• 2 Posts
  • 61 Comments
Joined 2 years ago
cake
Cake day: October 28th, 2024

help-circle



  • Regulation means nothing, if the feds want to track people there’s endless strings they can pull. Plenty of evidence online of feds intercepting packages and bugging devices. They can even use illegal means and then use parallel construction.

    On the other hand, just because the feds collect a bunch of dsta to be decrypted later, doesn’t mean they actually will. Encryption is very rarely cracked, it’s far more difficult than tracking people down via camera footage. Not to mention, statute of limitations means that even if they crack it 20 years later, the data might be useless by then.

    Fact is, I can send some monero to somebody today and know it won’t be cracked within the year. But if I put on a mask and gloves and try to send a letter in the dead of the night, I know there’s still a chance that I’m caught.

    There’s a reason why hackers today choose to use crypto and mixers rather than cash. Same reason why the US criminalized tornado wallet. Turns out, Monero and mixers are incredibly effective.


  • In the case of buying Protonmail accounts, I don’t think it’s obvious that it changed hands, since again, it just looks like the account user started using Tor, nothing more. The use of Tor is suspicious, but so is any anonymous methods. For example, mailing cash to a email provider is also extremely suspicious, given how much effort one is going through to pay anonymously, and thus it may trigger a cop to immediately start reviewing security camera footage around the mailbox. Any type of anonymity is going to raise eyebrows, but buying accounts from the darknet is imo the safest and most secure method.

    But being aware of the tradeoffs is important so thanks for sharing




  • I’m confused at your point here. First off, there’s very little initial metadata. The seller uses their ip address to make the account, and then you buy the account and start using Tor to access the account. From Protonmail’s perspective, this just looks like somebody made an account and started using it with Tor.

    But let’s say there was some usage difference that could be detected. Maybe the seller used the email for Github, and then you started using it for Discord. So what? I think you’re going to have to be more specific about the threat here.