News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Having a backup is important, don't get caught without one! : Dread | Torhoo darknet markets

The amount of request for PGP purging on Dread because user's forgot to backup their PGP is far too high! If you don't have a backup, you should make one right now. While we are talking about backups, due to the rise in DDOS attacks, you should all also have a backup of Dread URLS.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Dread's URLs are:

Tor: http://dreadytofatroptsdj6io7l3xptbet6onoyno2yv7jicoxknyazubrad.onion
I2P: http://dreadtoobigdsrxg4yfspcyjr3k6675vftyco5pyb7wg4pr4dwjq.b32.i2p

Signed by https://torhoo.cc/go.php?u=TDNVdlVHRnlhWE09#'s PGP key
-----BEGIN PGP SIGNATURE-----
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=7RuG
-----END PGP SIGNATURE-----


Dread is accessible both on Tor and I2P. Being that the attacks are all on Tor's hidden service side this post will focus on how to get setup on I2P the easy way. The vast majority of people who visit Dread do so on the Tor Browser. Did you know there is a I2P browser as well? It's true.

https://torhoo.cc/go.php?u=YUhSMGNITTZMeTluYVhSb2RXSXVZMjl0TDFCMWNuQnNaVWt5VUM5cE1uQmtZbkp2ZDNObGNnPT0=#

Getting setup is super easy! You can go to either the ⚠️releases⚠️ section to grab the latest version or compile it yourself if you are inclined (for non-windows versions make sure to update the build script firefox version). If you are on windows the fastest way to start is download the .exe version, run, and extract to a directory. You can then boot it up just like the Tor Browser. That's it. Due to how the I2P network works the longer you use it the faster it becomes for you. So it might be slow at the start but if you give it an hour or two it will start to load faster.

Best part? No EndGame captcha on Dread's I2P version. Plus with the forever cookie set you won't need to sign in again if you do close the browser. It is far more convenient.

There is a warning though. I2P's network works completely different from Tor. When you are on Tor you only directly connect to a small amount of nodes. Your request goes in and a request comes out. This means your surface area to those who know you are connected to Tor just the authority servers (you get the descriptors from) and your guards. You are a user of the network but not apart of it. I2P has a different system that is closer to P2P torrenting. This has a lot of benefits but also some drawbacks. Unlike Tor which tries that mask you are using Tor (bridges, limited guard nodes, and all that) I2P does not hide you are using I2P. By running I2P on your system it becomes apart of the I2P network. If you don't want people to know you are using I2P you need to proxy it locally from another server or use a VPN. The network is completely distributed and self organizing. It is specifically designed for hidden service connections and can be much faster and more resistant to DDOS attacks assuming equally high participants and capacity in the network. By running I2P you are increasing the network capacity and resistance to attacks. Unlike Tor where the more users creates more drain on limited network's resources.

I did the math today. If just under 10% of the users on Dread daily ran a I2P server we would have a larger footprint than the totality of the Tor network. That doesn't mean we would have the same capacity but due to the reduced load on the I2P network, compared to Tor, the connection would be more reliable and likely much faster. There are a lot of benefits to it. Give it a chance just to check that the backup works as planned if the Tor site goes down.
I2P usage is up over 500% after this post!
/u/duckduckcop
2 points
3 years ago
This is kind of a nonsequitor to OP, but on the topic of I2P, I am curious of your and the community's thoughts on the following.

I get the appeal of I2P (better reputation/less well known, darknet-first design, greater functional utility and flexibility, etc), and the problems with Tor (ONI/14 eyes funding, exit node surveillance, likelihood that majority of nodes are compromised, large amount of attention from NSA/GCHQ/etc)

However, that said, I feel there are some big drawbacks to I2P from our perspective.

For starters, there is no dedicated secure/sandboxed browser. By contrast, TBB is pretty adequate, and available on all linux/BSD flavors without any serious compatibility or usability issues.

