Tor Browser Bundle is better than tails by plurblur in DarkNetMarkets

[–]sohhlz 1 point2 points  (0 children)

I'll post the same comment I posted in that thread:


I just tested using a bridge in Tails 1.1 from the greeter and it worked without problem.

I also tested persisting the /etc/tor directory with a user modified torrc. I put a Bridge line in torrc, set UseBridges to 1 and that worked as well.

Bridge aaa.bbb.ccc.ddd:443 fingerprint

UseBridges 1

So, while guard node rotation is a problem, there are viable workarounds for Tails.

Need some practice. by diego1221 in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

Decrypted it!

Thanks for the reply. Can you confirm that Im also encrypting correctly?

Yes, looks like you are good to go!

Need some practice. by diego1221 in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

My public key is:

https://keyserver.cns.vt.edu/pks/lookup?op=get&search=0xD32DD22CC68995FD

https://keyserver.cns.vt.edu/pks/lookup?search=0xD32DD22CC68995FD&fingerprint=on&op=index


Formatting:

On reddit you can use the Reddit Enhancement Suite and mark the PGP blocks of text as "code" to get them to format properly. If you don't have RES installed, you have to put four spaces in front of each line to get it to look right.


Here is an encrypted message for you:

-----BEGIN PGP MESSAGE-----
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=lrVR
-----END PGP MESSAGE-----

EZ ways to use PGP/different types of encryption by EZpgp4erry1 in DarkNetMarkets

[–]sohhlz 7 points8 points  (0 children)

A, B & C might be EZ, but they are not secure.

They are 3rd party sites that can collect and store your unencrypted messages.

Don't use them!

Download and install GPA from here: http://www.gpg4win.org/

Guide:

http://www.deepdotweb.com/2013/11/11/pgp-tutorial-for-newbs-gpg4win/

{Security Advisory} Tails users are significantly more at risk of being deanonymized than TBB users. by tiredofthelazybulsht in tails

[–]sohhlz 5 points6 points  (0 children)

I just tested using a bridge in Tails 1.1 from the greeter and it worked without problem.

I also tested persisting the /etc/tor directory with a user modified torrc. I put a Bridge line in torrc, set UseBridges to 1 and that worked as well.

Bridge aaa.bbb.ccc.ddd:443 fingerprint

UseBridges 1

So, while guard node rotation is a problem, there are viable workarounds for Tails.

{Security Advisory} Tails users are significantly more at risk of being deanonymized than TBB users. by tiredofthelazybullsh in TOR

[–]sohhlz 1 point2 points  (0 children)

I just tested using a bridge in Tails 1.1 from the greeter and it worked without problem.

I also tested persisting the /etc/tor directory with a user modified torrc. I put a Bridge line in torrc, set UseBridges to 1 and that worked as well.

Bridge aaa.bbb.ccc.ddd:443 fingerprint

UseBridges 1

So, while guard node rotation is a problem, there are viable workarounds for Tails.

vendor's PGP key is not displayed on their page. Is there another way to find it? by 111yt in DarkNetMarkets

[–]sohhlz 4 points5 points  (0 children)

There is a PGP key listed for him on the Grams Info Desk:

http://grams7enufi7jmdl.onion/infodesk/vendor/0xBBE4960477DFAAFA

It matches the one listed for him on Evolution:

http://k5zq47j6wd3wdvjq.onion/profile/57891/pgp (need to login to see)


 pub   4096R/0xBBE4960477DFAAFA 2014-06-06
       Key fingerprint = 33AD 847A E259 1363 71EB  3D73 BBE4 9604 77DF AAFA
 uid                 [ unknown] TopShelf420 <topshelf420@mailbox.org>
 sub   4096R/0x729F808384B40D87 2014-06-06

Signing a file with GPG by 23237261588859226515 in privacy

[–]sohhlz 3 points4 points  (0 children)

Adding a couple of options to your command line will do it:

-a  ascii-armor

-b  detached signature

example:

gpg -abs file

New to this but ready for a test run. by nads420 in GPGpractice

[–]sohhlz 1 point2 points  (0 children)

-----BEGIN PGP MESSAGE-----

hQEMA3tN9iv6SFR1AQf7BfJce1DTv3XpPeOp8+ZYn2n2VxhBiL6w+JJ62DB6pbvT
VTzl0t9RTm12g1q+Rb7K48qdKYPyxblsiDihp6gNjGcxkYOmK7+if3HoQ21gB/OV
3K+29gC5snemZ2b4rlHWntojSK0fD4KnHDyK2aIX/khFo4r9LJa1gpdVng469Ook
BzmkaG1AJY+y9bquFgPMAswehpKqaV/cpajXa+iyBbDOfF+bIQsYAeD25ZokfCuY
uRtDs+AxDvQcIo+4Qkh0f2EKnncA1KKdlWEqKfF6oihYmshJhUH2LCTNZ/FtJ2af
NID88z42xqQxBwA84hYFhROG4m5P0lozLyUgKqYJR9LAGgGIKCdit7Ibif2W3mZW
19xaEKwpYtoFxAYGXgzonE3bH1mWbR3/B2897lDVuvuENz085JORzT1EjZc7B6/b
y9AjORHGuLlm6UYr9FA1Xzgqi66KbOn2KEdos5QX5xYmHpI7QOM5PQrPqF9yPspB
mGdDiCiyWRdJ/9q1VO3/5nWEtpWXGMaWgbG1S+92PJd2S3HYxo9mTetZIfrfN80F
Z2VvHBFJQZ2F1whVeUq7hlGA0Y7vnjfOLE5nQJqy5Kq2/xnJwEvdDDMdKijjfktf
/UaoK1DLtLWgkMyp
=M2Po
-----END PGP MESSAGE-----

New to this but ready for a test run. by nads420 in GPGpractice

[–]sohhlz 1 point2 points  (0 children)

Decrypted it!

Hi, sorry about this, but, what's up?

No problem. Not a whole lot.

Reply with your public key and I'll send you an encrypted message.

No .onion website works for me... by masudhossain in onions

[–]sohhlz 0 points1 point  (0 children)

Depending on what you are looking for, you should check the sidebar of this subreddit (/r/onions) or the sidebar of /r/DarkNetMarkets.

Watch out, there are a lot of phishing / scamming onion links on the hidden wikis.

No .onion website works for me... by masudhossain in onions

[–]sohhlz 0 points1 point  (0 children)

Are the time, timezone and date set correctly on your system?

You cannot connect to hidden services if your time is too far off.

