News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Read this if you're in an emergency and need to burn it all down to avoid prison. : OpSec | Torhoo darknet markets

I want to begin this post by saying that everyone does their setup in a different way, so your mileage may vary (YMMV) throughout this entire post. However, this will provide general advice to both protect yourself from threats before they happen, as well as some fast tricks.

Lesson 1 - Buying Yourself Enough Time
  • You need, and I must say this, really need cameras in your house, apartment or area of work. If you're not mobile and working from cafe shops or you're on the run, you need vision on what's going on.
  • Rotate the times you work on. Don't log in same day for example at 9 PM and start working exactly 8 hours. The cops will know when to raid you so that you're asleep.
  • Make sure there is no plain text data. Encrypted everything. Strong password, in your head only. Don't give shit and don't say shit. Get a lawyer to figure out how to justify the encrypted data.

Lesson 2 - Minimizing Liabilities
  • Scenario 1 - You are using Tails, and the cops are on their way on your staircase or in your yard. What do you do? Pull out the drive immediately, microwave it or burn it down. Flushing might work, but they might be smart enough to check your sewer - especially if you buy drugs.
  • Scenario 2 - You've got incriminating evidence everywhere. Drugs, guns, etc. Your main issue now? Destroy your data. SSD's should be in use ONLY, no HDD's. Make sure they are accessible easily. Microwave or burn. SIM cards? Microwave or burn. RAM? Microwave or burn. That covers the most essential things. Store all backups off-site where they can't get to.
  • Scenario 3 - You're clean of any drugs or guns, but panicked and have no time to burn anything, and everything is encrypted. Chill, you're gonna be okay with a good lawyer as long as you don't give up the keys.

Lesson 3 - Plausible Deniability
  • Did you know that you can use your job as an excuse? Freelancers included, ones with NDA agreements.
  • Become a freelancer on any site that works, employ yourself as a programmer, pentester, specialist, anything.
  • Save the NDA agreement on an unencrypted drive, or on your phone, as proof.
  • You've now got a massive bonus in court. The more legitimate the clients, the better. The more, the merrier. If you have actual clients and you actually work like that, you're golden.
  • This, with a good lawyer, gives you a fat fucking excuse for not decrypting your drives for the authorities.

Lesson 4 - Don't Use a Fucking Phone
  • Do I really need to say anything here? They're a nightmare for your security and a treasure trove for police.
  • If you can configure a secure phone on your own, you know how to dispose of it for sure.
  • If you don't, then you should not be using a phone for your operations.

This is not a fully complete post of course. But I will keep it updated and I will incorporate any suggestions you may have, as this post might very well become a sticky here, thanks to https://torhoo.cc/go.php?u=TDNVdlkyaGhkRzV2YVhJPQ==# and https://torhoo.cc/go.php?u=TDNVdlFtVmxiSHBsWW5WaQ==# for having the idea.
/u/Kwik-go
5 points
1 month ago
Don't go cheap on the security cameras, and set them motherfuckers to ALERT YOU TO MOTION. Those precious seconds matter. Not a rule but 4am ish is when the fuck boys like to use their master key on the front door...ACAB...
This is the way. Motion activated, not cheap Chinese crap. Saves your ass!
/u/Suffering01
3 points
1 month ago
> SSD's should be in use ONLY, no HDD's.
I will mention that HDDs are better if you are using deniable encryption like VeraCrypt with hidden volumes as the volumes cannot be discovered with forensics, unlike SSDs.
/u/pgpfreak P
1 points
1 month ago
Truth. Not told enough. Works only with HDD and on some specific partition schemes. FAT32 and a couple other. Pretty sure EXT3/4 are not included.
Indeed but they can still detect hidden volumes. A highly skilled forensic team can. If you're talking local or national police, maybe not. But a joint EUROPOL, INTERPOL and FBI task force? Better believe there is no deniability. Burn that shit down. And I don't mean any SSD. I mean M.2 format.
Chances are if pigs are ready to break your door down, they already have enough to prosecute you.

Encrypted devices might help but it depends of the content you hiding and the country you live in. In most countries (including mine) if you refuse to provide decrypting keys you get sentenced just as they've found what they are looking for and accusing you of. The judge finds you automatically guilty even without decrypting the hard drive. That is why indeed you need Plausible Deniability. Veracrypt with the hidden volume might work as you provide decrypt keys for the outer volume not the actual hidden one. Unfortunately if three letter agency is after you and not some dumb local agency, after inspection they might be able to determine that the hidden volume do exist.

"Lesson 3" have some creative points, but it's kind of hard to make it look legit or at least it might take a lot of time and efforts until you reach a point that could be used in court.

What I would suggest is, simply never store any device that can incriminate you (encrypted or not) at your own home. Renting server and securing it as good as you can could work(including securing your logins, encrypting the whole server and then the files that are important etc) .Even better install your own metal box somewhere that you can access when needed, then install your cameras there to monitor if someone is snooping around your box.
/u/Varixmar
2 points
1 month ago*
Just wanted to add that renting a server and securing it and encrypting it doesn't fully protect you if its hosted in a country that they can have backdoors in the servers and see all info regardless similar to a rootkit. Metalbox option would be your best option for the most paranoid then you if you are a high priority target you have to worry about 24/7 surveillance and the fact that you would need to know how escape tails (the phrase not the OS) and never have a phone or maybe they have GPS trackers on your vehicle if you use one, what about public transit and public cameras? If they really want you they will get you so its best to not make a single mistake which as humans is impossible which is why you ideally want to make a goal for money and get out before its too late.
/u/yelloweyes
1 points
1 month ago
Then why do they try to bust every DNM vendor with their laptop open? e.g. Ross Ulbricht?
Because they don't care about the sentence anymore at that level. It's about arresting everyone. You get that if you have all the operator's data. No more leverage for him to make a deal. What if it's encrypted and he refuses to snitch on the vendors and clients? What then?
Getting decrypted laptop will just make their work easier and the sentence bigger and certain + they can find some money/crypto and perhaps evidences against other people.
/u/churk
1 points
1 month ago
It depends from country to country

from police force to police force
In Australia and UK, indeed. You're very right. About lesson 3 - fully agreed. I'd argue destruction of all encrypted data is highly important in a country such as yours. Burn everything down. Another idea would be using a Tails USB, amnesic fully, and remote logging into an RDP. Just remember the domain name you paid for, and the password. This gives a lot of amnesiac power.
/u/zuberdriver Atlas
1 points
1 month ago
Agree. The bar for evidence to get a search warrant is pretty much at a high enough level to get you baked and the raid is just to get the topping. I'm sure in some cases they can get warrants for a fishing expedition but only if you're high value and been under observation for months if not years.

Offsite yes. But beware if you're a kingpin they will have internet and phone logs.
/u/GoVee
3 points
1 month ago
Lesson1 - always have you portable microwave at hand.
I have a microwave on my desk. Makes my frozen lasagna, and helps me stay safe from the pigs.
/u/creamsickevin82
1 points
4 hours ago
doesnt a melted computer in the microwave scream i have shit to hide?
/u/francoforte 🍼
1 points
1 week ago
I use mine as an anti drone cannon
/u/wreslur
2 points
1 month ago*
Lesson 3 - Plausible Deniability

I can not stress this enough, your arresting officers and the detectives will act like they have you from the second they have you in handcuffs when they still need to build a case. They NEED an omission of guilt, if you poke holes in their questions and act dumb you will visibly see the frustration set in as they lose confidence. I am telling you from personal experience.

Everything I do I make sure I have a reasonable explanation for in case I wind up having to explain those actions to a jury. The day came where I was charged with a class D Felony, I was released from Jail on Pars because I had a job and no priors, I didn't need a lawyer just explained the situation to the public defender. I didn't even have a real court case we just pushed the pretrial back month after month and poked holes in the evidence until the judge looked at my case, looked at me, rolled his eyes and dismissed it.

