home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   INTERNET      The global pornography network      2,155 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,005 of 2,155   
   Corey to Khelair   
   Re: Rise of the Dark Nets   
   30 Aug 13 09:09:05   
   
     Re: Re: Rise of the Dark Nets   
     By: Khelair to S/370 on Fri Aug 30 2013 09:45 am   
      
    >   Re: Re: Rise of the Dark Nets   
    >   By: S/370 to Khelair on Mon Aug 26 2013 03:02:27   
    >    
    >  > That's the thing. Considering that the US Navy originally developed tor,    
    >  > wouldn't be surprised if a good number of the exit nodes are run by the U   
    >  > government. But personallly I haven't heard any stories of people being b   
    >  > on tor (yet), so maybe its safer than it looks. Nevertheless, someone men   
    >  > I2P so I'll try reading more about that.   
    >    
    >     Yeah, I've thought about the exit node issue, too.  After all, that's ho   
    > good portion of the wikileaks information got pwned, too.  If you'll remembe   
    > Assange came on the scene, and it's not like you can just advertise "Leak al   
    > your info to us!  Be the first!"  When they got on the scene they already ha   
    > millions of leaked cables and documents.  It was from running tor exit nodes   
    > Thing about that is that you still can't determine the original sender's IP   
    > from the information that flows from them, so if you are careful enough with   
    > your online habits, you've still got a decent degree of protection.  Using t   
    > alone really isn't a good defense if you're still logging in to the same   
    > accounts, with the same passwords, from the same location, etc etc etc.  Tor   
    > site has a lot of documentation about proper usage of it that is pretty   
    > valuable.   
    >     Unfortunately, I just came across the news yesterday that the NSA has ma   
    > some massive, but thoroughly unspecific, advances in decrypting common   
    > encrypted data.  So it doesn't really specify if that is for SSL/SSH/PGP, or   
    > what, but it really should make a person reconsider what they're willing to   
    > commit to digital media in the first place.  I can't find the exact link tha   
    > first read it at, but here is one referencing the same information that came   
    > courtesy of Ed Snowden: http://tinyurl.com/oc3avnp  Needless to say, I'm   
    > reassessing my previous assertions that the PGP 2.3a algorithm, even, is sti   
    > an issue for the NSA to crack.   
    >     Came across this while I was looking for that last link, too.  Ugh I clo   
    > the link but it should be easy enough to google.  Looks like anybody with   
    > decent sniffing capabilities on your data can get through SSL pretty easily.   
    >     Oh as far as people being busted on tor, also...  Look up the massive wa   
    > of child porn busts that the federal government made not too long ago.  Thos   
    > were all related to federal interception of tor data and/or bitcoin data.   
    >    
    > -The opinions expressed are not necessarily an advocation of any of the   
    > aforementioned ideologies, concepts, or actions.  We still have the freedom    
    > speech, for now, and I enjoy using it in a satirical or ficticious manner to   
    > amuse myself-   
    >    
    > "In times of universal deceit, telling the truth will be a   
    > revolutionary act." --  George Orwell   
    >    
    >    
      
   beware the dorknits!   
      
   "Practise safe Lunch, Use a Condiment"   
      
      
   ---   
    þ Synchronet þ Three Stooges - Las Vegas, Nv - tsgc.synchro.net   
    * Origin: Time Warp of the Future BBS - Home of League 10 (1:340/400)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca