Forum Statistics

Threads
27,576
Posts
541,630
Members
28,554
Latest Member
pbtom

Search Results

  1. P

    Bitcoin and Porn

    PI notes : probably one of my fav places is bongo cams. These women do alot for a little BTC. _____________________ The Online Porn Industry Continues to Adopt Bitcoin for Payments By Jamie Redman - June 29, 2017 There’s a lot of talk about drug purchases on darknet markets with...
  2. P

    Glad to be Back.

    I hope to make this my new home. I wasted half of my life on other Fourms and need a place that will help me move forward in my Bodybuilding carreer with useful info and members that really live the lifestyle. I hope to learn and share info as well as meeting good quality friends here. Thank you PI
  3. P

    A New Proposal Called ‘Dandelion’ Hopes to Redesign the Bitcoin Network for Anonymity

    Dandelion is a concept designed by the Zcash advisor and developer Andrew Miller and a team of University of Illinois researchers. A few months ago the team released its white paper ‘Dandelion: Redesigning the Bitcoin Network for Anonymity.’ The project is a new type of transaction broadcasting...
  4. P

    Tumblebit Client Nears Completion — Gets a Taste of Tor

    Tumblebit Client Nears Completion — Gets a Taste of Tor By Jamie Redman - July 12, 2017 This week the creator of Hiddenwallet, a Simplified Payment Verification client (SPV) that utilizes the trustless anonymous payment hub Tumblebit revealed the near completion of another project, called...
  5. P

    Obtaining, sending and receiving bitcoins anonymously

    OBTAINING, SENDING AND RECEIVING BITCOINS ANONYMOUSLY This post was inspired by a user who posted the following on the Silk Road forums. Quote from: dusttodust on January 12, 2014, 07:39:43 pm BEST WAY TO OBTAIN BTC'S? AND HOW DO YOU PROTECT IDENTIY DONIG SO? i just would like to...
  6. P

    Tor chat

    TOR CHAT By now if you have been following this thread, you should know that any type of messaging system is likely compromised or storing your data for an unknown period of time, and if you ever become a person of interest can be looked back upon for 5+ years. This means things like...
  7. P

    Verifying signed messages with signatures and signing your own messages

    VERIFYING SIGNED MESSAGES WITH SIGNATURES AND SIGNING YOUR OWN MESSAGES Since we just finished a section on verifying downloads with signatures and public keys, I figured we should do a quick post on verifying messages by using the same two things, signatures and public keys. Now for...
  8. P

    How to verify your downloaded files are authentic

    HOW TO VERIFY YOUR DOWNLOADED FILES ARE AUTHENTIC I just had a realization about something that is pretty important and I wanted to share it with you, regarding security. Verifying your downloads As a general rule of thumb, you should always download files from the home pages of their...
  9. P

    How to connect to tor over top of tor

    HOW TO CONNECT TO TOR OVER TOP OF TOR Here is another fun tip that may or may not interest you, but I figured I would throw it in for you anyways. I figured this out while trying to figure out an effective way to do a TOR -> VPN connection. You can do TOR -> TOR connection with Tails...
  10. P

    Fraudulent private messages

    FRAUDULENT PRIVATE MESSAGES Be careful with private messages (PM) online, because one thing that comes with anonymity, is plenty of scammers. Silk Road users have been reporting supsicious and outright fraudulent messages from users posing as Moderators asking them to download files to...
  11. P

    Learning from others' mistakes. Libertas, dpr, sabu, lulzsec

    LEARNING FROM OTHERS' MISTAKES. LIBERTAS, DPR, SABU, LULZSEC A little change of pace for this next post. I want to talk about one of our fallen moderators Libertas. It has finally been confirmed, what we all were hoping for that Libertas, one of the 3 arrested moderators was released on...
  12. P

    Tracking cookies

    TRACKING COOKIES Next time I want to talk about is something that most people completely forget about. Tracking Cookies. A recent article explains how the NSA uses things like Google Ads and other tracking cookies to identify users over TOR when doing so by other means is not possible...
  13. P

    Combining tor with a vpn

    COMBINING TOR WITH A VPN I want to talk about a greatly debated topic. Should I use a VPN with TOR? Should I use TOR to connect to a VPN, or use a VPN to connect to TOR? Let me say first of all, that when you are browsing the internet without TOR, you should probably be using a VPN...
  14. P

    Retaining a lawyer, how to handle getting caught or interrogated

    RETAINING A LAWYER, HOW TO HANDLE GETTING CAUGHT OR INTERROGATED Next entry into the series on security is how to handle getting caught. Let us face it. We are all human and we make mistakes. Unfortunately, you only need to make one mistake, and the Law Enforcement, commonly referred to...
  15. P

    Exif data

    EXIF DATA when talking about metadata, that when it comes to photos, there is another risk involved called EXIF data, this is another form of meta data specifically related to images and may not be properly removed by Metadata Anonymisation Toolkit mentioned before. EXIF data stands...
  16. P

    General security precautions when posting online, learn from others' mistakes

    GENERAL SECURITY PRECAUTIONS WHEN POSTING ONLINE, LEARN FROM OTHERS' MISTAKES Next I want to talk about good practices when using TOR, Tails and other hidden services. First of all, it is highly recommended that you use multiple identities online for different things. Perhaps if you are...
  17. P

    Javascript vulnerabilities and removing personal metadata from files

    JAVASCRIPT VULNERABILITIES AND REMOVING PERSONAL METADATA FROM FILES Before I get into removing harmful meta data from your files, I want to talk about another vulnerability to our browsing capabilities called Javascript. In mid 2013, a person in Ireland was providing hosting to...
  18. P

    Whole disk encryption and file shredding

    WHOLE DISK ENCRYPTION AND FILE SHREDDING Now that we have PGP figured out, hopefully, I want to remind you that using PGP whenever possible, is very very very important. One of the pitfalls of Silk Road 1, is that some of the administrators, including Ross himself did not always...
  19. P

    Pgp, tails, virtual box

    PGP, TAILS, VIRTUAL BOX So keep in mind that if you are a user of Silk Road, or any other form of activism, you never want to enter any identifying details about yourself online. Make it so that even if the NSA intercepted and decrypted, or compromised Silk Road that the only...
  20. P

    INTRODUCTiON TO SECURE COMMUNICATION - TOR, HTTPS, SSL

    INTRODUCTiON TO SECURE COMMUNICATION - TOR, HTTPS, SSL Greetings comrades. Through my research I have put together some security measures that should be considered by everyone. The reason I put this together is mainly for the newbies of this forum. But if I can help anyone out...
Top