Silk Road forums
Discussion => Security => Topic started by: ikalihi812 on March 06, 2012, 08:46 pm
-
What are the chances of being caught and imprisoned?
-
If the actual server can be traced to you and you do things that piss off the government I would say the chances of imprisonment are substantial
If the server can not be traced to you and you only access it via Tor chances of imprisonment are substantially less
-
Right... so having someone else physically take care of the server would be a good idea.
-
Get it at a data center. Even if they require payment in non anonymous ways you can use exchangers to anonymously fund them after washing the money securely. Just fill out bullshit information on their registration forms but try to make it seem legit / be legit info largely to get by any automated fraud detection. You might even need to get burner phone or pay somebody to do it, if you need a dedicated server. Dedicated servers are the hardest to get anonymously, they might even want scans of identification docs. Lots of anti fraud systems and such are in place when it comes to dedicated, but I have yet to find a hosting provider who had unpwnable anti fraud / anti crime systems in place it just is a huge pain in the ass.
VPS are generally much easier to get.
This way even if the hidden service is traced they hit a dead end. Of course always use Tor. If the hosting provider wont let you purchase with a Tor exit you might need to find an open proxy that isn't on their block list for registration. You probably will need to use an exit node that is in the country you pretend to be in, and you might even need to be able to get a text message or verification phone call to a cell phone registered in that country / produce scans of ID for that country (this is all for dedicated).
There are also some bulletproof / anonymous specialty hosts that don't make you jump through a billion hoops, and most of them are in favorable geographic areas. But expect to pay out the ass for a bullet proof anonymous hosting plan.
-
get outta here, i've never seen an anonymous hosting plan/dedicated server plan/company before... please post one up
-
hm heihachi resells for 2X4, they have ties to russian organized crime (probably RBN) and have hosted mucho very illegal shit without taking it down, including everything from botnet CNCs to carder forums to drug forums to child porn to probably everything in between. RBN is tight with the russian intelligence agencies so they can get away with anything. Of course just being on heihachi network essentially means you are doing something illegal so that is something to take into consideration.
Of course since you heard about them on an illegal forum you should assume that they are a federal honeypot and totally avoid them. Oh well at least I don't tell you to use my VPN lol. Actually the only reason I share them is because they are already widely known / infamous bullet proof hosts. Look up heihachi they have hilarious abuse complaint logs. And also because they are selective scammers and you really shouldn't risk your money with them.
stephen:
i would like to speak to one of you
Welcome stephen! Your request has been directed to the Technical Support department. Please wait for our operator to answer your call.
Call accepted by operator Live Support | Thomas. Currently in room: Live Support | Thomas, stephen. Guten Tag, wie kann ich Ihnen helfen?
stephen:
hi there
Live Support | Thomas:
hi
stephen:
do you speak english
Live Support | Thomas:
yes
Live Support | Thomas:
and german.
stephen:
ok thanks
stephen:
english would do me, i am calling from london
stephen:
could you please tell me if this ip if yours x.x.x.x
Live Support | Thomas:
yes, its our ip.
stephen:
ok.
stephen:
is this one of you customers?
Live Support | Thomas:
whats the problem with this ip?
stephen:
ok, your customer is a hacker
stephen:
he is running an illegal botnet on your ip
stephen:
x.x.x.x (....)
stephen:
i have sent email abuse at gigalink
stephen:
but they haven't replied, i found out that this ip belongs to you.
stephen:
your customer is hositng on your ip. about 1000 hacked computers, and he is running a sophisticated ircd server on your ip which is listening on port ....
stephen:
logs:
Live Support | Thomas:
moment.
stephen:
[20:51] <[nLh-VNC]cmmakd> [RAGE SCAN:] range: 188.x.x.x/64 threads.
[20:52] <[nLh-VNC]dyywqe> RAGE SCAN: scanning in progress.
[20:52] <[nLh-VNC]opokcb> [RAGE SCAN:] range: 185.x.x.x/64 threads.
[20:52] <[nLh-VNC]rdjlgp> [RAGE SCAN:] range: 185.x.x.x/64 threads.
[20:52] * HTTP1.4 sets mode: +m
[20:52] <mIRC>
[20:55] * HTTP1.4 sets mode: -m
[20:56] <[nLh-VNC]wndgtx> RAGE SCAN: scanning in progress.
[20:56] * HTTP1.4 sets mode: +m
Live Support | Thomas:
moment.
stephen:
[20:11] * Connect retry #39 x.x.x.x (....)
-
[20:11] -HTTP1.4- *** eh...
-
[nLh-VNC]zpwcnd Nickname is already in use.
Live Support | Thomas:
he attacks you? with this botnet?
stephen:
he has
stephen:
but you shouldn't ask me this question
stephen:
if he din't attack me? do you allow botnets on your servers?
stephen:
BOTNET ARE ILLEGAL AND YOUR COMPANY MUST NOT HOST SUCH CLIENTS
stephen:
your company is involved on illegal activities
Live Support | Thomas:
and now?
stephen:
what do u mean now?
