On 10/06/2013 10:32 AM, mick wrote:
On Sun, 06 Oct 2013 02:36:20 +
mirimir miri...@riseup.net allegedly wrote:
Still, if one uses nested VPN tunnels from multiple providers in
suitably chosen spheres of influence, it will be nontrivial for
adversaries to install enough taps. Going
On Sun, 06 Oct 2013 03:19:31 +,
bm-2cwto4colsod6lrfmfcuebaua7uu2gv...@bitmessage.ch wrote:
If there is any wiretap in place to monitor VPN then it would instantly drop
the connection because encryption has been tampered with - that's the whole
design for VPN.
A tap is a completely
On Sun, 06 Oct 2013 02:36:20 +
mirimir miri...@riseup.net allegedly wrote:
Still, if one uses nested VPN tunnels from multiple providers in
suitably chosen spheres of influence, it will be nontrivial for
adversaries to install enough taps. Going through China, for example,
would be a
Needs a 'like' button...
Of course, that makes sense - if you believe them.
Well, I can prove that pigs fly. I start with the premise that
pigs fly and then...
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
bm-2cwto4colsod6lrfmfcuebaua7uu2gv...@bitmessage.ch:
Not necessarily, as long VPN provider doesn't keep logs of your
traffic. Like for instance, Phantom Peer works wonderfully since you
can use bitcoin for their service.
Sorry, but no.
It is easy to order a wiretap on the VPN uplinks (without
On 10/05/2013 12:08 PM, Lunar wrote:
bm-2cwto4colsod6lrfmfcuebaua7uu2gv...@bitmessage.ch:
Not necessarily, as long VPN provider doesn't keep logs of your
traffic. Like for instance, Phantom Peer works wonderfully since you
can use bitcoin for their service.
Sorry, but no.
It is easy to
connection.
Original Message
From: mirimir
To: tor-talk@lists.torproject.org
Sent: Sun, Oct 6, 2013, 02:41 AM
Subject: Re: [tor-talk] Silk Road taken down by FBI
On 10/05/2013 12:08 PM, Lunar wrote:
bm-2cwto4colsod6lrfmfcuebaua7uu2gv...@bitmessage.ch
(mailto:bm
@lists.torproject.org
Sent: Sun, Oct 6, 2013, 02:41 AM
Subject: Re: [tor-talk] Silk Road taken down by FBI
On 10/05/2013 12:08 PM, Lunar wrote:
bm-2cwto4colsod6lrfmfcuebaua7uu2gv...@bitmessage.ch
(mailto:bm-2cwto4colsod6lrfmfcuebaua7uu2gv...@bitmessage.ch):
Not necessarily, as long VPN provider
On Fri, 2013-10-04 at 03:22 +, mirimir wrote:
OK, I just read the Maryland complaint. It's obvious what happened.
An FBI undercover agent contacted him, wanting to sell large
quantities
of cocaine. He found a buyer, and delegated the details to his
employee.
Said employee had full
NSA Calls TOR the king of high-secure, low-latency
internethttp://www.theguardian.com/technology/internet
anonymity
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
On Fri, Oct 4, 2013 at 11:01 AM, Ted Smith te...@riseup.net wrote:
On Fri, 2013-10-04 at
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Rejo Zenger:
++ 03/10/13 13:49 -0400 - Ahmed Hassan:
One question is still remain unanswered. How did they locate
Silkroad server before locating him?
They had full image of the server before his arrest.
Where have you read this or deducted
On Fri, Oct 04, 2013 at 08:57:04AM -0700, Gordon Morehouse wrote:
I *think* people are mistaking VPN for VPS here - I can't find the
source, but there was some well distributed speculation that the FBI
was easily able to obtain a server image without disrupting the site
itself by having a VPS
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Roger Dingledine:
To be more concrete, their job here is to link the guy to the
website. So if they had a pretty good idea of who the guy was, but
not enough evidence to bust him, it makes sense to me that they
would go find one of the servers,
That's what I thought; if the FBI is guilty of selling the cocaine, then
they got away with it? They're using DPR's employee to initiate drug
exchange.
1) DPR is not a drug facilitator. He merely host the website for people to
use it.
2) Host wasn't located in the US; therefore US has no
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Juan Garofalo:
I'm wondering if I got this right:
The NSA is supposed to be concerned only with 'national security'
issues and can't spy on 'ordinary Americans'. In practice the NSA
spies on everyone paying no attention to 'legal'
Why use VPN at all? Isnt VPN some strange problem? So strange: people keep
using the VPN service, but i guess Tor does it better?
