News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Creating a secure, non-Qubes operating system configuration for the dark web using Kicksecure. : OpSec | Torhoo darknet markets

In my previous post - https://torhoo.cc/go.php?u=TDNCdmMzUXZZak16TnpKbVl6STVNVGxsTW1GbVpUSXlNelU9# - I explained the process of installing Whonix on QEMU and KVM for Debian, so you can securely access the dark web in a containerized and leak-free manner. But what about the host operating system? This question was raised as the top comment, and I promised I'd make a part two, so here we go.

You will want a Debian system, that's already installed and potentially blank to avoid any later issues. A user with "sudo" is ideal, LUKS full disk encryption is mandatory. The DE I would reccomend is XFCE, for many reasons - such as being lightweight, configurable to the bone, simple to use, and familiar, since both Qubes and Whonix use it by default. Let's get ahead of the boring parts with the commands below. Make sure you run "sudo su" to drop a "root" shell before running the commands. The commands assume "user" is your username, as it should be.
apt update && apt upgrade && apt install --no-install-recommends sudo adduser && echo "user ALL=(ALL:ALL) NOPASSWD:ALL" | EDITOR=tee visudo -f /etc/sudoers.d/nopassword >/dev/null && /usr/sbin/addgroup --system console && /usr/sbin/adduser user console && apt install console-data console-common kbd keyboard-configuration && apt install extrepo && extrepo enable kicksecure && apt install --no-install-recommends kicksecure-xfce-host && repository-dist --enable --repository stable && mv /etc/apt/sources.list ~/ && touch /etc/apt/sources.list 

Great! Now you have morphed a Debian box, into a Kicksecure box. I'd like to provide some general security recommendations you will need to do on your new system, in order to fully use this configuration to it's true potential.

  • Follow this - https://torhoo.cc/go.php?u=TDNCdmMzUXZZak16TnpKbVl6STVNVGxsTW1GbVpUSXlNelU9# - guide to install Whonix securely.
  • Disable auto-login using "sudo autologinchange" - it's pretty intuitive.
  • Install Mullvad VPN, enable DAITA, multi-hop WireGuard connection tunnel and enable a Shadowsocks obfuscation bridge. Enable killswitch and DNS blockers, make sure local network access is allowed, as you need it for Whonix. That's 3 hops of security before Tor. Don't use bridges.
  • Install "user-sysmaint-split" using "sudo apt install --no-install-recommends user-sysmaint-split sysmaint-panel" to separate your normal user from the administrative user.
  • Open your "sysmaint-panel" and take a look into cleaning and purging old, unused packages. You can also use it to manage your system using a GUI.
  • Install KeePassXC for your passwords in Kicksecure.
  • Remove every single bit of software you don't use or need.
  • Install "grub-customizer" and disable looking for other operating systems, and turn the boot delay to 0.

If you have any further recommendations, I'm all ears. I've noticed a project called HARDN that seems to want to replace Kicksecure, on GitHub - and I'd say take a look into it maybe it fits your threat model. You can probably even combine them if you tweak the modifications it does, but that'd be a little bit of work, so to speak.

Anyhow, this is how you get good security without Qubes, either due to hardware issues, limitations, skill level or threat model. I recommend this to anyone. It's a few commands that can determine your fate and your security level. Both, really, they're somewhat connected. Think about it and try it out!
/u/Beelzebub I really fuck with "The Devil Wears Prada" as a flair. I know I said I'd leave it up to you but this one is just too good not to mention. Hope the guide is on your taste.
/u/Ghost1259
2 points
1 month ago
Isnt it kind of....
girly?
Idk
Same with the subdread photo tbh.
Who said I have a penis?
Exclusively dressed by Prada.
and
😈The Devil Wears Prada😈
both fit. Which one do you like?
⛧The Devil Wears Prada⛧
I love this. Thank you!
From one fallen angel to another, you're welcome.
/u/12t45z56c9qsoq
1 points
1 month ago
What is the risk that is eliminated by using kicksecure instead of debian? I thought base OS wouldn't matter much as everything in whonix would be compartmentalized? Thanks for these write-ups, a lot to learn about
It does matter in certain ways, such as for example an exploit affecting QEMU or KVM. In my opinion? Doesn't matter all that much. Look at Qubes with EOL Fedora 39 in their "dom0" and they're fine. There are reasons for this. But we need one, as we might be using Wi-Fi in a non-compartmentalized way, or using a normal browser sometimes. Can't always run shit in boxes. We might need to use the host operating system for various "house chores" and we want it safe.
/u/12t45z56c9qsoq
1 points
1 month ago
Ah interesting I didn't know that about qubes. Yea I guess I am sort of leaning toward using debian. Kicksecure does seem like a good extra secure option but my concern is that once kicksecure is present, it seems more suspicious. Having basic debian just seems more deniably normal. Thx for the reply
No one would know if you have Kicksecure or Debian. Kicksecure is Debian, with some tweaks.
/u/SabSibo
1 points
1 month ago
What are your thoughts on secureblue ? Heard it's better than Kicksecure as a daily driver, and you get the stabilty advantage of it being an immutable distro. It comes hardened out of the box
Never heard of them.
/u/SuckDickRick
1 points
1 month ago*
Noob question (but I apparently drink from a baby bottle and might cry if you yell at me! 😂), but what is the advantage of this setup (and the containerized instance of Whonix) over a straight bootable Tails USB arrangement. There must be something or one wouldn't go through the trouble of setting this up so I'm eager to know.

EDIT: I realize now that this is for a "High Threat Level" per the FAQ. I am still curious, however, as to *why* this is considered more hardened than a Tails setup because that still may guide my decision to run this sort of setup even though I'm a personal use sort of girl.

I'm savvy enough to follow your directions (especially as they are so well-written) but thought to ask before trying this out.

Thanks in advance!
Thank you for commenting. You can always add other machines in QEMU to route them via Whonix, such as Kali Linux. You also have a fully leak-proof system, where a 0-day would need to be way more severe and perhaps coupled with other vulnerabilities in order to deanonymize you. Whereas Tails has had a worse security track record.
/u/zuberdriver Atlas
1 points
1 month ago
I use debian with all the network listeners disabled and a custom nftables firewall. It's on a usb drive and mounted on a vanilla Windows pc when I login to the dark web.
I use a Yubico key to store the disk encryption key.
So my system needs the USB drive plus the yubico key to boot. Easily disposable.
Only downside is mullvad messes with the firewall and it's not easy to control unless you use custom scripts. Full control is my target.
Why the Windows?
/u/NothingRlyMatters
1 points
1 month ago
No need to use Debian as a base to distro morph Kicksecure anymore.

Kicksecure now has it's own ISO install.
That's great to know. Are they on latest, Debian 13?
/u/headshotnegativity
1 points
1 month ago
very smooth
/u/headshotnegativity
1 points
2 weeks ago
currently not enough similiar content here.
I am pretty busy on other forums, but whenever I can, I am here to help.