News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Guide to burner phones: How to buy, use, store, and dispose anonymously : OpSec | Torhoo darknet markets

I have been researching burner phones for some time now and have used them successfully in various operations. For some reason there seems to be a good deal of gatekeeping when it comes to this topic, which is why I aim to shed some light on the practices I use and would recommend to others.

Thanks to https://torhoo.cc/go.php?u=TDNVdmIyNXNlV1p2Y25Oc1lYTm9aSE5zWVhOb2IzQnpaV009# for his comment on this post : /post/4ce056f907fea0444e13/#c-7264ddf8e4baa21625. This guide is a combination of my knowledge as well as his, gotta give credit where it is due.

1. Buying phone:
a) craigslist in the largest city near you will usually have dozens of phones available for cheap, especially after holidays when people get new phones as gifts. Look for google pixel 6+ phone, as they are the only type that can use grapheneOS. Contact the seller via VOIP number and meet in an area without cameras such as a public park or nature preserve
b) [ALTERNATE] you can order some shitty Chinese android dual sim phones via alibaba but they might not be capable of running graphene, so try to search for pixel phones. Also shipping to your address is unwise, so this method is discouraged.

2. SIM:
a) stealths.net has a massive selection of inexpensive eSIM phone plans, although they do not allow for top-up nor will they allow you to make or receive text; they are LTE only which is why you need to rent a phone number for monero elsewhere (see monerica com) or use VOIP
b) [ALTERNATE] Find a pre-paid physical sim, but don't use big-box stores which take your ID and have facial recognition software. You can find good ones in poorer areas of town, especially at foreign grocery stores. As slash d mentioned, Mexican ones are the best. I can personally attest to that, they ask zero questions, although you should know some spanish to blend in.

3. Installing OS: use GrapheneOS or CalyxOS (Graphene is the only device that has proven difficult for the forensics companies to crack).
***NOTE*** This is only possible with carrier unlocked phones. Carrier locked, especially verizon, will never allow you to unlock boot loader
- Download GrapheneOS from grapheneos.org/install/ on your PC via tails
- Go to phone settings > about phone > tap "build number" multiple times until developer mode is unlocked
- go to settings > system > developer options > turn on "OEM unlocking" so that you can boot in an outside OS (Graphene)
- on tails or other linux-based system, install the android-sdk-platform-tools-common package (debian and ubuntu)
- turn the phone off, then press both volume down button and power button together > bootloader screen opens
- use the volume buttons and power button to navigate the bootloader menu
- flash graphene img to the phone [ALL PREVIOUS DATA ON PHONE WILL BE LOST]
- boot into graphene and go to settings > system > developer options > turn OFF "OEM unlocking"

4. Downloading apps: Replace Google Play Store with F-Droid or Aurora Store ; AVOID ALL GOOGLE SERVICES
- maps: organic maps ; OsmAnd
- email: morke dot org is the only email I know of that doesn't glow, especially after proton sold out to the feds. rise up is basically impossible to get in to. Pissmail and cock li have not been loading for me recently
- NOTE: all the providers can see the content of your emails. Always pgp encrypt sensitive data
- messaging: briar or simplex; signal is for limp-wristed leftists apparently

5. VPN: Orbot, installed via F-Droid or github repository. Configure to connect over whole device by doing the following: in Graphene or Calyx go to Settings > Network > Advanced (at the bottom) > VPN > settings wheel next to Orbot > "Always On and Block Connections without". You can also just do this in the app itself

6. Tor: come on bro, why would you use tor browser on your fucking phone. Tor Browser on Android makes you stand out heavily, and when paired with the Orbot could cause Tor on Tor situation. If you want tor, buy a PC from craigslist, and boot from tails USB after deleting the windows installation from the internal drive and removing NIC and HDD/SSD. Use the PC only for tor.

7. General hardening:
- Never enable Bluetooth, NFC or Location. Disable it completely for all non personal profiles on the phone.
- Never ever ever use a PIN code for your phone. The phone forensics companies such as Greyshift, Cellebrite and MSAB can defeat the ARM based security chips rate limiting already. The RISC based chips are holding out better, but assume they will be broken too.
- Treat the phone code as if it were an encrypted volume key. At least 25 characters alphanumeric login
- Never use biometric locks, obviously. Have something to cover the selfie camera at all times. IMPORTANT: modern phones all have the ability to read your fingerprints from the phone screen. Invest in a stylus or wear gloves. Although graphene should not have this problem
- for Graphene, set a reboot time of two hours or less to bring the phone into BFU state. Always assume a copy of your flash storage can be taken by the forensics team and placed into the cloud to be brute forced. Even if the rate limit chip on the Pixel is defeated it should not be possible to brute force your code.

*****
NOTE: THE FOLLOWING ARE FOR THOSE WITHOUT GRAPHENE INSTALLED. Graphene protects, hides, or spoofs all of the following by default.

8. Location spoofing: plenty of open source GPS spoofing apps on F droid, all of which require a rooted device. Rooting gives full control over the system but increases attack surface. Only do this if you understand the risks.