--
Jerzy Łogiewa -- jerz...@interia.eu
On Oct 4, 2013, at 6:09 PM, shadowOps07 wrote:
As for VPN, I know several VPN doesn't keep logs at all regardless if they
-talk@lists.torproject.org
Sent: Fri, Oct 4, 2013, 11:26 AM
Subject: Re: [tor-talk] Silk Road taken down by FBI
Why use VPN at all? Isnt VPN some strange problem? So strange: people keep
using the VPN service, but i guess Tor does it better?
--
Jerzy Łogiewa -- jerz...@interia.eu (mailto:jerz
Stack Overflow, ah the code forum on the website. Ok. I see.
Original Message
From: Jerzy Łogiewa
To: tor-talk@lists.torproject.org
Sent: Fri, Oct 4, 2013, 11:26 AM
Subject: Re: [tor-talk] Silk Road taken down by FBI
So now we know Stack Overflow works with police.
--
Jerzy
could you not use top posting? Makes things difficult to read.[1]
[1] http://www.idallen.com/topposting.html
Peace;
Fynn.
--
Even a stopped clock is right twice a day
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
Juan Garofalo:
So that the company can be blacklisted as clowns who cooperate with
the US government, unlike a few principled individuals out there?
if you trust a vpn, what does that say about you? outting vpns for being
put into the situation of either complying with the law or facing
: [tor-talk] Silk Road taken down by FBI
Juan Garofalo:
So that the company can be blacklisted as clowns who cooperate with
the US government, unlike a few principled individuals out there?
if you trust a vpn, what does that say about you? outting vpns for being
put into the situation of either
Talk to the people who write mobile email clients.
—
http://makehacklearn.org
On Fri, Oct 4, 2013 at 11:26 AM, Enrique Fynn enriquef...@gmail.com
wrote:
could you not use top posting? Makes things difficult to read.[1]
[1] http://www.idallen.com/topposting.html
Peace;
Fynn.
--
Even a
--On Friday, October 04, 2013 6:41 PM + Tempest temp...@tushmail.com
wrote:
Juan Garofalo:
So that the company can be blacklisted as clowns who cooperate with
the US government, unlike a few principled individuals out there?
if you trust a vpn, what does that say about you?
On 10/04/2013 06:41 PM, Tempest wrote:
Juan Garofalo:
So that the company can be blacklisted as clowns who cooperate with
the US government, unlike a few principled individuals out there?
if you trust a vpn, what does that say about you? outting vpns for being
put into the situation of
mirimir:
On 10/04/2013 06:41 PM, Tempest wrote:
Juan Garofalo:
So that the company can be blacklisted as clowns who cooperate with
the US government, unlike a few principled individuals out there?
if you trust a vpn, what does that say about you? outting vpns for being
put into the
On 10/04/2013 11:44 PM, adrelanos wrote:
mirimir:
On 10/04/2013 06:41 PM, Tempest wrote:
Juan Garofalo:
So that the company can be blacklisted as clowns who cooperate with
the US government, unlike a few principled individuals out there?
if you trust a vpn, what does that say about
On 10/04/2013 03:01 PM, Ted Smith wrote:
On Fri, 2013-10-04 at 03:22 +, mirimir wrote:
OK, I just read the Maryland complaint. It's obvious what happened.
An FBI undercover agent contacted him, wanting to sell large
quantities
of cocaine. He found a buyer, and delegated the details to
mirimir:
On 10/03/2013 03:39 AM, Martin Weinelt wrote:
this subreddit is private
the moderators of this subreddit have set it to private. you must be a
moderator or approved submitter to view its contents.
a message from the moderators of /r/SilkRoad
Silk Road
Answering my
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Roger Dingledine:
On Thu, Oct 03, 2013 at 01:34:37AM +, mirimir wrote:
Wow. I just read the complaint :8
He was unfathomably stupid. Words cannot express how stupid he
was.
This has absolutely no relevance to the Tor network.
We just
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Jonathan D. Proulx:
2) Traditional police work still works - this should be good news
to the law and order folks that traditional methods still work and
no extensive digital survailance state is needed.
Note I'm only anecdotally familiar
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/02/2013 09:34 PM, mirimir wrote:
This has absolutely no relevance to the Tor network.
It serves as an object lesson about using good operational security
each and every time you get on the Net.
