News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

OPSEC for hacking : hacking | Torhoo darknet markets

I have been trying to figure out a way i could efficently work from my pc on home wifi instead of using my laptop and public wifi/ portable sim router ( my pc is connected with ethernet cable saying wifi is just easier).

I have had a few ideas but due to lack of knowledge i have gotten to a point and didnt know if i had everything secured to a good point and decided not to do anything apart from passive reconisance.

My initaial idea was to use a rasppbery pi or a shit computer bought with cash to use as a vpn/proxy. This idea ended very quickly due to not having anywhere I can have it plugged in at all times.

Then I planned on using a bulletproof vpn i purchased with xmr however i had so many diffrent leaks that i pretty quickly didnt see this as a good option.

Now i am using a laptop on public network (mic, camera, speaker and sim slot all removed) the battery only stays plugged in while in use all other times its out( as i dont see what vulnarability the laptop could be if it has no powersource apart from the seamoss battery).

I am still trying to figure out a way I could work from my computer however i have run out of ideas.

All suggestions/ideas are appriciated.
/u/DataIsLaw
2 points
2 weeks ago
Get a laptop. install qubeOS, install a qube with parrot, kali or install the tools you need in one of the default qubes. get a usb dongle from ebay with a ebay prepay card. buy a prepay SIM for the internet. only use the usb dongle when you need it and if you travel do not use the dongle since it will be close to your phone in a different location. use a VPN that does padding to the packets so your traffic dont get fingerprint, enable multi hop and lockdown. block all social media. never connect this computer to other network, remove mic, camera, bluetooth and wifi card from the laptop and never. if you have to chat with someone only use the words you need to express the idea and try not to write in the same way you do normaly. if you really want to go paranoid mode there is a lot of things you can do.
/u/noonetoknow 📢 🍼
1 points
1 week ago
Thank you for the suggestion, I will use what you said and have all my traffic routed through tor to ssh into a vps purchased with xmr
/u/DataIsLaw
1 points
1 week ago
you just need to read all OPSEC guide you find, then you write a protocol of the steps you need to follow to be secure and MAKE SURE you follow every step all the time. DO NOT GET LAZY no even once. if you do this you will be fine. also make sure you always keep reading so you can improve and make updates to your protocol
/u/tuxedodonkey
1 points
2 weeks ago
home wifi

ayo dont do it bro dont chose convenience over opsec
/u/meatt 🍼
1 points
2 weeks ago
[removed]
/u/AutoModerator M
1 points
2 weeks ago
Why?

This comment was posted automatically by a bot. All AutoModerator settings are configured by individual communities. Contact this community's Moderators to have your post approved if you believe this was in error.
/u/Dreadnautilus 🍼
1 points
2 weeks ago*
Some people swear by stealing neighbors wifi. You can do this. But be very careful doing so. Most people wouldn't notice, but if they do, you could be screwed.

If you live where you have a long sightline, I've also heard of some people using a large wifi antenna to use someone's wifi from a fair bit away, and keep an eye out on that house. If they get raided, you have a bit of time to clean house and GTFO.

Other than that, you have traceable cellular networks I suppose. But I definitely wouldn't recommend that.

Overall, I wouldn't recommend compromising your opsec for the convenience unless you NEED to do whatever it is you're doing, at home.
/u/shadex969 🍼
1 points
1 week ago
i see that you want to work from the computer which is on your house and to be protected from any leak or dangerous threat I'll give you some methods do it then thank me later, first of all don't use VPN at all they store your data then they sell it by themselves they don't protect you like you think especially when you do a terrible thing, use PROXY-CHAINS but make sure that you sat everything correctly there is another guy who was asking about how to work with NMAP with avoiding IP leaks and i gave him the same advice second thing you can set an evil twin attack for your neighbors and I'm sure that you know the weakness on the humans not on the systems so choose one of those sad grandparents which lives alone and got their WiFi password easily and set the proxy-chains and here we are you are protected but not 100% because there is nothing secured or doesn't has vulnerabilities those my words for you. take care
/u/noonetoknow 📢 🍼
1 points
1 week ago
Thank you for the suggestion
/u/hacker P
1 points
1 week ago
Using your PC securely from home while avoiding public networks is smart. Since a always-on device like a Raspberry Pi isn’t feasible, consider setting up a secure, encrypted remote desktop (like WireGuard VPN plus SSH or RDP with strong auth) on your home PC to access it from anywhere. To minimize leaks, use a firewall, disable unnecessary services, and regularly audit your network traffic for DNS or IP leaks. If you want extra anonymity, combine this with a trusted VPN on your client device. Also, keep your OS and software updated, and consider using privacy-focused OS or virtual machines for sensitive work.
/u/noonetoknow 📢 🍼
1 points
1 week ago
Not sure if you ment to setup a rdp on a diffrent pc but using my main pc as a proxy is not of the wises ideas.
/u/hacker P
1 points
1 week ago
Using your main PC as a proxy or remote access point isn’t wise because it increases your risk and attack surface. It’s safer to use a separate, dedicated device or a hardened VM for remote access or VPN duties. This keeps your primary system isolated and better protected from potential compromises.