News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

How Do I Make My Network OpSec Inpenetrable? : OpSec | Torhoo darknet markets

I want to make it to where my ISP doesn't know I use Tor, and I want to have extra hops after Tor. If I add a VPS after Tor can I still use it to access the darknet? No right? I want a windows VPS for when I do clearnet activities especially now that Tor doesn't obscure OS & other info in http headers, but I don't think I should use a Windows VPS after Tor for accessing the dark web. Is the following a good idea?:

VPN #1 --> VPN #2 --> SSH over Tor with snowflake bridge --> windows VPS --> VPN #3 --> clearnet websites

Is this overkill? Is there a version of this I can use for .onion sites as well? Do the VPNs before Tor compromise my security or is that bullshit?
Main issue with a remote desktop setup is the latency from your client to the Windows VPS. You suggest a proxy chain + Tor to reach the Windows machine, it will be very frustrating to remote desktop. The latency can be something like 150-1000ms.

You could have a low latency connection instead, where your clients internet connection is from a network that is not related to you (random free WiFi from a dinner or coffee shop) and a single fast VPN to your Windows machine (<50ms). However, this can expose you in cameras during and shortly after your sessions.

From your Windows machine you can very well have a separate Tor with a residential proxy as your internet breakout. The latency here is less significant.
/u/yelloweyes 📢
1 points
1 month ago
Can you expound on your last sentence or link me to somewhere that explains it? I'm not asking you to give me a 100% surefire way to never get caught, but your opinion on a good setup to (primarily) keep my ISP from knowing I'm using Tor? I've seen people claiming SSH over Tor to VPS is great opsec for them, are you saying I would connect to coffee shop wifi --> windows VPS --> Tor --> residential proxy and this would offer a more usable experience? Then the Windows VPS would only know the coffee shop IP?
Sure SSH over Tor is good, but the network latency is annoying depending on the Tor circuit. When working mouse moves and display updates are lagging making things hard to maneuver. Best is to use as much keyboard shortcuts as possible.

So, from your client you have:
RD-client -> VPN #1 -> VPN #2 -> SSH -> Tor -> RD-server (Windows)

The communication from your Windows Remote Desktop is independent and not a part of the above "proxy chain":
RD-server (Windows) -> Residential proxy -> Tor

The two "proxy chains" work independent of each other which gives you one extra layer of isolation.
The draw back is the first "proxy chain" which will have long latency. However the latency on the second "proxy chain" is independent of the first and most likely faster, and should therefore not affect the overall performance.
/u/yelloweyes 📢
2 points
1 month ago
Thank you for this good to know. I think I will just use VPN -> SSH over Tor -> Windows VPS -> Residential Proxy (-> Tor if on the darknet)
/u/X8X8L
1 points
1 month ago
Bro you're an idiot just use pigeon post
You think adding more third party providers (vpn) make you more anonimous
just use bridge
or use without, ISP dgaf about you using tor if it's not banned in your country
/u/yelloweyes 📢
1 points
1 month ago
Look up the Harvard Bomb Threat. Feds figured out it was him who called it in because he was the only person on Harvard school grounds accessing Tor. If you think that being the 1 person using Tor out of 1,000,000 people in your area doesn't put you on a watchlist you're dead wrong.
/u/yelloweyes 📢
1 points
1 month ago
Doesn't matter what country you're in, if they know there's a dark web dealer in a city with 100k people, and there's 3 people using Tor in that city it won't be hard to figure out who it is. I'm 99% sure that the government spying agencies in most countries have this all automated since they sniff traffic everywhere anyways. Why wouldn't they write a script to collect all routers accessing Tor entry nodes and bridges and put it in a list?
/u/Argo
1 points
1 month ago
Achieving complete impenetrability is impossible. The key to maximizing security lies in simplifying processes and avoiding repetitive patterns. Utilizing SSH, proxies, and bridges is generally more effective than layering VPNs over a Windows VPS. For maximum security, it's best to build your process from the ground up. This way, you can ensure trust in every aspect of the system.
/u/yelloweyes 📢
1 points
1 month ago
Okay, what kind of proxies/bridges are you talking about? What are the proxies called?
/u/usefuIIdiot
1 points
1 month ago
Can you guys help me determine what honeypot technology is used there: 13.48.42.241, its purely academic tho
/u/[deleted]
1 points
1 month ago
you are using multiple vpns, bridges to hide tor usage and a windows vps to spoof os, user agent etc in http headers but you don't know that such an approach makes you more fingerprintable to clearnet websites that you will be visiting and it will also allow vps provider to see your browsing too. tor does not just hide ip but makes everybody look same, you stand out with this setup.
/u/yelloweyes 📢
1 points
1 month ago
Even if all the website sees is VPS + private VPN?