Readit News logoReadit News
323 · 3 years ago
A big misconception that the author and others have is that if two countries don't have an extradition treaty it means that you won't be extradited.

It doesn't work like that. All it means it that instead of you being more or less automatically extradited now a negotiation process starts between the two countries. Put another way: extradition is manual instead of automatic.

Plenty of people were extradited from "no extradition treaty" to US.

> One very important takeaway from this article should be that just because a country does not have a formal extradition agreement with the United States, does not mean that the country will not extradite you.

https://www.expatriationattorneys.com/non-extradition-countr...

RcouF1uZ4gsC · 3 years ago
And also how much the US authorities want you. If the US really wants you, they have a very long reach (see Bin Laden in Pakistan).
stjohnswarts · 3 years ago
Very few (maybe 1 or 2 at any given time out of billions) have the ultimate impetus to capture that bin laden had.
daniel-cussen · 3 years ago
Yeah, same as the British monarchy after the murder of Charles 2. Or James 2. But they tracked down the killers all the way to America, or so they say. Same with Stalin getting Trotsky in Mexico.

But there's others who never were captured, Hannibal evaded Rome until they almost captured him, but he successfully killed himself so they never got him alive. There's many others on both sides.

praptak · 3 years ago
> Keep in mind that the NSA will start scooping up all of your packets simply because you visited torproject.org.

This particular one might not be true but the general spirit probably is. This is why I sometimes do things which a drug lord would do even though I am not one (I swear). It's for the benefit of possible-future me where I do have something to hide.

The correlation of the time where you started using Tor extensively and the time a particular Darknet service started operating? Certainly a possible leak of a few precious bits of those ~30 bits that are needed to pinpoint you.

It's a generalization of the rule that you should not restrict encryption to only those messages that are important.

tormock · 3 years ago
> This is why I sometimes do things which a drug lord would do even though I am not one (I swear). It's for the benefit of possible-future me where I do have something to hide.

We need robots that do this constantly.

tormock · 3 years ago
Also, by the way, I am building a switchblade 300 clone and the charge will be nitrocellulose!!!
Nadya · 3 years ago
Opsec is incredibly difficult to get correct - especially in the long term. Many of the people who need to be getting it correct do not and the only reason they are not in front of a judge or serving time is simply because their government hasn't given a shit to so much as glance their way. Because if their government actually gave a crap to investigate they'd be found almost instantly. From doing stupid things like sharing photos of their pets to more mundane things like having very obvious hours of activity and using vocabulary that varies spelling regionally (eg: how you spell color/colour suddenly matters) or even worse using regional slang like a bunch of Australian slang.

If you want to be a darknet drug lord my advice is of a different flavor: Don't let yourself become too big. Once a (or multiple) governments are after you it is very likely only a matter of time before you get caught. Not because the government is particularly good at tracking people down or somehow nearly omniscient but simply because you likely had or have terrible opsec and finding you is more trivial than you've led yourself to believe. If you believe they are already looking for you it's time to abandon everything and disappear. Live your life like it never happened and whatever you do don't pass on the torch. Let your work die and be buried and someone else build on top of the grave.

digianarchist · 3 years ago
I find DNMs fascinating and love reading about how founders are eventually caught.

> Opsec is incredibly difficult to get correct - especially in the long term

I'd say if you are doing it long term then you are doing it wrong. The longest surviving DNM by far was Dream which I speculate had some nation state backing it.

Nadya · 3 years ago
> I'd say if you are doing it long term then you are doing it wrong.

I agree entirely but it also depends on your threat model. When making my post I didn't have DNM's in mind (though that's the context...) and was actually thinking about the abysmal opsec of many private tracker admins.

rawoke083600 · 3 years ago
>If you want to have some fun at the expense of business in the short term, intentionally take your service offline periodically in order to mess up attempts to match your downtime with public information

Wow, I would have never thought about that to use public-downtime to find/match your service.

csunbird · 3 years ago
It is also a fantastic way of knowing where the owner of the site lives and their daily routines. For example, if the site owner is doing maintenance 03:00 GMT, they probably are in Europe. If they are active during only evenings in Americas, they probably live in somewhere in America and has a day job or they study.

So, activity hours and maintenance hours can be used to pinpoint the timezone of the owner and their daily habits. Randomizing every bit of information is important.

nanliu · 3 years ago
Basically the plot of “death note” and how detective L pinpointed Japan as the location.
tablespoon · 3 years ago
> So, activity hours and maintenance hours can be used to pinpoint the timezone of the owner and their daily habits. Randomizing every bit of information is important.

