Silk Road forums

Discussion => Newbie discussion => Topic started by: shawnmichaels on July 03, 2013, 09:11 am

Title: Security
Post by: shawnmichaels on July 03, 2013, 09:11 am
So I know there is another section for this, but I cannot post there yet so wanted to get your views.

What are the best way of staying safe while browsing.... Not talking about buying here.

I use Tails OS for all my lets say, want to be unwatched browsing. Is this the best way to do it?

Thoughts and advise as ever.

Title: Re: Security
Post by: dirtybiscuitzz718 on July 03, 2013, 09:35 am
TOR alone would be sufficient. Tails simply for personal browsing is overkill. Then again, some will tell you there is no such thing as anonymity overkill.
Title: Re: Security
Post by: shawnmichaels on July 03, 2013, 09:42 am
TOR alone would be sufficient. Tails simply for personal browsing is overkill. Then again, some will tell you there is no such thing as anonymity overkill.

I don't use it for personal browsing, I'm lucky enough to have another machine for that (inc music etc).

How does all my traffic through this appear through my ISP?
Title: Re: Security
Post by: Wadozo on July 03, 2013, 10:07 am
TOR alone would be sufficient. Tails simply for personal browsing is overkill. Then again, some will tell you there is no such thing as anonymity overkill.

I don't use it for personal browsing, I'm lucky enough to have another machine for that (inc music etc).

How does all my traffic through this appear through my ISP?

When browsing using Tor, your ISP cannot see what sites you visit.
Title: Re: Security
Post by: shawnmichaels on July 03, 2013, 10:08 am
Thanks

But, they can see I am using TOR though right?
Title: Re: Security
Post by: mezzomixtor on July 03, 2013, 10:56 am
thats right, your ISP can see that you are using TOR, but they cannot see on which sites you are.

If this is still not enough security for you, try out TAILS. It is really easy to install and you dont have to worry about getting leaked because of java javascript or pdf and the like. And as an extra, you can easily use bridges, so that your ISP wont even see that you are using TOR (but dont ask me how this works, i am not really tech savvy, thats just the things i could find out)

Title: Re: Security
Post by: shawnmichaels on July 03, 2013, 10:57 am
Also I know I mentioned this yesterday as I wanted help with it! but i will ask again in this thread.

How do you wipe something making data unrecoverable to anyone? FBI/NSA etc, but still useable.... I haven't done anything illegal, but I don't want to be traced....
Title: Re: Security
Post by: m1ddle on July 03, 2013, 11:05 am
How do you wipe something making data unrecoverable to anyone? FBI/NSA etc, but still useable.... I haven't done anything illegal, but I don't want to be traced....

The reason Tails is good, is it relies on your RAM for storage only. It won't touch your HDD. So once you turn it off, all traces are wiped. As you would know, writing to your HDD becomes problematic as there is a physical change by way to the disc (which can be wiped with a strong magnet).

Once RAM loses power, it inherently wipes all data it was storing, unless you put keep it straight into a freezer (something LE is starting to become aware of).

Your ISP can see you connect to the Torproject. Anyone running an exit point to the clearnet can sniff your data, unless it's encrypted (SSL). I believe Tor hidden services are inherently encrypted, as they technically don't leave the Tor network - they just relay between users until it reaches you.
Title: Re: Security
Post by: shawnmichaels on July 03, 2013, 11:13 am
How do you wipe something making data unrecoverable to anyone? FBI/NSA etc, but still useable.... I haven't done anything illegal, but I don't want to be traced....

The reason Tails is good, is it relies on your RAM for storage only. It won't touch your HDD. So once you turn it off, all traces are wiped. As you would know, writing to your HDD becomes problematic as there is a physical change by way to the disc (which can be wiped with a strong magnet).

Once RAM loses power, it inherently wipes all data it was storing, unless you put keep it straight into a freezer (something LE is starting to become aware of).

Your ISP can see you connect to the Torproject. Anyone running an exit point to the clearnet can sniff your data, unless it's encrypted (SSL). I believe Tor hidden services are inherently encrypted, as they technically don't leave the Tor network - they just relay between users until it reaches you.