What does this site say?

http://vancouver-webpages.com/time/

Can you connect to this hidden service?

http://3g2upl4pq6kufc4m.onion/ (DuckDuckGo search engine)

What level of risk am I at taking these precautions when ordering/recieving drugs? by Sploshie in DarkNetMarkets

[–]sohhlz 9 points10 points  (0 children)

Running DBAN after every purchase to completely wipe my hard drives.

This might be a little over the top.

If you are really thinking of doing this, just dedicate a junk computer with no hard drive to run Tails on.

Forum by Trojantouch in AgMarketplace

[–]sohhlz 0 points1 point  (0 children)

It's up and running for me.

Are you able to get to other hidden onion sites?

http://3g2upl4pq6kufc4m.onion/ (DuckDuckGo search engine)

So I opened process explorer while TrueCrypt was running and I saw this... by [deleted] in encryption

[–]sohhlz 1 point2 points  (0 children)

Where did you get your copy of truecrypt?

I had downloaded it from the original TrueCrypt site before everything blew up.

You can still download it from here:

https://www.grc.com/misc/truecrypt/truecrypt.htm

Also are there any official places to get all the hashes for the different versions?

https://defuse.ca/truecrypt-7.1a-hashes.htm

practice by burnerturner12 in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

To encrypt to me, you use my public key.

practice by burnerturner12 in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

Thank you, please post if this comes back through, fingers crossed.

Decrypted it!

So I opened process explorer while TrueCrypt was running and I saw this... by [deleted] in encryption

[–]sohhlz 2 points3 points  (0 children)

sha256sum TrueCrypt\ Setup\ 7.1a.exe

e95eca399dfe95500c4de569efc4cc77b75e2b66a864d467df37733ec06a0ff2  TrueCrypt Setup 7.1a.exe

sha256sum TrueCrypt.exe 

7f4e7ac770928e9d313b7e91db4b904a98f3d8bbac3e0b88fbca9ef15dd6ed71  TrueCrypt.exe

Looks like a false positive:

https://www.virustotal.com/en/file/7f4e7ac770928e9d313b7e91db4b904a98f3d8bbac3e0b88fbca9ef15dd6ed71/analysis/

Need practice! thank you :) by testbotgamers in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

I just saw your other post with your public key in /r/GPGpractice.

I sent you an encrypted message in that post.

Quick Practice. Please send me encrypted message. by gocavs01 in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

anyone know the best way around this?

Try this:

http://www.reddit.com/r/onions/wiki/reddit_with_tor


My public key is:

https://keyserver.cns.vt.edu/pks/lookup?op=get&search=0xD32DD22CC68995FD

https://keyserver.cns.vt.edu/pks/lookup?search=0xD32DD22CC68995FD&fingerprint=on&op=index


Formatting:

On reddit you can use the Reddit Enhancement Suite and mark the PGP blocks of text as "code" to get them to format properly. If you don't have RES installed, you have to put four spaces in front of each line to get it to look right.


Here is an encrypted message for you:

-----BEGIN PGP MESSAGE-----
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=kaA0
-----END PGP MESSAGE-----

Need practice! thank you :) by testbotgamers in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

You can only decrypt messages that have been encrypted with your public key.

Reply with your public key, and I'll encrypt a message to you using it.

practice by burnerturner12 in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

My public key is:

https://keyserver.cns.vt.edu/pks/lookup?op=get&search=0xD32DD22CC68995FD

https://keyserver.cns.vt.edu/pks/lookup?search=0xD32DD22CC68995FD&fingerprint=on&op=index


Formatting:

On reddit you can use the Reddit Enhancement Suite and mark the PGP blocks of text as "code" to get them to format properly. If you don't have RES installed, you have to put four spaces in front of each line to get it to look right.


Here is an encrypted message for you:

-----BEGIN PGP MESSAGE-----
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=KP2x
-----END PGP MESSAGE-----

New to this but ready for a test run. by nads420 in GPGpractice

[–]sohhlz 2 points3 points  (0 children)

Hey, so I am sending this correctly

Decrypted it!

New to this but ready for a test run. by nads420 in GPGpractice

[–]sohhlz 2 points3 points  (0 children)

My public key is:

https://keyserver.cns.vt.edu/pks/lookup?op=get&search=0xD32DD22CC68995FD

https://keyserver.cns.vt.edu/pks/lookup?search=0xD32DD22CC68995FD&fingerprint=on&op=index


Formatting:

On reddit you can use the Reddit Enhancement Suite and mark the PGP blocks of text as "code" to get them to format properly. If you don't have RES installed, you have to put four spaces in front of each line to get it to look right.


Here is an encrypted message for you:

-----BEGIN PGP MESSAGE-----
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=TVAV
-----END PGP MESSAGE-----

are there any good search engines for tor? by czopinator in TOR

[–]sohhlz 0 points1 point  (0 children)

Be very careful!

There are a number of phishing sites that look just like the Silk Road, but will steal your money.

If you are looking for links to darknet markets, check the sidebar on this subreddit:

/r/DarkNetMarkets

This Tor search engine is listed on the sidebar of /r/onions : (You may want to check that sub for more Tor links.)

http://kbhpodhnfxl3clb4.onion/

I'm not sure how good it is.

Need practice! thank you :) by testbotgamers in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

That passphrase is used to protect your private key. It is not used to encrypt or decrypt the actual messages. It's there so that if someone manages to steal your private key, they will not be able to use it to decrypt messages that have been sent to you, unless they crack the password that the private key is protected with.

Need practice! thank you :) by testbotgamers in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

Decrypted it!

What's the difference between encrypting with passphrase and without?

On Tails, "Encrypt Clipboard with Passphrase" will symmetrically encrypt your message with a passphrase. For the person receiving the message to decrypt it, they would need to know the same passphrase that you used to encrypt it. It's not super useful unless you can somehow get the passphrase to them in secret (meet in person and whisper it in their ear). Public key cryptography has the major advantage that nothing needs to be kept secret. The eavesdropper can see the encrypted message and the public key used to encrypt it, but will be unable to decrypt it.

Thank you for helping me out!

Glad to!

Need practice! thank you :) by testbotgamers in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

My public key is:

https://keyserver.cns.vt.edu/pks/lookup?op=get&search=0xD32DD22CC68995FD

https://keyserver.cns.vt.edu/pks/lookup?search=0xD32DD22CC68995FD&fingerprint=on&op=index


Formatting:

On reddit you can use the Reddit Enhancement Suite and mark the PGP blocks of text as "code" to get them to format properly. If you don't have RES installed, you have to put four spaces in front of each line to get it to look right.