- --
The Doctor [412/724/301/703] [ZS]
No, it was a rookie fuck-up that enabled old-fashioned detective work. if
it wasn't a fookie fuck-up, then none of this would have happened.
On Thu, Oct 3, 2013 at 11:15 AM, Gordon Morehouse gor...@morehouse.mewrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Jonathan D. Proulx:
2)
On Thu, Oct 03, 2013 at 01:26:06PM -0400, shadowOps07 wrote:
:No, it was a rookie fuck-up that enabled old-fashioned detective work. if
:it wasn't a fookie fuck-up, then none of this would have happened.
It was human error, which is what traditional police work relies on all
the time.
I chuckled
One question is still remain unanswered. How did they locate Silkroad
server before locating him?
They had full image of the server before his arrest.
On Thu, Oct 3, 2013 at 1:26 PM, shadowOps07 shadow.uni...@gmail.com wrote:
No, it was a rookie fuck-up that enabled old-fashioned detective
Who says they arrested him as soon as he was located?
I'd bet a few bitcoins that he was found as soon as the first news story
on Silk Road came out. Looking at the origins of the Silk Road and
finding the first announcements of it would've been the first thing the
FBI did. Everything else was
++ 03/10/13 13:49 -0400 - Ahmed Hassan:
One question is still remain unanswered. How did they locate Silkroad
server before locating him?
They had full image of the server before his arrest.
Where have you read this or deducted this from?
--
Rejo Zenger . r...@zenger.nl . 0x21DBEFD4 .
If DPR has really been known since March 2011, that'd be pretty incredible.
The FBI is really playing the long game. It's impossible to say at this
point though.
On Thu, Oct 3, 2013 at 2:39 PM, Ted Smith te...@riseup.net wrote:
Who says they arrested him as soon as he was located?
I'd bet a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/03/2013 01:49 PM, Ahmed Hassan wrote:
One question is still remain unanswered. How did they locate
Silkroad server before locating him? They had full image of the
server before his arrest.
Not sure. One hypothesis (and that's all it is - a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 10/03/2013 03:00 PM, Patrick wrote:
If DPR has really been known since March 2011, that'd be pretty
incredible. The FBI is really playing the long game. It's
impossible to say at this point though.
How long do these sorts of investigations
On 10/03/2013 05:49 PM, Ahmed Hassan wrote:
One question is still remain unanswered. How did they locate
Silkroad server before locating him?
They had full image of the server before his arrest.
From http://www.bbc.co.uk/news/technology-24371894 we know:
According to the court complaint
On Thu, 2013-10-03 at 20:58 +, mirimir wrote:
So they did have the server before they knew who he was. We also knew
that he was sold out by his VPN provider. Hopefully, the identity of
that VPN provider will come out soon.
I don't see evidence in your quote that implies that.
The section
On Thu, Oct 03, 2013 at 03:25:23PM -0400, The Doctor wrote:
On 10/03/2013 01:49 PM, Ahmed Hassan wrote:
One question is still remain unanswered. How did they locate
Silkroad server before locating him? They had full image of the
server before his arrest.
Not sure. One hypothesis (and
On Thu, Oct 03, 2013 at 08:12:25AM -0700, Gordon Morehouse wrote:
Here's my one teensy thing that bothers me, this bit of speculation
from Ars Technica:
The Tor Project, whose software enabled the Silk Road, noticed a
significant spike in usage in late August and was unable to explain
it.
On Thu, Oct 03, 2013 at 08:58:57PM +, mirimir wrote:
So they did have the server before they knew who he was.
Careful there -- while I assume they didn't lie in their affidavit, it's
quite reasonable to assume that they investigated all sorts of things,
all sorts of ways, and then afterwards
Was the VPN located in the US? If not, then FBI doesn't have any
jurisdiction outside of US.
On Thu, Oct 3, 2013 at 6:54 PM, Roger Dingledine a...@mit.edu wrote:
On Thu, Oct 03, 2013 at 08:58:57PM +, mirimir wrote:
So they did have the server before they knew who he was.
Careful there
On 10/03/2013 10:54 PM, Roger Dingledine wrote:
On Thu, Oct 03, 2013 at 08:58:57PM +, mirimir wrote:
So they did have the server before they knew who he was.
Careful there -- while I assume they didn't lie in their affidavit, it's
quite reasonable to assume that they investigated all
On 10/03/2013 11:33 PM, shadowOps07 wrote:
Was the VPN located in the US? If not, then FBI doesn't have any
jurisdiction outside of US.
