antidarknet

joined 3 months ago
[–] antidarknet@monero.town 0 points 3 months ago (2 children)

We're against heavy drugs and heavy drug trafficking

[–] antidarknet@monero.town 1 points 3 months ago (1 children)

Should you look for impressive perhaps look at fashion shows? What you see is a mini side quest as we said. The big time will come from other ways.

Their main clearnet gateway advertised everywhere has been shut down. They can replace it but at cost of exposing their incompetency lack of understanding of hosting and their childish responses by their admin. There isn't a funnier thing to see than admins hide behind Cloudflare because they can't protect their Tor infrastructure in any other way.

 

A mini side quest from AntiDarknet

We always thought "admins" who protect themselves by Cloudflare and other automated clearnet solutions are at the bottom ladder when it comes to skill. What level of script kiddie do you have to be to protect yourself against attacks with Cloudflare? The answer: the lowest level the definition of "LOL". Why not have your markets and forums in clearnet while you're at it?

To top it off those same admins decide to use random registrars and clearly don't have a full understanding of how the underground economy works. Ironic.

What we're getting at here is if these are your "top markets" and "top admins" who we've shown can be easily disrupted through their poorly coded payment systems or poor choice of infrastructure... how far do you think police have gone? You're ruled by amateurs who will not only extort your information (hello Incognito) but also take you down with them when time for raids is right. Don't be stupid and don't do anything illegal and for those peddling heavy drugs fuck you and keep dropping the soap.

Now to the fun part.

Remember our tweet & post on 3 August 2024? https://x.com/antidarknet/status/1819705708520280475 & https://t.me/antidarkdotnet/17

Leaving this here as proof. Pending.

d3c883ec351c39b34fad35b2d12c1c40cf5f01da58cabd8a5bd03e75202c9ccc

#darknet #darkweb #markets #soon #archetyp #sha256secret #lazyadmins

Time to deliver and reveal the sha256 secret.

d3c883ec351c39b34fad35b2d12c1c40cf5f01da58cabd8a5bd03e75202c9ccc == ByeByeArchetypdotCC03August2024#72hours#ANTIDARKNET

Exactly within 72 hours the domain archetyp.cc has been removed.

We're sure the admin of Archetyp who's had security issues previously will show once again what a calm & technically capable individual he is by deflecting his incompetence & screaming unsubstantiated bullshit. We were reminded of his temper equivalent that of a rapist when we disclosed the Monero 0day attack against several marketplaces and subsequently in discussion his own.

A truly remarkable leader who definitely isn't a narcissist who got cucked out of a darknet forum once or mentally unstable individual with verbal diarrhea on every post or an unskilled script kiddie who can't protect his infrastructure. We should all aspire to be more like him.

We should further aspire to be as "neutral" as the admins of certain darknet discussion forums. Once you're at the top vote manipulation, deleting bad experienced about your market, trashing competitors with an obvious alt account army - all is allowed. An excellent business model one that breeds real trust and definitely doesn't decrease darknet market numbers year on year (thanks!). Pay the piper and swing your dick ;)

Back to the Hitler of darknet markets. Gear up for what Law Enforcement has next for you bud. We'll keep doing small side quests while our main operations run against yours and other darknet markets, fraud shops & pedo targets. The real world isn't a CoD lobby and no amount of German screeching will stop whats coming next this time.

You're very much welcome.

AntiDarkNet


Source: https://antidark.net/board/viewtopic.php?t=3624

We weren't completely sure if its relevant to Monero but we decided to post anyways since it's a Monero-only marketplace. Remember don't do crime kids

[–] antidarknet@monero.town 4 points 3 months ago

Good to hear we never intended to hurt any legitimate Monero users. That has been said so many times already even on our latest clarification topic (for the thickest of users) https://antidark.net/board/viewtopic.php?t=15 hope you don't mind posting this link twice. We very much like this site better than Reddit.

[–] antidarknet@monero.town 2 points 3 months ago

We're adding a clarification topic with answers to comments since Reddit has censored almost all of our responses.

