News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Buyers, Seriously, Encrypt Your Fucking Address : OpSec | Torhoo darknet markets

I don’t know how many times I have to say this: encrypt your fucking address, properly. Don’t rely on the market’s auto-encrypt feature. Do it yourself. It’s not hard, and it’s not optional.

Stop being fucking lazy. You're putting both yourself and your vendor at risk. If you care about your safety, act like it.

Handle your shit right.
This is an excerpt from a 𝓢𝓶𝓪𝓵𝓵 𝓟𝓾𝓻𝓬𝓱𝓪𝓼𝓮𝓼 Buyers Guide I made. /d/Guides/wiki/?id=2807d956

𝒮𝑒𝓇𝓋𝑒𝓇-𝓈𝒾𝒹𝑒 𝒫𝒢𝒫 𝐸𝓃𝒸𝓇𝓎𝓅𝓉𝒾𝑜𝓃 𝒮𝒸𝒶𝓂

𝗗𝗼𝗻'𝘁 𝘂𝘀𝗲 𝗦𝗲𝗿𝘃𝗲𝗿 𝘀𝗶𝗱𝗲 𝗲𝗻𝗰𝗿𝘆𝗽𝘁𝗶𝗼𝗻.

𝗪𝗵𝗲𝗻 𝘆𝗼𝘂 𝘀𝗲𝗻𝗱 𝗱𝗮𝘁𝗮 𝘁𝗼 𝗮 𝗠𝗮𝗿𝗸𝗲𝘁 𝗶𝗻 𝗰𝗹𝗲𝗮𝗿 𝘁𝗲𝘅𝘁 𝘁𝗵𝗲𝘆 𝗸𝗲𝗲𝗽 𝗶𝘁 𝗶𝗻 𝗮 𝗱𝗮𝘁𝗮𝗯𝗮𝘀𝗲.

𝗪𝗵𝗲𝗻 𝘁𝗵𝗲𝘆 𝗳𝗶𝗻𝗱 𝘆𝗼𝘂𝗿 𝗮𝗱𝗱𝗿𝗲𝘀𝘀 𝘁𝗵𝗲𝘆'𝗹𝗹 𝘂𝘀𝗲 𝗶𝘁 𝘁𝗼 𝗯𝗹𝗮𝗰𝗸𝗺𝗮𝗶𝗹 𝘆𝗼𝘂, 𝘁𝗿𝗮𝗱𝗲 𝗳𝗼𝗿 𝗮 𝗿𝗲𝗱𝘂𝗰𝗲𝗱 𝘀𝗲𝗻𝘁𝗲𝗻𝗰𝗲 𝗶𝗳 𝘁𝗵𝗲𝘆 𝗴𝗲𝘁 𝗯𝘂𝘀𝘁𝗲𝗱, 𝗼𝗿 𝘀𝗲𝗹𝗹 𝘁𝗼 𝗼𝘁𝗵𝗲𝗿 𝗰𝗿𝗶𝗺𝗶𝗻𝗮𝗹𝘀 𝗮𝘀 𝗮 𝗹𝗶𝘀𝘁 𝗼𝗳 𝗱𝘂𝗺𝗯 𝗽𝗲𝗼𝗽𝗹𝗲 𝘄𝗵𝗼'𝗹𝗹 𝗳𝗮𝗹𝗹 𝗳𝗼𝗿 𝗮𝗻 𝗼𝗯𝘃𝗶𝗼𝘂𝘀 𝘀𝗰𝗮𝗺.

𝗧𝗵𝗶𝘀 𝗶𝘀 𝗮 𝗹𝗶𝘀𝘁 𝘆𝗼𝘂 𝗻𝗲𝘃𝗲𝗿 𝘄𝗮𝗻𝘁 𝘁𝗼 𝗯𝗲 𝗼𝗻.


𝓐𝓵𝔀𝓪𝔂𝓼 𝓮𝓷𝓬𝓻𝔂𝓹𝓽 𝓼𝓮𝓷𝓼𝓲𝓽𝓲𝓿𝓮 𝓲𝓷𝓯𝓸𝓻𝓶𝓪𝓽𝓲𝓸𝓷 𝓵𝓲𝓴𝓮 𝓷𝓪𝓶𝓮 𝓪𝓷𝓭 𝓪𝓭𝓭𝓻𝓮𝓼𝓼 𝓵𝓸𝓬𝓪𝓵𝓵𝔂
/u/TripperX
1 points
2 weeks ago
I can't believe that people STILL need to be reminded of this!
/u/datarape
1 points
2 weeks ago

by /u/GramsVendor 🍼
I don’t know how many times I have to say this: encrypt your fucking address, properly. Don’t rely on the market’s auto-encrypt feature. Do it yourself. It’s not hard, and it’s not optional.

Stop being fucking lazy. You're putting both yourself and your vendor at risk. If you care about your safety, act like it.

Handle your shit right.


Why this matters:

Failing to properly encrypt your shipping address is a massive OPSEC failure that directly exposes you to law enforcement and other adversaries. The market’s auto-encrypt feature is often buggy, incomplete, or compromised—never trust it blindly.

Here’s why sloppy address handling is so dangerous:

  • []If LE seizes a market or vendor server, any unencrypted or poorly encrypted addresses can be instantly linked to you.
  • []Addresses can be cross-checked with other intel—mail surveillance, drop monitoring, or informants—to build a real-world profile.
  • []Even partial leaks (e.g., missing PGP encryption, using weak or old keys) allow advanced cryptanalysis or metadata correlation.
  • []Vendors might get pressured or compromised; if they have your unprotected data, they become an easy target to expose you.
  • [*]Metadata like timing, order patterns, and reused keys can help LE deanonymize you, even if your crypto payments look clean.


Simply put: LE has the tools and manpower to exploit the smallest OPSEC slip-ups, especially with automated scraping and network correlation. Encrypt your address properly, with fresh keys, every time. Use offline PGP tools and never reuse keys linked to your real identity.

Stop risking everything over laziness. Your safety depends on doing it right.