• 1 Post
  • 48 Comments
Joined 2 years ago
cake
Cake day: October 28th, 2024

help-circle


  • Regulation means nothing, if the feds want to track people there’s endless strings they can pull. Plenty of evidence online of feds intercepting packages and bugging devices. They can even use illegal means and then use parallel construction.

    On the other hand, just because the feds collect a bunch of dsta to be decrypted later, doesn’t mean they actually will. Encryption is very rarely cracked, it’s far more difficult than tracking people down via camera footage. Not to mention, statute of limitations means that even if they crack it 20 years later, the data might be useless by then.

    Fact is, I can send some monero to somebody today and know it won’t be cracked within the year. But if I put on a mask and gloves and try to send a letter in the dead of the night, I know there’s still a chance that I’m caught.

    There’s a reason why hackers today choose to use crypto and mixers rather than cash. Same reason why the US criminalized tornado wallet. Turns out, Monero and mixers are incredibly effective.


  • In the case of buying Protonmail accounts, I don’t think it’s obvious that it changed hands, since again, it just looks like the account user started using Tor, nothing more. The use of Tor is suspicious, but so is any anonymous methods. For example, mailing cash to a email provider is also extremely suspicious, given how much effort one is going through to pay anonymously, and thus it may trigger a cop to immediately start reviewing security camera footage around the mailbox. Any type of anonymity is going to raise eyebrows, but buying accounts from the darknet is imo the safest and most secure method.

    But being aware of the tradeoffs is important so thanks for sharing



  • I’m confused at your point here. First off, there’s very little initial metadata. The seller uses their ip address to make the account, and then you buy the account and start using Tor to access the account. From Protonmail’s perspective, this just looks like somebody made an account and started using it with Tor.

    But let’s say there was some usage difference that could be detected. Maybe the seller used the email for Github, and then you started using it for Discord. So what? I think you’re going to have to be more specific about the threat here.











  • as mentioned in other comments, making burners on Tuta is a pain. You often have to wait 1-2 days before they’ll let you use the account, and often the account gets deleted during that period if it was made over Tor. Out of the 5-10 times I tried, I was only able to make 2-3 accounts. I’d rather pay for a reliable method.

    And in my mind, paying is a more sustainable path. Protonmail and Tuta are pro-privacy, ultimately these services just want to avoid people creating unlimited spam accounts. Rotating Tor exits is something a bot can do, and so I wouldn’t be surprised if Tuta started blocking it entirely. Payment is a barrier that doesn’t cost your privacy. Protonmail and Tuta don’t accept crypto during account creation, but darknet markets provide a workaround


  • used by some other person for some personally identifiable thing (which is why the internet at large trusts that account and why you bought it!)

    the internet trusts protonmail because protonmail adds barriers to prevent unlimited spam accounts from being created. Those barriers are IP, phone number, and secondary email. Darknet markets simply provide an alternative path: monetary. But monetary is still a barrier, and prevents spam accounts as well. So imo society should still “trust” it. In other words, a monetary barrier achieves sybil resistance without sacrificing privacy, and I’m all in support of that.