News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Anonymity Tutorials Thread : CafeDread | Torhoo darknet markets

Hi all, I'm redoing my anonymity tutorials on my blog ( blog.nihilhfjmj55gfbleupwl2ub7lvbhq4kkoioatiopahfqwkcnglsawyd.onion/servers/anon.html ),
i guess it would be best if i ask the ones that need anonymity the most on what tutorials i should make, so here i am lol

Here is the current list i have below, let me know if you'd like to see some other tutorials (both for clientside and for serverside). Or some specific topics to be covered in the current tutorials.

Anonymity Tutorials

📝 Clientside - The Basics

❌ Open Source Host OS + Virtualisation (Linux and QEMU/KVM)
❌ Anonymous web Browsing (Tor Browser)
❌ Anonymous payments (Monero)
❌ Anonymity Management (OPSEC, Passwords)
✅ Private Messaging (PGP)
❌ Data Availability (scp backups)
❌ Plausible Deniability (Veracrypt Hidden Partition)
❌ Linux anti-forensics (clearing logs, emergency shutdowns)

📝 Clientside - Advanced

❌ Advanced Anonymous web Browsing (Whonix QEMU VMs)
❌ Advanced Monero usage (Stack, Hold, and Cash Out)
❌ Advanced Veracrypt usage
❌ Plausibly Deniable Data Protection
✅ Complete Anonymity Management (Whonix, Veracrypt Plausible Deniability, OPSEC, anti-forensics)⭐

🧅 Serverside - Contributing to the Networks

✅ Tor Bridge Node
✅ Tor Node
✅ Tor Exit Node
❌ Monero Node

🧅 Serverside - Hosting your services

❌ Hosting a .onion website (local or non-KYC cloud provider)
❌ Onionbalance Load Balancing for .onion services
❌ Endgame .onion service DDOS Protection V2

🧅 Serverside - Other

❌ Accessing OpenVPN Anonymously
❌ Anonymous Website on the Clearnet
❌ Anonymous Mail Server on the Clearnet ⭐
looks good thanx
/u/footsteps 🌈 Nazi 🌈
1 points
1 year ago
So in other words, you've done one little "tutorial", and have a huge wishlist that will take you months to complete? So why post it now?!

...and why post it in CafeDread, it should be in /d/freeguides, but maybe in 6 months' time or more.
Are you doing some kind of phishing trip?
/u/nihilist1 📢
1 points
1 year ago
Just checking if my todolist is complete basically
/u/footsteps 🌈 Nazi 🌈
1 points
1 year ago
why open a bottle account just for that?
/u/[deleted]
1 points
1 year ago
All that u/foot guy wants to do is have a continuous, never ending, argument, with everyone, and anyone, who is will to go back and forth with him, till the literal end of time.

My advice is to just ignore him, watch him reply to my comment with abuse, I wouldn't be surprised

You can also block him in his account page if you need
/u/nihilist1 📢
1 points
1 year ago
no problem :)
/u/[deleted]
1 points
1 year ago
He doesn't know i replied to this because i already blocked him pmsl
/u/footsteps 🌈 Nazi 🌈
1 points
1 year ago*
As you probably know, I can see it easily
...why are you spending so much effort trolling?
...and why are you trying to win the affections of bottles?!
/u/[deleted]
1 points
1 year ago
I made a tutorial for myself on how to make a Qubes VPN VM that only will let you conects through the internet if anyone wants it:

Setting Up OpenVPN in a Qubes Fedora AppVM


For detailed instructions, visit: https://torhoo.cc/go.php?u=YUhSMGNITTZMeTltYjNKMWJTNXhkV0psY3kxdmN5NXZjbWN2ZEM5b2IzY3RkRzh0YzJWMGRYQXRiM0JsYm5ad2JpMW1aV1J2Y21FdFlYQndkbTB0Wm05eUxXOTJjRzR2TXpNMU5BPT0=#

Pre-setup:


1. Sign up for OnionMail inside the Whonix VM in Qubes.
2. Use Onionmail to sign up for ProtonVPN.
3. Download an .ovpn file from the fastest percentage option in the ProtonVPN Downloads section after logging in.
4. Copy the username and password from ProtonVPN 'Account' section into a new txt file, naming it cred.txt.

cred.txt contents example:
h459683u4r9r3hjtiu
wejh3498u39ri3j45iu3hj49t3j4o5i43oi
5. Send both files to Vault by right-clicking and selecting 'copy to another qube.' 6. Open the .ovpn file inside Vault and append the following lines to the end:
auth-user-pass /home/user/QubesIncoming/vault/cred.txt
redirect-gateway def1
auth-nocache
dhcp-option DNS 1.1.1.1
Main Instructions
1. Create a new Qubes VM with the following options:
        Type: AppVM
        Template: fedora-38-xfce
        Networking: (none)
        Launch settings after creation option: Tick yes
In the Settings window, click on 'Firewall rules' and add the remote IP addresses from your .ovpn file. Examples:
        Address: <ip>
        Protocol: UDP
        Port/Service: 5060

    or

        Address: <ip>
        Protocol: TCP
        Port/Service: 80


2. In the 'Services' tab of Settings, select 'network-manager.'

3. Press 'OK' to close the Settings.

4. Run the new VM.

5. In Vault, find your .ovpn and cred.txt files, and send them to your new VM.

6. Click the new icon at the top right of Qubes (same color as your Qube), then select 'VPN Connections' and 'Add a VPN connection.'

7. In the new box, open the drop-down menu and choose the last option (Import a saved VPN configuration...).

8. Select the .ovpn file from the 'QubesIncoming' folder.

9. Return to the new icon at the top right, click it, and connect to your .ovpn file (usually named 'node-'). Tick the box in the context-looking menu.

Note: Firewall rules ensure your VM connects only through the VPN. Optionally, in the VPN VM settings, go to the 'Advanced' tab and select 'Provides network access to other qubes' for more control over networking.

If anyone has a workaround for the manual connection each time the VPN VM runs, please share. It might be a security measure. But its also inconvenient.
/u/nihilist1 📢
1 points
1 year ago
i should probably make some QubesOS tutorials aswell, will probably buy a separate laptop just for those
/u/[deleted]
1 points
1 year ago
Just wish qubes had support for dedicated fingerprint scanners, really wasting the use of mines by using this OS
/u/footsteps 🌈 Nazi 🌈
1 points
1 year ago
The guy "Nihilist" links to "matrix chat" and "hack the box" on this supposed anonymity guide - both of which require javascript enabled.

I'm calling this as an LE effort.
jewvascript* ftfy

This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.