News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

How to clear your serach history on your hard drive : OpSec | Torhoo darknet markets

I use Tail OS whenever I going on Darknet markets or Dread Forums. But sometimes, I use the Tor software on my laptop without tails. If the Fed look at the traces left on my hard drive I'm screwed. How do you guys clear you hard drive? Also, should I use Tails OS on Dread forums, or is fine accesing Dream with the regular app on my laptop
/u/LittlePoPete
2 points
6 days ago
Holy Water
/u/Ghwbushsr
1 points
6 days ago
if you don't know, then it's time to get a new hard drive
/u/diaperspray P
1 points
6 days ago
Amnesia

Tails always starts from the same clean state and everything you do disappears automatically when you shut down Tails.

Without Tails, almost everything you do can leave traces on the computer:
  • Websites that you visited, even in private mode
  • Files that you opened, even if you deleted them
  • Passwords, even if you use a password manager
  • All the devices and Wi-Fi networks that you used

On the contrary, Tails never writes anything to the hard disk and only runs from the memory of the computer. The memory is entirely deleted when you shutdown Tails, erasing all possible traces.
/u/becomedeath 🍼
1 points
5 days ago
Couldn't I keep the password manager and its information inside the USB booting tails?
/u/diaperspray P
1 points
5 days ago
Yes it's called "persistent storage". Use it or lose it... basically.
/u/becomedeath 🍼
1 points
5 days ago
Yeah but it isn't safe, right? I have a manual switch USB that only lets you read the content inside. So I could put the passwords in, then enable the switch and surf the dark web. But would it leave trace anyways if I only use it for passwords and booting up Tails OS? Guess not, but I gotta ask this.
/u/diaperspray P
1 points
5 days ago
It does use a small bit of encrypted storage space to keep files such as your KeepassXC password database and Kleopatra keys.

I've used Tails with persistent storage for purchases since SR days and I'm still trolling along.
/u/threeohthree
1 points
6 days ago
This isn’t my background, but I know people have suggested a command-line tool called cipher.exe made by Microsoft.
/u/rmrf P
1 points
6 days ago
You have not explained what your operating system is.

On windows especially you will have lots of problems. Just clearing the browser history from your browser will not remove this information. There are prefetch files, some temporary files usually for cache purposes stored, and even shadow volume will retain copies. Each browser is different as well. I am not sure of tor browser forensics on each machine but if may keep different network information as well.

Please update your post with your OS and Browser preferences and there can be more information on maybe how to remove the data. The better idea is to restore to backup what you need and do a factory reset, encrypt your machine again, and stop using tor outside of tails.
/u/ag3030 📢
1 points
5 days ago
My operating system is window Lenovo laptap.
/u/rmrf P
1 points
5 days ago
Lenovo is great for linux support. I would suggest dual boot. I make the same recommendation that you reset to factory settings, dual boot, and forget your encryption password. Linux does not require cloud login but I think windows does so it makes your encryption ineffective if you use windows.
/u/seinfeldsuperfan 🍼
1 points
6 days ago
Veracrypt. Do a few passes
/u/deanonymize 🍼
1 points
6 days ago
If you access Dread from your main OS, you already left traces.

Tor Browser on a normal OS (like Windows or even hardened Linux) does not guarantee no forensic artifacts. Think:

Page cach
DNS history (OS level)
Swap space
Journals
Session files
Clipboard

Even if you clear browser history manually, disk forensics will still pull leftovers unless you used FDE (Full Disk Encryption) and never hibernated.

Answer:
Use Tails only that’s what it’s made for. It runs in RAM and doesn’t touch your disk unless you explicitly use persistence (which you shouldn’t for darknet access).

If you already used Tor Browser on your host:

Secure wipe free space (BleachBit / shred / sfill / wipe based on distro)

Delete known Tor and browser folders: ~/.tor-browser, ~/.mozilla, cache dirs, etc.

Disable swap or securely wipe swap partition

Or just nuke the OS and reinstall with FDE if you suspect forensic risk.

TL;DR:

Use Tails for Dread.

Never mix darknet and clearnet on the same OS.

Never trust Tor Browser alone without live OS.

Clean with purpose or rebuild.

Stay paranoid.
/u/fnaisodhfui 🍼
1 points
4 days ago
Hammer & nail
/u/ALTERR1 🍼
1 points
4 days ago
[removed]