Silk Road forums

Discussion => Security => Topic started by: connoisseur on July 10, 2013, 08:22 am

Title: MAC spoofing and other security questions
Post by: connoisseur on July 10, 2013, 08:22 am
Is this safe or could it be a honeypot?
CLEARNET!!!!
http://feross.org/spoofmac/
I am not a nerd but I can comprehend mid-level technical answers.
I am grateful for a short explanation which computer/internet services pull MAC addresses.
Iwould also like to know whether a cell modem with an anonymous SIM card has (and will send) a MAC address.

2nd question
Does anybody have knowledge (NOT opinions) on the FF extension "cryptocat"?
Honeypot yes or no?

PMs for enquiry about my new public PGP key for deeper explanations are welcome.
Title: Re: MAC spoofing and other security questions
Post by: mbius298074 on July 10, 2013, 08:55 am
Is this safe or could it be a honeypot?
CLEARNET!!!!
http://feross.org/spoofmac/
I am not a nerd but I can comprehend mid-level technical answers.
I am grateful for a short explanation which computer/internet services pull MAC addresses.
Iwould also like to know whether a cell modem with an anonymous SIM card has (and will send) a MAC address.

Depends if you are talking about your ethernet or wifi devices. Assuming Wifi, anyone who is within range of your wifi adapter can see your MAC address and signal strenghth (i.e., locate you). It is also important to remember that when your WiFi card is poered on it spams all access points in the area with an announce packet. Due to this, you need to change your MAC address before you start the WiFi card.


2nd question
Does anybody have knowledge (NOT opinions) on the FF extension "cryptocat"?
Honeypot yes or no?

PMs for enquiry about my new public PGP key for deeper explanations are welcome.

Don't use cryptocat. It is not secure as the random number generator used to generate keys is not very good.
Title: Re: MAC spoofing and other security questions
Post by: Flowski on July 10, 2013, 03:48 pm
Sorry I can't answer any of your questions, but I do have one of my own. When people say "clearnet warning", what exactly does that mean. I know it's not a tor website, but does that mean I shouldn't use tor to access it?
Title: Re: MAC spoofing and other security questions
Post by: saulgood on July 10, 2013, 04:00 pm
1. The MAC spoofing program is likely not a honeypot. It's written by what seems to be a fairly well established developer. I might give it a try myself..

2. Don't use cryptocat, the developers are kids, not professionals. They make a lot of mistakes that make the software unsuitable to guarantee actual private conversation. Instead use GPG to keep conversations private, and transmit the messages via Tor to mask your location.

3. When people say "clearnet warning", it just means they are linking a site that isn't a Tor onion site, not that you specifically shouldn't access it via Tor. In my opinion this is fairly silly, as it's very easy to see the URL you are clicking on.
Title: Re: MAC spoofing and other security questions
Post by: Andrewbud420 on July 10, 2013, 04:03 pm
I use tmac. I clone cable modems for my internet access. Haxorware on the Motorola surfboard modems...