mirimir:
> On 10/03/2013 03:39 AM, Martin Weinelt wrote:
>
> > this subreddit is private
> >
> > the moderators of this subreddit have set it to private. you must be a
> > moderator or approved submitter to view its contents.
> > a message from the moderators of /r/SilkRoad
> >
> > Silk Road
>
On Wed, Oct 02, 2013 at 11:17:08PM -0400, Jonathan D. Proulx wrote:
> :https://blog.torproject.org/blog/tor-and-silk-road-takedown
>
> In many ways this is (or should be) a PR win for Tor.
>
> 1) No technical vulnerabilities were used (AFAWK) - this should be welcome
> news to Tor users
>
> 2) T
On 10/03/2013 03:39 AM, Martin Weinelt wrote:
> this subreddit is private
>
> the moderators of this subreddit have set it to private. you must be a
> moderator or approved submitter to view its contents.
> a message from the moderators of /r/SilkRoad
>
> Silk Road
They can have their little pr
On 10/03/2013 03:39 AM, Martin Weinelt wrote:
> this subreddit is private
>
> the moderators of this subreddit have set it to private. you must be a
> moderator or approved submitter to view its contents.
> a message from the moderators of /r/SilkRoad
>
> Silk Road
Answering my own question:
ht
Arlo Breault:
>> How about changing "Your browser…" to "This browser…"?
>
>
> Thanks for the reminder. That was one of first issues that came up
> but I was holding off in case other strings needed translation.
> https://github.com/arlolra/check/issues/1
>
Yes, please do this :-) I have witness
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
this subreddit is private
the moderators of this subreddit have set it to private. you must be a
moderator or approved submitter to view its contents.
a message from the moderators of /r/SilkRoad
Silk Road
On 03.10.2013 04:29, shadowOps07 wrote:
>
On Wed, Oct 02, 2013 at 10:07:00PM -0400, Roger Dingledine wrote:
:On Thu, Oct 03, 2013 at 01:34:37AM +, mirimir wrote:
:> Wow. I just read the complaint :8
:>
:> He was unfathomably stupid. Words cannot express how stupid he was.
:>
:> This has absolutely no relevance to the Tor network.
:
:
Guys,
There are rumors that LE arrested the wrong "DPR" guy, as a security
precaution. Just read it over at reddit:
http://www.reddit.com/r/SilkRoad/comments/1nle25/has_anyone_considered_this/
My two cents.
On Wed, Oct 2, 2013 at 9:34 PM, mirimir wrote:
> On 10/02/2013 07:49 PM, Al Billings
On Thu, Oct 03, 2013 at 01:34:37AM +, mirimir wrote:
> Wow. I just read the complaint :8
>
> He was unfathomably stupid. Words cannot express how stupid he was.
>
> This has absolutely no relevance to the Tor network.
We just put up a statement on the blog which basically says that:
https://
On 10/02/2013 07:49 PM, Al Billings wrote:
> It was one of the things clearly listed in the court filing.
>
>
>
>
> http://krebsonsecurity.com/wp-content/uploads/2013/10/UlbrichtCriminalComplaint.pdf
Wow. I just read the complaint :8
He was unfathomably stupid. Words cannot express how stupi
On 10/02/2013 09:32 PM, shadowOps07 wrote:
> https://medium.com/i-m-h-o/85dc5cccf8c6
>
> The charges won't stick for numerous of reasons. He will be let go.
While I appreciate the spirit of those reasons, I'm 100% certain that
they'll mean nothing in the US court system.
> On Wed, Oct 2, 2013 a
Not if he has the messages encrypted with PGP. NSA/FBI cannot crack/factor
beyond 1024 bit RSA. Always, always, always encrypt your message with PGP.
Congratulation to Special Agent Christopher Tarbell:
[image: Inline image 1]
Alias, DPR will be acquitted because the charges won't stick against
https://medium.com/i-m-h-o/85dc5cccf8c6
The charges won't stick for numerous of reasons. He will be let go.