Here is an encrypted message for you:

-----BEGIN PGP MESSAGE-----
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=omyI
-----END PGP MESSAGE-----

Oh so happy not to encrypt! by Copperwing in SilkRoad

[–]sohhlz 4 points5 points  (0 children)

privnote.com ... Isn't this safer than encryption.

Unfortunately, not. You are trusting that the privnote site isn't logging your messages. Also since it appears that their server is located in the US, they are subject to US court orders / National Security Letters that may force them to collect messages.

PGP ... it would not be a tough nut to crack, esp since it exists there permanently.

Luckily, PGP is quite secure and will be for some time to come when used with a reasonable key length. (Snowden recommended using a key larger than 2048 bits in his video to Glenn Greenwald.)

PGP messages will be most likely be safe until the invention of a general purpose quantum computer.

Kursing Kleopatra by Copperwing in SilkRoad

[–]sohhlz 2 points3 points  (0 children)

You may want to try GPA instead. Here's a guide:

http://www.deepdotweb.com/2013/11/11/pgp-tutorial-for-newbs-gpg4win/

There's also this client which is very easy to use:

http://www.gpg4usb.org/

Here's a guide for it:

https://securityinabox.org/en/gpg4usb_portable

Hope this works, first time trying. by [deleted] in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

Decrypted it!

I am starting to get the hang of this, but it's a little difficult at first.

Definitely. Once you get the hang of it, though, it's really easy.

One thing:

You may not want to use the option "Hide recipients". If a user has multiple secret keys, and they are not running an agent, they will have to enter a password for each of their secret keys until they get the right one. They may become confused and give up before they decrypt your message.

Hope this works, first time trying. by [deleted] in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

My public key is:

https://keyserver.cns.vt.edu/pks/lookup?op=get&search=0xD32DD22CC68995FD

https://keyserver.cns.vt.edu/pks/lookup?search=0xD32DD22CC68995FD&fingerprint=on&op=index


Formatting:

On reddit you can use the Reddit Enhancement Suite and mark the PGP blocks of text as "code" to get them to format properly. If you don't have RES installed, you have to put four spaces in front of each line to get it to look right.


Here is an encrypted message for you:

-----BEGIN PGP MESSAGE-----

hQIMA3xWonb03bk7AQ//Tdqc8Pj4WNKyxlCwwL+V7may/KQgxLFvxdBkLmb9aWEv
PVSpdV+zS/kQN84je6509L4ZK2LxVsiTxCJNHQR2ac6paksnYR1WuqCr2/zbCESD
clehawU24cbaI2aGYLvH69qtC5vUqaE51xwfXyaCoh2UPOtkGFWYu8CgHIZHq+PK
1kzCW56X6DZYZQSQ5sN1uz0UdI/adPexPBImRjPW6mosl9Wss55htBfnZsqMBPDm
82wOp97z2fZczQprQeaz+uKO0y30cMkaNrNcB3qJ+Fent4U9b//wD0wlaH6af8tp
khscUFvTXelDFZsIDASbMb6WTO5A/pGUoQlcp5zGOOZMzO9s4pk/mLqlxmaQsvhC
GbDzqvfJY2MCJB0OSoUCpHXG8AytFoPgk+SDA9ZrZLo5F6k9MP5OciWNp7RJP6QS
hNyGfYoLQJKnp7X9yj0gMD8yBkVqwFmkKt93mJADKVt57mQ55YLwGPeOW23tITFI
8qTcRbnJnSVKLGY1b+EMWuIIXKzqvPeGwJlB9Upcc3j2CbGPLZnpvAoiFYjjDMul
fBOYt1LWitU00czj/GHVKRwcihs6cjpHiWrKNi73MyEnjyVp4lul3/TRRZk9vHfE
wun7CPhYFlQZt3iMpLaQGqWutGtFDYnYoXToSG+erMUPVClj0c1/Z0F9kYgU4qLS
wA0Bfl4+eTpjG3jOpU7cDebNWoGyAf056cHEwiQJS0yaYgQ5zmy1+tLWmXLA0NwH
SIR5GQi2aMPtwYrnXUVoLuiVloRouNxCav1sLaMi0jxdAC83c9+ZnFt26SOq5vVv
Vb2b8ysdpB9Zan+w5Y+nYPdQJs6qsW+i3XkxWjSudyLx0JuP/3o57frxQ0I1mJxx
ynubNKa/TX5KhGwJRMSUcscjUd5q00Eq1W0746PJnzKi3tE9iNu58NomR0osZs14
k0EcGryglEQCs6Xr4j37
=rlrU
-----END PGP MESSAGE-----

Downloading gnupgp on tails? by adicted2gravity in DarkNetMarketsNoobs

[–]sohhlz 1 point2 points  (0 children)

It's best if you learn how to use PGP on Tails using the OpenPGP applet (clipboard icon on the top bar to the right):

https://pay.reddit.com/r/DarkNetMarketsNoobs/wiki/tails (Search for PGP near the middle.)

First time (and post) can someone help me practice? by DuckTigger in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

My public key is:

https://keyserver.cns.vt.edu/pks/lookup?op=get&search=0xD32DD22CC68995FD

https://keyserver.cns.vt.edu/pks/lookup?search=0xD32DD22CC68995FD&fingerprint=on&op=index


Here is an encrypted message for you:

-----BEGIN PGP MESSAGE-----
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=oCHE
-----END PGP MESSAGE-----

Can't access markets. Any of them. Tor/network issue? by durgsrbad in DarkNetMarkets

[–]sohhlz 1 point2 points  (0 children)

Are the time, timezone and date set correctly on your system?

You cannot connect to hidden services if your time is too far off.

What does this site say?

http://vancouver-webpages.com/time/

Can you connect to this hidden service?

http://3g2upl4pq6kufc4m.onion/ (DuckDuckGo search engine)

stupid tails USB question by [deleted] in tails

[–]sohhlz 1 point2 points  (0 children)

can I just use a seperate usb for pgp and other stuff that needs to be stored?

Yes.

If you decide to do that, it would be good to use an encrypted setup on the second USB.


The advantage to using the persistence setup is that it's automatic. All of your keys and files are ready to go as soon as you finish booting up.

Adding persistent files to filesystem? by Illmatic-Herbicide in tails

[–]sohhlz 0 points1 point  (0 children)

Can you clarify how I should edit the /live/persistence/TailsData_unlocked/persistence.conf document when I want to link /live/persistence/TailsData_unlocked/etc/modprobe.d/wireless.conf ?

Sure.

