Has Anyone Used Silk Road to Buy or Sell Steroids?

Tor is how you stay hidden online.

Tor is one means of helping you stay hidden or at least have your communications be one layer more secure. Your data still comes in and out of the Tor network at the start and end of it's journey. You should be using several other methods to keep yourself protected. Or opt to live in a place where steroids aren't treated as a crime. Deca at Wal-Mart anyone?
 
Tor is one means of helping you stay hidden or at least have your communications be one layer more secure. Your data still comes in and out of the Tor network at the start and end of it's journey. You should be using several other methods to keep yourself protected. Or opt to live in a place where steroids aren't treated as a crime. Deca at Wal-Mart anyone?

No one is tracing TOR no mater where the start and end are. It jumps so many times that it would be be virtually impossible to trace who and what is using it. If it were possible to trace it would have been done by now as dirty pedophiles are having the time of their lives on TOR. Even anonymous has limited success in taking down sites.
 
Just wanted to chime in and say its virtually impossible to trace anyone to anything using TOR especially when using the .onion website type like the SR does.

The only way you are getting busted while using TOR with the SR or anything else is if they have end access to your computer, and at that point...they are already at your house looking at your computer so you're already fucked...but this in no way could be triggered anywhere down the line using TOR, it would have to be due to some other information leak, the way TOR is designed. It is IMPOSSIBLE to identify anyone anywhere along the chain in a TOR link unless you are at the ORIGINAL computer where everything started.

I really wished more vendors used PGP encryption when sending mail for orders and such. Its a flawless encryption technique especially if you use Tormail, so if at the worst a source gets busted, there is no way to check those emails out, I don't think Tormail is co-operating with anyone. I would love more soruces to use this method to as an extra layer of security and insurance.

I considered using SR to get Sicroxx gear considering the source was verified, but it was much cheaper through SF and I had a good feeling about them. On a side note, I have used the SR with a friend for other reasons, and we've had a 100% success rate on 7 different transactions.

If you've ever used SR you'll note they use "stealth methods" of packing, which is another needed thing I would say from sources. Any package you open from the SR, you wouldn't have any clue there are illicit substances within, they are packaged to look like any other package, with fake items to throw people off (Why don't sources ship ancilliares in fake multivitamin bottles?) I would feel comfortable having anyone in my house opening a package from the SR, they would have no clue there is anything illicit in there.

If sources used SR methods for their business (Tor Communication Methods: PGP Encryption/Tormail, Stealth Packaging andBitcoin Anonymous currency)...they would be in business for a loooong time.

Think about it this way, they've been around for 3 years, selling more illegal drugs than any source could sell steroids. There have been few stings in the SR compared to the huge amount of volume being traded, and everyone one of these cases can be attributed to negligence outside of the TOR network.

tl;dr, more sources operate like the SR please
 
The LE knows what they are doing trust me... They can catch anyone at anytime. We are just experiments to see how it effects us long terms
 
The LE knows what they are doing trust me... They can catch anyone at anytime. We are just experiments to see how it effects us long terms

How the PEDs affect us long-term? They already know that. Fact is they don't have the manpower to go after all the internet sources for even one major drug, let alone all of them!
 
There is a lot of bullshit in this thread. Nothing is 100% fool proof but TOR is pretty hard to trace. I have not seen verifiable instance that the feds have traced any TOR related activity.

OK, here's your "verifiable instance".

The recent takedown of Freedom Hosting - the owner was wanted on child porn charges - mostly for letting child porn run unfettered on his servers.

The attack vector was to add some JavaScript code to the main page of many of the sites on the servers (including TorMail) that loaded an exploit thru an unpatched hole in Firefox. This was done subsequent to his arrest in Ireland.

The exploit uploaded the "real" local IP address and hardware MAC address to an FBI server in VA, hidden amongst SAIC IP addresses. Nothing more.

It only worked on versions of Tor Browser on WINDOWS prior to 2.3.25-10.

The solution to this is twofold.

1) Don't run windows for security sensitive applications
2) Always VPN before you TOR.

The NSA can do traffic correlation to uncloak you, but if you have the NSA chasing you, you have bigger problems.

WHW
 
You never use any computer with any Windows to run any TOR service. You will use only Linux or OS X. Windows machines are for entreatment only.