Live Support | Thomas:
we allow botnets.
stephen:
excusme ?
stephen:
you must be joking
Live Support | Thomas:
Yes, sure, we allow. Give us money and we host you and we will **** the german police
stephen:
ah
stephen:
stephen:
is ok
stephen:
have you got a name?
Live Support | Thomas:
oik
Live Support | Thomas:
name?
stephen:
your name and surname
Live Support | Thomas:
for what?
Live Support | Thomas:
stephen:
so i can sent to the police
stephen:
so you can **** them
stephen:
or i will email
Live Support | Thomas:
yes
stephen:
russian police
Live Support:
Hello
stephen:
yes
stephen:
who is that?
Live Support:
Aha
stephen:
who am i speaking 2?
Live Support:
Your mother
Live Support:
**** off
Live Support | Thomas:
stephen:
where would you like me to post this conversation?
Live Support:
Please make, this is very good ads for us
stephen:
i mos certanly will
stephen:
most*
Live Support:
THX
Live Support:
We will this customers which host botnets at us
Live Support:
YOU ARE WELCOME!
Live Support:
We never kick you ))))))
Live Support | Thomas:
:hD
Live Support:
byeeeee
Live Support | Thomas:
have a nice day
Actually be safe with these fucks they are known to selectively scam their customers. I would go directly through 2X4 but they only speak Russian afaik. Actually I would go with a random provider (and pwn their anti fraud / anti crime identity verification systems) and use a Tor hidden service, it's almost pointless to use a hidden service with these guys just cuz everyone knows 99% of what they host is illegal lol.
-
Can't I simply just use a fully maximum encrypted server in my own house and then use TOR hidden service? I mean both ways it's safe... even if the cops take it for investigation it's still safe.
-
Holy shit, these guys are awesome..
stephen:
where would you like me to post this conversation?
Live Support:
Please make, this is very good ads for us
-
They can prove what is on the server via traffic analysis without having to actually get info off it when they seize it. Hosting illegal hidden services from home is bad for your health.
-
Holy shit, these guys are awesome..
stephen:
where would you like me to post this conversation?
Live Support:
Please make, this is very good ads for us
Heihachi is awesome up to the point they steal your money and tell you to go fuck yourself. I know plenty of people who have used their services for botnet CNC and also for hosting illegal forums, but I also know of a few cases where they quite frankly tell people to go fuck themselves after they send money. They are selective scammers. Plus they just resell for 2X4, but pretty sure 2X4 only sell dedicated servers and only speak Russian.
There are several hosts that are bulletproof to various extents. Some will host drug forums no problems and ignore absue complaints. It takes hardcore bulletproof to host botnet CNC though even the "bulletproof" providers who don't care about drug forums will shut down CNC pretty damn fast. Not going to share the others though go dig them up yourself ;P. But there is little need for bulletproof host since Tor pretty much accomplish the same thing. Of course if your hidden service is traced to a non bullet proof provider it may be taken down. But so far this has never happened due to a direct attack on Tor. But I would *not* want to host a hidden service with a server that has any ties to me that are not obfuscated by Tor and long path of E-currency/exchangers or bitcoin mixes etc.
-
They can prove what is on the server via traffic analysis without having to actually get info off it when they seize it. Hosting illegal hidden services from home is bad for your health.
What do you mean by traffic analysis? All I'm going to have on my server is a message board...?
-
They can prove what is on the server via traffic analysis without having to actually get info off it when they seize it. Hosting illegal hidden services from home is bad for your health.
What do you mean by traffic analysis? All I'm going to have on my server is a message board...?
Feds will load every page on the message board and archive it, then trace it to its entry guards, passively monitor them, send your hidden service some packet streams with a pattern they add in the modulation, then observe the stream arrive at your physical server, thus proving that your physical server has all the material they previously loaded on it, regardless of if it is encrypted when they seize it or not.
-
Two things I thought of. Pruning or cleaning regularly. Or an IRC based chatroom or something similar where things don't get archived.
-
stephen:
i would like to speak to one of you
Welcome stephen! Your request has been directed to the Technical Support department. Please wait for our operator to answer your call.
Call accepted by operator Live Support | Thomas. Currently in room: Live Support | Thomas, stephen. Guten Tag, wie kann ich Ihnen helfen?
stephen:
hi there
Live Support | Thomas:
hi
stephen:
do you speak english
Live Support | Thomas:
yes
Live Support | Thomas:
and german.
stephen:
ok thanks
stephen:
english would do me, i am calling from london
stephen:
could you please tell me if this ip if yours x.x.x.x
Live Support | Thomas:
yes, its our ip.
stephen:
ok.
stephen:
is this one of you customers?
Live Support | Thomas:
whats the problem with this ip?
stephen:
ok, your customer is a hacker
stephen:
he is running an illegal botnet on your ip
stephen:
x.x.x.x (....)
stephen:
i have sent email abuse at gigalink
stephen:
but they haven't replied, i found out that this ip belongs to you.
stephen:
your customer is hositng on your ip. about 1000 hacked computers, and he is running a sophisticated ircd server on your ip which is listening on port ....
stephen:
logs:
Live Support | Thomas:
moment.
stephen:
[20:51] <[nLh-VNC]cmmakd> [RAGE SCAN:] range: 188.x.x.x/64 threads.