On p. 14 of UlbrichtCriminalComplaint.pdf, there's reference to a
Mutual Legal Assistance Treaty.
On Thu, Oct 3, 2013 at 6:54 PM, Roger Dingledine
Excuse me, I meant the server host, not VPN, in my reply.
--
Al Billings
http://makehacklearn.org
On Thursday, October 3, 2013 at 5:27 PM, Al Billings wrote:
Sure they do. The VPN was clearly not in the US and they used agreements to
access it (it is mentioned in the affidavit).
--
Sure they do. The VPN was clearly not in the US and they used agreements to
access it (it is mentioned in the affidavit).
--
Al Billings
http://makehacklearn.org
On Thursday, October 3, 2013 at 4:33 PM, shadowOps07 wrote:
Was the VPN located in the US? If not, then FBI doesn't have any
Yeah, but the country doesn't have the release the log to the fascist
police state just because Mutual Legal Assistance Treaty is in place.
They have the MORAL obligation to disregard the treaty. US is in no
position to demand obligations from other countries. Rather, MLAT is a
farce.
On Thu,
--On Thursday, October 03, 2013 6:54 PM -0400 Roger Dingledine
a...@mit.edu wrote:
that he was sold out by his VPN provider. Hopefully, the identity of
that VPN provider will come out soon.
Why? So everybody can abandon that VPN and move to a different one that
also responds to subpoenas
On 10/04/2013 12:44 AM, shadowOps07 wrote:
Yeah, but the country doesn't have the release the log to the fascist
police state just because Mutual Legal Assistance Treaty is in place.
They have the MORAL obligation to disregard the treaty. US is in no
position to demand obligations from other
I'm wondering if I got this right:
The NSA is supposed to be concerned only with 'national security' issues
and can't spy on 'ordinary Americans'. In practice the NSA spies on
everyone paying no attention to 'legal' restraints.
If the NSA happens to find the location of, say, a
On 13-10-03 09:13 PM, Juan Garofalo wrote:
--On Thursday, October 03, 2013 6:54 PM -0400 Roger Dingledine
a...@mit.edu wrote:
that he was sold out by his VPN provider. Hopefully, the identity of
that VPN provider will come out soon.
Why? So everybody can abandon that VPN and move to a
What kind of VPN provider did he use?
On Thu, Oct 3, 2013 at 9:27 PM, mirimir miri...@riseup.net wrote:
On 10/04/2013 12:44 AM, shadowOps07 wrote:
Yeah, but the country doesn't have the release the log to the fascist
police state just because Mutual Legal Assistance Treaty is in place.
On 10/04/2013 01:54 AM, Juan Garofalo wrote:
I'm wondering if I got this right:
The NSA is supposed to be concerned only with 'national security'
issues and can't spy on 'ordinary Americans'. In practice the NSA spies
on everyone paying no attention to 'legal' restraints.
On Fri, Oct 04, 2013 at 02:11:26AM +, mirimir wrote:
On 10/04/2013 01:54 AM, Juan Garofalo wrote:
I'm wondering if I got this right:
The NSA is supposed to be concerned only with 'national security'
issues and can't spy on 'ordinary Americans'. In practice the NSA spies
on
All government agency lies.
On Thu, Oct 3, 2013 at 9:54 PM, Juan Garofalo juan@gmail.com wrote:
I'm wondering if I got this right:
The NSA is supposed to be concerned only with 'national security'
issues and can't spy on 'ordinary Americans'. In practice the NSA spies
On 10/04/2013 02:22 AM, shadowOps07 wrote:
What kind of VPN provider did he use?
He had a dedicated exit IP, given that it was hard coded in his site for
admin access. That was also a risky move, in my opinion. He could have
lost the VPN account, and the IP. Better practice is using key-based
On 10/04/2013 02:21 AM, Roger Dingledine wrote:
On Fri, Oct 04, 2013 at 02:11:26AM +, mirimir wrote:
On 10/04/2013 01:54 AM, Juan Garofalo wrote:
I'm wondering if I got this right:
The NSA is supposed to be concerned only with 'national security'
issues and can't spy on
--On Friday, October 04, 2013 2:11 AM + mirimir miri...@riseup.net
wrote:
On 10/04/2013 01:54 AM, Juan Garofalo wrote:
I'm wondering if I got this right:
The NSA is supposed to be concerned only with 'national security'
issues and can't spy on 'ordinary Americans'. In
krishna e bera:
If the FBI had to use a subpoena it means the VPN provider wasnt
cooperating, but was forced by legal means to hand over the info.
