News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

OpSec FAQ Series: Using Tor from Home or Public WiFi : OpSec | Torhoo darknet markets

Introduction
/u/decaptchamyass
2 points
7 months ago
Why are you even recommending WiFi if you are on a home network? WiFi, just like BT, has a lot of attack surface which comes with extra convenience. Use wired connection at all times. I seriously doubt you would have any "real security" if you rely on a stock router which are usually outdated, doesn't get any updates and has UPnP enabled (TLDR; ISP can remotely control the router). The least you could do is to throw out the ISP router and buy a device with at least 2 ethernet ports and install opnsense or pfsense on it.
It is the opposite. The article states that using network cables is more safe than WiFi.
Great summary, thanks!
Thanks! Some great new tips here. First time I read about generating background noise.

You also mention avoiding cameras in public. Any tips on how to deal with high amount of cameras in dense urban areas? Are there ways to make it harder to localize your signal or blend more in the crowd? Perhaps certain types of cameras are to be avoided more than others?
Dealing with high amount of cameras is difficult so you might consider the tip of staying out of the public eye based on your threat model. Other than that you might consider to get more distance with a Yagi antenna to avoid or reduce video surveillance risks. Considering signal catching you should generally keep darknet sessions as short as possible.
Thanks, man. Using a Yagi antenna to boost a mobile signal seems like quite a setup. I guess I was hoping for something diy like a using pringles can :)

But I get what you're saying. In these cases it's best to go as remote as possible and using a proper directional antenna connect to only to few distant towers.
/u/Northern_Lights
1 points
7 months ago
what does generating background noise actually mean; is it as in playing background noises in real life, so if someone gets access to your microphone then he gets false info
In the context of the article it means to create network traffic by data transmission.
/u/[deleted]
1 points
7 months ago
Great post! I bet there will still be questions about this afterward.
Hi there, thank you for the elaboration. Short answer to the topic:

Advantages for connecting from Home contain:

You avoid video surveillance.

No issue, you connect from your safehouse (whatever that means in your OpSec consideration).
You stay out from the public eye as people have memories, biases and remember things.

No issue, you connect from your safehouse (whatever that means in your OpSec consideration) remotely.
You avoid using network and hardware owned and controlled by others, i.e. avoid retention logs, monitoring etc.

No issue there. You always run your signal around the world with Tor using 99.999999% of the infrastructure that is not under your control.
You have the safety of your own residence

Yes, with the proper antenna setup yo do.

The above completely neglects the from-home connection and properly promotes the remote connection to the crowded, remote, public hotspot. Use any crowded remote hotspot, with proper Tor setup and hotspot rotation.
/u/EmilioGaviria66
1 points
5 months ago
Why don't you just use mobile phone hotspot to share to your computer and use vpn in phone?
This is described under "Tor through public WiFi". UMTS/LTE: Alternatively to public WiFi you could use burner phones with UMTS/LTE that you dispose periodically. In this case it is recommended to connect laptop to phone with USB-tethering instead of WiFi.

Regarding VPN I refer this post: /post/970a0dc97b513669b407
/u/EmilioGaviria66
1 points
5 months ago
Wich is better burner phone with sim or wifi router?
/u/temp0101
1 points
5 months ago
Hypothetically,

If I was using a device that had bad OPSEC (read no tails etc), and I wanted to fix this moving forward, would I need a new device? I understand that the current device would have traces from apps I have already run related to darkweb activities. But if I run everything from tails moving forward then there should be nothing ongoing?

How do IP leaks happen /TOR connections get compromised?

Thanks
As your first question does not relate directly to this post I suggest to create a new post.

Some references to your second question:
http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Speculative_Tor_Attacks
http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Advanced_Deanonymization_Attacks
/u/7Eyes
1 points
5 months ago
If you do not live in country with tor banned do not worry as much. If you live in country withou tor protocol banned or a country with strict monitoring you have to use a vpn. I use a vpn beceause I live in Peoples Republic of China. I you do you need to use application on computer or from firewall you control to server you control use IPSEC or wireguard. Tor protocol use show 9001, 9030, 9040, 9050, 9051, 9150 and 443. 443 stil can show as tor protocol even on basic firewall or router, web tunnel not always work. Web tunnel has failed to connect me out of the country.
Thank you for your contribution.
/u/7Eyes
1 points
5 months ago
CCTV is very powerful where I live. I more afraid of outside than in my apartment.
/u/r00tz1ll4 🍼
1 points
4 days ago
excellent post!!!