Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Communications Encryption Privacy

'Silk Road Reloaded' Launches On a Network More Secret Than Tor 155

rossgneumann writes A new anonymous online drug market has emerged, but instead of using the now infamous Tor network, it uses the lesser known "I2P" alternative. "Silk Road Reloaded" launched yesterday, and is only accessible by downloading the special I2P software, or by configuring your computer in a certain way to connect to I2P web pages, called 'eepsites', and which end in the suffix .i2p. The I2P project site is informative, as is the Wikipedia entry.
This discussion has been archived. No new comments can be posted.

'Silk Road Reloaded' Launches On a Network More Secret Than Tor

Comments Filter:
  • can sombody say.... (Score:5, Interesting)

    by ganjadude ( 952775 ) on Monday January 12, 2015 @09:31AM (#48792631) Homepage
    Honeypot???
    • by TWX ( 665546 ) on Monday January 12, 2015 @09:32AM (#48792639)
      Yes. I have no speech impediments in English.

      Don't ask me to properly say, "burrito," in Spanish though, as I cannot roll my Rs...
      • Re: (Score:3, Funny)

        by Ed Avis ( 5917 )
        As an English speaker learning Spanish I found it easiest to start with the word 'corrida'. Somehow the O vowel before helped to roll the RR. After that, 'corrida de burritos'. More difficult still, 'corrida de perritos'.
      • You ever make engine noises while playing with toy cars as a kid? Flutter your tongue against the roof of your mouth/back of your top teeth and go nuts for a while. RrrrRRrRRRrRRRRRRRrrrrrrRRRrrRR... Keep it up - you want to get your tongue comfortable with the motion.

        Now say burrRRrrito. Then dial it back a bit and you're golden. Well, bronzed at least.

        • Now say burrRRrrito. Then dial it back a bit and you're golden. Well, bronzed at least.

          I've never had a problem with this. No matter how I pronounce burrito, rolled R's or not....they give me what I want at Taco Bell, no problems, no big deal.

          :D

          • But then if you're only eating at Taco Bell, you've never had a real burrito (or any kind of actual food for that matter), so why should it matter if you can pronounce it or not?

            • I've found it amazing that many otherwise intelligent people will believe that Taco Bell got its name because it was originally owned by the Mexican telephone company.

              Try mentioning it the next time you drive past a TB when you have non /. readers in the vehicle.

          • why would you feel the need to roll your R's?
    • by ShanghaiBill ( 739463 ) on Monday January 12, 2015 @10:17AM (#48792979)

      Honeypot???

      I downloaded it from www.fbi.gov/downloads/i2p.exe and it looks okay. Why do you think it is a honeypot?

      • by Anonymous Coward

        I downloaded it from www.fbi.gov/downloads/i2p.exe and it looks okay. Why do you think it is a honeypot?

        You should download the source code and compile it yourself. Be sure to use the compiler that is supplied as part of the package.

        www.fbi.gov/downloads/i2p/sources/WindowsFullPackage.zip .

        • But if you are using the supplied compiler then it could still be compromised. The compiler could be programmed to inject the malicious code.
          • But if you are using the supplied compiler then it could still be compromised. The compiler could be programmed to inject the malicious code.

            I felt a great disturbance in the Force, as if millions of voices suddenly cried out WHOOOSH and were suddenly silenced. I fear something terrible has happened.

    • by Cito ( 1725214 )

      If so, they deliver.

      To test it out ordered little pot and a single dose of DMT

      Items received

      • Big deal. Intelligence agencies deal in drugs to accomplish their own ends. It's called establishing trust. Look at the team members on the development of this project. They are all anonymous, as far as I can tell. I have no idea who KillYourTV is. Nor do I know who you are. For me personally, a typical citizen, I have no idea where to go or what to do to maintain my privacy. This goes beyond wanting to look up medical conditions without my ISP and government looking over my shoulder. I don't know who to t
    • Can somebody spell "somebody"?
    • Let's just introduce the new top-level domain .nsa, and have done with it.

  • by hodet ( 620484 )

    One crappy drug site and the whole Tor network is now infamous.

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      It wasn't one crappy drug site, but yes the prominent "dark web" front leader is as a result infamous. There are plenty of innocent and justified uses for systems like tor, but for the average person associates tor with drugs by mail, child porn and murder for hire thanks to the media.

      • by rmstar ( 114746 ) on Monday January 12, 2015 @10:17AM (#48792975)

        here are plenty of innocent and justified uses for systems like tor, but for the average person associates tor with drugs by mail, child porn and murder for hire thanks to the media.

        Truth be told, it's not the media. We live in a world that is far freer than many would like to acknowledge, and for most purposes tor is a hassle or pointless. The end result is that tor is mostly only used when there is a very good reason for it, and since we live in fairly free society, that reason tends to be stuff that gives tor a bad reputation.

        There is also this paradoxon that, if we lived in a society where tor would make a difference, tor would most likely not exist or be useless. This is the situation in Saudi Arabia and other similar places. This is so because the real weakness of tor is that, since it is not possible to hide the exit or entry nodes themselves, the network is easy to shut down or to filter out.

        • by jythie ( 914043 ) on Monday January 12, 2015 @11:04AM (#48793387)
          One of the things that makes pointing this out difficult for some people though is that there are a non-trivial number of people who use it for ideological reasons, so they always have their own small community to point to as examples for legitimate use. But just like the other groups you point out, ideological usage is still not common usage since it provides an inferior network experience for mostly symbolic gains, which the average user has no use for.
      • by Anonymous Coward

        As a sysadmin, Tor was infamous for the attacks coming from exit nodes. So much that it became a policy to block all traffic coming from those IPs at the routers, application level, and even the OS level via group policies or recipes. This way, if someone was using TOR for C&C, there was a good chance, something somewhere would block it.

