News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

EU Police flags address if ISP sees tor traffic : DarkNetMarkets | Torhoo darknet markets

Figure I'd share this here. This happened in a country in Europe that is in the EU. In this country, from one month to another the police was intercepting A LOT of orders successfully. I was able to find out, from police themselves, that they do this by flagging your address if your ISP detects tor traffic. I figure this is worth sharing because I often see the debate on whether to use VPN's/Bridges or not, and nobody ever mentions that simply detecting tor traffic can be a very effective way to flag suspicious addresses for mail inspection. After the package gets caught, the police won't immediately come bursting down your door or even send you a seizure letter, in fact, they will simply keep the package at the post and record you picking it up. Even then, they still won't move on you. They will keep letting you order as to build more evidence against you. I was able to confirm this by looking into the case files, and this person wasn't ordering large amounts either they were just small personal amounts.
/u/jedi_outcast 🍼
1 points
3 days ago
Pretty soon we'll all have to go to the mall on the weekends to get drugs again 🙃
/u/amicursed
1 points
3 days ago
yep but we should do something to get rid of sus list
we even should not search abt opsec related things on clear net much and should search dump things as possible so even police decide this dump person can't order
like gustavo gus
/u/Cannabel
1 points
3 days ago
So which one is it - you were able to look into case files? Or you were able to get this info from the police?

I doubt very much that if that was the case it would be written in a case file because flagging like this is certainly illegal in any eu country and would get the case dismissed against this person immediately.
/u/hufflepuffHR 📢 🍼
1 points
3 days ago
Both. You get access into the case files when you get accused and it is prosecuted further. You also talk with the police. It was confirmed by both. And no, it isn't against EU law. They can also make about a dozen arguments for why certain factors together make for reasonable suspicion. It's also not hard or resource intensive. You think many people use tor? And how many people do you think use tor and then receive mail from a random place within 14 days after? And how many people do you think do so within the same area that share the last processing center for mail? Not many, even in large dense countries.

This started December 2023/January 2024. Besides noticing this common situation happening all around the country, multiple vendors from Germany would also have packages seized at the same intervals.

Not sure why 2 of you are so picky with this. Even though you have no way of knowing whether what I'm saying is true or not, the method is VERY MUCH possible and VERY EASY and basically FREE (resource wise) to do for LE. It's also very easy to avoid this happening to you.
/u/cilantr0
1 points
3 days ago
Tell us you don' t know how Tor works without telling us how Tor works. It takes 30 seconds to set a webtunnel bridge, and there's been not even a theoretical attack or technique discussed to detect a tor connection set up this way. Why do you waste both people and your own time in making up such an easy to debunk FUD post?
/u/hufflepuffHR 📢 🍼
1 points
3 days ago*
Are you actually serious? It is incredibly easy and not a secret at all that your ISP can see if you are using the tor network without a bridge or VPN. In case you are thinking that I'm saying they flag you based on you visiting known tor darknet markets, no, I'm saying they will flag SIMPLY for using tor. Read the official docs on the official Tor website if you don't believe me that it's very simple for ISP to see that you are using tor lmfao.

And unlike multiple other people here, I'm not making things up.
/u/cilantr0
1 points
3 days ago
Lol, it's not. You cannot determine someone is using Tor when there's a webtunnel bridge. Feel free to prove me wrong, but let's say if you explain to me how you can get to determine there's a HTTPS stream inside another HTTPS one, I will be really shocked.
/u/AutoModerator M
1 points
3 days ago
All links require approval to be posted. Contact modmail to get approved

This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
/u/DaddySaysTo
1 points
3 days ago
You must be a noob or something... Every idiot knows that you use Bridges or a VPN if you do not want your IP address to be known... If an ISP is willing to work with law enforcement, this would be a really easy way for them to flag addresses and does make perfect sense. We have a little more privacy in the US, but it relies HEAVILY on an ISP to not WANT to work with LE, but they easily could. I think it would be more work than represented, but this would be easy enough to do.

Bridges is supposed to be just for people in 3rd world countries that could be subject to death for accessing the DN but there is really nothing saying that overzealous gov couldnt get that info either.

I would be more concerned with Arch and not using encryption to send your address (a lot of us got too confortable i suspect) but you personally probably shouldnt be using the DN, you are not intelligent enough.
/u/AutoModerator M
1 points
3 days ago
Please visit /d/dnmbible and /d/darknetmarketsnoobs before proceeding.

This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
/u/pgpfreak P
1 points
3 days ago
You think many people use tor?

