News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

How the FBI (fr) node tried to FUCK ME over yesterday (REPOST BC OF BOTS) : OpSec | Torhoo darknet markets

Story time : FBI has been surveilling me and harassing me for about a year, their file probably goes back further, but this is when the overt surveillance/harassment started. I am not discussing much info about circumstances, but some karens eventually submitted tips/reports on my ass. Anyways, I have seen what the FBI resources in combination with sheriff/local police can do in terms of surveillance and it is horrifyingly dystopian.

From my experience, using bridgedb to get tor bridges to add to tails, most of the bridges are garbage. The tails website says obsf4/meek should work with tails, but it fucking doesn't and they are lying. Just yesterday, I would enter 3 bridge lines, connect to tor, and would you look at that....FBI (fr) exit nodes appears! LOL hence the name. I shutdown, reboot, enter in another 3 bridge lines, and same exit node appears, despite the bridges being different. I repeated this process several times, and even with fresh bridges, FBI exit node appears in onion circuits. There were a couple other nodes that kept appearing and gained my suspicion also. So I decide to fuck with the FBI, because whatever if they want to watch then lets play a game. I decide to log into dread and proceed to delete all my comment history. While using the dread onion, I saw that the circuits were not using the FBI exit node. Also, if you ever noticed, tor uses a cloudflare onion to make dns queries. Now, I browsed around dread, then logged off, the circuits with the FBI exitnode laying stagnant, but still there...fucking waiting for a potential circuit to exploit. Now get this, I enter in the clearnet address for a crypto exchange and boom, traffic suddenly starts going through the FBI exit node circuit. OH? SO NOW YOU WANT TO LISTEN FBI? I didn't login bc I did not even have an account on that exchange, it was a fucking test and they fell for it. Who knows, they could have served me a spoofed copy of the login page and could of stolen my credentials, if I even had an account there lol. I keep the tab open and open up a separate tab, for an onion address, which gets routed through a different circuit. There are only a couple ways they could be selectively routing traffic to specific malicious nodes of their choosing. For one, if cloudflare is assisting the feds with dns queries, cloudflare transparency reports says they got
5 Pen Register/Tap and Trace Orders in 2019 - 7 accounts affected - 10 domains affected
217 Court Orders in 2019 - 679 accounts affected - 1675 domains affected
29 Criminal Subpoenas - 21 accounts affected - 214 domains affected

Another potential option is they are controlling a good portion of the bridge operators and I must have been the victim of several bad guard nodes that allow them to route my traffic to their malicious exit nodes. Weird thing is, that this happened with almost every bridge I tried, even the obsf3 bridge on bridgedb, but as soon as I connected to tor regularly, I was able to cut the sybil attack off. I actually am staying away from bridges for a while, because tails seems to have a bad implementation of them, who knows maybe this is intentional from the developers? They seem to want journalists/dissidents outside the USA to have anonymity, to aid the US empire, but still allow the FBI/determined adversaries to conduct sybil attacks/sophisticated tor deanon exploits. Anyways, fuck the FBI. The FBI BTC wallet is huge and the government sells of massive amounts of seized crypto every year, I bet a good portion of this is literally stolen via xss attacks and spoofed login pages served via tor/other browsers (use 2fa folks). All those reports from users having their btc stolen with bad market onion pages? I bet thats the FBI lol, it takes a sophisticated adversary to spoof pages that well.

I say dn users start anonymously xmr crowdfunding our own secure linux distro separate from the US defense industry that developed tails. separate developer team based in a country that has zero intelligence agency interest. Ik is a stretch, but eventually they will back us into a corner if it continues this way.
/u/TwattyMcTwatface
3 points
5 years ago
Why would the FBI have an exit node called FBI? Are you really this fucking dense?
/u/FBIEXITNODELOLZ 📢
1 points
5 years ago
BIG BRAIN WITH HIGH DENSITY
/u/burned47
3 points
5 years ago
An FBI node named FBI? - Someone has a sense of humor or someone is on the meth again... :-\ Put DOWN the pipe!
/u/FBIEXITNODELOLZ 📢
1 points
5 years ago
MY NEIGHBORHOOD AGENT GAVE ME THE AUTHORIZATION NECESSARY TO PUT THE PIPE DOWN IN YOUR MOMMA
/u/tapas
1 points
5 years ago*
Can you prove it or are you just assuming cause it makes sense? I always got the NSA in my ass and I would love to sue cause they have no reason to be looking at me. They are just a bunch of hollywood kikes wishing they were decedents of the hebrew people out to steal my creative content. The more I think about these backward fucks, the more I think they killed Kennedy! How do we call it LA should be LD for diablo.
/u/FBIEXITNODELOLZ 📢
1 points
5 years ago*
FED BURNER ACCOUNT DETECTED. 0 POINTS. FIRST COMMENT ABOVE. LOL DISREGARD HIS CLAIMS. YEAH SURE LET ME JUST "PROVE" THIS TO THE RANDOM NEW ACCOUNTS ON DREAD! LOL
/u/efoam
1 points
5 years ago
Jesus Christ you are insane. The effort you go to just troll and with other accounts is scary dude, take a break.

