Silk Road forums

Discussion => Security => Topic started by: MacMan on September 30, 2013, 04:08 am

Title: F*ck, Did i make a mistake with Uglysurfers Darknet USB?
Post by: MacMan on September 30, 2013, 04:08 am
Idk wtf i was thinking and how i didnt factor in the possibility what if dude is LE!!!. Not saying he is but, plugging a usb stick in ur computer if he was is pretty much a sealed deal your fucked.  Idk why i didnt think about it before i did it. But now im questioning how do I/We know he is legit???

Please someone tell me they KNOW this dude aint LE
Title: Re: F*ck, Did i make a mistake with Uglysurfers Darknet USB?
Post by: skitzo on September 30, 2013, 04:20 am
lmao thats what i thought about. can just make your own with good ole google
Title: Re: F*ck, Did i make a mistake with Uglysurfers Darknet USB?
Post by: Bazille on September 30, 2013, 11:55 am
If you're paranoid you could simply create your own Darknet USB. The bootable Whonix tutorial in my signature does pretty much the same as the USB stick you bought. It may be even more secure as it uses Whonix for the virtual machines.

I assume you boughts this:
http://silkroadvb5piz3r.onion/silkroad/item/1858539732
Title: Re: F*ck, Did i make a mistake with Uglysurfers Darknet USB?
Post by: ECC_ROT13 on September 30, 2013, 02:22 pm
My opinion: There are a million ways it could be full of evil shit, but I really, really doubt it's US LE.

Think about it backwards, from their perspective.   Let's make a USB stick, full of stuff that let's people communicate anonymously, but we'll backdoor it, so we'll know who they are and what they do.   Okay, so far, this sounds great from their perspective.

But with the constraints we can surmise from the FH malware incident a few months ago, LE can't get a judge to just let them spread malware to the world (yet) just in case it helps them catch something "bad".   In that case, they had a *clear* link that users using the FH sites  were viewing CP.   And what they apparently got the okay for was to ship very careful malware that just pinged info back to them, only on a subset of clients.  And based on the fact that the exploit didn't even work on *current* versions of the Tor Browser, you can guess that it took them a while to get the okay.   Too long to be truly effective.

So in the case of your USB stick, their request looks like: "We have no idea who's going to buy this, and we can't prove they're going to be doing bad things with it.  We just know they're buying it from SR, which is chock full o' evil shit.  Can we backdoor it and sell it and see where it leads?"  I don't think that makes the hurdle from an oversight perspective, and I damned sure don't think any boring assed middle manager in LE is going to say, "Yeah, what a great use of our resources.  We might accidentally catch some people".

I don't think your worry is from LE.  Which means there are two explanations why the seller is selling "Darknet USB" sticks:
1. Jimmy Wannahack thinks he can make an super-eleet USB stick.  He wants bitcoin.  Presto, he's all crypto-munitions-dealer and shit now.
2. Somebody wants to backdoor it, and if they're not LE, they're wanting a way to monetize it.

#1 above is mostly harmless, except Jimmy Wannahack is almost certainly not be quite as bright as he thinks he is, and I wouldn't trust a stranger with my security.  You shouldn't, either.

#2 is the one you oughta be worried about.  The two obvious ways to make money from you using my evil USB stick would be to either skim your credentials to SR and other places, and find ways to use those to steal bitcoin, or to gather enough personal information about you to extort cash from you.  i.e.  "I know you're Person X, and you did these five Evil Things.   Gimme cash."

You should:
1. Go get something you can trust to use, even if only temporarily.  If you don't feel like going through any of the decent tutorials here on how to build Whonix/etc systems, at least go get a copy of Tails and copy it to USB.   
2. Once you're not using that darknet USB craziness, go change every fucking password you have, everywhere.
3. Sit down, pour yourself a beer, and try to make a list of everything you did while using the darknet USB.  See what you can do to address any other exposure you may have.

And if you used that darknet USB on a laptop that also had *your* hard drive in it (i.e. your normal, Joe Blow everyday laptop), consider that malicious code on that USB could have dug through those files on the hard drive (unless the HD had full disk encryption), and it could have planted malware on the hard drive itself.  Personally, I'd use dban or something similar to wipe that hard drive and reinstall it.

You're much better off with using a tutorial here, or using Tails than you are trusting a stranger to provide "security" for you. 

There's no magic in the world, and Jimmy Wannahack or whoever is making USB sticks on SR doesn't have any secret ninja tricks.  He's doing the same shit you see in tutorials here, and possibly skipping a few steps.

It does make me wanna see a copy of one of those USB sticks, though.  If anybody has one that they've never used, posting a "dd" of it somewhere would be awesome.  If you have one that you *have* used, you'd be an idiot to post it though, because there's no telling if it had your personal info already buried in it.
Title: Re: F*ck, Did i make a mistake with Uglysurfers Darknet USB?
Post by: Shaggy Shaman on October 01, 2013, 04:33 am
1. Jimmy Wannahack thinks he can make an super-eleet USB stick.  He wants bitcoin.  Presto, he's all crypto-munitions-dealer and shit now.

That was hilarious! Perfect an' shit!

SS
Title: Re: F*ck, Did i make a mistake with Uglysurfers Darknet USB?
Post by: streetelitist on October 01, 2013, 05:01 am
The moment you type in your account info and pin number to buy something, say good bye to your BTC.

I've seen reports on multiple vendors who sell tech equipment/guides (pdf files), saying they lost all of their btc after installing/using said equipment. Bunch of malicious software you will never find with any sort of scan. These SR vendor-hackers are pretty damn smart.