News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

car / public wifi making little sense : OpSec | Torhoo darknet markets

I am of reading a lot of posts on here that speak of using public wifi to be using internet anonymous. After much search through forum, i find no expansion of idea into this method. If looking to remove chances of correlation / timing attack, there are not many people connecting to tor from coffee shop. Therefore, adversary could watch node and see. However, this is normal opsec tradeoff but with advent of surveillance technologies using things like pole-mounted photography and videography machines, it allow for less complicated attack to visually see patterns of traffic of car parked within wifi range of coffe shop. Monitoring internet is more complex than cop driving around block and using eyes.

I see quote here /post/c3e1c26b14914c030da1/#c-e2e42d1f5e6f27091d : "If the assumption is that each Tor node and VPN-server are under adversary control 100% of the time, don't connect to Internet / Tor at all from fixed points. Only use random free WiFi with an Yagi-antenna, do not visit the same location for months and spread out your operative geography hundreds of kilometers. Learn how to move with minimal traces. "

I am think that patterns of single car driving around to so many location creates unique fingerprint of movement / behaviour.

Opinions?
If you use a car, learn which roads does not have cameras. Park your car a few blocks away and same here, learn where the surveillance cameras are so you can avoid them. You can also travel with busses, trams, trains, ferries, bicycle, etc.

Being lazy is no excuse, can end up in doing fed time.
We all can't see cameras these days.

Example: Assume that every single residential home has a wide angle Ring door camera that can see the entire street. Five clicks and LE can get video of almost every residential street in the USA in less than a few hours through the Ring LE portal.

This idea of looking for cameras is a little outdated. Assume everywhere you go, you're on camera.
/u/yougogirl
1 points
2 weeks ago
Cameras are indeed everywhere. I was thinking about having glasses that reflex UV and viable light, rendering the cameras unable to clearly identify you, or do any facial recognition. But that might make you stick out more to LE, idk
Yes, some cities has crazy number of cameras. In London many of the street punks where MC-headwear to avoid face recognition. However, that is not enough.

Ways to trace you while traveling
Recognition of humans based on images and video streams uses several techniques. However, it's not limited to visuals, other technology can be used to complement the identification:
  • Facial detection and recognition
  • Gait recognition (walking style and analysis of joint trajectory and angles)
  • Outfit recognition
  • Fingerprinting (official or hidden in doorhandles, etc.)
  • DNA sniffing (in secured passages/gates)
  • Human body radiation recognition (in secured passages/gates)
  • Passive RFID/NFR communication (activates RFID/NFR tags in passports, ID-cards, mobiles, etc. can be used either from stationary gates or mobile stations)
  • Cell phone triangulation and remote activation (turning on phone)
  • WiFi triangulation or activation (partially turning laptop)

AI cross-view detection and recognition using above methods will already now and even better in the future mass surveil people moving close to secured objects like airports, train stations, violent neighborhood, etc.
Awesome reply. Thank you!!!!
/u/Ahello
1 points
2 weeks ago*
I think the idea of this is that at any given time more people are using public wifi then your VPN + Tor, so you have more plausible deniability with public wifi
/u/twinhermits 🍼
1 points
2 weeks ago
Modern cars generally have very poor respect for user privacy and freedom. See:

https://www.mozillafoundation.org/en/blog/privacy-nightmare-on-wheels-every-car-brand-reviewed-by-mozilla-including-ford-volkswagen-and-toyota-flunks-privacy-test/

Unfortunately the guide linked from there depends on JS, but the blog post contains some info about the topic.
Tor fails occasionally and your IP gets leaked. If the attack is tailored and includes international teams, you can get deanonned instantly (ISP data sharing). In such case your real IP is known to the adversary instantly.

Therefore to avoid this type of compromise, you use the remote, public, crowded wifi. You can use it from the mobile operation like car with the omni antenna for about 1/2 mile or from the static operation with directional antenna for few miles+. It depends on your OpSec considerations and structure and character of your operation.

Remember, if you are doing what your particular government doesn't like, you are in a warzone and you have to adapt proper approach and understand your situation.

Your main questions are - what would be the impact of my full compromise? How many years in jail I can get? How will it affect my future life? And once this is clear - how much should I invest into my security and OpSec setup to prevent it?

Once this is clear, you have a good approach to the situation and you can start to be realistic with your security.