Or injecting disinformation: pick a misleading timezone, and only connect at times compatible with that timezone (e.g. 03:00 GMT is 11PM EST). Though that might not be compatible with making all your connections from unconnected locations (not many coffee shops/libraries are open that late).

stjohnswarts · 3 years ago
I think Satoshi did this. His hours were kind of unpredictable. Wonder if he was just an insomniac or trying to be time agnostic for security or both?
Melatonic · 3 years ago
Do we have enough info to even pinpoint this type of data to him (or her) ? I was under the impression the links were nebulous at best. But I do not know that much about Satoshi
praptak · 3 years ago
Speaking of time-matching you should also avoid starting a publicly observable spike in Tor-related activity just before the date your new Darknet service goes online.
globular-toast · 3 years ago
Check out the ways people have tried to identify Satoshi Nakamoto to learn more about this and other ways you leak information.
Daffodils · 3 years ago
Where can I find more about this?
stjohnswarts · 3 years ago
Ooops, missed your post, gonna leave mine tho I guess.
eatonphil · 3 years ago
Reminds me of Evan Ratliff's The Mastermind [0] about Paul Le Roux building an illegal online pharmacy and how eventually he was caught.

[0] https://www.goodreads.com/book/show/41181600-the-mastermind

Malp · 3 years ago
Wow, there's a blast from the past. Here's another piece [0] by Ratliff about trying to go off the grid while orchestrating a manhunt for himself. It scratches the same spy-crime-opsec itch that the other links in this thread do, and left a lasting impression on 8-year-old me.

[0] https://www.wired.com/2009/11/ff-vanish2/

elliekelly · 3 years ago
Along the same lines there’s a German show (on US Netflix) called “How to Sell Drugs Online Fast” that’s loosely based on the true story of a teenager[1] who started an online drug business from his bedroom. It’s pretty funny and a bit Silicon Valley-esque. There’s also a documentary where he’s interviewed. I think it’s called “Shiny Flakes” which was the name of his website.

[1]https://www.theguardian.com/world/2015/nov/03/german-teen-so...

runjake · 3 years ago
IIRC, Shiny Flakes went back into the business after the Netflix show and ended up getting busted.

Talk about horrible OPSEC.

Agingcoder · 3 years ago
Ah yes, this story was amazing.

I didn't know there was a book, but there was a series of articles a while ago by the same author : https://magazine.atavist.com/the-mastermind/

rdelpret · 3 years ago
One of my favorite books!
spansoa · 3 years ago
> This section tries to be as operating system independent as possible

But if you are going to interact with Tor and setup hidden services, Whonix[0] is your best bet. The idea behind Whonix being that even if there's some javascript-based 0-day that tries to decloak you, it can't leak your naked IP, because it fails closed and everything is routed through Tor.

[0] https://www.whonix.org/

MortenToudahl · 3 years ago
Is it different than tails? As far as I understand tails routes all traffic through tor too, and cuts the connection if it cannot be done.
FDSGSG · 3 years ago
Huge difference. Whonix consists of two VMs, one where you actually work and another which acts as a "router" sending all of your traffic out over Tor.

Code running in the work VM can't leak your IP even with root access.

j4yav · 3 years ago
This is a great article, I love reading stuff like this that goes into detail into interesting and unusual lives, whether criminal or not. Is there any collection of similar articles, related podcasts, or particular stories I should check out?
alsko · 3 years ago
I really enjoy the Darknet Diaries podcast: https://darknetdiaries.com/
mertd · 3 years ago
The host is masterful at divulging the right amount of technical detail to keep both casual and tech savvy listeners engaged. He is also very good at finding good topics and getting hackers to talk on the podcast.

Deleted Comment

rsync · 3 years ago
Isn’t there a hidden service bbs/forum out there where the primary topic of conversation is opsec and anonymity applied in this manner?

I thought I read (on hn) of such a community…

greenie_beans · 3 years ago
not a forum but this has good privacy and osint info: https://inteltechniques.com/podcast.html

lots of content, you gotta weed through a lot to get the good stuff

Melatonic · 3 years ago
Mostly still IRC chat interestingly enough
skywal_l · 3 years ago
I don't know if this is what you are looking for but I enjoyed this AMA to a bartender a few months back: https://news.ycombinator.com/item?id=27979864.
x86_64Ubuntu · 3 years ago
>... Keep in mind that the NSA will start scooping up all of your packets simply because you visited torproject.org.

I wonder how true that is.

Jalad · 3 years ago
Based on a cursory glance, this looks to be true through the XKeyscore program [0] (CTRL-F Tor)

[0] https://en.wikipedia.org/wiki/XKeyscore

sterlind · 3 years ago
only if you don't live in the Five Eyes. though I definitely wouldn't bet my freedom on it.
chockchocschoir · 3 years ago
When you're trying to cover your tracks, it's best to assume the worst at all times, even if it's unlikely.

Besides, it's not like the NSA doesn't have the capability to scoop all packets from people they've seen visited torproject.org.