Recent Posts

Pages: [1] 2 3 ... 10
News / Re:
« Last post by Hanswurst on June 23, 2017, 01:24:03 PM »
So whats the status here?
I would love to have more input in the form of other sites to become an expert about PEAs.
As some of you might have noticed, I'm in the process of proving myself worthy and will finish recent projects in the upcoming months when I finally have the time.

Who can throw me a bone, help me gain access, vouch for that trust is well invested in my person?
What are the places the scene gathers at, or has the end if the Hive made this largely impossible?

Feel free to PM, if you consider the information sensitive.
One solution to this is to use ring signatures from other buyers: it would allow for proof that the rating did indeed come from an actual buyer but conceal which buyer it is. This will lower the risk at being blackmailed, poisoned, or creating additional information that could potentially be incriminating.

I'm curious if there is a way to make this easier to implement using Monero? Monero specifically since it is particularly well suited for such transactions, and already uses ring signatures as well as allows for limited information to be reveled selectively, such as a viewkey.

 Especially if the buyers/sellers used Monero for the transactions. Obviously it could be done by the marketplace by building rings out of something such as the bitcoin/Monero transaction data, but I'm not sure what the best way would be, and I am worried that many schemes would reveal info or allow the marketplace to manipulate data, which would be less than ideal.

Not sure how to implement it, but likely the best strategy for this would be to have ratings for seller and ratings for products separate, and limit posting of ratings until there are at least 5 purchases from the seller, and 5 purchases of the same product being sold.

 I think you'd have to trust the marketplace to publish a list of key images used for each transaction with the vendor. Then the person leaving feedback could put a ring signature on their review to prove they did make a purchase, but would not reveal which purchase it was that they made. The key image mechanism would also prevent the anonymous review from being submitted more than once per transaction made with the vendor (there would be a second type of key image published per review submitted, and no more than one review will be allowed to be submitted with any particular instance of this second type of key image).

The overall idea is particularly suited to Monero transactions because revealing the key image used in a Monero transaction (for the marketplace to publish) does not reveal the wallet address of the person that made the transaction.

When Monero gets multisignature transactions, it will be possible and likely effective to by pass marketplaces by doing 2 of 2 multisig escrow. It maybe possible for a vendor to publish a key that associates all of their transactions, and from each transaction a rating/review could also be published by a real but anonymous buyer.
Cypherpunk, Cryptoanarchy & The Darknet / Influential Writings
« Last post by Vesp on June 15, 2017, 03:21:32 AM »
I would say these three, and probably others are "mandatory" reading for those interested in the resulting economic, political and social changes that come about from wide spread encryption, and tools like Tor, I2P, Bitcoin, and other privacy tools.

The Crypto Anarchist Manifesto

Timothy C. May
A specter is haunting the modern world, the specter of crypto anarchy.

Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re-routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation.

The technology for this revolution--and it surely will be both a social and economic revolution--has existed in theory for the past decade. The methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication, and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security Agency. But only recently have computer networks and personal computers attained sufficient speed to make the ideas practically realizable. And the next ten years will bring enough additional speed to make the ideas economically feasible and essentially unstoppable. High-speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will be some of the enabling technologies.

The State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be trade freely and will allow illicit and stolen materials to be traded. An anonymous computerized market will even make possible abhorrent markets for assassinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy.

Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally alter the nature of corporations and of government interference in economic transactions. Combined with emerging information markets, crypto anarchy will create a liquid market for any and all material which can be put into words and pictures. And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property.

Arise, you have nothing to lose but your barbed wire fences!

                   A Cypherpunk's Manifesto

                        by Eric Hughes

Privacy is necessary for an open society in the electronic age.
Privacy is not secrecy.  A private matter is something one doesn't
want the whole world to know, but a secret matter is something one
doesn't want anybody to know. Privacy is the power to selectively
reveal oneself to the world. 

