Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    INTERNET    |    The global pornography network    |    2,155 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,004 of 2,155    |
|    Khelair to S/370    |
|    Re: Rise of the Dark Nets    |
|    30 Aug 13 09:45:34    |
       Re: Re: Rise of the Dark Nets        By: S/370 to Khelair on Mon Aug 26 2013 03:02:27               > That's the thing. Considering that the US Navy originally developed tor, I        > wouldn't be surprised if a good number of the exit nodes are run by the US        > government. But personallly I haven't heard any stories of people being bust        > on tor (yet), so maybe its safer than it looks. Nevertheless, someone mentio        > I2P so I'll try reading more about that.               Yeah, I've thought about the exit node issue, too. After all, that's how a       good portion of the wikileaks information got pwned, too. If you'll remember,       Assange came on the scene, and it's not like you can just advertise "Leak all       your info to us! Be the first!" When they got on the scene they already had       millions of leaked cables and documents. It was from running tor exit nodes.        Thing about that is that you still can't determine the original sender's IP       from the information that flows from them, so if you are careful enough with       your online habits, you've still got a decent degree of protection. Using tor       alone really isn't a good defense if you're still logging in to the same       accounts, with the same passwords, from the same location, etc etc etc. Tor's       site has a lot of documentation about proper usage of it that is pretty       valuable.        Unfortunately, I just came across the news yesterday that the NSA has made       some massive, but thoroughly unspecific, advances in decrypting common       encrypted data. So it doesn't really specify if that is for SSL/SSH/PGP, or       what, but it really should make a person reconsider what they're willing to       commit to digital media in the first place. I can't find the exact link that I       first read it at, but here is one referencing the same information that came       courtesy of Ed Snowden: http://tinyurl.com/oc3avnp Needless to say, I'm       reassessing my previous assertions that the PGP 2.3a algorithm, even, is still       an issue for the NSA to crack.        Came across this while I was looking for that last link, too. Ugh I closed       the link but it should be easy enough to google. Looks like anybody with       decent sniffing capabilities on your data can get through SSL pretty easily.        Oh as far as people being busted on tor, also... Look up the massive wave       of child porn busts that the federal government made not too long ago. Those       were all related to federal interception of tor data and/or bitcoin data.              -The opinions expressed are not necessarily an advocation of any of the       aforementioned ideologies, concepts, or actions. We still have the freedom of       speech, for now, and I enjoy using it in a satirical or ficticious manner to       amuse myself-              "In times of universal deceit, telling the truth will be a       revolutionary act." -- George Orwell                     ---        þ Synchronet þ Tinfoil Tetrahedron : telnet bismaninfo.hopto.org 8023 :       http:8080        * Origin: Time Warp of the Future BBS - Home of League 10 (1:340/400)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca