What's new

Tracking seed orders on the web. Security hole? Fuckin-A right it is.

Bulldog11

Active member
Veteran
will that even help? I am talking way over my head, lol. I am a carpenter/electrician, I only play with tools and bang things together.
 

Critter

Think for yourself, question authority
ICMag Donor
Veteran
So im confused I installed Tor button and https everywhere yesterday after reading a similar thread on here Now im reading that dosnt do anything? Should i just go back to google crome? Im a spinal cord patient who uses cannibis for med reasons But i dont live in a legal state. I only grow for myself. I dont think they are worried about little ole me.
 

Stress_test

I'm always here when I'm not someplace else
Veteran
Well Bulldog it really isn't as difficult as it seems.

Look at it like an electrical circuit: power in (your PC)-------> power out (USPS)...
okay now add a couple of relays in the circuit. Power in--->(Tor) relay--->(Tor) relay 2---> (Tor) relay 3--->power out.

Power in---encrypted data--->(Tor) relay---data encryption--->(Tor) relay 2---encrypted data---> (Tor) relay 3---UNencrypted data--->power out.

The data is encrypted by your PC and remains encrypted while it remains on the Tor network but is decrypted as it leaves the Tor network. All the Gov. needs to do is watch the data as it enters the USPS network and they can decrypt and trace everything else.

htw1.png

Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.
htw1.png

To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through. The problem is that LEO DOES NOT have to trace the hops, they already know where the destination is AND they know which package is being tracked also.
htw2.png


All this smoke and mirrors and dancing and hopping around still doesn't prevent your data (YOUR IP and MAC address) from being traced since it is unencrypted once it leaves the Tor network.
 

SOTF420

Humble Human, Freedom Fighter, Cannabis Lover, Bre
ICMag Donor
Veteran
I think an even bigger security risk is downloading various files posted by ANY other members on a Cannabis forum. Seems like a good way to download something else along with it but hey call me paranoid. ;)

Answer is, don't order from places with tracking numbers I mean really why risk it. :canabis:

I would not go sending anyone any emails either on here, in general. :)
 

Stress_test

I'm always here when I'm not someplace else
Veteran
So im confused I installed Tor button and https everywhere yesterday after reading a similar thread on here Now im reading that dosnt do anything? Should i just go back to google crome? Im a spinal cord patient who uses cannibis for med reasons But i dont live in a legal state. I only grow for myself. I dont think they are worried about little ole me.

Don't take my posts wrong guys. Tor is better than nothing for the average internet user. But sorely lacking if you want to cover your tracks from the USPS or any other government agency.
 

Dojo

Member
No Gypsy doesn't send you a tracking link. Others do


Problem sovled right? Shop only with Gypsy

But really i understand all the need for security but to a rookie like myself all this tech talk is alien....could it be as simple as downloading firefox and another program from a TRUSTED source...if so let me know the dumb version...and please if you post a link can you get it approved by a mod...you guys got me noid with this shit now :thank you:
 

Bulldog11

Active member
Veteran
Stress_test - believe it or not this all makes scents now. You must be some kind of super teacher, getting through to people like me is not easy. Just have to find a way to relate. Thanks!!!
 

dontstepongrass

M.U.R.D.A. / FMB crew
Veteran
ok, seems to be a lot of conjecture going on in here regarding seed orders and tracking #'s from non-domestic sources...

this has not been pointed on in the thread so possibly it's unknown to quite a few on here...

im gonna shout it for effect:

EVEN IF YOU PAY FOR TRACKING SERVICES, ALL TRACKING ENDS AT INTERNATIONAL BORDER.


meaning, if you ship a payment from USA to UK... once the package is handed over to royal mail.... THATS IT. u will have no further confirmation other than that.

vice-versa, ANYTHING coming from another country.... the tracking on this shipment ONLY allows u to verify that they even sent anything (could b empty envelope even lmao, just saying thats all it VERIFIES) and this tracking will also end upon the parcel being turned over to usps.

now carry on ur techie proxy banter... ;)
 

I.M. Boggled

Certified Bloomin' Idiot
Veteran
One of these directional "Yagi antennas" attached to the back of a wifi repeater...

