News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

OpSec Guidepost : OpSec | Torhoo darknet markets

This post provides an overview and structure of relevant OpSec topics and behaviors in brief. This is not intended as a deep dive but as first step to get to know what is important and what might be important to be considered. See this as a guidepost.

Keep in mind that OpSec is rarely convenient and means continuous learning. OpSec measures depend on your threat model.

Stay updated with news and media.
Last updated: December 2024

Hardware Security
/u/BlackCell P
2 points
7 months ago
Simple but effective.
/u/col_aureliano_buendia
1 points
7 months ago
Would a sealed faraday cage type bag work for preventing gettting spied through the phoen????
Not exactly. If the phone would be infected with something it might still be able to record sound through the bag and send it later.
I guess a soundproof layer would help though, can't think of much what the phone could do then.
/u/col_aureliano_buendia
1 points
7 months ago
True...
Very nice overview. P

Perhaps you could emphasize the split between personal and business devices in Mobile Security. For example prevent using these in same network cell or LAN.
Thanks for the contribution. I hope the first point in Hardware Security covers your point.
/u/moonjogger
1 points
7 months ago
Love this, great work, keep it up, earned yourself some good karma keeping people safe with this
/u/Wh0 P
1 points
7 months ago
Very good guide despite its size.
/u/[deleted]
1 points
7 months ago
[removed]
Generally speaking it is not bad OpSec, but please do not consider this as final answer as the choice of your setup depends on your threat model and assessment. I posted a summary about that topic which you might consider: /post/1e03cc92f64e42c498fc
/u/Fyodor-MD
1 points
7 months ago
thank you for making this post and reminding me that ive done everything in my power to make it easier for the feds
/u/Salvador012
1 points
7 months ago
Can you suggest the best best combos for smartphone communication.
Second phone with burner sim is 1. after that?
GrapheneOS as operating system is often recommended. But keep in mind that you shouldn't use a phone if not necessary.
/post/d6b7b84dd5994a9ae808/#c-2e4715964be3e285f3
/post/c74c45f33dd7b289f475/#c-010d97332d1ad88522
/u/iykuk1
1 points
7 months ago
good one
/u/TmpNickname
1 points
6 months ago
"i.e. use separate devices and networks" for saying that i dont have 2 internet at my home. should i hack wifi near me or should i use just public wifi or just reset my modem and good to go.
This suggestion might not be always practical. I am going to adjust it in the next update.

As a general advise you should not hack or use a WiFi network near to you. Often a publication is referenced that states most of the time malicious usage of neighbor's WiFi get de-anonymized within a short time frame. For more information on public WiFi vs. Tor from home look here: post/f12b38fc9337bce6ae34