News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Opsec advice for vendors requested : OpSec | Torhoo darknet markets

Hypothetically if someone was a darkweb vendor. What is the safest Opsec? Is there a safe way to work from home? Is there a safe way to work on the road while travelling? Hotels? Airports? Cafe's? Would be sweet to set up an anonymous starlink and work from anywhere. Otherwise Hotspot and switch sim cards?

Is Tails the best? Tails, Whonix, or Qubes?

To bridge or not to bridge? If bridge whats the best protocol and why?

XMR only? Best wallet protocols?

PGP; How often should this change?

Is sessions or signal really that secure? Can they be run on tails or is there a safe way to use these?

Whats the deal with javascript?

Is there a suprior email platform that can be accessed through tor?

Tor Vs I2P?

Does anyone actually use jabber?
/u/bleak
1 points
1 week ago
Alright, these are all the most basic questions anyone could ask. You should genuinely sort these out before you actually deal, I'd be very concerned otherwise. (considering you even have your own subdread)

1. TAILS vs Whonix vs QubesOS
- TAILS is usually for short term things, like a quick in and out. Best for casual buyers. Simple to set up and use.
- Whonix is a bit more complicated to set up, but offers more flexibility and security.
- QubesOS is for the ultra paranoid. Maximum available security but also really steep learning curve.

2. Bridge or no bridge?
- Definitely use a bridge. In case you didn't know, bridges basically hide the fact you're using Tor. (But it isn't foolproof as analysis can still figure out if you're using Tor)
- Obsf4 is the latest one, makes Tor data look like random data.
- NO BRIDGE IS FOOLPROOF.

3. XMR?
- ONLY XMR. You will get caught if you used only Bitcoin due to chainanalysis (BTC's blockchain is public, XMR's is private.)
- Beware of using XMR nodes. LE is known to be running lots of nodes with chainanalysis built in. Carefully choose your nodes.

4. PGP. How often should this change?
- This shit shouldn't change. That's the point. You should almost never change your keys.

5. Don't use Session or Signal. Use SimpleX Chat through Tor or just use Jabber/XMPP.

6. Always disable javascript. Most Tor zerodays are based on javascript.
- No JS = better.

7. There isn't any "superior" email platform. (Like bruh email is fucking email. What unnecessary bloat do you want?)

8. Tor Vs I2P
- Both are good. Depends on use-case.

9. Yes, people do use Jabber.

I hope this fucking helped. You should consider reading the wiki and dnmbible for fucking once.
Have a good fucking day.
bleak.
To add clarity to 2) as I see people mix it up still. I'd mostly presume this is to do with linguistic expression rather than anything else.

Bridges definitely don't hide the fact you are using Tor /post/5f1ba84246ac7d2f386f. Bridges only help to circumvent network filters.
/u/polytheistic
1 points
1 week ago
How would one verify the integrity of the XMR nodes being connected to?
/u/bleak
2 points
1 week ago
You really can't. Just use them over tor and you should be pretty much fine as long as you don't mix up wallets over different identities or do something dumb like sending money to an account directly linked to you.
/u/FairDopeSellerCH
1 points
1 week ago
Run your own node via Tor
/u/bleak
2 points
1 week ago
Ah yes, this. I forgot about that lol.
/u/polytheistic
1 points
20 hours ago
This makes sense. Do you have a link to information pertaining to that activity?
/u/jethro23
1 points
4 days ago
Tails with persistence works great for buyers and vendors. Just keep a back up or 3
/u/sulthanthalapathy
1 points
1 week ago
One question. Can session just be used for simple communication where you dont send any crucial msg?
/u/bleak
1 points
1 week ago*
Why would you risk it? Why would you intentionally increase your surface area by using a non-typical application when you can simply use PGP+email or PGP+Jabber or XMPP.
PGP+anything is generally fine, but that only hides the message content, not always who is sending it. (eg Signal leaks ip addr if not routed through tor),

edit: I understand you won't really be able to send encrypted attachments, but since you said simple comms, I'd argue you can outsource them.

Worst case you can set up onionshare or even torrent over i2p if the files are too large.
/u/sulthanthalapathy
1 points
1 week ago
thanks for the advice