On Wed, Oct 2, 2013 at 4:31 PM, kendrick eastes wrote:
> On Wed, Oct 2, 2013 at 1:33 PM, jake.tar...@gmail.com <
> jake.tar...@gmail.com
> > wrote:
>
> > > Of course, part of what tipped
On 10/2/2013 3:58 PM, Shaun Savage wrote:
> He got busted.
>
> On 10/02/2013 12:10 PM, David Larsus wrote:
>> looking for a way to contact silk road.Site shut down.money at stake.
>
And now that Mr. Larsus (if that is his real name) has posted publicly
that he has "money at stake" at silk road,
On Wed, Oct 2, 2013 at 1:33 PM, jake.tar...@gmail.com wrote:
> > Of course, part of what tipped off the Feds was when his fake IDs were
> intercepted by customs while being mailed from Canada.
>
> Where did you read this?
>
https://pay.reddit.com/r/Bitcoin/comments/1nl58n/silkroad_domain_states_
He got busted.
On 10/02/2013 12:10 PM, David Larsus wrote:
> looking for a way to contact silk road.Site shut down.money at stake.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-tal
Congratulations to all participants. It looks fantastic.
On Wed, Oct 2, 2013 at 12:25 PM, Roger Dingledine wrote:
> Tor 0.2.5.1-alpha introduces experimental support for syscall sandboxing
> on Linux, allows bridges that offer pluggable transports to report usage
> statistics, fixes many issu
I would assume they were digging into the origins of the Silk Road, tracking
down references as you quote below. It isn't clear how they actually got his
name and if they had it before customs intercepted him importing fake IDs. The
paperwork claims that this was a random customs check but that
Page 26 paragraph 38 (I think) is where it has the first indication of
how they caught him.
Summary:
* The very first mention of the Silk Road was from a user named
"altoid" on a forum
* Someone else named "altoid" on the bitcoin forums advertised for
developers, using
On 10/02/2013 07:21 PM, Ahmed wrote:
> http://www.ehackingnews.com/2013/10/silk-road-taken-down-by-fbi.html
The FBI recently took down Freedom Hosting. Tormail used Freedom
Hosting. I wonder whether the FBI found unencrypted messages on Tormail
servers that led them to Ross Ulbricht.
--
tor-ta
I think they were already looking for him by name when he posted on
stackoverflow.
—
http://makehacklearn.org
On Wed, Oct 2, 2013 at 12:56 PM, Ahmed Hassan wrote:
> Go to page 24 here, and read how was caught:
> http://www1.icsi.berkeley.edu/~nweaver/UlbrichtCriminalComplaint.pdf
> He was caug
It was one of the things clearly listed in the court filing.
http://krebsonsecurity.com/wp-content/uploads/2013/10/UlbrichtCriminalComplaint.pdf
—
http://makehacklearn.org
On Wed, Oct 2, 2013 at 12:41 PM, jake.tar...@gmail.com
wrote:
>> Of course, part of what tipped off the Feds was when h
Go to page 24 here, and read how was caught:
http://www1.icsi.berkeley.edu/~nweaver/UlbrichtCriminalComplaint.pdf
He was caught because of this post ->
stackoverflow.com/questions/15445285/how-can-i-connect-to-a-tor-hidden-service-using-curl-in-php
On Wed, Oct 2, 2013 at 3:33 PM, jake.tar...@gma
On Thu, 2013-09-26 at 20:07 +0200, Leo Unglaub wrote:
> Hey,
>
> On 2013-09-26 13:58, Nathan Suchy wrote:
> > Wow are you guys really going to argue over what operating system or
> > version the guy uses? He just wants help getting Tor to work on his old
> > operating system.
>
> So it is a proble
Of course, part of what tipped off the Feds was when his fake IDs were
intercepted by customs while being mailed from Canada.