If two parties have some sort of dealings, then each has a memory of
their interaction.  Each party can speak about their own memory of
this; how could anyone prevent it?  One could pass laws against it,
but the freedom of speech, even more than privacy, is fundamental to
an open society; we seek not to restrict any speech at all.  If many
parties speak together in the same forum, each can speak to all the
others and aggregate together knowledge about individuals and other
parties.  The power of electronic communications has enabled such
group speech, and it will not go away merely because we might want it

Since we desire privacy, we must ensure that each party to a
transaction have knowledge only of that which is directly necessary
for that transaction.  Since any information can be spoken of, we
must ensure that we reveal as little as possible.  In most cases
personal identity is not salient. When I purchase a magazine at a
store and hand cash to the clerk, there is no need to know who I am.
When I ask my electronic mail provider to send and receive messages,
my provider need not know to whom I am speaking or what I am saying
or what others are saying to me;  my provider only need know how to
get the message there and how much I owe them in fees.  When my
identity is revealed by the underlying mechanism of the transaction,
I have no privacy.  I cannot here selectively reveal myself; I must
_always_ reveal myself.

Therefore, privacy in an open society requires anonymous transaction
systems.  Until now, cash has been the primary such system.  An
anonymous transaction system is not a secret transaction system.  An
anonymous system empowers individuals to reveal their identity when
desired and only when desired; this is the essence of privacy.

Privacy in an open society also requires cryptography.  If I say
something, I want it heard only by those for whom I intend it.  If
the content of my speech is available to the world, I have no
privacy.  To encrypt is to indicate the desire for privacy, and to
encrypt with weak cryptography is to indicate not too much desire for
privacy.  Furthermore, to reveal one's identity with assurance when
the default is anonymity requires the cryptographic signature.

We cannot expect governments, corporations, or other large, faceless
organizations to grant us privacy out of their beneficence.  It is to
their advantage to speak of us, and  we should expect that they will
speak.  To try to prevent their speech is to fight against the
realities of information. Information does not just want to be free,
it longs to be free.  Information expands to fill the available
storage space.  Information is Rumor's younger, stronger cousin;
Information is fleeter of foot, has more eyes, knows more, and
understands less than Rumor.

We must defend our own privacy if we expect to have any.  We must
come together and create systems which allow anonymous transactions
to take place.  People have been defending their own privacy for
centuries with whispers, darkness, envelopes, closed doors, secret
handshakes, and couriers.  The technologies of the past did not allow
for strong privacy, but electronic technologies do.

We the Cypherpunks are dedicated to building anonymous systems.  We
are defending our privacy with cryptography, with anonymous mail
forwarding systems, with digital signatures, and with electronic

Cypherpunks write code.  We know that someone has to write software
to defend privacy, and since we can't get privacy unless we all do,
we're going to write it. We publish our code so that our fellow
Cypherpunks may practice and play with it. Our code is free for all
to use, worldwide.  We don't much care if you don't approve of the
software we write.  We know that software can't be destroyed and that
a widely dispersed system can't be shut down.

Cypherpunks deplore regulations on cryptography, for encryption is
fundamentally a private act.  The act of encryption, in fact, removes
information from the public realm.  Even laws against cryptography
reach only so far as a nation's border and the arm of its violence.
Cryptography will ineluctably spread over the whole globe, and with
it the anonymous transactions systems that it makes possible.

For privacy to be widespread it must be part of a social contract.
People must come and together deploy these systems for the common
good.  Privacy only extends so far as the cooperation of one's
fellows in society.  We the Cypherpunks seek your questions and your
concerns and hope we may engage you so that we do not deceive
ourselves.  We will not, however, be moved out of our course because
some may disagree with our goals.

The Cypherpunks are actively engaged in making the networks safer for
privacy.  Let us proceed together apace.


Eric Hughes

9 March 1993

Author : The Mentor
                               ==Phrack Inc.==

                    Volume One, Issue 7, Phile 3 of 10

The following was written shortly after my arrest...

                       \/\The Conscience of a Hacker/\/


                               +++The Mentor+++

                          Written on January 8, 1986

        Another one got caught today, it's all over the papers.  "Teenager
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
        Damn kids.  They're all alike.

        But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker?  Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
        I am a hacker, enter my world...
        Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...
        Damn underachiever.  They're all alike.

        I'm in junior high or high school.  I've listened to teachers explain
for the fifteenth time how to reduce a fraction.  I understand it.  "No, Ms.
Smith, I didn't show my work.  I did it in my head..."
        Damn kid.  Probably copied it.  They're all alike.