        IP blocks are a wise thing in any case for every single public service. If there is no need for Elbonian sites to connect to a VPN service, they get blocked by IP. E

        • Although it gives your IP some semblance of legitimacy, having a fixed endpoint after Tor (as would be the case with a VPN through tor) is a bad idea in practice - though obviously the measure of bad depends on what your exact threat model is.
      • by mi ( 197448 )

        for the average person associates tor with drugs by mail, child porn and murder for hire thanks to the media.

        That's what I for one think of this entire newfangled "internet" thing, thank you very much...

    • For drugs, and not child porn. I call that progress!

  • by OzPeter ( 195038 ) on Monday January 12, 2015 @09:42AM (#48792703)

    Two people can keep a secret, but only if one of them is dead

    But then, from the I2P page [wikipedia.org]

    I2P is beta software since 2003. Developers emphasize that there are likely to be bugs in the software and that there has been insufficient peer review to date. However, they believe the code is now reasonably stable and well-developed, and more exposure can help development of I2P.

    So while "More secret than TOR", may be true, actually being secret is unknown by the users. But I bet the TLA LEAs will be keeping an eye on it and directing resources to test I2P limits (if they already haven't - they kinda don't like communications they can't tap)

  • by wonkey_monkey ( 2592601 ) on Monday January 12, 2015 @09:46AM (#48792731) Homepage

    'Silk Road Reloaded' Launches On a Network More Secret Than Tor

    *sigh* Sure was a nice secret network we had going up until five minutes ago. Thanks a bunch, timothy!

    TL;DR - shut uuuuuuup!

    • Oh come on: anyone with a passing interest in trying to get away from ubiquitous corporate and state tracking knows of i2p. It takes a minute of googling to find Tor first, and i2p second.

      • by OzPeter ( 195038 )

        Oh come on: anyone with a passing interest in trying to get away from ubiquitous corporate and state tracking knows of i2p. It takes a minute of googling to find Tor first, and i2p second.

        Do you hear that close-by whooshing sound? It's gotta be pretty loud where you are.

        • Only if he is close to the first echo. Otherwise it could be any volume when it finally passes him by. That is just the price that he pays for his privacy.

  • by gstoddart ( 321705 ) on Monday January 12, 2015 @09:50AM (#48792769) Homepage

    So, does this provide any actual additional security, or is is just security by obscurity because nobody is using it?

    If it's just security by obscurity ... well, good luck with that.

    • I was going to post this. It's not some secret, kept hidden from folks. It's just simply neither popular nor well known.

  • Comment removed (Score:5, Informative)

    by account_deleted ( 4530225 ) on Monday January 12, 2015 @09:51AM (#48792779)
    Comment removed based on user account deletion
    • Tor has something i2p doesn't: exit nodes (or outproxies, in i2p parlance). That's what keeps me on Tor, despite the fact that most exit nodes are probably ran by state surveillance agencies: I use it to throw Google and other nosy corporations off my tracks when I browse the regular internet, not to escape state surveillance or buy drugs. There's no escaping the latter anyway...

      • by crow ( 16139 )

        I run a Tor relay, but I set it up to also allow exit for specific sites, such as Google.

        I don't use Tor much myself, but I figure I'm a step ahead of the game by being in the habit of opening most links in a private browser (killing tracking unless I'm tethered to my phone--thanks Verizon).

      • by jythie ( 914043 )
        As the saying goes, 'standard is better than the best solution'.

        Tor is more well known, so it has more people and services on it, which makes it a better protocol to actually use if you want to connect to other people and services. i2p, no matter how much additional technical advantage it has, is useless unless there is a critical mass of users to make it worthwhile. It does not take shadowy state or media manipulation to keep it on top, just simple emergent behavior.
  • Comment removed based on user account deletion
  • "You want to go to Silk Road 2.0? You're either nuts or on drugs."

  • by Anonymous Coward

    I have tried I2P several times for torrent and iMule to avoid university anti piracy regulations and it was ridiculously slow, download times were about 10KB/sec and that is not good for movies. EEpsites are also quite slow first time they are loaded. Most nodes were in Russia, some were also in Romania and similar east european countries, also some in India and Brazilia. If it is a honeypot, it is most probably Russian honeypot as there are many Russian IPs. Not good for political activism, good enough for

  • by fuzzyfuzzyfungus ( 1223518 ) on Monday January 12, 2015 @10:20AM (#48793005) Journal
    Given that size is a fairly useful attribute for an 'anonymous' network(if the system is so small that a little traffic analysis can identify the 10 cypherpunks and couple of dozen kiddie porn enthusiasts that actually use it, it isn't too useful no matter how elegant the design), what does i2P fix about TOR to be worth the greater obscurity?
    • In reality, the only thing making it "more secret" is the fact that you can split the communications up into small UDP packets instead of a TCP stream. That means that for certain uses, it can be more secret; but performing HTTP transactions isn't one of them.

  • Yet Another X-Bone (Score:5, Informative)

    by jd ( 1658 ) <imipakNO@SPAMyahoo.com> on Monday January 12, 2015 @10:21AM (#48793009) Homepage Journal

    People have been designing virtual networks for decades. I2P is well advertised on Freenet, itself a well-known secure network.

    Nothing new here. The security and reliability of none of this software is proven, it may not even be provable due to the distributed nature. That reduces the problem to one of how many people you're ok with knowing what you're doing.

  • If we are discussing it on Slashdot, it's not secret.

  • "Naturally, Silk Road Reloaded has its own forum as well. At the moment, there isn't a single posting, but it seems to function normally."

    what was that supposed to mean?

Keep up the good work! But please don't ask me to help.

Working...