Another thing is the untested nature of the I2P network security. Tor, for all its drawbacks or concerning issues, is pretty well battle tested. We know its strengths and limitations. I2P, however, could have all kinds of 0days that just aren't known yet due to lack of use etc. The project is at an earlier stage of development, adoption, and visibility...and that cuts both ways. It's a blessing, and a curse, depending on the aspects you look at.

I2P is also primarily meant to share files as a slow, but more anonymous alternative to torrenting. The relevant result of this is that I2P isn't really designed or intended for high security applications, as much as it is intended for use cases prioritizing anonymity (and privacy to a lesser degree). Security is no less crucial than anonymity and privacy when it comes to darknet activities. So, this may be a conflict of design goals. However, there is no perfect triangle when it comes to P/S/A

I2Prouter is also meant to be running all the time. This isn't necessarily a bad thing, but it can mean that DNM related activity of an end-user (customer, vendor) can potentially be more exposed to the network than when that end-user uses Tor.

These are just some abbreviated thoughts I have. What do you all think about this?
I2pd provides a very simple socks proxy system so you can hook up your own sandboxed browser system (maybe one which doesn't even have javascript support at all) if you prefer it. This post was more so to show how you can setup a simple portable browser with i2p out of the box, similar to the Tor Browser. It's built on the same Firefox base and if you can get the Tor Browser to run you should be able to get this to run. Hell if you wanted use the same Tor browser you could customize it for that.

BTW fuck the main i2p java implementation. It is complete trash. They need to stop putting future resources put into that version. It's far too dated and too unperformant to be used in modern computer systems.

i2p was released back in 2003. While i2pd was released in late 2014. These are not early stage developments that have no tests. They are mature programs built on dated and detailed specifications. The logic behind their network is sound and if properly integrated (which from what I see they do so) it's a reasonably secure network. I wonder where you are getting these main use cases from. I2P's first development was for private IRC chats (which is still functioning almost 20 years later). It is a universal anonymous network layer. What you choose to do on it is really up to you. But unlike Tor, which is designed to anonymize where clearnet traffic is coming from, that made onion sites as a example you can build things on top of the network; i2p was designed for traffic WITHIN the network. It doesn't treat hidden sites as a kind of second rate feature. It is a first class citizen within the network. As more people use i2p the network gets more resistant against attacks while becoming more performant. The reason why you can't torrent over Tor is not only because torrenting does leak information (via the clients) but also is because there is a finite amount of resources on the network constricted within a relatively small pool of nodes. The more people who use it, the more the weight of the traffic weighs on the network. Until it collapses on itself.

i2p is designed to be run as much as possible because every single person who runs it provides extra protections and bandwidth. It also helps masks their own traffic when they do start using i2p occasionally. Think of it this way. Unless you are connecting to a bridge or VPN (which would just put monitoring on the VPN end) your ISP can see that you connected to a tor guard node at a specific time and place. While they can't tell what you are doing, they can see how long you have been using it and how much bandwidth you used. To me that makes you more exposed in the event your ISP is spying on you to make profit off your traffic or by order of your local government. It also makes it possible just to block connections to any tor node on the network (which many authoritarian governments do). All tor nodes are public to block.

This isn't the same for i2p. By just running it you are providing a real benefit to both yourself but other participants in the network. With enough scale it would be impossible for people to get a complete graph of the i2p depth. So if you really think about it, end-users are better protected against these traffic timing attacks and exposure.

Now I won't say there isn't potential of 0days (there is always potential 0days). But that is the reason why you run it on a separate sever and just connect into it when you need it. It should be professionally audited? Yes. But it also should be written in Rust before that point.
/u/byballotbybullet
2 points
3 years ago
Strong defense.

