News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Rate my schizo setup : OpSec | Torhoo darknet markets

I'm planning on using a laptop with whonix connected to a hotspot from a pixel with grapheneOS and an e-sim bought anonymously.
I will only be using the devices in random spots in the forest to make cell tower triangulation useless.

Are there any holes in my setup that could reveal my identity?
Turn off the WiFi and use USB tethering instead. The rationale to use USB tethering is to radiate less. In this type of anonymous setup you usually don't need a VPN. However, in case you need a VPN, be aware that any VPN in the GrapheneOS are not in use. In such case, configure the VPN in our laptops host o/s.

Use either Qubes or KickSecure as the host o/s. You can potentially also use Debian, ParrotOS or Gentoo but this will require additional hardening.

Consider if you should complement with a Pixel signal booster antenna to get longer range.

Don't connect from the same spot for months, this is in case LE get some type of traces. When connecting, make sure you blend in, not many visitors in the forest and people might remember. Best is to use a bicycle or something without plate number.

Otherwise, do not bring any personal devices with you. Anything that radiates might leave traces on the way in and out. So, no additional phone, Bluetooth headset, airpods, smart watches, etc.
/u/sendthehailmary
2 points
6 days ago
To add to this, you should think about what your threat model is. Who is going to investigate if your crime is reported? FBI? A city police department? Figure this out and you'll be more effective becuase you won't waste time on higher levels of security than what's needed for the op. What OP posted sounds good for investigation by the FBI or europol.

Don't forget to consider cartels and organized crime as potential adversaries too. Create a mental model of what threats you'll face. If you've been in this game for a short time and don't have the experience, don't try too hard to threat model, just follow OPSEC tutorials.
/u/meatt 🍼
1 points
6 days ago
Depends on what you are doing
/u/theeditor_4096
1 points
6 days ago
wildly unnecessary and overly complex. keep it simple. use tor, use monero, use FDE, encrypt all comms, dont reuse passwords, dont enable js.
Your not an iranian nuclear scientist, your some random person probably buying small quantities of drugs online.

Threat modeling 101: your level of paranoia should match the level of how much someone would pay to bust you. you're not snowden, you're not a russian political dissident campaigning against putin. the more complexity you add, the more chances for mistakes you create. KISS. good luck
/u/anima_inanis
1 points
6 days ago
wont the fact that you are in the midle of nowhere put you at risk of being more essily tracked down?
The Pixel cannot change the IMEI, the eSIM has its own identifier. Switchine On and OFF the phone in the forest is suspicious. It gets flagged for further investigation.