Silk Road forums
Discussion => Security => Topic started by: nplv123 on July 08, 2013, 07:07 pm
-
i used it before i found bitinstant, but since i cant use that anymore i deposited via international wire to bitstamp. was completed at 2am. in the past id have the money credited by 7am.. anyone else notice a delay with bitstamp lately? i shoulda tried local bitcoins..
-
Yeah, it took a whole day for my payment to get through as well. I'm not too fussy when it comes to waiting on BTC. Just to be able to purchase them in my locale is hard enough lol. Sounds like most locales are having the same problem though!!
-
I'm looking into bitstamp. What's everyone's thoughts on it? Is it safe to buy large amounts of bitcoins?
-
I'm looking into bitstamp. What's everyone's thoughts on it? Is it safe to buy large amounts of bitcoins?
I would definately recommend Bitstamp to you Hargenflargen. I have bought several large amounts using this site, and it works like clockwork. If you live in the EU, you can do a SEPA transfer at your local bank. Hope this helps!
-
My customers seem to have really good luck with Bitstamp.
-
What's a safe email site or something to use with bitstamp? I never used tormail or anything like that, so I don't know a secure server.
-
I just use a gmail account created on TOR. Its not illegal to buy and transfer bitcoin so no need to worry to much
-
Bitstamp is the place to go, mtgox is finished.
-
What's a safe email site or something to use with bitstamp? I never used tormail or anything like that, so I don't know a secure server.
Just use Hushmail or another secure webmail address.
-
Thanks everyone!
I think I'll go with hushmail.
-
Forget about hushmail bro, it's screwed. Safe-mail.
Bitstamp is great, no ID verification or any shit like that. Multiple funding or withdrawal options, easy to use marketplace. Loving it.
-
Whats the problem with hushmail jeanmoulin? ???
-
I read a while ago that they weren't as privy about our communications as they say they are. Wiki extract:
"Compromises to email privacy
Until September 2007, Hushmail received generally favorable reviews in the press.[4][5] It was believed that possible threats, such as demands from the legal system to reveal the content of traffic through the system, were not as imminent in Canada as they are in the United States and that if data were to be handed over, encrypted messages would be available only in encrypted form.
However, developments in November 2007 led to doubts among security-conscious users about Hushmail's security and concern over a backdoor. The issue originally revolved around the use of the non-Java version of the Hush system. It performed the encrypt and decrypt steps on Hush's servers and then used SSL to transmit the data to the user. The data is available as cleartext during this small window; additionally the passphrase can be captured at this point, facilitating the decryption of all stored messages and future messages using this passphrase. Hushmail has stated that the Java version is also vulnerable in that they may be compelled to deliver a compromised java applet to a user.[6][7]
Hushmail turned over cleartext copies of private email messages associated with several addresses at the request of law enforcement agencies under a Mutual Legal Assistance Treaty with the United States.[6]; e.g. in the case of U.S. v. Tyler Stumbo.[8][6][7] In addition, the contents of emails between Hushmail addresses were analyzed, and a total of 12 CDs were turned over to US authorities. Hushmail also now states that it also logs IP addresses in order "to analyze market trends, gather broad demographic information, and prevent abuse of our services."[9]
Hush Communications, the company that provides Hushmail, states that it will not release any user data without a court order from the Supreme Court of British Columbia, Canada, and that other countries seeking access to user data must apply to the government of Canada via an applicable Mutual Legal Assistance Treaty.[7] Hushmail states that "...That means that there is no guarantee that we will not be compelled, under a court order issued by the Supreme Court of British Columbia, Canada, to treat a user named in a court order differently, and compromise that user's privacy." and additionally "...If a court order has been issued by the Supreme Court of British Columbia compelling us to reveal the content of your encrypted email, the "attacker" could be Hush Communications, the actual service provider."[10]
Hushmail recommends using non web-based services such as GnuPG and PGP Desktop for those who need stronger security.[10]"