You can read it here https://antidark.net/board/viewtopic.php?t=15

[–] antidarknet@monero.town -1 points 3 months ago
The attacker;

doesn’t know;
        DoS’ing isn’t 0day and bug -- **There is indeed a bug and it has been classified as such by the monero dev team. I'm talking about the fee selection bug that was fixed in the last wallet release. Whether it's 0day or not that's semantics. As it was pointed out on another board this same type of attack was first spotted in 2020 and as I explained there example PDF rendering vulnerabilities exist so when a new vulnerability is found and not reported it is a 0day. Same analogy. Whether you believe it is "0day" or not is irrelevant. No where does it describe how to do the "Black Marble" attack, we described it first.**
        Dynamic block size -- **Do your own research before talking? No? Read the comments here https://www.reddit.com/r/Monero/comments/1ebshvh/we_now_know_who_was_behind_the_recent_spam_attack/ then look at the analysis of the attack. There are ways to bypass it we're not as ignorant as yourself. **
        CIA drug trafficking allegations (which is different from drug selling) -- **Okay? They sell drugs so we selling drugs is okay they kill we kill no problem logic? Hello 14th century.**
        Corrupt government structures (such as fiat money and others) -- **Relevancy? Trash talk.**
        Pharmacies also sell hard drugs -- **More nonsense non-related trash talk.**
    calls “donation” to collateral damage -- **Who was the collateral damage? Darknet market admins? Poor them they only got away with hundreds of thousands when they exited and left their customers and vendors out to dry.**
    thinks they’re “saving” our children -- **Better than doing nothing? What are YOU doing for that then?**
    complains official wallet is so slow when 200k sub-accounts used -- **Using the RPC it is slow and it shouldn't be. Imagine, I know imagination in your simpleton mind not possible but try hard for us here, you run an exchange. You have 10,000 making exchanges every day. 1000 of them use Monero in either direction. 1000 x 30 days that's 30,000 subaccounts for a month. In 3-4 months that wallet will be clogged up and won't be working correctly. And then you cry when shops or other places don't accept Monero. If it can't deal with high volume is it enterprise-ready? Basic logic says no.**
    didn’t prove they really made the attack -- **Take a look at the post once again. Try it out yourself. Post back the results. Really simple for the smoothest of brains to understand.**

Now that I've proven you've got no idea what you're talking about, try again and this time try to use the thing between your ears.

This settles my limit for answering questions with hardened stupidity level for today.

[–] antidarknet@monero.town -2 points 3 months ago (3 children)

Unless you're criminal you shouldn't be worried in any way. We support privacy (disclosure of bug) and agree darknet communities should exist but not when they break the law. No sane person can argue selling h**oin or someones bank account details is something noble and we should all be very upset about it when its disrupted. Unless you are one of them.

[–] antidarknet@monero.town 3 points 3 months ago* (last edited 3 months ago) (8 children)

Official antidarknet admin here.

You seem very certain the attack has been "patched" and we made money from "extortion"? Where are you getting your information from while answering with such certainty? Really curious. I'm not being offensive here but is really not good especially for a website admin to make high speculation when they don't know the facts.

Let me tell you how it really is and then you and everyone else can draw own conclusions.

Fact #1

Although the bug was patched officially it's still possible to do what we described in the post on our forum. Try it out and see for yourself. Automatically setting the fee doesn't make the problem go away if you're 300 blocks or more backlog. As an attacker setting high fees and spamming it DOES create backlog too albeit slower. We do agree it could've been the case of the market wallets not being updated hence not being able to send transactions and falling under our exploit scope. Some of our attacks were after the patch was deployed evident by the timeline of certain darknet marketplaces collapsing.

Fact #2

We never extorted nobody we simply took it from criminals extortion means something else. You say we "extorted" but in the next sentance you say "they somehow broke their payment systems"? You're absolutely correct we did break their payment systems but not because they didn't account for long delays or because we "extorted" them (we never communicated we just did our exploit). But reason being when markets were executing sending payments functions (withdraw for clients) they hadn't accounted for the sending itself to fail due to the huge backlog we were creating with the spam. Creating an account and depositing then withdrawing while spamming Monero network resulted in getting multiple times the same amount over and over. Simple and honestly newbie programmer mistake not to cover use cases that cost them in total 300k+ and lead to several of them shutting down.