At the end of last year the police even falsified a piece of evidence so they could open a new case, arrested me again, got the same judge in jail, released me again on Pars.

Stick to your story, act dumb, and if they ask you anything that you don't know how to answer "I don't know what you're talking about."
This is great advice. Act stupid, have your story straight, stick to it. The cops are not good guys either, they will do their best to fuck you up.
The plan is to put it in our Wiki.
I can't really see the post but I was tagged somehow. I say let the post be pinned for a while and when people stop contributing and it reaches peak, move to wiki?

So that everyone can contribute to the post. And then all the data can be moved.
I replied, but I didn't approve it. I've fixed that now. Sorry. I've stickied it so everyone can comment and suggest improvements.
Great, I hope people will contribute to it. I have a few ideas myself I'll comment soon.
/u/subwaysubs
1 points
1 month ago
Nice information, concise and to the point.

Awesome contribution that will surely help people in the future.
/u/Hex1984
1 points
1 month ago
One can, for lack of a better term, have a mobile security environment and internet access all in one. Carry a portalble router or, better yet, use a small dev board like the Pi. OpenWRT for the OS and you can set the router to point traffic to any number of different ways e.g. VPN, Tor, proxies and SSH tunnels if you wish. I do not know how secure a Raspberry Pi is as far as it's normal O.S. but there are a variety of chioces there.

Then, the idea of cameras from your post. For the cheap down and dirty you can use an ESP32 for a super cheap, super light and disposable if needed. Just drop one around each corners and in the potted plant down the hall so you can see whos coming in.

So A Raspberry Pi running OpenWRT, a few ESP32 units, handfull of small batteries and some kind of video software for the cameras.

Since you have the router you can set up your local network including the cameras and you can log into whatever wifi from the OpenWRT web interface.

It's not fancy but I think a good project to look into. ( Like I need any more tech in my bag. )
I would not want something so cheap as an ESP32. And a Raspberry Pi is not powerful enough to hold all your wishes.
/u/Hex1984
1 points
1 month ago
Pehaps. I guess it depends what it is one wants or needs? Is there a better option, yep. of course. But I was not talking about that. I was thinking more from the standpoint of Doing More With Less.

As far as cheap, I guess its a matter of point of view. When I build things like these, their low cost has little to do with cheap. WIth the advent of the 3D printer it becomes easier to move a project from the loose wire and tape stage to a more finished looking project.
Again, is there better, faster etc? of course there is.
/u/AlexeiKuraken
1 points
1 month ago
Well done.
/u/miner21 P
1 points
1 month ago
That was a good write up man. I'm sure more could be added
Thank you! Open to any suggestions.
/u/pgpfreak P
1 points
1 month ago
Great write up. Using a NDA agreement to justify encrypted devices is a smart idea.
As long as you try hard to make it legit, there are many many ideas in that area that can be explored.
You types always leave out possibility of Jury Nullification if ONLY FOR PERSONAL USE. I'd say at least half the shoppers are only users and you only need 1/12 jurors to have the courage to say it's an unjust law, not that you broke the law but that it's not a just law. Example is they think you should be able to buy and use drugs safely at home especially when the government allows sales of deadly tobacco and alcohol. Fuk them.
How about we avoid risking it as far as going to court and prevent even being charged with anything?
I get it, some of these countries will literally bury you.
Thankfully I do live in the USA where we have rights and laws, know your rights and bend the laws, especially when a jury is involved.
I never spoke of being ignorant, just mentioning something powerful that you didn't.
I appreciate what you mentioned. If it ever gets to that, your Hail Mary card would be jury nullification.
/u/GhostShelf P
1 points
1 month ago
Yeah, also, don’t use fingerprint, pattern, PIN, or facial recognition on your smartphone.
Indeed. I assume in this guide you either have no mobile device with incriminating data - or if you do, you already know all the best practices.
/u/[deleted]
1 points
1 month ago
all good if youre inthe US. In other countries you need to decrypt when asked under Key Disclousure laws