In my testing I've found that it's enough to have the following in the persistence.conf file:

/etc    source=etc,link

Then if you create an "etc" dir under /live/persistence/TailsData_unlocked

and then create a "modprobe.d" dir under /live/persistence/TailsData_unlocked/etc

and then put the file you want linked in under /live/persistence/TailsData_unlocked/etc/modprobe.d

it will link the file into that directory.

Example:

root@amnesia:/live/persistence/TailsData_unlocked#   ls -ld etc

drwxr-xr-x 3 root root 4096 Aug 10 16:29 etc

root@amnesia:/live/persistence/TailsData_unlocked#   cd etc

root@amnesia:/live/persistence/TailsData_unlocked/etc#   ls -ld modprobe.d

drwxr-xr-x 2 root root 4096 Aug 10 16:01 modprobe.d/

root@amnesia:/live/persistence/TailsData_unlocked/etc#   cd modprobe.d/

root@amnesia:/live/persistence/TailsData_unlocked/etc/modprobe.d#   ls -l

-rw-r--r-- 1 root root 18 Aug 10 16:01 test.conf

root@amnesia:/live/persistence/TailsData_unlocked/etc/modprobe.d#   cat test.conf 

# this is a test

root@amnesia:/live/persistence/TailsData_unlocked/etc/modprobe.d#   cd /etc/modprobe.d/

root@amnesia:/etc/modprobe.d#   ls -l

-rw-r--r-- 1 root root  229 May  8  2013 alsa-base-blacklist.conf
-rw-r--r-- 1 root root 1186 May  8  2013 alsa-base.conf
-rw-r--r-- 1 root root   65 Jun 23  2012 blacklist-berry_charge.conf
-rw-r--r-- 1 root root  456 Apr 28  2013 fbdev-blacklist.conf
-rw-r--r-- 1 root root   16 Apr  8  2012 libpisock9.conf
-rw-r--r-- 1 root root   31 Jul 22 15:05 no-mei.conf
-rw-r--r-- 1 root root   17 Jul 22 15:05 no-pc-speaker.conf
-rw-r--r-- 1 root root  128 Jan  2  2013 open-vm-tools.conf
-rw-r--r-- 1 root root   26 Mar  9  2013 radeon-kms.conf
lrwxrwxrwx 1 root root   61 Aug 10 16:27 test.conf -> /live/persistence/TailsData_unlocked/etc/modprobe.d/test.conf

root@amnesia:/etc/modprobe.d#   cat test.conf 

# this is a test

Someone help me please by keithmadden in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

My public key is:

https://keyserver.cns.vt.edu/pks/lookup?op=get&search=0xD32DD22CC68995FD

https://keyserver.cns.vt.edu/pks/lookup?search=0xD32DD22CC68995FD&fingerprint=on&op=index


Here is an encrypted message for you:

-----BEGIN PGP MESSAGE-----
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=fmsT
-----END PGP MESSAGE-----

Can anyone help me with sending/recieving with GPGTools? by lols64146 in DarkNetMarkets

[–]sohhlz 1 point2 points  (0 children)

GPGTools instructions:

To import somebody's key, highlight it and paste it into GPG Keychain Access.

To decrypt a message:

Highlighting the message, right-click and select "OpenPGP: Decrypt Selection to New Window". A new window will pop up with the decrypted message.

To encrypt a message:

Type up your message, highlight it, right-click, select "OpenPGP: Encrypt Selection to New Window". A new window will pop up with the encrypted message.


http://support.gpgtools.org/kb/how-to/first-steps-where-do-i-start-where-do-i-begin

http://support.gpgtools.org/kb/faq-gpgservices/how-do-i-activate-the-gpgservices

http://support.gpgtools.org/kb/faq-gpgservices/how-to-encrypt-and-sign-text-or-files-with-gpgservices


If you want to practice sending and receiving encrypted messages, this is a good sub:

/r/GPGpractice

practice? by tyrrany in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

Good deal!

Did you want to test encryption as well?

If so, send me a message encrypted with my public key and I'll try and decrypt it.

practice? by tyrrany in GPGpractice

[–]sohhlz 0 points1 point  (0 children)

My public key is:

https://keyserver.cns.vt.edu/pks/lookup?op=get&search=0xD32DD22CC68995FD

https://keyserver.cns.vt.edu/pks/lookup?search=0xD32DD22CC68995FD&fingerprint=on&op=index


Formatting:

On reddit you can use the Reddit Enhancement Suite and mark the PGP blocks of text as "code" to get them to format properly. If you don't have RES installed, you have to put four spaces in front of each line to get it to look right.


Here is an encrypted message for you:

-----BEGIN PGP MESSAGE-----

hQEMA2PzbQpu6MTwAQgAgBEVFW30OIvwo1sXYyLy8hLYMWsyBbunq6Hycv72bu4Y
4reD+JmQIzNYtXuATOtg6cyn0UVTXwDsoXzj8hMIG3yA+BQ8dXFbkRIOEpiwB7rm
b3b903vnwo4NDcw3jBvL9mMfejaP0mKuEVpr1jSvYJnc2RriO5fSA9R4xPK/DD1D
t1LHZLja+UR+w8r9BJ0kbkah4SID0B1eZ8NlFbMscd2dbKM4YscCAldQvRV7fbrZ
kSoY0kWbYeH1whPMnMoWVe547bLB5XHzKRM6FlrzAd0jOJW18vo2HL2QjFhMavqQ
98MeeFxxgyH4fRfkVJzcS7fQ3nDMuxwneJaSHVm9k9LAEgEleUuxhZPr52FAeKqh
J1SRyv5xbu3f9FfdOb8mffXwEEmyDQVDDo8T7IzceuWxXt1MAJw2cjHeRSh81nsw
ckviWHnyZGgOVi1gif0+ovfNsGITEiOZ8mj1Ka1uP+E3x0AJ0sBv1oN1DyM+Yr38
2D/AQoMcdhkzxJuhP5r8ZzFhkQU6vcRaCoBlhdV2fg4J0efpobVlS3N/jiWxJ8GE
Lpv6/7cFEfr2Tufi+d7PTslgUMumuofagDprK+jDl/fwmjNzZpSwhKfYthfJPCIY
GLS/nw==
=2gdC
-----END PGP MESSAGE-----

Tails automatically set all my file pemissions to root and locked me out, how do i do batch reset? by someonehelpwithtailz in tails

[–]sohhlz 1 point2 points  (0 children)

I'm sorry that did not work for you.

Please actually try your code before telling others to take a chance with all the time and energy it takes to create a working tails.

I have tested that code in the past and I just tested it again (twice). It worked without problem.

