Silk Road 2.0 Launches

I understand the concern for heat as much as the next person, but honestly, the buyer has less to worry about IMO. If I was a vendor, I'd be worried about it. And from doing some homework on reddit, SR 2.0 seems g2g. Give it another week or two and it will be like BMR once all of the traffic from Sheep and BMR head over there.

another one worth checking in to is TorMarket

Yes you are right sir....the seller would have more on the plate to sweat then the buyer and they do have a rep system and all.. as well as escrow.But man does silkroad have some eyeballs in theire directions.... massive advertising id say.
 
Someone writes

why don't vendors just stop using market places and just use reputable buyers and spread their business via word of mouth?
wouldn't that be the safest way? and we could still us the sr forums or make new forum to point out the scammers and the and the trusted vendors? fuck all this market place bullshit

Doesn't that sound familiar [|)]
 
3 further guys were busted and the new head has disappeared. Speculated a top vendor got nailed too.

Read this thread, but also take note of the top comment "This would be the perfect story to cover for LE covertly taking control of the site. Just saying.."


Oracle reveals process behind formation of SR2, and what it means for current affairs involving DPR2, Lib, Inigo, SSBD, StExo, Defcon et al : SilkRoad

You'd have some kind of tremendous faith to not stay away for at least the time being.


A vendor was supposedly arrested as well.

He posted about it yesterday on the SR forums but was deleted shortly after. Someone on TM managed to copy it before it was taken down.

"Guys I was arrested yesterday and out on bond now. But something is fucked! I know I'm risking more warning you guys and my attorney doesn't even want me on the internet but you guys need to know this. When I was in the interview room they showed me all sorts of shit that they should not know or have access to including conversations I've had with buyers and even DPR. I don't fucking understand.. and when I was in there I was at a loss for words. Something is definitely wrong and they have the ability to see things on here only mods or admins should like btc transfers and a dispute I had. WHAT THE FUCK?"

TM Link: http://7kyuxl5h7xjl6eir.onion/index.php?topic=1364.0

edit: Post has now been confirmed as accurate by Yoshi

It would make all too much sense for the LE to run it as a honeypot, they surely have the means and motivation.
 
Last edited:
DDOS attacks help the source find the target.

TOR is not bulletproof and the weenies who say it is, are just that - weenies.

There is a TS/SI document that is from back in the day (2000? I think) about breaking TOR. There are more current powerpoints as well.

I won't put them here unless someone in authority said it was OK for obvious reasons. (like being classified to the "holy f*ck" level - even though they were leaked by Snowden - they are still classified TS//SI)

The NSA SSO has had TOR by the nads for years. They pass info onto the DEA Special Operations Divison - who uses it for "parallel construction".

In case you are not familiar with "parallel construction" - it is how they turn ILLEGAL evidence into "your ass in prison".

WHW
 
the original head of the silk road got busted on some dumb shit though. He didn't go down because of weakness with the TOR, his dumb ass hired an ex drug dealer to kill two of his employees after he found out they were robbing him. The "killer" turned states evidence. dude was a fuckiing idot, a smart idiot, but an idiot
 
wiki something or other said:
Honey Pot : In computer terminology, a honeypot is a trap set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers. This is similar to the police baiting a criminal and then conducting undercover surveillance.

I have read this and read this and thought about it and thought about it and I can't make the connection. Can somebody chime in and help me understand this honetpot setup by LE?

Would it matter if it was a honey pot? If you are following all of your security protocols, I don't see why it would matter.

For instance, if you and your vendor used PGP only for communication (which you should anyways), then what would it matter if you communicated in a site monitored or created by the government? You would use a stand alone, Live Distro like Tails from a public location that has free wifi and is crowded with a laptop you bought for cash.....
As long as the vendor wasn't LE, then it wouldn't matter who was operating the site, they wouldn't have your information.
Let's say they track the Bitcoins in the blockchain......so you use Bitfog first. Then move things around a bit and before you know it, tracking those bitcoins from other bitcoins will be statistically impossible.

So the catch is a good vendor - that is what throws a monkey wrench in this whole thing. If LE set this up, then a good vendor using proper safety procedures could remain anonymous and keep thier customers safe - all at the expense of the government. If that got out, wouldn't thier be a public outcry? Is empowering the hacker drug dealers to catch the not so computer literate ones even worth it? Maybe it is, maybe it isn't. But keep the fact that regardless, if this is LE or not, they can't be every vendor and they wouldn't be able to control sales from vendors that used secure methods. They would only know what the description of what is being sold is as it was displayed.

Furthermore, it is not Tor that is unsafe. It is the people that use it. Tor by design is very safe when used properly and purely.

DDos attacks are used to help show the geographic location of a hidden service. This only shows how secure Tor is, not the other way around. This is the way it works. They setup hundreds or thousands of "zombie" machines to constantly send packets to that hidden service via the .onion address. Then they start analyzing network traffic in large portions to see where the large portions of traffic actually stop. The USA government has access and even own Tor exit relays giving them the ability to statistically analyze connections in aggregate to postulate where Ddos attacks are ending on the IP layer rather through Tor. Tor runs on the internet so if you can't figure out where a service is, the try to drown it and then look for the tiny hole in the internet that shows where the little bit of data is actually trickling. So, the funny part about Silk road and all the traffic is, BY DESIGN the more traffic, the easier it is to tell the actualy location of a service.

So why does Silk Road run? If it is busy enough to be located and has enough media coverage to be a target, then how is it running?

The story told is that the servers images reside in a country(ies) that do not coorperate with the USA or NSA for any reason. I believe that is easily possible and a much better failover plan. Some careful planning with proxy servers, some encrypted tunnels and very secure ftp setups could easily allows an image of Silk Road to stay backed up in multiple locations and giving rise to many failovers in a short amount of time. This would keep SR up and running regardless of what happened. It is a good idea and would require a lot of effort at the architectual level to defeat. They would have to know how it was designed, you know and I just don't see how that would happen unless they had an insider.

I digress and I'm back to where I started.

Who gives a fuck if it is a honey pot if you trust the vendor? Used correctly the government would be empowering security conscious criminals.....am I missing something?
 
I think it'd be cautious to wait this one out, if LE created their own SilkRoad (they certainly have the means) as a trap, with or without cooperation of anyone that went down the first time, it seems like a pretty good way to fill the void and get vendor details, if not customers. No need to be an early adopter. :cool:

Remember how that one "hacker" group LulzSec went on a rampage, only to find out one of the key members Sabu had been an informant for such a long time? They sat by and let their twitter chime off with #fuckFBIfriday the whole time, just waiting.
i agree better to be safe. let someone else take the hit.
 
Back
Top