On the point of not running torrent over Tor, are you concerned about attempts to route I2P over Tor (e.g., running it on Tails)? Is this overkill? Is this good practice? Seems to me it will stress the Tor network more with little in return.
It's bad practice. You need a stable connection on I2P and the Tor network doesn't provide that. It harms your latency and adds more points where there could be compromises and analysis. It does harm the Tor network too but ultimately it is more so a bad idea simply because it makes an unstable unreliable system which has horrible performance. A pain to use.
/u/byballotbybullet
1 points
3 years ago
Thanks. Have eep browser running on system even though not actively using it yet. It will be interesting to see if i2p gains significant ground on, or even overtakes, Tor before PoW is ever implemented. I'm guessing if it does, it will yet again be this outlaw corner of the darkweb driving it.
/u/LeeYoo-Mi
1 points
3 years ago*
i2p has been around for quite sometime now but normal users hardly use it so having something like i2pdbrowser could change the whole perspective towards i2p
/u/BlackMarketplace
1 points
3 years ago
Yeah, I2P has been around for a long time.
It's just that people, don't want to step out of their comfort zone.

Just like people, in the beginning, didn't want to believe in BTC.
/u/mrbenzo666
4 points
3 years ago
or how ppl still use btc over xmr lol
/u/Lollyb99
3 points
3 years ago
Alright, let's give it a crack.
/u/zexdac
3 points
3 years ago
Thanks Paris. I verified my backup restores successfully, saved those links, and am running a I2P server.
/u/clipmip
1 points
3 years ago
> I verified my backup restores successfully

This is super important. Gotta test those backups!
/u/byballotbybullet
2 points
3 years ago
Unlike Tor which tries that mask you are using Tor (bridges, limited guard nodes, and all that) I2P does not hide you are using I2P. By running I2P on your system it becomes apart of the I2P network. If you don't want people to know you are using I2P you need to proxy it locally from another server or use a VPN. The network is completely distributed and self organizing. It is specifically designed for hidden service connections and can be much faster and more resistant to DDOS attacks assuming equally high participants and capacity in the network. By running I2P you are increasing the network capacity and resistance to attacks. Unlike Tor where the more users creates more drain on limited network's resources.


So what's the OpSec risk with using I2P?
If they know I accessed the I2P network, can they know I went to a market selling drugs?
I remember using torrent and ISPs would know exactly what movie you downloaded and would send you warning about where you went and what you downloaded as a deterrent (I always threw them in the trash and continued on).
But illegal drugs feels just a bit...actually a LOT more risky to run across a torrent-like protocol.

Or is this unknown? Kind of like all the lessons learned from the beautiful disaster that was Silk Road and AB-1. We laugh now at some of the fails, but how could they have known? Being ahead of the times also means being ahead of the knowledge (much of what could possibly be known to be good or bad).
/u/xrbuzz
3 points
3 years ago
If you're going to run I2P I would do so only over a VPN router at the bare minimum.

I wouldn’t trust I2P unless they add the option to connect to a remote I2P server over Tor, it would be ideal if Tails supported a I2P over Tor via remote server, thats the only situation in which I would ever use I2P.
/u/byballotbybullet
2 points
3 years ago
well, main issue seems to be the unencrypted log files stored by I2P router on local device that can lead to discovery of user or their browsing habits. a VPN wouldn't prevent that, though it might delay you getting raided (since no VPN provider will likely stick its neck out for anyone).
/u/cannabliss420
1 points
3 years ago
That's why many darknet users use Mullvad. They have no obligation to comply with US authorities.
I2P has similar privacy guarantees to tor. When communicating on the network it's designed to provide privacy. They won't reasonably know you are visiting anything at all. There is in fact a larger guarantee when on the I2P network of that fact compared to Tor. Because in the case of your connection is being monitored they would see not a direct line between one or two peers but many many short lived connections over many more.

The way ISPs knew you were torrenting a movie is that copyright holders monitor popular torrent sites and torrent links and record who connects and starts downloading. This is because torrenting is a open IP connection where everyone knows what the others are doing/have. I2P, by it's design, protects your privacy while on the network. So while it is similar in it's connection process for peers what people know is far more privacy oriented.

The OPSEC mistakes from many major markets are mostly not because of the networks people use to connect to them but the market application software or admin mistakes in building/marketing the market. It's an arms race and people need to understand there are risks but with reasonable processes and common sense they are manageable.
/u/byballotbybullet
1 points
3 years ago
Sounds great. And the convenience. If it's as robust as you say on the privacy side, and this can be done from a Windows OS, then wow. The DN might be poised for a serious boost if more DNMs (think it's only AB so far?) offer services on I2P.