One of these directional "Yagi antennas" attached to the back of a wifi repeater...

can provide numerous connection opportunities to discretely check upon traceable communications by using a remotely accessed Internet Service Provider signal that is commonly available through a broadcasting, no password required type of "open to all" router/repeater. :)
I can receive line of sight wifi signals from a couple of miles away with my Yagi. :)
picture.php

2.4GHz 16dBi Directional High Gain 16-Unit Antenna for Wifi/Wireless Network
(with a "RP-SMA" connector.)

These are currently available from "DealExtreme" for (US) fifteen dollars and eighty cents delivered from Hong Kong...
"Newegg" has "wifi repeaters" starting about 25-30 dollars delivered.
Wardriving in a car for an open wifi signal across town with an open laptop searching is another classic ol' standby anonymity technique.

Good Information, thanks for sharing y'all.

IMB :)
 
Last edited:

Stress_test

I'm always here when I'm not someplace else
Veteran
can provide numerous wide open connection opportunities to remotely check traceable communications.
I can receive line of sight wifi signals from a couple of miles away. :)

2.4GHz 16dBi Directional High Gain 16-Unit Antenna for Wifi/Wireless Network (with a "RP-SMA" connector.)
These are currently available from "DealExtreme"dotcom for (US) fifteen dollars and eighty cents delivered from Hong Kong...
Neweggdot has wifi repeaters starting about 25-30 dollars delivered.
Wardriving in a car for an open wifi signal across town with an open laptop searching is another classic ol' standby anonymity technique.
With remotely accessed Internet Service Provider signals through an open access router a
Good Information, thanks for sharing y'all.

IMB :)

Close to my setup. Except that I am also using 4 Linksys routers that I hacked with ddwrt and converted into relays, each with directional antenna and doing basically the same thing that Tor does in relaying and encrypting. But once 1 relay it detected it is simply a matter of wardriving to locate the others.
 
Some food for thought:

Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use web proxies such as Privoxy while web browsing to block cookies and withhold information about your browser type.

Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.

Tor by itself is NOT all you need to maintain your anonymity. There are several major pitfalls to watch out for:

1. Tor only protects Internet applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. Tor recommends you use Firefox with the Torbutton extension.
2. Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others: they can be manipulated into revealing your IP address. For example, that means Youtube is disabled. If you really need your Youtube, you can reconfigure Torbutton to allow it; but be aware that you're opening yourself up to potential attack. Also, extensions like Google toolbar look up more information about the websites you type in: they may bypass Tor and/or broadcast sensitive information. (How many tool-bars and add-ons do you have installed?) Some people prefer using two browsers (one for Tor, one for non-Tor browsing).
3. Beware of cookies: if you ever browse without Tor and a site gives you a cookie, that cookie could identify you even when you start using Tor again. Torbutton tries to handle your cookies safely. CookieCuller can help protect any cookies you do not want to lose.
4. Tor anonymizes the origin of your traffic, and it encrypts everything between you and the Tor network and everything inside the Tor network, but it can't encrypt your traffic between the Tor network and its final destination. If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication. HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites.
5. While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust. Be careful opening documents or applications you download through Tor, unless you've verified their integrity.
6. Tor tries to prevent attackers from learning what destinations you connect to. It doesn't prevent somebody watching your traffic from learning that you're using Tor. You can mitigate (but not fully resolve) the risk by using a Tor bridge relay rather than connecting directly to the public Tor network,

Keep in mind that Tor doesn't encrypt you info being sent to the vendor, only between you and the Tor network. Once it leaves Tor network, it is wide open and the gov already knows which servers to watch; USPS?

I hate to say it OldPork but Tor really does NOTHING to offer security in the manner you want/need. It is another instance of false security.