Statistically, criminal activity is merely a fraction of the overall Tor traffic worldwide. In this fraction, buyers worth investigating (...resellers) are themselves a fraction of the total. The scenario you describe is not that far-fetched. But. I don't know.
/u/hufflepuffHR 📢 🍼
1 points
3 days ago*
Yes, but when you combine it with visit times + incoming mail you get it down to a handful per distribution center per week, if that. You can break it down even further by using average mailing times from wherever the mail is coming from and then calculate a confidence factor matching with your tor activity. Even if it was a hundred packages per week, thats not a lot of work. And with 3D CT scanners entering the field, it won't be long until this is standard everywhere. The city in question had a little under a million residents and only 1 distribution center.

Take the high estimates of Germany. 200k users per day, spread across germany's cities in fair amounts, then spread across distribution centers. Then further take away those who didnt receive mail, or didnt receive it within the correct time period. You can also count in the smaller distribution centers that are the last point before they get onto the truck. That's like maybe 10 envelopes to check per day per center, and that's a very high estimate. Probably more like 10 per week.
/u/pgpfreak P
1 points
3 days ago*
I can think of several factors that could dramatically increase this number or weaken the process efficiency.

  • A buyer's IP isn't always attached to their drop and/or personal address
  • Often buyers will connect Tor without actually engaging in a transaction
  • A transaction doesn't always mean there's a product to ship
  • Shipping times can anywhere between 3 and 21 days
  • EU postal sector is open to private sector meaning you need full cooperation from shipping companies
  • Lockers and dead drops are a thing
  • Such practices could be forbidden by GDPR

I know I'm checking several of those. And even if it was doable, this kind of approach would be the darknet equivalent of checking bags of by-passers close to a drug dealing area. Sure. You'll catch a couple of them. But. They won't know jack shit about the vendor. That would be an expensive, unpopular, and inefficient way of fighting drug trafficking. In my current area it's a lot more easy to go after Whatsapp delivery services. Well. If you're only here to catch somebody anyway.
Don't get me wrong. I'm challenging the idea because I find it interesting. I'll be curious to take a look at any document you could produce about that.
/u/DaddySaysTo
1 points
3 days ago
These are all good points, I wonder if, with regular access, and utilizing basic AI, you could overcome some of these quite easily though...? It could even be a process where flagged packages get looked at randomly, to see how well it is working, then addresses just get flagged for any non-regular mail (amazon, utilities, etc.). Could even just flag all priority mail in the states.
/u/rigid_companion 🍼
1 points
3 days ago
[removed]
/u/meatt 🍼
1 points
3 days ago
Absolutely.
/u/booboom
1 points
3 days ago
Not bad
/u/rigid_companion 🍼
1 points
3 days ago
Connect to Tor over VPN or bridge.
People will say that VPN doesn't make you more anonymous on the DNMs and they're right. But it does hide the metadata that you're connecting to Tor.
/u/losangeldust
1 points
3 days ago
name the country
/u/k07 🍼
1 points
3 days ago
I'm not sure whats so hard to understand, It's not hard to believe that LE has abused and collected large amounts data via major telecommunication companies like we've seen with AT&T and Room 641A. It wouldn't be far fetched to believe that their still using those same Narus STA 6400's which are capable of DPI to log tor usage and it's users. Every node is public and bridges still use tor related names which gets on my nerves since everything is logged permanently by your ISP, a single ISP breach would return the names and addresses and plenty more information (Bank details and more) to log every tor user nationally. That alone has minimized Millions of potential addresses nationally to a few hundred thousands in specific states to break down the job of monitoring its users. Now you have state/federal influence spread across your nations mailing branch to keep a close eye on those specific users and their mail. Maybe a package "rips open" while in transit and now your fucked. So yeah I'm a big fan of VPN -> Tor because most of us lazy fucks order from home.
/u/Damage111
1 points
3 days ago
This brother is cappin, change my mind
/u/carpeDMT 🍼
1 points
2 days ago*
You are kind of right! There are numerous articles which I've found through chatGPT saying that the BKA of Germany is using a method called IP catching to identify those IPs that are using tor. This was used to catch the person running "boystown" the pedophile website.
BUT, I am also wondering which "case files" you mean. Could you tell us where to find those case files?
/u/AutoModerator M
1 points
2 days ago
Posting links of any sort is discouraged. There are ways to shortlist links or just include the information the link provides.
If you feel it's completely necessary to post a link, it requires Mod approval to be posted.

This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
Lose the link buddy.
/u/mobyxhaze01
1 points
5 hours ago
Lets suppose it is all true , they are wasting time and resources to caught a guy with small amounts for personal use ? why not do it to catch the vendors? The buyer got no info to give them about the vendors . What is the point ?
/u/scaryhigh
0 points
3 days ago
fud post
/u/chemicalbliss 🍼
0 points
2 days ago
Well u can still use mobile data or hotspots