Btw, does this mean these vulnerabilities are no longer relevant (the issue of unencrypted log files stored on the user's local system especially - the phishing attacks are an issue everywhere, so I disregarded those): https://www.tandfonline.com/doi/full/10.1080/21642583.2017.1331770
I2Ps domain resolution system is problematic. The .i2p domain problem is still there and the way it's design makes it impossible to fix without completely changing how it operates. This is why we request everyone to only use the full address and not an address book (which could come from a compromised registrar) that could MITM attack. If you use the full b32 address it has the same connection guarantees that onion services have.

Seeing if you are running I2P is obvious to an outsider. They do a poor job of masking but that is more so a product of the network design (where you are apart of the network not a leech off it). This is why if you care about if people know you are running I2P to use a VPN or to just proxy from a remote server.

All other problems with the network are mostly a product of the low latency design and are shared with the Tor network.
/u/enosh
1 points
3 years ago
I have actually been thinking of doing this with my pgp incase my "burner" laptop dies. Just not sure really where to start. I am most definitely a pgp newb. All I did was researched he basics of pgp years ago just to be able to use the markets. When I downloaded GNUpg/GPA and I remember it asked me to write down my "SEED" phrases and to store it in a safe place offline (along with all my other important passwords/phreases/mneomonic keys). I did that, but I actually dont know what I would do if my whole system crashed. I mean, I imagine I would download the same program and I would be prompted to enter my seed? I am not really sure. What is entailed in backing up ones PGP? Do I need a backup of my key ID and/or my fingerprint? Any info would help from anyone knowledgeable in this area. Thanks!
I don't use the same program that you do but I have a "manage keys" choice. From there I can put a check in the checkbox next to my key and then choose "export to file" and save it wherever such as a usb or external drive. My program also has an "import key" choice so I could reinstall the program on a new device and import my saved pgp key.
/u/enosh
1 points
3 years ago
Ah yes, I see where I can import and export key for my program. When I tried to export it prompted me to save a file. I saved it then when I opened it it was just a copy of mt key. Now mt question is: on my key ring, I have all the saved "public" keys I use, and then their is my key that has a "public" key and a "private" key to it. So when I exported my key, I imagine that is just the "public" key for others to encrypt to me, but how do I know I am also exporting the "private" key that I use to decrypt?
My bad. That is indeed how to export the public key. My program is portable and I just save the entire folder periodically which saves everything.
Thanks so much for this topic https://torhoo.cc/go.php?u=TDNVdlVHRnlhWE09#

At the risk of admitting to being a Windows user what is the difference between the windows and windows_prebuilt versions of the web browser for i2P?
You will need to use the windows version not the prebuilt. Prebuild is for combining everything together into an easy to send exe while everything else needs to be built on a user's computer.
Okay, thank you for the response.
/u/TrippyHippy
1 points
3 years ago
I finally went out and bought a usb to make backups of all my important info not too long ago. I was one of those users who messaged requesting for PGP purge. Now I need to go get another usb to make a extra backup of that backup.

Also barely today was looking around into I2P and I did not know there was an I2P browser! I still haven't messed around with it too much and don't really know much on how to navigate it so hopefully that is easier with a browser.
/u/TZSKSKTZ
1 points
3 years ago
SD cards are great for backup, discreet, and cheap
/u/solingen
1 points
3 years ago
What is the recommended use of the I2P browser opsec wise? I am using Whonix - should I install the browser on Whonix or is it safe to use on the hostOS/other VM instance?
/u/bleedinirish
1 points
3 years ago
Thanks Paris.

Kind regards
Thatirishbloke.
Use it with a VPN or proxy the I2P process from another server. Using with whonix isn't recommended. I2P requires direct connections for stability. You can run the browser in it's own sandbox or VM if you want. Depending on your risk tolerance.
/u/MommyCrush
1 points
3 years ago
"Using with whonix wouldn't be possible."