That SR owner was the biggest idiot around. He run an empire worth $500m. He still lived in the US and he used Internet Cafe to administrate SR. This guy is a joke.
 
With as much money he had the guy should have been running the site from international waters on a nice yacht!

The prices were outrageous anyways for anything. 180$ for a 10ml x 300mg/ml Test Enanthate[:o)] That's worse that post RAW Deal gym prices or 1990's gym/school prices.

90 to 120$/g for some nose candy[:o)] 20 to 30$ for decent Molly, lol. For suckers that entire operation was. Just a false sense of security and mostly for personal amounts.
 
I can't believe some of you guys even went near that place. That gig was screaming next 20/20 two hr special. That place needed to go from the start. One good thing is it sheds some light on steroid users. Now we don't look as bad.
 
The LE knows what they are doing trust me... They can catch anyone at anytime. We are just experiments to see how it effects us long terms
For sure their, with all this new "smart" phones ,tvs , appliances etc I doubt their is very little they don't know nowadays.
 
I read in the paper today he put his actual return address on a package that was seized in Canada.
 
Will be funny if it turns out they arrested a re-mailer and just thought it was DPR.
 
Very insightful arstechnica article on how DPD/Silk Road was busted:

How the feds took down the Dread Pirate Roberts | Ars Technica

The key was some surprisingly low-tech detective work:

In the absence of usual digital clues, the feds fell back on a low-tech approach: keep going back in time until you find the first guy to ever talk about the Silk Road. Find that guy and you probably have a person of interest, if not Roberts himself.

So they looked, assigning one agent to conduct "an extensive search of the Internet," in the FBI's words, looking for early Silk Road publicity. The earliest post ever to mention the site appeared on a drug-oriented forum called shroomery.org, where a user named "altoid" had made a single post. It read:

I came across this website called Silk Road. It's a Tor hidden service that claims to allow you to buy and sell anything online anonymously. I'm thinking of buying off it, but wanted to see if anyone here had heard of it and could recommend it.​

The post directed readers to visit silkroad420.wordpress.com, belonging to the blogging operator WordPress, where further instructions would be found for accessing the real Silk Road site. A subpoena to WordPress Revealed that the blog had been set up on January 23, only four days before the Altoid post. If this wasn't the first mention of Silk Road, it was certainly one of them.

Altoid became a person of interest, but who was he? Further research revealed that Altoid had been posting on a board called Bitcoin Talk—further suggesting a possible link to the Silk Road, which operated on Bitcoin. A key break came when the agent found an October 11, 2011 post by Altoid, looking for an "IT pro in the Bitcoin community" and directing all inquiries to "rossulbricht at gmail dot com."

A subpoena to Google revealed that this account was in fact registered to one "Ross Ulbricht."
 
The end of Silk Road isn't the end of libertarian efforts to "advance human freedom". Efforts will only be intensified now according to Ryan Lackey:

Ryan Lackey was the key implementor of HavenCo, and he lived aboard the fort for weeks and even months at a time, trying to turn his libertarian principles into practical reality. Ten years on from the HavenCo experiment, I asked Lackey what the Silk Road takedown meant for the movement.

"Obviously in the short run it's a setback," he told me, because "Silk Road was the main example of a long-running 'hated by the government' service which was able to use technical means to operate, profitably, with a lot of users. I can't condone illegal activity, and it looks like Silk Road/DPR may have engaged in violent activity over and above just flouting drug laws, but Silk Road was technically a really interesting system."

To Lackey, the best way forward for those concerned with using tech to advance human freedom is to start with something legal. "It would be a lot better to work on the technology in explicitly legal and protected areas, like 'an anonymous way to organize political movements in the US,' versus a drug/murder for hire market," he adds. And what's needed is a new generation of protocols, "asynchronous, message-based, and fully pseudonymous, with the ability for users to build reputation independent of the transport." In Lackey's view, no one worked hard on these problems for the last decade because "no one believed NSA/FBI/etc. would seriously go after users; that has been conclusively disproved."

Now, with the Edward Snowden leaks and Silk Road's demise, security and anonymity have become hot topics once again—and they may spur a renewed interest in making the 'Net less traceable.

Source: How the feds took down the Dread Pirate Roberts | Ars Technica
 
Back
Top