> There are only a couple ways they could be selectively routing traffic to specific malicious nodes of their choosing. For one, if cloudflare is assisting the feds with dns queries, cloudflare transparency reports says they got
5 Pen Register/Tap and Trace Orders in 2019 - 7 accounts affected - 10 domains affected
217 Court Orders in 2019 - 679 accounts affected - 1675 domains affected
29 Criminal Subpoenas - 21 accounts affected - 214 domains affected

Can you explain what exactly you mean by this and how you could get the transparency report? Also even if they control a node dont they need to control the whole circuit to actually get any good information from you?

>The FBI BTC wallet is huge and the government sells of massive amounts of seized crypto every year, I bet a good portion of this is literally stolen via xss attacks and spoofed login pages served via tor/other browsers (use 2fa folks). All those reports from users having their btc stolen with bad market onion pages? I bet thats the FBI lol, it takes a sophisticated adversary to spoof pages that well.

Sure, I agree with half of this but people can literally copy the onion and basically paste it to spoof it, which is why Empire now makes a lot of small updates to it's onion to differentiate itself from the old copies (also to keep up with Opsec but this just seems like a good idea to me). People, the adversary does not need to be the entire FBI...
/u/FBIEXITNODELOLZ 📢
1 points
5 years ago
GOOD EFFORT
/u/beyourownbank
1 points
5 years ago
Can tails devs control the exit nodes like you can on kodachi? Personally wouldn't use kodachi because the dev doesnt seem to know shit about security, but being able to omit certin nodes seemed useful. At least it seems useful from my understanding.
/u/beyourownbank
1 points
5 years ago
or, would this just make it easier to track you?
/u/[deleted]
1 points
5 years ago
Can tails devs control the exit nodes like you can on kodachi?

lol no.

You could exclude exit nodes yourself in the Tor software itself.
/u/beyourownbank
1 points
5 years ago
Thanks, just wanted to know if its possible. How do you do this?
/u/[deleted]
1 points
5 years ago
When you run Tor then Tor is controled by a configuration file on your system.
On Linux systems usually this file is located in
/etc/tor/
On the torproject manual page you can see which options for controlling Tor are available. https://torhoo.cc/go.php?u=YUhSMGNEb3ZMM0Z5YldaMWVIZG5lWHByTldwa2Fub3ViMjVwYjI0dlpHOWpjeTkwYjNJdGJXRnVkV0ZzTG1oMGJXd3VaVzQ9# If you want to play around a bit and if you are on Tails just set an administration password next time, then open the Terminal and type
sudo nano /etc/tor/torrc


Then you will see how the Tails developers configured Tor and this is the place where you would specify which countries or nodes you want to exclude or which nodes you want Tor to use for your circuits.

Doing this is fine if you want to test something or if you have a very good reason to do it but usually its not recommendable because when you start excluding too many nodes you reduce the possible circuits Tor can choose drastically and that generally makes you more fingerprintable and comes with a lot of other problems.
/u/Mobrando
1 points
5 years ago
Who you order your crack from?
/u/FBIEXITNODELOLZ 📢
1 points
5 years ago
DONNA ON FLOOR 9 OF FBI HQ HAS THE BEST CRACK RN
/u/NotCool
1 points
5 years ago
Your paranoia has got the best of you my friend. Lay off the weed or meth.

Clear the cache of your tor folder, then stop, and restart services. Make sure you have new exit node.

You don't need an obfs4 bridge since you're in the states.

One thing I know about the Feds, is they will come around if you ask them to. Just like you are doing now. Change your routers MAC address, and reformat all your shit if you're concerned.
/u/FBIEXITNODELOLZ 📢
1 points
5 years ago
I GET ALL MY DRUGS FROM FLOOR 3 OF THE FBI