Just fyi, I2P does work with whonix. The original java client is awful but my workstation runs I2Pd beautifully. So even if there are flaws in their network we have not discovered yet, I'm still protected by TOR (:
For stability I highly recommend not doubling up networking. Think of it this way. In the case the Tor network crashes, your I2P connection would also break up. You also would be proxying over more hosts with a direct connection point of your guard node. That removes a lot of the privacy guarantees I2P provides to people from their shortlived connections. It's just a bad idea.
/u/ned7887
1 points
3 years ago
I'm confused. I'm following the I2P guide on AlphaBay and it specifically says to run the code to set up I2P on Whonix/Debian flavours.

Am I doing something wrong?
Running on Debian is fine. It's going to be far faster and more performant using the Linux kernel. Whonix is built on Debian and is counted within the same distro flavor. That doesn't mean you should use I2P with whonix and proxy all your I2P connections over Tor.
/u/Dreadsticals
1 points
3 years ago
Whonix isn't just built on debian its built on debian and morphed and built off Kick Secure templates then hardened again. So I am sure if they say you can run I2P off it you could run it safely?? Or is there a reason not to trust Whonix Developers?

I am slightly confused.
Personally I am not ready to trust I2P just yet but if I were I would of done as the other poster was saying and looked up the default Whonix run I2P version.
If you think this is incorrect it could be worth creating a post about it.
/u/Booda
1 points
2 years ago
Using with whonix wouldn't be possible

Not sure what you mean here. I'm literally using dreads i2p address on Whonix right now to comment this to you and it works fine.
Well I guess it is possible but not something I would recommend. The Tor process uses TCP while I2P uses UDP (with their SSU transport). Whonix must now package the UDP within TCP to pass it to the regular I2P network. Plus tons of secondary connections that Tor just doesn't have stability for. I can't think it's a good experience.
/u/Booda
1 points
2 years ago
I find it's okay not as fast as VPN/Proxy/VPS + I2P but definitely better on markets than Tor these days.
/u/UnKnOwN8733
1 points
3 years ago
Works great, thanks. Is there a list of available I2P links somewhere?
http://reg.i2p/all
/u/flowerbuyerunit
1 points
3 years ago
Good reminder. One should have back up for each steps.
/u/DrSwole
1 points
3 years ago
For a user using Tails how would recommend story the backup

just a straight up copy of Keepass database and keep off site

or do a full second install of tails and move everything over. Then youve got the benefit of FDE?

DOC
/u/ned7887
2 points
3 years ago
From AlphaBay 'How to' guide.

'We HIGHLY RECOMMEND using I2P over Tor for many reasons which you can see in Frequently Asked Questions (FAQ) section. Currently Tails DOES NOT work with I2P and requires too much configuration for the average user to do on each boot. We are working on Tails having I2P/custom script for Tails'.

I'm a noob to all this and all these conflicting messages are very confusing.
/u/xrbuzz
1 points
3 years ago
Dude, there is a back up utility in tails already built it, use that...
/u/azfphree
1 points
3 years ago
have been running i2p for a week or so, can confirm dread loads great. almost never any downtime and love that you get to bypass annoying but understandable access queue.

maybe you can add a sitewide msg encouraging users to make the switch to i2p?

https://torhoo.cc/go.php?u=TDNVdlVHRnlhWE09#
/u/Warningo
1 points
3 years ago
Good reminder and thanks the infos
/u/dayaftertomorow
1 points
3 years ago
Nice Explain

i just downloaded it and its workin fine !!
thank you
/u/Zergburgers
1 points
3 years ago
Let's say I have a pgp key on tails. How can I back it up if my usb does? I don't even understand how I would be able to transfer it to another usb stick, for instance.
/u/[deleted]
1 points
3 years ago
This is refreshing to see after years of bashing I2p. Garlic routing is far superior to onion routing and have been saying it for years, welcome to becoming an I2p head.
Their Java client is shit still. But i2pd saved them in my mind.
/u/spiltnsplit
1 points
3 years ago
So, you can use i2p over tails, correct? And if it's safer to use a VPN with i2p (unlike Tor), then would using the hotspot on your phone as your wifi conncetion on Tails be secure as long as your phone's wifi is using a VPN?

