• 2 Posts
  • 60 Comments
Joined 2 years ago
cake
Cake day: October 28th, 2024

help-circle
  • I think this comment is a good example of why people don’t like physical methods. It just seems so hand-wavy, like homeopathic medicine. How do you judge how well it will work in a given situation? Physical privacy is just dependent on too many unknowns. And privacy techniques for the user have not improved in the past 100 years, meanwhile surveillance and location tracking algorithms for the authorities have progressed.

    Digital privacy continues to improve every year. Andbody can use Tor and Monero, and benefit from the research and development behind them. Anybody can audit the tech, and build on top of it. Right now darknet markets are clunky to use, but they definitely feel better than they did 5 years ago, and they’ll keep getting better.

    Anyways thanks for engaging in this discussing with me, it definitely helped me explore these ideas deeper.

    Keep your nose clean out there, you never know whose gonna be looking in 20 years…

    depending on your juridiction, the statute of limitations should save you after 20 years :)






  • Regulation means nothing, if the feds want to track people there’s endless strings they can pull. Plenty of evidence online of feds intercepting packages and bugging devices. They can even use illegal means and then use parallel construction.

    On the other hand, just because the feds collect a bunch of dsta to be decrypted later, doesn’t mean they actually will. Encryption is very rarely cracked, it’s far more difficult than tracking people down via camera footage. Not to mention, statute of limitations means that even if they crack it 20 years later, the data might be useless by then.

    Fact is, I can send some monero to somebody today and know it won’t be cracked within the year. But if I put on a mask and gloves and try to send a letter in the dead of the night, I know there’s still a chance that I’m caught.

    There’s a reason why hackers today choose to use crypto and mixers rather than cash. Same reason why the US criminalized tornado wallet. Turns out, Monero and mixers are incredibly effective.


  • In the case of buying Protonmail accounts, I don’t think it’s obvious that it changed hands, since again, it just looks like the account user started using Tor, nothing more. The use of Tor is suspicious, but so is any anonymous methods. For example, mailing cash to a email provider is also extremely suspicious, given how much effort one is going through to pay anonymously, and thus it may trigger a cop to immediately start reviewing security camera footage around the mailbox. Any type of anonymity is going to raise eyebrows, but buying accounts from the darknet is imo the safest and most secure method.

    But being aware of the tradeoffs is important so thanks for sharing




  • I’m confused at your point here. First off, there’s very little initial metadata. The seller uses their ip address to make the account, and then you buy the account and start using Tor to access the account. From Protonmail’s perspective, this just looks like somebody made an account and started using it with Tor.

    But let’s say there was some usage difference that could be detected. Maybe the seller used the email for Github, and then you started using it for Discord. So what? I think you’re going to have to be more specific about the threat here.