fivebells
|
|
September 25, 2011, 10:33:47 PM |
|
Yes, it's pretty remarkable that the Silk Road doesn't do https, only http. I wonder why that is. The CIA/NSA must have tor exit nodes... You could really have some fun by hijacking some high-profile accounts there...
|
|
|
|
P4man
|
|
September 25, 2011, 10:41:35 PM |
|
HTTPS would be good I guess, but its not uncrackable and might give a false sense of security. People there use PGP encryption to encrypt all their communication (at least the non retarded ones do).
|
|
|
|
TiagoTiago
|
|
September 25, 2011, 10:42:23 PM |
|
They don't use https? Woah 0.0
|
(I dont always get new reply notifications, pls send a pm when you think it has happened) Wanna gimme some BTC/BCH for any or no reason? 1FmvtS66LFh6ycrXDwKRQTexGJw4UWiqDX The more you believe in Bitcoin, and the more you show you do to other people, the faster the real value will soar!
|
|
|
fivebells
|
|
September 25, 2011, 10:42:43 PM |
|
Ah, PGP authentication would help a lot.
|
|
|
|
P4man
|
|
September 25, 2011, 10:49:34 PM |
|
Browse around on the site. Seems like all the sellers list their PGP private keys. I suppose there are good reasons why they dont use HTTPS. Like, who is going to apply for the SSL certificate? Im also not sure how secure SSL really is, Id rather trust PGP.
|
|
|
|
mb300sd
Legendary
Offline
Activity: 1260
Merit: 1000
Drunk Posts
|
|
September 25, 2011, 10:50:38 PM |
|
Traffic to SR never goes through an exit node.
When you go to a hidden service the "exit node" is the node hosting the service. So its an unencrypted http connection to (I assume) localhost
|
1D7FJWRzeKa4SLmTznd3JpeNU13L1ErEco
|
|
|
P4man
|
|
September 25, 2011, 10:51:36 PM |
|
Traffic to SR never goes through an exit node.
When you go to a hidden service the "exit node" is the node hosting the service.
But the node before that, you could call exit node, no? And it could be an FBI computer.
|
|
|
|
mb300sd
Legendary
Offline
Activity: 1260
Merit: 1000
Drunk Posts
|
|
September 25, 2011, 10:52:18 PM |
|
Traffic to SR never goes through an exit node.
When you go to a hidden service the "exit node" is the node hosting the service.
But the node before that, you could call exit node, no? And it could be an FBI computer. In the node before that, its still encrypted by Tor.
|
1D7FJWRzeKa4SLmTznd3JpeNU13L1ErEco
|
|
|
TiagoTiago
|
|
September 25, 2011, 10:57:27 PM |
|
Ah, yeah, i forgot it was a site inside TOR.
|
(I dont always get new reply notifications, pls send a pm when you think it has happened) Wanna gimme some BTC/BCH for any or no reason? 1FmvtS66LFh6ycrXDwKRQTexGJw4UWiqDX The more you believe in Bitcoin, and the more you show you do to other people, the faster the real value will soar!
|
|
|
paraipan
In memoriam
Legendary
Offline
Activity: 924
Merit: 1004
Firstbits: 1pirata
|
|
September 25, 2011, 11:04:46 PM |
|
|
BTCitcoin: An Idea Worth Saving - Q&A with bitcoins on rugatu.com - Check my rep
|
|
|
fivebells
|
|
September 25, 2011, 11:15:51 PM |
|
Traffic to SR never goes through an exit node.
When you go to a hidden service the "exit node" is the node hosting the service. So its an unencrypted http connection to (I assume) localhost
Oh. Thanks for the explanation.
|
|
|
|
racerguy
|
|
September 26, 2011, 10:17:02 AM |
|
I'm running tor atm. Would setting tor up as a non exit relay help the network (I don't want to be able to know what stuff i'm hosting).
|
|
|
|
Interfacial
Newbie
Offline
Activity: 5
Merit: 0
|
|
September 26, 2011, 11:28:40 AM |
|
The nifty thing about Silk Road is that it can only be accessed through the Tor network. While it doesn't make tracking your IP/Location impossible, it sure makes it a hell of a lot lot harder (and more expensive) than most authorities are willing to deal with to bust someone over.
And in combination with something like peerguardian or savepeer? Trying to get some info bout them, but don't know if they're working.
|
|
|
|
Interfacial
Newbie
Offline
Activity: 5
Merit: 0
|
|
September 26, 2011, 11:34:26 AM |
|
So as far as computer applications go, just using Silk Road is reasonably safe? Any hacking issues that someone needs to worry about just from installing the software?
I think the digital aspect of silk road is pretty safe (for now) but its more the postadress i'm concerned about. Allready tried or not?
|
|
|
|
Interfacial
Newbie
Offline
Activity: 5
Merit: 0
|
|
September 26, 2011, 11:44:38 AM |
|
|
|
|
|
|
nefanon
Member
Offline
Activity: 112
Merit: 10
|
|
September 26, 2011, 03:02:42 PM |
|
ITT: FBI agents
|
|
|
|
Albert Schweitzer
Newbie
Offline
Activity: 13
Merit: 0
|
|
September 26, 2011, 05:36:33 PM |
|
Imo are silk road similar sites and of course every other illegal transactions atm the most important BTC circulations for stabilizing the currency...
my2cents
|
|
|
|
gwern
Newbie
Offline
Activity: 47
Merit: 0
|
|
September 26, 2011, 07:28:50 PM |
|
Thoughts: - as a hidden service, SSL is redundant. SR's .onion address *is* the signature of the public key you're using to set up the connection to SR. That's the nice thing about hidden services. - It's probably legal in a lot of jurisdictions to merely access the site. It's not displaying child porn, after all. And SR is selling legitimate stuff last I looked; in http://www.gwern.net/Silk%20Road#preparations you can see screenshots of 2 of the non-drug sections - military helmets and miscellaneous services - racerguy: setting up as a middleman node would help the network and would also make your browsing faster, as I understand it. (IIRC, when you run as a middleman or exit node, Tor cuts an entire hop out of all your browsing because all the strangers' traffic going *into* your node now serves to camouflage your own particular traffic.)
|
|
|
|
P4man
|
|
September 26, 2011, 07:57:17 PM |
|
Thoughts:
- as a hidden service, SSL is redundant. SR's .onion address *is* the signature of the public key you're using to set up the connection to SR. That's the nice thing about hidden services.
Thats cool! And that explains the lack of ssl. So basically the traffic is all encrypted, and moreover, without the key, you have no way of knowing where the server is? Do I understand that correctly, that every peer forwards the traffic, but can not know if its forwarding to another peer or the actual server? However it works, its pretty clever.
|
|
|
|
|