        I made a discovery today.  I found a computer.  Wait a second, this is
cool.  It does what I want it to.  If it makes a mistake, it's because I
screwed it up.  Not because it doesn't like me...
                Or feels threatened by me...
                Or thinks I'm a smart ass...
                Or doesn't like teaching and shouldn't be here...
        Damn kid.  All he does is play games.  They're all alike.

        And then it happened... a door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought... a board is
        "This is it... this is where I belong..."
        I know everyone here... even if I've never met them, never talked to
them, may never hear from them again... I know you all...
        Damn kid.  Tying up the phone line again.  They're all alike...

        You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless.  We've been dominated by sadists, or
ignored by the apathetic.  The few that had something to teach found us will-
ing pupils, but those few are like drops of water in the desert.

        This is our world now... the world of the electron and the switch, the
beauty of the baud.  We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals.  We explore... and you call us criminals.  We seek
after knowledge... and you call us criminals.  We exist without skin color,
without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals.

        Yes, I am a criminal.  My crime is that of curiosity.  My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me

        I am a hacker, and this is my manifesto.  You may stop this individual,
but you can't stop us all... after all, we're all alike.

                               +++The Mentor+++

News / Re: Chemicals for one billion ecstasy pills seized in the Netherlands
« Last post by Tsathoggua on May 30, 2017, 08:01:55 AM »
Still pretty popular down UK ways. We've long been fond of the ol' beans. Well, say 'we', not hugely into entactogens for regular usage personally, but for 'legitimately' therapeutic  purposes, some of them have been a big help. With PTSD in particular, although AMT was the tool of choice in besting it. Still remember the first time on MDMA though. And on methylone. Although the latter was...not nearly for so good a reason. Commercial  product, tainted with triphenylphosphine, spent the next few days coughing blood. But the first time on pills, in Tsath's teens, quite a bash that was, although he did end up having to more or less carry some 13yo girl to the toilet for her to make room for more booze, whilst gurning manically, and courtesy of a couple of bottles of ether and some home-made yopo snuff not so steady on his feet either. Still, it was about good manners, if that makes sense, better that than have her throw up somewhere undignified, or get her hair in it etc.

Still remember that party after all these years, they say you don't forget your first time, not that Toady will ever forget the several week-long sleepless hangover after dramatically underestimating the potency of some really cheap amphetamine, the pasty stuff around in the '90s and thenabouts with the funky smell to it? at 3 grams for a tenner, wasn't expecting much, but what Tsath' didn't know, that it apparently, was courtesy of the seller being a close friend of the hostess'es mother. 3 grams of that stuff within perhaps that many hours...lets just say the comedown stank worse than theresa may's chocolate starfish had it crawled into a broken mexican sewer pipe, inverted itself and shat in reverse:P
News / Re: Chemicals for one billion ecstasy pills seized in the Netherlands
« Last post by Kasey Jones on May 30, 2017, 03:53:15 AM »
people still eat pills?

Lol, no shit...why eat all that filler when you have pure crystals:)
News / Re: Chemicals for one billion ecstasy pills seized in the Netherlands
« Last post by hamsterbob on May 30, 2017, 03:36:12 AM »
people still eat pills?
News / Re: Chemicals for one billion ecstasy pills seized in the Netherlands
« Last post by Tsathoggua on May 29, 2017, 09:18:27 PM »
Choir. Preaching.
News / Re: Chemicals for one billion ecstasy pills seized in the Netherlands
« Last post by Tsathoggua on May 29, 2017, 04:47:26 PM »
'warned that MDMA is being sold at unprecedented purity...'

Surely, that is nothing but a good thing? what would the filth think better? pills that are full of PMA or PMMA? dirty, amphetamine/meth bombs? piperazine based shite? if people are going to take it, and they are, regardless of the opinion of verminous LE trash, surely, it is a far better thing for the product to be purer and cleaner, than it is for it to be dirty muck. If nothing else, bar massive overdoses, or hyponatraemia due to people knowing to drink lots of fluid whilst raving, but not realizing it needs to contain electrolytes to replace those lost there will be far fewer deaths.

Warnings, should be left for bad pills, not good pills. v   
Pages: [1] 2 3 ... 10