—
http://makehacklearn.org
On Wed, Oct 2, 2013 at 12:26 PM, Ahmed wrote:
> http://www.ehackingnews.com/2013/10/silk-road-taken-down-by-fbi.html
> --
> tor-talk mailin
> Of course, part of what tipped off the Feds was when his fake IDs were
> intercepted by customs while being mailed from Canada.
Where did you read this?
On Oct 2, 2013, at 15:29, "Al Billings" wrote:
> Of course, part of what tipped off the Feds was when his fake IDs were
> intercepted by c
http://www.ehackingnews.com/2013/10/silk-road-taken-down-by-fbi.html
It was shutdown by the FBI.
On Wed, 2013-10-02 at 15:10 -0400, David Larsus wrote:
> looking for a way to contact silk road.Site shut down.money at stake.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscr
http://www.ehackingnews.com/2013/10/silk-road-taken-down-by-fbi.html
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Tor 0.2.5.1-alpha introduces experimental support for syscall sandboxing
on Linux, allows bridges that offer pluggable transports to report usage
statistics, fixes many issues to make testing easier, and provides
a pile of minor features and bugfixes that have been waiting for a
release of the new
looking for a way to contact silk road.Site shut down.money at stake.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
Hi everyone,
The Tor page on Stack Exchange is now a public (beta) site! You can
ask and answer questions about Tor on http://tor.stackexchange.com/.
If you'd like to discuss the Tor Stack Exchange page itself, nominate
moderators, and such, check out http://meta.tor.stackexchange.com/.
Thanks!
harmony:
> krishna e bera:
> > On 13-10-02 08:00 AM, harmony wrote:
> >> The latest iteration is based on Firefox 10.0.9esr, which brings with it
> >> a lot of important security fixes.
> >
> > I hope you mean Firefox 24.0esr or at least 17.0.9esr
> >
>
> The link says 17.0.9esr. Unpardonable ed
On Wed, Oct 02, 2013 at 02:47:37PM +0200, Philipp Winter wrote:
> On Tue, Oct 01, 2013 at 06:21:19PM -0700, Arlo Breault wrote:
> > We're considering launching a new check,
> > https://check2.torproject.org/
>
> How about changing "Your browser..." to "This browser..."?
>
> I believe that Andrew
> How about changing "Your browser…" to "This browser…"?
Thanks for the reminder. That was one of first issues that came up
but I was holding off in case other strings needed translation.
https://github.com/arlolra/check/issues/1
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusb
On 10/2/2013 7:00 AM, harmony wrote:
Tor Weekly NewsOctober 2nd, 2013
On September 28th, Mike Perry released t
On 10/2/2013 12:08 AM, Andreas Krey wrote:
On Tue, 01 Oct 2013 13:43:10 +, Joe Btfsplk wrote:
...
I believe in same TBB version (maybe the same in many versions) they
spoof the useragent & time zone, but wouldn't differences in screen
sizes & color bit ALONE, among a few users on one entry
krishna e bera:
> On 13-10-02 08:00 AM, harmony wrote:
>> The latest iteration is based on Firefox 10.0.9esr, which brings with it
>> a lot of important security fixes.
>
> I hope you mean Firefox 24.0esr or at least 17.0.9esr
>
The link says 17.0.9esr. Unpardonable editorial neglect on my part
On Tue, Oct 01, 2013 at 06:21:19PM -0700, Arlo Breault wrote:
> We're considering launching a new check,
> https://check2.torproject.org/
How about changing "Your browser..." to "This browser..."?
I believe that Andrew once reported that some users interpret "your browser" as
"my most favourite b
On 13-10-02 08:00 AM, harmony wrote:
> The latest iteration is based on Firefox 10.0.9esr, which brings with it
> a lot of important security fixes.
I hope you mean Firefox 24.0esr or at least 17.0.9esr
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other set
Tor Weekly NewsOctober 2nd, 2013
Welcome to the fourteenth issue of Tor Weekly News, the weekly
newsletter that
40 matches
Mail list logo