Silk Road forums
Discussion => Newbie discussion => Topic started by: redDot333 on September 10, 2013, 10:25 pm
-
Is there any steps to use or something you should do rather than do before? I use TAILS and have had success with that. When TAILS updates are they using the newest versions of Tor? Just looking foe any general insite or knowledge that anyone will have on this topic with the NSA at all.
Thanks
-
What are you talking about man, it's almost impossible for the NSA to crack modern encryption methods like PGP.
Wait, are they running quantum computers?
-
What are you talking about man, it's almost impossible for the NSA to crack modern encryption methods like PGP.
Wait, are they running quantum computers?
I think he's considering this (clearnet):
http://news.yahoo.com/report-nsa-cracked-most-online-encryption-075457559--politics.html
But I think most of this is by collaboration with commercial organizations, making it possible for the information to be intercepted prior to encryption, rather than having direct access to encrypted information.
-
The encryption they're speaking of lies in these categories:
commercial encryption software
https and other encryption standards that are used for secure website logins, banking, etc.
VPNs
So far there is NO indication that TOR or PGP have been compromised.
All those folks acessing SR over those .tor links are fooked though.
-
dont like to say it but sounds like they are on there way to breaking PGP and somthing very strange is going on with tor atm for the last few weeks. i just wonder.....
-
There has been talk that the standard 1024bit encryption is weak, thats why there are 2048 and higher options if you use the bottom rung expect to be grabbed first..
As for TOR having problem ie running extremely slow its because the users went from 500,000 to 3,500,000 in a matter of days, believed to be a botnet as unimaginable that many people started using TOR since there hasnt been that many extra downloads, I upgraded to the new beta version that runs differently and seems a bit more stable and slightly more reliable
On a side note which retard thinks hidding a 3,000,000+ computer botnet behind 4000 nodes will work?
-
thanks for the insight fellas. Im not the best when understanding all of this, some of it is still greek to me so im trying to obtain all the info i can about the ongoing nsa situatuon
also, what is the point of having all those bots on the tor network? just to slow it down more?
safe travels on the road
-
i use hotspot shield (vpn) along with tor. i actually emailed my vpn provider for their thoughts. which i doubt the nsa cares about "legal". this was the reply they gave me:
Sep 07 14:01 (PDT):
Hello,
We do not keep logs or data of our users so they would not be able to access that information because it doesn't exist in the first place. They would have to physically tap in to and break our algorithm in order to accomplish spying. That of course is illegal.
-
u can also refer to this article
http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance
-
I have privateinternetaccess as a vpn because you can pay with BTC but just run tails for the most part now
Not sure of the point running a botnet through tor, trying to hide which as stated earlier not going to work too well or they are trying something out who knows, only Vlad
-
safety in numbers? stay in the noise.