9. Device Fingerprint: Root your phone with Magisk or Xposed. Change IMEI, Android ID, and Serial Number using spoofing modules

10. Change IMEI: sim cloning ; Look up an app called App Cloner.
- If you pay for the premium you can spoof new IMEI/IMSI etc.
- Can change or hide Android ID, IMEI / IMSI, Wi-Fi & Bluetooth MAC
- Can change Google Service Framework (GSF) ID, Google / Amazon Advertising ID & Facebook Attribution ID (although this is irrelevant for graphene, it is useful for carders, so I'm including it)
- Can change WebView User-Agent
- Can hide Wi-Fi info, GPU info, hide SIM & operator info
- Can customize build props to prevent device fingerprinting
*****

11. Storage and Usage: Don't take your regular phone anywhere with your burner. They should never be able to be correlated closer than a block away AT LEAST. Store your burner in a faraday bag when not in use, and only take it out when you've gained sufficient distance from your home. Some people (read: idiots) like to place their personal phones in Faraday bags when using their burner phones and vice versa. It is trivial for anyone with access to the cell tower such as LE to demonstrate the correlation. Instead, leave the personal phone at home and switched on at all times.

12. Disposal: When shit hits the fan or when you feel you need another phone, disposal is essential. Wipe the phone. Take out physical SIM, smash it with a hammer. Do same with battery. Now do the same with the phone. Drop it in the sewer after wiping your prints. Burn any remaining shards/pieces or flush em down the toilet.

13. Dealing with Cops:
a) Never talk without a lawyer
b) immediately invoke your right to silence. If you do not, cops may try to trump up non-compliance charges
c) always deny access to the home and personal property
d) don't let them scare you with their lies and manipulation

Hope this helps guys!
/u/datarape
2 points
1 week ago*

I have been researching burner phones for some time now and have used them successfully in various operations...

Things that LE can do:
  • [*]Craigslist accounts can be subpoenaed.
  • [*]VOIP numbers (like TextNow, Google Voice) can leak IP and metadata.
  • [*]Most cities have ambient LPRs and Wi-Fi triangulation even in "camera free" spots.
  • [*]IMEI of the phone can be tracked across networks.


Recommend:
  • [*]Choose rural meetup zones with no infrastructure not urban "quiet" areas.
  • [*]Wipe & re-flash phone immediately after purchase to remove preinstalled spyware or Google keys.



stealths.net has a massive selection of inexpensive eSIMs...


SIM Card / eSIM

Recommend:
  • [*]Always obtain SIMs physically, never online.
  • [*]Foreign SIMs (like Mexican Telcel) are a good OPSEC choice if bought in person and activated anonymously.
  • [*]Use MAC address randomization before activating SIM.
  • [*]Route all outbound data via VPN over Tor on device.



carrier unlocked phones only...


3. Installing OS (GrapheneOS)

Deanonymization Risks:
  • [*]Most people flash Graphene from home networks = timestamp + IP correlation.
  • [*]If flashing from Tails, remember Tails logs nothing, but if you use a personal laptop, firmware persistence (Intel ME, BIOS logging) is possible.
  • [*]OEM unlocking leaves forensics artifacts unless reset properly.


What to do:
  • [*]Flash from a public computer + Tails. Use a clean machine or an airgapped laptop.
  • [*]Remove all power/network before and after flashing.
  • [*]Always relock bootloader after flashing.
  • [*]Use Graphene's hardened memory management and disable all telemetry.


Downloading Apps

I recommend:
  • [*]First download F-Droid APKs via Tor on Tails, then sideload offline.
  • [*]Disable network access for apps unless needed.
  • [*]Use Orbot or AFWall+ to firewall connections per app.
  • [*]Disable location services entirely.
  • [*]Use sandboxing (like Shelter or Graphene's per-profile installs).



- email: morke dot org is the only email I know of that doesn't glow, especially after proton sold out to the feds. rise up is basically impossible to get in to. Pissmail


Email Security

  • [*]Make sure to access only over Tor.
  • [*]Don't write like yourself writing style analysis (stylometry) is a common deanonymization tactic.


Radio Risks

Even if you're not making calls, phones with SIMs constantly ping towers Triangulation + metadata are easily accessible by LE.

Recommend: Keep radios off unless needed Use airplane mode + hardware kill switches (like Librem5) Store phone in a Faraday bag when idle.

Cross Contamination

If you touch your burner while logged into any ID linked services (Gmail, Reddit, crypto wallets) your OPSEC is done.

So always isolate burner use completely no crossover with known IDs, routines, or devices.