It would be unrealistic to expect any provider in any country to destroy
subscriber info after they had received a notice from a judge ordering
On 10/04/2013 03:50 AM, Juan Garofalo wrote:
--On Friday, October 04, 2013 2:11 AM + mirimir miri...@riseup.net
wrote:
On 10/04/2013 01:54 AM, Juan Garofalo wrote:
I'm wondering if I got this right:
The NSA is supposed to be concerned only with 'national security'
issues
--On Friday, October 04, 2013 3:22 AM + mirimir miri...@riseup.net
wrote:
On 10/04/2013 02:21 AM, Roger Dingledine wrote:
On Fri, Oct 04, 2013 at 02:11:26AM +, mirimir wrote:
On 10/04/2013 01:54 AM, Juan Garofalo wrote:
I'm wondering if I got this right:
The NSA is
looking for a way to contact silk road.Site shut down.money at stake.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
http://www.ehackingnews.com/2013/10/silk-road-taken-down-by-fbi.html
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
http://www.ehackingnews.com/2013/10/silk-road-taken-down-by-fbi.html
It was shutdown by the FBI.
On Wed, 2013-10-02 at 15:10 -0400, David Larsus wrote:
looking for a way to contact silk road.Site shut down.money at stake.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To
Of course, part of what tipped off the Feds was when his fake IDs were
intercepted by customs while being mailed from Canada.
—
http://makehacklearn.org
On Wed, Oct 2, 2013 at 12:26 PM, Ahmed ah...@linuxism.com wrote:
http://www.ehackingnews.com/2013/10/silk-road-taken-down-by-fbi.html
--
Of course, part of what tipped off the Feds was when his fake IDs were
intercepted by customs while being mailed from Canada.
Where did you read this?
On Oct 2, 2013, at 15:29, Al Billings alb...@openbuddha.com wrote:
Of course, part of what tipped off the Feds was when his fake IDs were
It was one of the things clearly listed in the court filing.
http://krebsonsecurity.com/wp-content/uploads/2013/10/UlbrichtCriminalComplaint.pdf
—
http://makehacklearn.org
On Wed, Oct 2, 2013 at 12:41 PM, jake.tar...@gmail.com
jake.tar...@gmail.com wrote:
Of course, part of what tipped off
Go to page 24 here, and read how was caught:
http://www1.icsi.berkeley.edu/~nweaver/UlbrichtCriminalComplaint.pdf
He was caught because of this post -
stackoverflow.com/questions/15445285/how-can-i-connect-to-a-tor-hidden-service-using-curl-in-php
On Wed, Oct 2, 2013 at 3:33 PM,
On 10/02/2013 07:21 PM, Ahmed wrote:
http://www.ehackingnews.com/2013/10/silk-road-taken-down-by-fbi.html
The FBI recently took down Freedom Hosting. Tormail used Freedom
Hosting. I wonder whether the FBI found unencrypted messages on Tormail
servers that led them to Ross Ulbricht.
--
I think they were already looking for him by name when he posted on
stackoverflow.
—
http://makehacklearn.org
On Wed, Oct 2, 2013 at 12:56 PM, Ahmed Hassan ah...@linuxism.com wrote:
Go to page 24 here, and read how was caught:
Page 26 paragraph 38 (I think) is where it has the first indication of
how they caught him.
Summary:
* The very first mention of the Silk Road was from a user named
altoid on a forum
* Someone else named altoid on the bitcoin forums advertised for
developers, using an
He got busted.
On 10/02/2013 12:10 PM, David Larsus wrote:
looking for a way to contact silk road.Site shut down.money at stake.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsusbscribe or change other settings go to
On Wed, Oct 2, 2013 at 1:33 PM, jake.tar...@gmail.com jake.tar...@gmail.com
wrote:
Of course, part of what tipped off the Feds was when his fake IDs were
intercepted by customs while being mailed from Canada.
Where did you read this?
On 10/2/2013 3:58 PM, Shaun Savage wrote:
He got busted.
On 10/02/2013 12:10 PM, David Larsus wrote:
looking for a way to contact silk road.Site shut down.money at stake.
And now that Mr. Larsus (if that is his real name) has posted publicly
that he has money at stake at silk road, the
https://medium.com/i-m-h-o/85dc5cccf8c6
The charges won't stick for numerous of reasons. He will be let go.