Thanks.

I was reffering to old HDDs that I have use unencrypted in the past that I want to wipe, but leave the ability to reinstall windows on them.
Title: Re: Security
Post by: m1ddle on July 03, 2013, 11:28 am
Thanks.

I was reffering to old HDDs that I have use unencrypted in the past that I want to wipe, but leave the ability to reinstall windows on them.

You want to use a tool like Eraser - http://eraser.heidi.ie/

It'll basically write data throughout your entire physical HDD, so it's still useable, with nothing left on it.
Title: Re: Security
Post by: shawnmichaels on July 03, 2013, 11:32 am
Top man.

Would it then mean noone could read data if it was ever taken to a lab?

Or if I am that paranoid should I just destroy them...?
Title: Re: Security
Post by: Lorimer on July 03, 2013, 12:02 pm
Unless you're using a VPN, your ISP can see that you're connecting to a TOR relay, and will know the date and time of any connections. Tails users have similar fingerprints as those using the TOR browser bundle, so basically you'll look to your ISP like a TBB user, and maybe, with some additional investigation, as though you're using Tails.

If you're worried about your ISP monitoring your use of TOR, either get a VPN or restrict your TOR browsing to public wifi connections.  In the first case your ISP will be able to see that you're using an VPN, but would have no idea that you're using TOR, and VPNs, unlike TOR, are extremely common: many people use them to connect to their work or school networks.

I'd personally not be comfortable with my ISP knowing about my TOR usage - it seems something they'd obviously flag, if not be required already to report to certain authorities. If you're not ordering much tho you probably don't have much to worry about. Tails will definitely keep your ISP from knowing *what* you're looking at. :)
Title: Re: Security
Post by: m1ddle on July 03, 2013, 12:05 pm
Top man.

Would it then mean noone could read data if it was ever taken to a lab?

Or if I am that paranoid should I just destroy them...?

Theorotically it should be lab-proof, however you can buy a new HDD for less than half a gram of coke. I don't think the paranoia is worth $100-200?

If you're that worried, buy a new HDD. Then use the program, or a few different programs, on the old HDDs. Unscrew the HDD casing and remove the discs, apply supermagnets to them. Cut them up with power tools into tiny pieces, then find places to hide the pieces. You can ask Siri where to hide a dead body if you're not sure where to hide the pieces. Perhaps devise a plan to get the parts into space.

Good luck!
Title: Re: Security
Post by: Lorimer on July 03, 2013, 12:09 pm
You can ask Siri where to hide a dead body if you're not sure where to hide the pieces. Perhaps devise a plan to get the parts into space.

Good luck!

+1  ;D
Title: Re: Security
Post by: m1ddle on July 03, 2013, 12:14 pm
I'd personally not be comfortable with my ISP knowing about my TOR usage - it seems something they'd obviously flag, if not be required already to report to certain authorities. If you're not ordering much tho you probably don't have much to worry about. Tails will definitely keep your ISP from knowing *what* you're looking at. :)

You could VPN across to a temporary virtual server, which you've created with a Tails image, and simply destroy both once you disconnect.

I don't use drugs myself, and my ISP would be able to see I use Tor, but I don't do anything illegal. I figure my participation helps create the necessary fluff (or safety in numbers) that the ligimate SR users need.
Title: Re: Security
Post by: shawnmichaels on July 03, 2013, 06:00 pm
Thanks all for the great answers.
Title: Re: Security
Post by: mcguire39 on July 03, 2013, 06:33 pm
Right your ISP will definitely know if you're hitting tor entry nodes. Whether they care or not is another matter. If you use any of the popular VPN's you can configure it to through the VPN before hitting the tor entry node. VPN's are extremely common for people accessing work/corporate networks for working remotely or from home so I would rather the ISP (and likely NSA etc haha) see VPN traffic rather than hitting tor entry nodes all the time.

For wiping hard drives, you need any of the tools that rewrite the data many times. Such as writing it with all 1's then all 0's then all 1's again. How many times this is necessary probably varies, but after enough times, then it is not possible to extract the original data.