Remember:
Don’t use Craigslist or VOIP unless you're routing everything through Tor and compartmentalized identities. Instead, source phones in person with cash, preferably sealed or clean used models. Avoid urban meetups rural, low surveillance environments are essential. Never assume “no cameras” means safe. Assume you're being watched, tracked, and profiled.
/u/9ultra9rebel9 📢
1 points
1 week ago
Thanks for the thoughful reply. A few points to consider:

- Craigslist accounts can be subpoenaed
> I never make an account, there's no need. Sellers often put their direct contact number in the post.
- VOIP leak IP and metadata
> Then just go one step further and use the new phone that's now hardened and secured to buy another one in another city. One more layer added.
- IMEI tracking
> shouldn't be a problem with graphene or the other protocols I mentioned for non graphene OS

- obtain sims physically never online
> the sites I mentioned do not require JS and allow payment using XMR. I access them from tails frequently using their onion address
- obtain them irl
> That method was listed by me, but why risk a camera seeing you buy SIM irl? Any time you leave your house you expose yourself to constant, unnecessary surveillance.
- MAC address randomization before SIM
> done automatically in grapheneOS
- route all data over TOR
> already covered, this is what orbot does

Rest of your points are very solid. Stylometry especially should be considered more.
/u/Dreadnautilus 🍼
1 points
1 week ago
Great guide! Thank you for making this easily accessible and free for everyone!
/u/DarkMeech
1 points
1 week ago
fire guide, nice job
Hey mate, isn't the whole idea of a burner to rinse and repeat regularly, so your one step ahead?

It would be an expensive and time consuming exercise if you had to buy a Pixel and flash Graphene every 2 weeks.

A phone and sim, not in your name and recycled every X amount of weeks, would save a lot of time/money.

My current Pixel was over $1000, but my dumb burner was $40, so it is cheap to rinse/repeat.
/u/9ultra9rebel9 📢
1 points
2 days ago
pixel 6 on craigslist is like 100USD. pixel 6+ is all you need for graphene OS. Also, this is a guide for those with extreme threat levels, and with graphene, you won't need to recycle your phone if you follow the guide: Graphene is the only OS that has proven difficult for the forensics companies to crack)
/u/CleoP4tra
1 points
1 week ago
I've been using Burners for over 15 years, I buy the Vodaphone Tracfone for $30 USD cash at WalMart. Do they take my picture? Probably, but I just sell drugs, I'm not Murdering or Kidnapping, so it's not like I will have the FBI's BAU on me, so I am not too worried. I switch phones like once a month, more often if there is any sort of incident. I think a lot of how much effort you need to put in should consider what you are doing, which for most Dread users, the ones doing personal use amounts of drugs, no one really gives a shit, they want the dealers, or cartel heads, people ordering or committing violence. So, the $30 Tracfone should be fine. Just don't go connecting to your home internet and think you'll maintain your privacy, as soon as you connect it to something like a Wifi Signal that connects to your real name and address, that's it. Now they could, if they wanted too, track you.
/u/9ultra9rebel9 📢
1 points
1 week ago
Does the walmart near you not require extreme kyc? like ssn, license, etc. If you were using a burner bought that way you might as well just use your real phone or a VOIP...They would offer about as much protection to your identity (ie zero). LE could easily track you if they wanted with the footprint you leave in and around a bigbox store...Cameras everywhere.

And this guide was more for people who have extreme threat levels. I agree with you that lots of low level dealers and buyers don't need to worry much, there are guys on my team who just raw dog it from their iphone when selling. But that's what separates the grunt from the kingpin.
/u/CleoP4tra
1 points
18 hours ago
NO. Cash on the counter, some nuro-divergent Walmart Employee hands you your phone, you hand them the cash. That's it, Why did you think they did KYC? It's Walmart, not a bank.
/u/arambolyo 🍼
1 points
1 week ago
Question here- Does the Signal app actually leak ip?
If le want to track you via Signal then what are the chances? So, Coming to sessions now! Same question.
/u/9ultra9rebel9 📢
1 points
1 week ago
You can do a search on dread for more information on this, but as far as I know, they have cooperated with LE or at least have made consessions to privacy practices in the name of protecting minors from CSA groups who operate on their platforms. Of course it's all a ploy because intelligence groups own 90% of the CP ever created -> they infiltrate groups on private messaging apps -> get the groups banned by spamming CP -> leak info to press -> the masses become enraged, demand more surveillance and monitoring from the very groups that perpetrated the situation in the first place -> private messangers forced by law to change privacy practices -> to protect their business model they often don't tell customers outright, just put it in one of the millions of user privacy agreement changes that very few actually read, hoping you will miss it amongst all the legal gobble-de-gook. p2p messaging will always be superior. I really don't recommend using phones at all when possible, but if you do irl crime you have to have a burner phone to comm with other criminals. Real life isn't all theory like here, we have to make concessions to be effective from a practical standpoint. No one buying drugs from you irl is gonna pay with XMR or use an encrypted messenging service. So you have to make the best of it. Hope that makes sense.
/u/arambolyo 🍼
1 points
1 week ago
Yes :) Thanks :)
/u/sadboy1990
-1 points
1 week ago
idk but It's my first time doing anal yesterday felt good lowkey
/u/9ultra9rebel9 📢
1 points
2 days ago
thanks for your contribution, faggot