Tails automatically set all my file pemissions to root and locked me out, how do i do batch reset? by someonehelpwithtailz in tails

[–]sohhlz 0 points1 point  (0 children)

how can i set the file permissions to amnesia user for all the files in tailsdata folder at once?

You probably do not want to do that, depending on what you have persisted. Some files and directories in that dir are not owned by the amnesia user.

To change all of the files in a certain directory to be owned by amnesia, you can use this command from a root terminal:

chown -R amnesia:amnesia dir-to-be-changed


Some of the files in the persistence directory have a very specific owner and permissions set:

https://tails.boum.org/contribute/design/persistence/#index7h2

Here's a set of commands that will configure those permissions correctly:


(Note: For the below commands - chown, chmod and setfacl - it is difficult to see, but they have a trailing space followed by a period. The space and period are needed for the command to complete correctly.)

cd /live/persistence/TailsData_unlocked

chown root:root .

chmod 0775 .

setfacl -m u:tails-persistence-setup:rwx .

chown tails-persistence-setup:tails-persistence-setup persistence.conf

chmod 0600 persistence.conf


There's also this page:

https://tails.boum.org/doc/first_steps/persistence/copy/index.en.html

Are you in a hurry and don't wanna learn PGP? Use this... by Saturnix in DarkNetMarketsNoobs

[–]sohhlz 1 point2 points  (0 children)

Sorry, I didn't realize that it was client side, but I still don't think that people should trust it.

http://matasano.com/articles/javascript-cryptography/

How do I know that the code is secure and how do I know that the code will remain secure over time?

Since it is not using an encrypted secure connection, you could still be man in the middle attacked when downloading the javascript from the site. (Especially if you are using Tor to connect to it.)

Most users of darknet markets keep javascript disabled for safety to help prevent browser exploits from de-anonymizing them. What happens if the site is taken over (or the link man-in-the-middled) and malicious javascript with a payload designed to track the user is downloaded instead?

https://en.wikipedia.org/wiki/Freedom_Hosting#Firefox_.2F_JavaScript_anonymity_attack

Are you in a hurry and don't wanna learn PGP? Use this... by Saturnix in DarkNetMarketsNoobs

[–]sohhlz 4 points5 points  (0 children)

NOOOO!

Don't use that. That site could easily collect all of your unencrypted messages.

Also, it's not even a httpS link, so anybody that can see your internet traffic (your ISP, their ISP, the NSA / FBI) could read your unencrypted messages.

Learn to use PGP. It's really easy!

Here's a guide for installing and using GPA from the Gpg4win package:

http://www.deepdotweb.com/2013/11/11/pgp-tutorial-for-newbs-gpg4win/


This program is a little better than GPA in some ways and is a little easier to use:

http://www.gpg4usb.org/

Here's a guide for it:

https://securityinabox.org/en/gpg4usb_portable


If you want to practice sending and receiving encrypted messages, this is a good sub:

/r/GPGpractice

Bitcoins Suspected to be CIA or NSA experiment. by cannabisity in DarkNetMarkets

[–]sohhlz 5 points6 points  (0 children)

if it's got a backdoor to track transactions

It doesn't need a backdoor to track transactions. It has a front door and it's called the blockchain. Every transaction can be traced as coins move from one address to the next. That's why people use bitcoin tumbling services.

The guy behind the Bitcoins=CIA claims is one crazy mofo. Here's an excerpt from his website:

Oh, and I have an UNPAID INVOICE for 10 Hours of my time that your
Secret Service, FBI, CIA and NSA servants have not paid me for yet, for my 
services rendered to the USA to help the country prevent terrorism due to 
my PROVEN ASTRAL ABILITIES to see future world events.

http://soladoni.com/proof-bitcoin-cia-project/

Bitcoins Suspected to be CIA or NSA experiment. by cannabisity in DarkNetMarkets

[–]sohhlz 4 points5 points  (0 children)

That's a crappy article with zero evidence.

The people that use bitcoin will deny that there is any merit to such a possibility, because if it turns out to be true, all our coins will become worthless.

Why would bitcoins become worthless?

Help navigating Agora by helpthrowaway8 in AgMarketplace

[–]sohhlz 0 points1 point  (0 children)

If you go to the bottom of their vendor pages, you will see a list of the products that they are currently selling. You can click on the top line of any of those links to go directly to that product listing.

http://agorahooawayyfoe.onion/vendor/Instrument

http://agorahooawayyfoe.onion/vendor/HouseofSpirit

[Agora]Cannot find usable key for PGP login. Enter a usable public key on your profile page and save it.? by [deleted] in DarkNetMarkets

[–]sohhlz 2 points3 points  (0 children)

Delete any "Version:" or "Comment:" lines from the key.

Make sure that there is one blank line between the "BEGIN" and the start of the key.

Should look like this:

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=W4um
-----END PGP PUBLIC KEY BLOCK-----

Agora or Helix stealing bitcoins? by whattsdsadhehell12 in DarkNetMarkets

[–]sohhlz 2 points3 points  (0 children)

Message the grams admin here at /u/gramsadmin

or

contact him via email grams@lelantos.org

Created new 1.1 install, gives me blank cursor upon boot and disabled access to my 1.0 persistent drive by cantfigurethisout343 in tails

[–]sohhlz 1 point2 points  (0 children)

I'm sorry that you are having so many problems with the upgrade. Unfortunately, the 1.1 upgrade is a major one and a number of people are having problems with it.

If you have a full backup of all of your files, at this point it might just be easier to boot from the UUI created Tails 1.1 USB and use it to do a Clone & Install to your old USB. This will delete all of your persistent files on the old drive, so make sure that your backup is good. Then boot from the newly installed USB and reconfigure persistence on it and restore your files from backup to it.

You may still be able to rescue your old USB and restore the persistence settings, but you will have to do the upgrade manually from the command line.

Problems verifying signature from text by wuggywuggy in GnuPG

[–]sohhlz 1 point2 points  (0 children)

that has to do with the trust that my keychain has in that public key, right?

Correct.

that trust increases over time by just validating more and more signatures by that public key?

No. Here are some references:

https://en.wikipedia.org/wiki/Web_of_trust

https://www.linux.com/learn/tutorials/760909-pgp-web-of-trust-core-concepts

the checksums I also had no issue with. thanks for that, too.

Glad to help!

Adding persistent files to filesystem? by Illmatic-Herbicide in tails

[–]sohhlz 0 points1 point  (0 children)

Is your original file to be linked located here:

 /live/persistence/TailsData_unlocked/etc/modprobe.d/wireless.conf

Does this command show your file:

cat /etc/modprobe.d/wireless.conf

You might also run into a sequencing problem. The boot sequence may be something like this:

The system boots.