I did give you rep for bringing the topic up and making others aware. But in the end Tor does nothing for you except slow your PC down and falsely ease paranoia slightly for the unaware.

not to mention that the original creators of TOR were law enforcement that wanted to illegally dig into peoples privacy and didn't want to be traced doing it. most TOR nodes are LEO computers. for that reason alone i wouldn't use it. its so easy to configure firefox to use an elite proxy and have ALL of your connections to the internet encrypted it isn't even funny. spend 10 minutes on firefox's home page and figure it out. and if your super paranoid, you can get a program that changes your mac address just in case you don't trust your elite proxy, a bit unnecessary, but if it makes you feel better, than its worth it. there are also web sites that you can go to to check your proxy to see what info it is giving about you. install "noscript" onto firefox and you have even more protection for all the script programs that stealthily reveal your ip and whatnot even when using a proxie.
 

green_thumb...

Strain Whore Extraordinaire!
Veteran
Uuuuuh just order from someone elses comp? That's what I do,I have prolly 3 laptops I baught off of people that baught em brand. New and are still regestered in their info and they have no clue who I am either so thay can't point me out later.


People are always slangin computers for cheap these days. Shit And with wifi everywhere you don't even need internet of your own these days either.
 

Critter

Think for yourself, question authority
ICMag Donor
Veteran
not to mention that the original creators of TOR were law enforcement that wanted to illegally dig into peoples privacy and didn't want to be traced doing it. most TOR nodes are LEO computers. for that reason alone i wouldn't use it. its so easy to configure firefox to use an elite proxy and have ALL of your connections to the internet encrypted it isn't even funny. spend 10 minutes on firefox's home page and figure it out. and if your super paranoid, you can get a program that changes your mac address just in case you don't trust your elite proxy, a bit unnecessary, but if it makes you feel better, than its worth it. there are also web sites that you can go to to check your proxy to see what info it is giving about you. install "noscript" onto firefox and you have even more protection for all the script programs that stealthily reveal your ip and whatnot even when using a proxie.

What!! Now im less safe with tor and am using leo computers. fck this!! im going back to chrome and not worrying about it.
 

OldPork

Member
Sorry Stess_Test, you weren't even close.
That being said, feel free to post the entire trace right here.

*** TOR WORKS ***
 
R

Rysam

What about just going down to Starbucks, getting some coffee, having a seat in them comfy chairs and ordering some seeds? Theres always a private seat. Use a hotmail acct., and the Visa gift card from a store at the other end of the mall?
Can they trace from a laptop that way? Im with bulldog and know squat about this, but Im trying to understand. I dont order seeds but I do like the idea of security.
 

KharmaGirl

~Resident Puck Bunny~
Veteran
I will not warn anyone again. Keep your offline activities that require personal info to be exchanged off the site. Don't push it. Thank you.
 

Stress_test

I'm always here when I'm not someplace else
Veteran
not to mention that the original creators of TOR were law enforcement that wanted to illegally dig into peoples privacy and didn't want to be traced doing it. most TOR nodes are LEO computers. for that reason alone i wouldn't use it. its so easy to configure firefox to use an elite proxy and have ALL of your connections to the internet encrypted it isn't even funny. spend 10 minutes on firefox's home page and figure it out. and if your super paranoid, you can get a program that changes your mac address just in case you don't trust your elite proxy, a bit unnecessary, but if it makes you feel better, than its worth it. there are also web sites that you can go to to check your proxy to see what info it is giving about you. install "noscript" onto firefox and you have even more protection for all the script programs that stealthily reveal your ip and whatnot even when using a proxie.

Exactly what I have been saying about elite proxies. Tor and most other internet and boxed "security software/sites" are little more than hoaxes.

Oh some actually do what they say that they will do. But the problem is that under close scrutiny, what they say they will do for you is NOTHING.

What!! Now im less safe with tor and am using leo computers. fck this!! im going back to chrome and not worrying about it.

Well now when you put it like that. Ummm Chrome is basically Google. Google tracks EVERYTHING. Here are a couple articles:

http://bits.blogs.nytimes.com/2009/06/02/google-is-top-tracker-of-surfers-in-study/

http://news.bbc.co.uk/2/hi/technology/7872026.stm
 
Top