On Wed, Oct 2, 2013 at 4:31 PM, kendrick eastes keas...@gmail.com wrote:
On Wed, Oct 2, 2013 at 1:33 PM, jake.tar...@gmail.com
jake.tar...@gmail.com
wrote:
Of course, part of
Not if he has the messages encrypted with PGP. NSA/FBI cannot crack/factor
beyond 1024 bit RSA. Always, always, always encrypt your message with PGP.
Congratulation to Special Agent Christopher Tarbell:
[image: Inline image 1]
Alias, DPR will be acquitted because the charges won't stick against
On 10/02/2013 09:32 PM, shadowOps07 wrote:
https://medium.com/i-m-h-o/85dc5cccf8c6
The charges won't stick for numerous of reasons. He will be let go.
While I appreciate the spirit of those reasons, I'm 100% certain that
they'll mean nothing in the US court system.
On Wed, Oct 2, 2013 at
On 10/02/2013 07:49 PM, Al Billings wrote:
It was one of the things clearly listed in the court filing.
http://krebsonsecurity.com/wp-content/uploads/2013/10/UlbrichtCriminalComplaint.pdf
Wow. I just read the complaint :8
He was unfathomably stupid. Words cannot express how stupid he
On Thu, Oct 03, 2013 at 01:34:37AM +, mirimir wrote:
Wow. I just read the complaint :8
He was unfathomably stupid. Words cannot express how stupid he was.
This has absolutely no relevance to the Tor network.
We just put up a statement on the blog which basically says that:
Guys,
There are rumors that LE arrested the wrong DPR guy, as a security
precaution. Just read it over at reddit:
http://www.reddit.com/r/SilkRoad/comments/1nle25/has_anyone_considered_this/
My two cents.
On Wed, Oct 2, 2013 at 9:34 PM, mirimir miri...@riseup.net wrote:
On 10/02/2013 07:49
On Wed, Oct 02, 2013 at 10:07:00PM -0400, Roger Dingledine wrote:
:On Thu, Oct 03, 2013 at 01:34:37AM +, mirimir wrote:
: Wow. I just read the complaint :8
:
: He was unfathomably stupid. Words cannot express how stupid he was.
:
: This has absolutely no relevance to the Tor network.
:
:We
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
this subreddit is private
the moderators of this subreddit have set it to private. you must be a
moderator or approved submitter to view its contents.
a message from the moderators of /r/SilkRoad
Silk Road
On 03.10.2013 04:29, shadowOps07 wrote:
On 10/03/2013 03:39 AM, Martin Weinelt wrote:
this subreddit is private
the moderators of this subreddit have set it to private. you must be a
moderator or approved submitter to view its contents.
a message from the moderators of /r/SilkRoad
Silk Road
Answering my own question:
On 10/03/2013 03:39 AM, Martin Weinelt wrote:
this subreddit is private
the moderators of this subreddit have set it to private. you must be a
moderator or approved submitter to view its contents.
a message from the moderators of /r/SilkRoad
Silk Road
They can have their little private
On Wed, Oct 02, 2013 at 11:17:08PM -0400, Jonathan D. Proulx wrote:
:https://blog.torproject.org/blog/tor-and-silk-road-takedown
In many ways this is (or should be) a PR win for Tor.
1) No technical vulnerabilities were used (AFAWK) - this should be welcome
news to Tor users
2)
I want to know how to purchase merchandise on silk road using tor-talk
___
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk
On Thu, Dec 06, 2012 at 03:11:20AM -0800, Edwin Farnworth wrote:
I want to know how to purchase merchandise on silk road using tor-talk
Tor-talk is a mailing list. I doubt the Silk Road accepts
mailing lists as currency. Pro tip: try Google.
___
slim chance anyone here will help you buy drugs
Sent from my iPhone 5
On Dec 6, 2012, at 6:55 AM, Eugen Leitl eu...@leitl.org wrote:
On Thu, Dec 06, 2012 at 03:11:20AM -0800, Edwin Farnworth wrote:
I want to know how to purchase merchandise on silk road using tor-talk
Tor-talk is a mailing
On Thu, 6 Dec 2012 07:29:44 -0500
Philip Holbrook fhlipz...@gmail.com wrote:
slim chance anyone here will help you buy drugs
Careful, someone's knee might jerk and you'll be accused of attacking
their freedom of speech.
--
3072D/F3A66B3A Julian Yon (2012 General Use) pgp.2...@jry.me
92 matches
Mail list logo