It does various things one of which is scan the /etc/modprobe.d directory.

The system then mounts the persistence directories and creates the links to persistent files.

The system finishes booting.


So the system could link your file into the correct directory, but after the directory was already scanned.

I tried going on silk road, and it said there was another ddos attack. by trenderman3000 in SilkRoad

[–]sohhlz 1 point2 points  (0 children)

I was able to login just now.

Try right clicking on the green onion and selecting "New Identity" to get a different exit node.

(Warning: This will close all of your open tabs and restart the Tor browser.)

Helix is a waste of time by dogcatdog223232 in DarkNetMarkets

[–]sohhlz 4 points5 points  (0 children)

The grams admin is active on reddit.

You could try messaging him here:

https://pay.reddit.com/user/gramsadmin

Or on his subreddit:

https://pay.reddit.com/r/grams

Or email his support address:

grams@lelantos.org

http://grams7enufi7jmdl.onion/contact

Problems verifying signature from text by wuggywuggy in GnuPG

[–]sohhlz 2 points3 points  (0 children)

Once you have their key imported, you should be able to just download the signature file (right click -> save link as) and then do this:

gpg --verify SIGNATURES-1.12.0.txt

gpg: Signature made Thu 31 Jul 2014 01:53:01 PM MST
gpg:                using DSA key 0xA70F085D21F2949A
gpg: Good signature from "Gerald Combs <gerald@wireshark.org>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg:          There is no indication that the signature belongs to the owner.
Primary key fingerprint: EEE7 3F8C 231A 3C99 2D9A  AE0B A70F 085D 21F2 949A

Then do an SHA1 on the downloaded file (an example using the source tarball):

sha1sum wireshark-1.12.0.tar.bz2 

c7a94a9ec90c1ff9be2a7d7b813276e433509df9  wireshark-1.12.0.tar.bz2

and make sure that it matches the checksum in the signature file.

From the sig file:

SHA1(wireshark-1.12.0.tar.bz2)=c7a94a9ec90c1ff9be2a7d7b813276e433509df9

If I'm running Tails with persistence, do I need to install Gpg4win? by L_S_D_throwaway in DarkNetMarketsNoobs

[–]sohhlz 1 point2 points  (0 children)

is this assuming that I have already set up an email account somewhere, for example, Claws Mail or something?

Typically with darknet markets, all of the messaging is done via the web interface to the market. So, if a vendor sent you an encrypted message, you would copy that message from the website to your clipboard and then decrypt it using the applet.

Created new 1.1 install, gives me blank cursor upon boot and disabled access to my 1.0 persistent drive by cantfigurethisout343 in tails

[–]sohhlz 1 point2 points  (0 children)

Do you mean installing tails from within windows? isnt that unsafe?

Boot whatever operating system you still have available to you (Tails if possible) and then using that OS, burn the 1.1 ISO to a DVD.

Created new 1.1 install, gives me blank cursor upon boot and disabled access to my 1.0 persistent drive by cantfigurethisout343 in tails

[–]sohhlz 0 points1 point  (0 children)

Set aside your USB with the disabled persistence for now.

(Keep it safe so that we can re-enable the persistence after we boot 1.1 from another device.)

Try and create a bootable 1.1 device (DVD or USB).

Can you burn 1.1 to a DVD and boot from that?

So I want a 100% anonymous identity. Where do I begin? by Hugh_Man in TOR

[–]sohhlz 0 points1 point  (0 children)

Who is this run by

http://webmasterprofile.com/webmaster/Pierre_Barre

https://twitter.com/skyice_fr

why should anyone trust them

You should not trust them or anyone else that provides email service.

Encrypt all of your emails using PGP.

Create and access your email account via Tor only.

Erinn Clark's key (signs TOR releases) Key ID 0x63FEE659 Fingerprint 8738 A680 B84B 3031 A630 F2DB 416F 0610 63FE E659 by in1984 in PGPkeys

[–]sohhlz 0 points1 point  (0 children)

gpg -k 0x416F061063FEE659

pub   2048R/0x416F061063FEE659 2003-10-16
      Key fingerprint = 8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659
uid                 [ unknown] Erinn Clark <erinn@torproject.org>
uid                 [ unknown] Erinn Clark <erinn@debian.org>
uid                 [ revoked] Erinn Clark <erinnc@bellsouth.net>
uid                 [ unknown] Erinn Clark <erinn@double-helix.org>
sub   2048R/0xC41E59C7EB399FD7 2003-10-16

I removed all of the external signatures on that key to shorten it:

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=ZdeU
-----END PGP PUBLIC KEY BLOCK-----

Bitmessage on Tails 1.1 by [deleted] in tails

[–]sohhlz 1 point2 points  (0 children)

Try using this port instead: 9151

Using port 9050 on Tails will make Tor create a different circuit through the Tor network for every Bitmessage node you connect to.

Using port 9151 may make a correlation between your Bitmessage traffic and your browser traffic possible. If you are worried about such a correlation, you could create a custom SocksPort entry in the torrc config file for Bitmessage to use.

From the Tails /etc/tor/torrc file:

## Default SocksPort
SocksPort 127.0.0.1:9050 IsolateDestAddr IsolateDestPort


## SocksPort for the default web browser
SocksPort 127.0.0.1:9151

Bitmessage on Tails 1.1 by [deleted] in tails

[–]sohhlz 0 points1 point  (0 children)

in regard to the reboot, the config files are gone but bitmessage directory is fine.

The only difference I see between this and my test is that I had done this to start Bitmessage

 cd Persistent/PyBitmessage/src

 ./bitmessagemain.py

Using your method, I get the same results as far as the configuration files being lost after a reboot. Looks like a problem with the "Run in Portable Mode" option. The config and other files are placed in your current working directory, instead of "... files are stored in the same directory as the program ...", which in this case is the amnesia home directory and that is not persisted. Try a cd to the src directory and then running it from there.

Check to make sure that the file "keys.dat" is saved under "~/Persistent/PyBitmessage/src". That file contains your configuration.


without "listen for incoming connections when using proxy"

Same here.

Still no connections are being made

Not sure what is happening here. I do get a lot of error messages like this:

Bitmessage MIGHT be having trouble connecting to the SOCKS server. timed out

But I am able to connect to the network eventually (after a few minutes) and send messages between two different nodes.


Can you try this to capture your debug output:

./bitmessagemain.py &> zout

and then post the output to a private pastebin and PM me a link?


One thing to check is that it looks like Bitmessage and the tor process use a lot of CPU time on start up.

