AS MY OWN.
It's a simple exercise Ben. You can put me to shame if your correct in what you wrote, however, I know I am telling the 100% truth and would never plagiarize what others have written in their posts and use it in mine. Looking forward to what you post here Ben. ::)
once again Wadozo your making yourself look more and more retarded with every post. I dont know what posting in ALL CAPS with massive gaps between each words like you have nodded out on the space bar after typing each word was meant to achieve but once again you've made yourself look so silly that im convinced your either LE or a troll.
Seeming your so deadset on wondering whose insults you have attempted to copy then seeming i cbf going through looking for them im gonna have to just allow my memory to serve me correctly and quote the "1.5 hrs to watch 60 minutes" line originally quoted by Lim somewhere and the "should have been left as a cum stain on your mums bedsheets" line which im also sure was a line quoted by Lim at some stage. I've made a mental note of others as i have said every time i read your posts i cringe inside, but i cant be fucked digging the rest up. Your memory doesnt work too well? Like i said before, dont blame me, blame your parents or the years of drug abuse you have inflicted on your brain.
BC
It's as plain to see as the nose on your face Ben, that you are without doubt the silliest cunt I've ever encountered!! I have never used anything written in a post by Lim in my own posts, EVER!! These are sayings that were written and used by millions around the world to depict dickheads like you! Lim certainly didn't create them (no offense Lim), although you probably think he may have. ???
As I said champ, you can't produce anything in response to my post because there is nothing to produce!! Your a fucking LIAR who accused me of something knowing it was bullshit to begin with. I put extra space between the words Ben, because I'm thinking maybe English is not your first language and the words written with CAPS LOCK ON is me emphasizing what I'm posting. Metaphorically speaking, I'm raising my voice at you because you keep ducking and weaving, avoiding the SIMPLE QUESTIONS I HAVE ASKED YOU, WHICH WOULD END THIS BEN. However, as we both know, you'll never find something that was never there to begin with!! ::) Twice I have asked you to PUT UP OR SHUT UP. That means Ben, post any evidence you have to corroborate your accusations or FUCK OFF. As I previously posted, I'll gladly apologize to anyone who's post I plagiarized and used as my own but I know for a fact and am 100% certain of, I haven't and would never do such a thing. I am an educated person Ben, capable of writing my own posts based on my own thoughts, knowledge and beliefs, which ever the case may be. You, on the other hand, are clearly not the sharpest tool in the shed, maybe a beer short of a six pack or perhaps just best described as a real life dumb cunt. :-[
Im sure in your mind you have never used anything used by Lim as you are a drug fucked junkie whose brain ceases to function in a normal manner, but to the rest of us in reality you have, whether you remember or believe you have is irrelevant.
All of your insults, saying that Im 3 years old, cannot speak english and some vague attempts at using euphemisms to insult my intelligence are only backfiring on you as if this is so, then you are being torn apart and have been for the last week by someone you consider inferior, therefore by default placing you even lower down the food chain, not that any person with a half functioning brain couldn't work it out but your just highlighting the fact. Good work son :D
The answers to the simple questions are right in front of you. There in your memory, but seeming it has already been confirmed that your a junkie who has fried his brain i expect this to be a difficult task for you to access them. This is not the fault of myself, Limetless, The two brothers in Esperance or any of the other SR users who continually have to read your irrational posts about nothing. This could of ended a long time ago however you continue to ramble on with statements such as "im an educated person" something so far from the truth that you must be trolling, and if you have you are doing a good job at it. Give up champ this thread was over a week and abit ago and you had a chance to leave with the tiniest bit of dignity still intact,but instead your now continuing to make a further spectacle of yourself for all too see. I really do hope for your sake you get some help IRL before its too late. Good Luck.
STILL WAITING for you to post evidence of me plagiarizing Ben. But it's an impossible task when there is nothing to post. >:( I never said you were 3 yrs old dickhead. I said talking to you is like having a conversation with a 3 yr old, it's called an analogy Ben. Believe what you will champ, I don't give a fuck, but for you to believe you've torn me apart or torn me to shreds is fucking hilarious. Like I have said before, you must be a Seinfeld fan. You know the episode where George Costanza says to Jerry "It's not a lie if you believe it!" I see your a crack head Ben, who found himself being constantly ripped off by street vendors not supplying you with the correct weight. It seems another piece of the puzzle has fallen into place!! Never mind Ben, that will give you something to work on moving forward. Good luck with that. ::)
WOW. out of all your meaningless posts that had to be one of the worse. Its just amazing how you manage to slide further and further downhill.
SENSE MOTHERFUCKER. DO YOU MAKE IT??????????
-
Ben, you've mastered the art of the Claytons Post. It's the post you've written when your not really writing a post! ;)
-
Its like trying to get a "special" kid to stop licking his shoulder....fuck you dont get it