Or would there be a safer way to do this such as not using a cellular hotspot, regardless of a VPN??

Thnaks for your help!
/u/armatek47
1 points
3 years ago
Unfortunately just learned that i2p isnt supported on tails anymore since 2.1.
/u/SmooLack
2 points
3 years ago
Lame...
/u/armatek47
1 points
3 years ago
They are looking for a volunteer to take care of i2p in the next version tho, crossed fingers.
/u/spiltnsplit
1 points
3 years ago
damn so what would you recommend? can you use it on whonix? Or do you just use it on windows/mac with a VPN? Or without one?? Im confused as to how it operates, sorry if my questions are stupid
/u/[deleted]
1 points
3 years ago
Learnt it the hard way :(
/u/greenRC
1 points
3 years ago
Which other Markets Can I sell My fire Crystals Analogue (Eutylone, MDMA) AS We have Warehouse in USA.

Besides, alphabay and ASAP
/u/anonchansama
1 points
3 years ago
I2P to the moon!!
/u/methSavoy
1 points
3 years ago
Backups are very important. I always make sure to have a copy at least two times on two different places.
/u/House81
1 points
3 years ago
Thanks for your hint :-)! Is updated now.

Greats
House81
/u/hp_617
1 points
3 years ago
Thanks, made backups!
/u/Scarface_Alpha
1 points
3 years ago
Great info for those who don't know much.
/u/kcats
1 points
3 years ago
Bad things happened to my hardware after downloading i2pdbrowser
/u/PirateMan69
1 points
3 years ago
I didn't use the source https://torhoo.cc/go.php?u=TDNVdlVHRnlhWE09# listed, but found one I found I could build from source. Which requires somes terminal/CLI knowledge, but wow the experience is cleaner and faster. I can understand the drawbacks, but I actually like this experience on i2p more. Thanks for the nudge!
Don't compile i2p from random sources (source may be compromised). PurpleI2P is the official github organization for i2pd.
/u/PirateMan69
1 points
3 years ago
The irony here is I though PurpleI2P might not be official and that I2P/I2P would be. Thank you for looking out.
/u/jasonblockchain
1 points
3 years ago
Absolutely Thankxx
/u/LongTimeNoob
1 points
3 years ago
Can we get a section on this in the DNM Bible? I prefer using Tails as suggested in the bible but i2p doesn't seem to play nice with Tails. Is there a similar setup you use for i2p? Debian VM image you have on a usb with encrypted storage and such? Also, as you mentioned, i2p seems to work better with long term usage but I usually try to keep my usage short. Plug in tails usb, check dread and DNM, shut down. This doesn't seem ideal for i2p.
In your case I would recommend just getting a cheap server, running i2pd, and proxying that connection in when you need it.
/u/Lollyb99
1 points
3 years ago
I gave it a go, and I really struggled with the I2P. Until it is as easy as downloading the TOR browser, it is probably still some time away before it is mainstream.
/u/DWdenizen777
1 points
3 years ago
Great points here, thanks for the post.
/u/aburame
1 points
3 years ago
Where does the I2P come from? waas it also made by military and later releaseddd for public? or some random darknet guy? and I feel pressured into using I2P (im not blaming u) this post will eventuually make me and others use it but i just want to know if anyone has done research on it?
i2p is a fork of freenet. They don't have any governmental funding support unlike the Tor project. You should do your own research if you don't know. It's not hard to find. https://geti2p.net/en/
/u/aburame
1 points
3 years ago
are comments limiteddd on this sub? bcuz i wanted to know more about i2p...?
/u/MathMan
1 points
3 years ago
Thank you for this post. Does anyone have details on how to install this on Tails for a person that is just not completely linux literate? lol
/u/BigBoss
1 points
2 years ago
[removed]
/u/AutoModerator M Judge Dread
0 points
2 years ago
We do not allow Wickr IDs and you are posting in the wrong sub, this is for Dread information only.

This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.