You should check to see if your CPU is maxed out:

Top bar -> Applications -> System Tools -> System Monitor

Why is Tails pgp so difficult? by elvis9000yjwrsi in tails

[–]sohhlz 5 points6 points  (0 children)

transferring keys from desktop gpa to tails via usb...etc...its gotten to the point that i rarely use tails because of this.

Sounds like you are doing this every time you boot up Tails. Have you considered installing Tails to a USB flash drive and enabling the persistence feature, so you would only have to do this once and then they would be stored on the Tails USB?

https://tails.boum.org/doc/first_steps/persistence/configure/index.en.html

i keep getting open file errors in the command prompts in tails when importing keys.

Could you paste back the errors that you are getting or summarize them?

Can someone please explain in detail precisely how to use tails pgp.

Not sure if you are wanting instructions on using command line gpg or if you want info on using the Tails "OpenPGP encryption applet" (the clipboard on the top right of the menu bar).

Here are some links for using the applet:

https://tails.boum.org/doc/encryption_and_privacy/gpgapplet/public-key_cryptography/index.en.html

https://tails.boum.org/doc/encryption_and_privacy/gpgapplet/decrypt_verify/index.en.html


To import keys (public or private) you would left click on the PGP applet and select Manage Keys.

In the windows that pops up, select File -> Import.

Browse to where the keys are saved and select the key you wish to import and hit Open.

Hit Import.


To export your public key to the clipboard, click on your key to highlight it and then from the top menu of the "Passwords and Keys" window, do Edit -> Copy.

To export your public key to a file, click on your key to highlight it and do a File -> Export. On the lower right hand side of the new window, change "PGP keys" to "Armored PGP keys", browse to where you want to save the file and click Export.

If I'm running Tails with persistence, do I need to install Gpg4win? by L_S_D_throwaway in DarkNetMarketsNoobs

[–]sohhlz 2 points3 points  (0 children)

Here's a guide for using PGP on Tails:

https://pay.reddit.com/r/SilkRoad/comments/1qtuy6/guide_for_the_pgp_tool_preinstalled_in_tails_with/

Be aware that with Tails 1.1, some of the menus have changed.

Here's one change that has caught a number of people:

To export your public key to the clipboard, click on your key to highlight it and then from the top menu of the "Passwords and Keys" window, do Edit -> Copy.

To export your public key to a file, click on your key to highlight it and do a File -> Export. On the lower right hand side of the new window, change "PGP keys" to "Armored PGP keys", browse to where you want to save the file and click Export.

If I'm running Tails with persistence, do I need to install Gpg4win? by L_S_D_throwaway in DarkNetMarketsNoobs

[–]sohhlz 3 points4 points  (0 children)

If I'm running Tails with persistence, do I need to install Gpg4win?

No. You should use the Tails "OpenPGP encryption applet" instead. (The clipboard icon on the top right menu bar.)

Bitmessage on Tails 1.1 by [deleted] in tails

[–]sohhlz 1 point2 points  (0 children)

python and SSL etc can be installed and persistently configured.

I was able to run Bitmessage on a stock version of Tails 1.1 without installing any additional software.


but when I reboot everything goes poof again.

When you say everything, do you mean the config (your personal generated addresses, your subscriptions, etc) or do you mean the entire bitmessage directory?


I have no idea how to configure the actual network side

Settings -> Network Settings

Type: SOCKS5

Server hostname: localhost Port: 9050

I had to close it and restart it to get it to connect to the network after changing these settings.

Looking for a VPN that fills this crucial requirement. by [deleted] in privacy

[–]sohhlz 1 point2 points  (0 children)

It's going to be difficult to find somebody willing go to jail for you. If a VPN provider gets a court order from their local jurisdiction and government thugs with guns come to the door, they can either obey it, go to jail or shoot it out.

Best bet is to find a VPN in a country that does not have an MLAT with the US and hope that they really don't keep records. That way, if they do get a court order from their local jurisdiction, there would be no information for them to hand over.

Silkroad PGP public key by styit8 in SilkRoad

[–]sohhlz 0 points1 point  (0 children)

Good deal!

How to install tails 1.1? ifcpu64.c32: not a COM32R image by dohburn in tails

[–]sohhlz 0 points1 point  (0 children)

Since you do not have a DVD, you might want to try this:

Download and install VirtualBox. https://www.virtualbox.org/wiki/Downloads

Create a virtual machine using the Tails 1.1 ISO as the boot file.

Boot Tails in the VM.

Insert your USB into the PC.

"Capture" the USB with the VM by right clicking on the USB icon on the lower right hand side of the VM window and selecting the USB drive.

Start the Tails installer:

Top bar -> Applications -> Tails -> Tails Installer -> Clone & Install

(This will delete anything on the USB, so use the Clone & Upgrade option if you are trying to upgrade a USB drive with a persistence partition on it.)

Silkroad PGP public key by styit8 in SilkRoad

[–]sohhlz 0 points1 point  (0 children)

It could be because it's getting double spaced. Delete any "Version:" or "Comment:" lines and make sure there is one blank line between the "BEGIN" and the start of the key. Should look like this:

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=W4um
-----END PGP PUBLIC KEY BLOCK-----

OSX GPG HELP by nvr86 in GPGpractice

[–]sohhlz 1 point2 points  (0 children)

Glad to help!

Reply with a test public key with a fake name and email address if you want to do some practice encryption / decryption.

OSX GPG HELP by nvr86 in GPGpractice

[–]sohhlz 1 point2 points  (0 children)

Do I have to give it an actual email?

No.

Depending on what you are using the PGP key for, you may want to specifically use a fake email address.


And how do I identify which key is my public and my private key?

That is mostly done automatically by the PGP client software.

Your public key is used by others to encrypt messages to you.

Your private key is used by you to decrypt messages from others.

If you were to export both using "ASCII armor",

the public key would start with this line

-----BEGIN PGP PUBLIC KEY BLOCK-----

and the private key key would start with this line

-----BEGIN PGP PRIVATE KEY BLOCK-----


Is the "key id" my public and "fingerprint" my private or is that my "sub key"?

No.

The 32 bit keyid, 64 bit keyid and 160 bit key fingerprint are all the same number, just different lengths. That number represents a hash of the key that can be used to identify it.

Example:

                                C68995FD  32 bit keyid
                        D32DD22CC68995FD  64 bit keyid
03A92ACF7A7A0BD66C194268D32DD22CC68995FD 160 bit key fingerprint

How to use a pgp on a mac? by vortex1098 in SilkRoad

[–]sohhlz 2 points3 points  (0 children)

there seems to be some online encryption tools

Don't use online tools to encrypt your messages. They could easily record all of your unencrypted messages, private keys and key passwords.