Fact #3

Our mission statement is crystal clear. We never took any profit from these attacks. All money were and are being put back into our new projects and operations which are ongoing targetting darknet markets, forums, fraud shops and so on.

We appreciate the discussion and do hope sincerely the monero devs to be notified, do simulation tests on that stressnet that was build specifically due the attack and see what we're talking about is not theory in any way and still possible today with enough resources (not talking crazy amounts here less than 100k).

As a bonus to the developers if you're reading this is the official wallets are extremely unstable at 200,000 subaccounts if each has had at least one transaction in and one out. Try generating more subaccounts after 200k it takes many times longer to generate rather than when first initializing a wallet. The more accounts you add the slower it gets. Should probably fix that too. Don't take our word for it but test it yourselves.

We fight the illegal use and not against privacy featured coins like Monero that's why we're sharing all of it. We did indeed use it and possibly cost inconvenience to users however taking down illegal markets where hardcore substances are sold is a priority over making a payment now rather than in half a day.

Antinet, AntiDarkNet admin

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Official antidarknet admin here.

You seem very certain the attack has been "patched" and we made money from "extortion"? Where are you getting your information from while answering with such certainty? Really curious. I'm not being offensive here but is really not good especially for a website admin to make high speculation when they don't know the facts.

Let me tell you how it really is and then you and everyone else can draw own conclusions.


Fact #1

Although the bug was patched officially it's still possible to do what we described in the post on our forum. Try it out and see for yourself. Automatically setting the fee doesn't make the problem go away if you're 300 blocks or more backlog. As an attacker setting high fees and spamming it DOES create backlog too albeit slower. We do agree it could've been the case of the market wallets not being updated hence not being able to send transactions and falling under our exploit scope. Some of our attacks were after the patch was deployed evident by the timeline of certain darknet marketplaces collapsing. 


Fact #2

We never extorted nobody we simply took it from criminals extortion means something else. You say we "extorted" but in the next sentance you say "they somehow broke their payment systems"? You're absolutely correct we did break their payment systems but not because they didn't account for long delays or because we "extorted" them (we never communicated we just did our exploit). But reason being when markets were executing sending payments functions (withdraw for clients) they hadn't accounted for the sending itself to fail due to the huge backlog we were creating with the spam. Creating an account and depositing then withdrawing while spamming Monero network resulted in getting multiple times the same amount over and over. Simple and honestly newbie programmer mistake not to cover use cases that cost them in total 300k+ and lead to several of them shutting down.


Fact #3

Our mission statement is crystal clear. We never took any profit from these attacks. All money were and are being put back into our new projects and operations which are ongoing targetting darknet markets, forums, fraud shops and so on.


We appreciate the discussion and do hope sincerely the monero devs to be notified, do simulation tests on that stressnet that was build specifically due the attack and see what we're talking about is not theory in any way and still possible today with enough resources (not talking crazy amounts here less than 100k).

As a bonus to the developers if you're reading this is the official wallets are extremely unstable at 200,000 subaccounts if each has had at least one transaction in and one out. Try generating more subaccounts after 200k it takes many times longer to generate rather than when first initializing a wallet. The more accounts you add the slower it gets. Should probably fix that too. Don't take our word for it but test it yourselves.

We fight the illegal use and not against privacy featured coins like Monero that's why we're sharing all of it. We did indeed use it and possibly cost inconvenience to users however taking down illegal markets where hardcore substances are sold is a priority over making a payment now rather than in half a day.


Antinet,
AntiDarkNet admin
-----BEGIN PGP SIGNATURE-----

iHUEARYIAB0WIQR/iAQxtllG0fCl//MAuh7Std/C3gUCZqJrvgAKCRAAuh7Std/C
3h8SAQDInTE6L6bmaVEzikzWM/9KwDkWspo0KLAwjQNlDyIQUAD/VkM/wHhEL3Sk
Tzt/c/UW1pQdONhXT5JI2wkFd4FkjA8=
=vFU7
-----END PGP SIGNATURE-----