[20:52] <[nLh-VNC]dyywqe> RAGE SCAN: scanning in progress.
[20:52] <[nLh-VNC]opokcb> [RAGE SCAN:] range: 185.x.x.x/64 threads.
[20:52] <[nLh-VNC]rdjlgp> [RAGE SCAN:] range: 185.x.x.x/64 threads.
[20:52] * HTTP1.4 sets mode: +m
[20:52] <mIRC>
[20:55] * HTTP1.4 sets mode: -m
[20:56] <[nLh-VNC]wndgtx> RAGE SCAN: scanning in progress.
[20:56] * HTTP1.4 sets mode: +m
Live Support | Thomas:
moment.
stephen:
[20:11] * Connect retry #39 x.x.x.x (....)
-
[20:11] -HTTP1.4- *** eh...
-
[nLh-VNC]zpwcnd Nickname is already in use.
Live Support | Thomas:
he attacks you? with this botnet?
stephen:
he has
stephen:
but you shouldn't ask me this question
stephen:
if he din't attack me? do you allow botnets on your servers?
stephen:
BOTNET ARE ILLEGAL AND YOUR COMPANY MUST NOT HOST SUCH CLIENTS
stephen:
your company is involved on illegal activities
Live Support | Thomas:
and now?
stephen:
what do u mean now?
Live Support | Thomas:
we allow botnets.
stephen:
excusme ?
stephen:
you must be joking
Live Support | Thomas:
Yes, sure, we allow. Give us money and we host you and we will **** the german police
stephen:
ah
stephen:
stephen:
is ok
stephen:
have you got a name?
Live Support | Thomas:
oik
Live Support | Thomas:
name?
stephen:
your name and surname
Live Support | Thomas:
for what?
Live Support | Thomas:
stephen:
so i can sent to the police
stephen:
so you can **** them
stephen:
or i will email
Live Support | Thomas:
yes
stephen:
russian police
Live Support:
Hello
stephen:
yes
stephen:
who is that?
Live Support:
Aha
stephen:
who am i speaking 2?
Live Support:
Your mother
Live Support:
**** off
Live Support | Thomas:
stephen:
where would you like me to post this conversation?
Live Support:
Please make, this is very good ads for us
stephen:
i mos certanly will
stephen:
most*
Live Support:
THX
Live Support:
We will this customers which host botnets at us
Live Support:
YOU ARE WELCOME!
Live Support:
We never kick you ))))))
Live Support | Thomas:
:hD
Live Support:
byeeeee
Live Support | Thomas:
have a nice day
LOLOLOLOLOL!! Holy shit KMF what the hell is this? LOL!!!
-
Two things I thought of. Pruning or cleaning regularly. Or an IRC based chatroom or something similar where things don't get archived.
No matter what you do hosting a hidden service from home is retarded because chances of the FBI and other feds not being able to quickly trace them are pretty much zero percent. I would like to continue to cling to the fantasy that FBI is an entirely incompetent organization, but the step by step instructions for how to trace hidden services are contained in whitepapers on the public internet so its really a stretch to think that they can't at least pay someone to do it for them.
-
So why is Silk Road so safe then?
-
It probably is fairly safe to assume that all traffic to and from SR server is passively monitored.
-
See my issue with having a remote server is that I won't be able to encrypt it's full disk and keep the contents encrypted as well inside a container
-
See my issue with having a remote server is that I won't be able to encrypt it's full disk and keep the contents encrypted as well inside a container
You could encrypt the entire drive if you get a server with a remote KVM switch :). And you can use container encryption without even needing that. But you might need a dedicated server. A lot of VPS software doesn't give you the ability to create encrypted containers
-
See my issue with having a remote server is that I won't be able to encrypt it's full disk and keep the contents encrypted as well inside a container
You could encrypt the entire drive if you get a server with a remote KVM switch :). And you can use container encryption without even needing that. But you might need a dedicated server. A lot of VPS software doesn't give you the ability to create encrypted containers
Sounds unlikely that I will find a service that allows that in North America.
-
How does this setup look like to you guys:
Internet --> Modem --> SonicWall TZ210 w/ AV... OR UNTANGLE PC --> PC with hardware encryption(TPM) and full software encryption(Truecrypt Hidden Operating System and Decoy) --> Virtualization --> TrueCrypt File Container, using AES-Twofish-Serpent w/ Whirlpool and using the max amount of characters allowed 64 bits, with multiple key files as .jpg files and .mp3 files --> Contents of message board et al.
Of course, since Truecrypt is only compatible with Windows for the most part, the PC will also have Bitdefender as AV and Comodo Firewall
I WILL TRY TO MAKE THE SERVER in a far away location, but have yet to find a place that will let me. It's on my list of things to do.
-
Of course, since Truecrypt is only compatible with Windows for the most part, the PC will also have Bitdefender as AV and Comodo Firewall
...you sure about that?
hxxp://www.truecrypt.org/downloads
Available for:
1) Windows 7/Vista/XP/2000
2) Mac OS X
3) Linux (Standard/Console/32-bit/64bit)