For the Mac, you can use GPGTools:

https://gpgtools.org/

GPGTools instructions:

To import somebody's key, highlight it and paste it into GPG Keychain Access.

To decrypt a message:

Highlighting the message, right-click and select "OpenPGP: Decrypt Selection to New Window". A new window will pop up with the decrypted message.

To encrypt a message:

Type up your message, highlight it, right-click, select "OpenPGP: Encrypt Selection to New Window". A new window will pop up with the encrypted message.


http://support.gpgtools.org/kb/how-to/first-steps-where-do-i-start-where-do-i-begin

http://support.gpgtools.org/kb/faq-gpgservices/how-do-i-activate-the-gpgservices

http://support.gpgtools.org/kb/faq-gpgservices/how-to-encrypt-and-sign-text-or-files-with-gpgservices


If you want to practice sending and receiving encrypted messages, this is a good sub:

/r/GPGpractice

Is it strange for a vendor to have 2 different public PGP keys on 2 different markets? by Tdunsky in DarkNetMarkets

[–]sohhlz 0 points1 point  (0 children)

Perhaps they have different employees working as separate teams on each DNM?

Could be.

Is it strange for a vendor to have 2 different public PGP keys on 2 different markets? by Tdunsky in DarkNetMarkets

[–]sohhlz 2 points3 points  (0 children)

Seems like that would be a very bad practice. That kind of thing could point to somebody else acting as an imposter of the original vendor.

You might want to check the All Markets Vendor Directory here and see what they have listed for the vendor:

http://directory4iisquf.onion/

Issues when starting tails by drugsolicitation in tails

[–]sohhlz 0 points1 point  (0 children)

At this point, you might want to try that.

You could also try burning a Tails 1.1 DVD and booting from that.

What method are you using to install Tails to the USB?

Impossible to get public PGP key on Tails 1.1 by [deleted] in DarkNetMarkets

[–]sohhlz 3 points4 points  (0 children)

The menus for the OpenPGP applet have changed in Tails 1.1.

To export your public key to the clipboard, click on your key to highlight it and then from the top menu of the "Passwords and Keys" window, do Edit -> Copy.

To export your public key to a file, click on your key to highlight it and do a File -> Export. On the lower right hand side of the new window, change "PGP keys" to "Armored PGP keys", browse to where you want to save the file and click Export.

Issues when starting tails by drugsolicitation in tails

[–]sohhlz 0 points1 point  (0 children)

You might try these two things:


Can you connect a hardwired ethernet cable between your PC and your router?

There is some possibility that, even though you seemingly have a good internet connection (as shown by the Unsafe Web Browser test), you might be dropping larger packets if Tails was unable to setup your wireless device correctly.


Can you try turning off the MAC spoofing option?

On Tails boot, select "Yes" in the "More options" window and hit "Login".

Then click on the "Spoof all MAC addresses" button so that it is not selected (Dark -> Light).

See if you can connect.

WTF where is the tails iso checksum? by bonobnbonoada in tails

[–]sohhlz 0 points1 point  (0 children)

Unfortunately, it looks like they removed it from the download page (maybe temporarily?).

You can still find it on the Tails website here:

https://tails.boum.org/inc/stable_i386_hash/

Update from 0.22 to 1.0 Issues by The-White-Rabbit-One in tails

[–]sohhlz 0 points1 point  (0 children)

The upgrade to Tails 1.1 is a major one.

To upgrade, boot from a new Tails 1.1 device (DVD or USB) and after the boot is complete, insert the USB to be upgraded.

When you upgrade your old USB, make sure that you use the "Clone & Upgrade" option from the Tails Installer.

Top bar -> Applications -> Tails Installer -> Clone & Upgrade

(Do not use the "Clone & Install" method. It will wipe out your persistence volume.)

One method is to boot from a Tails 1.1 DVD and then insert the old USB and upgrade it.

If you can't do that (no DVD, etc.), you can create a bootable Tails 1.1 USB using the Universal USB Installer (Select Tails as the OS) and boot from that. Use it to upgrade your old USB with the persistence volume.

If at all possible, back up the important data in your persistence volume before the upgrade (GPG keys, passwords, Electrum seed words, etc.).


If you can't boot from the USB with persistence because of the failed upgrade and therefore can't get to your persistent data to back it up, try this:

Boot from a Tails 1.1 DVD with the USB that has the persistent volume on it already inserted into the machine.

Hit Tab at the Tails boot screen and add a space and then the following:

bootfrom=/dev/sr0

to the boot line and then hit enter.

Tails should boot up from the DVD and see the persistence partition on the USB and allow you to enable it.

Update from 0.22 to 1.0 Issues by The-White-Rabbit-One in tails

[–]sohhlz 0 points1 point  (0 children)

Are you using the boot from Tails 1.1 DVD -> Tails Installer to USB method?

If you set aside your USB with persistence are you able to create a new 1.1 USB and get it to properly boot?

Issues when starting tails by drugsolicitation in tails

[–]sohhlz 0 points1 point  (0 children)

I was able to load yahoo on the unsafe web browser.

That's good! It means that Tails was able to configure your wireless device and you are connected to the internet.


Are you able to access the Tor network from your normal operating system (Window 7?) using the Tor Browser Bundle?

(Just trying to see if Tor might be blocked from your location.)


Try setting the time in your PC's BIOS to UTC instead of your local time.

http://www.worldtimeserver.com/current_time_in_UTC.aspx

and then boot Tails and see if it can connect to the Tor network.

If it still does not connect to the Tor network, start the Unsafe Web Browser and go here:

http://vancouver-webpages.com/time/

What does this site say your time offset is?

I tried to install TAILS to new USB from an original USB, but it rendered the new USB useless? by L_S_D_throwaway in DarkNetMarketsNoobs

[–]sohhlz 0 points1 point  (0 children)

I lost a lot of sleep over this last night

Sorry about that. I've used the Disk Management tool in the past with Tails and it worked without problem.

this totally worked. Thanks.

Excellent!

It should be noted though that I had to format the disk before it became usable.

I'll put that note in my original response.

reddit gold

In Summation

Want to say thanks to %(recipient)s for this comment? Give them a month of reddit gold.

By purchasing Reddit Gold, you agree to the Reddit User Agreement.

  • make my gift anonymous
  • include a message

Please select a payment method.

Give gold often? Consider buying creddits to use, they're 40% cheaper if purchased in a set of 12.

Would you like to learn more about giving gold?