  • Use an amnesic system with KVM. Debian host would be good, with kicksecure live-grub
  • Hide kvm Whonix instances in Veracrypt hidden.
  • Have some plausible emabarrasing files in the outer layer
  • Lawyer as always in anycountry
That's lovely. But VC is not as good anymore. It really matters on your threat model here. What kind of charges you're dealing with. And not all countries have Key Disclosure laws. There are no keys to disclose if you burned your drive and RAM.
/u/[deleted]
1 points
1 month ago
why is vc not good anymore?
It can be detected by higher level federal agencies. Your deniability means shit at that level. Erase all data by burning.
/u/yelloweyes
1 points
1 month ago
So just put my laptop in the microwave in a tub of HCl acid?
Haha! Just the flash components are good. SSD, RAM, SIM's. Keep laptop with no screws in the case and broken caps so it falls out when you pick it up. So that way you can easily extract RAM and SSD and burn!
/u/Amethyst_
1 points
1 month ago
This is nice. I always suggest that people hack into a bunch of different WIFi using a long range antenna. That gives you a huge advantage, because they might be able to triangulate you if you hack several, but pinpointing you will be nightmare.
This is a great idea to preventing getting fucked in case your Tor or VPN connections get fucked too.
/u/DisenfranchisedCitizen
1 points
1 month ago
> RAM? Microwave or burn.

This one has me curious. Ram isn't persistent storage unless using a RAM drive, even then just cut the power to it, if there's any backup batteries remove it and all the data will be gone. Why would you need to destroy your ram? It's wiped to a clean state the moment it loses power, unless I'm missing something.
/u/upton9081
1 points
3 weeks ago
There's small window of time (~5 minutes), after powering off, where the contents of RAM can be recovered. The contents sometimes contains decryption passphrases. RAM always contains unencrypted data.
Precisely, well pointed.
/u/innocentmethod 🍼
1 points
3 weeks ago
I would be willing to burn down my entire house just not to pay a lifetime prison... So I encourage you to have always something that can burn your entire room in case anything happens.. Gasoline, kerosene, lighters, matches and something to make an excuse "it burned by accident"
Burn everything, stay safe. Fuck the money, fuck the identities, avoid prison.
/u/[deleted]
1 points
1 month ago*
.for lesson2
.once the cops search your home and find that you were using tails, you are effectively done for. an ordinary guy using tails may at most get him to a watchlist but not behind the bars. but, a very big BUTT your local law enforcement, fbi, swat whatever don't just randomly appear at your home out of thin air. there must exist a p-r-o-p-e-r evidence to lead them there and an associated search warrant in relation to the investigation.

.if you have drugs, guns etc. everywhere by the time le is at your door you are already fucked. you may as well start praying for a miracle.

.if you have encrypted data, you either give the keys or give your freedom when the le demands you to provide them the keys. not complying with le is a crime, as simple as that. no, a lawyer won't save you.

.for lesson3
.oh you think ndas will save you? that nda is just a piece of paper if the law is against you. because an nda is only an nda if it is bound by law and enforced by law enforcement. if there is no law enforcement and law on your side, you are cooked.

.not only that, but an nda does not mean you cannot testify. authorities may seek organizations or individuals who signed ndas with you for a compromise in helping them for an investigation case. ndas that prohibit testifying before court when demanded do not exist. yeah, they just dont.

.what if you are interrogated by a rogue actors, with no respect to laws? how long will you be able to resist to constant torture, agonizing pain? or to psychological torture? to the point you will do anything to disclose your keys? what if they threaten your family? your loved ones? you think an nda will work in that case? this is beyond stupid.

.what if they drug you? or place you in a room with no outside contact for days, weeks or even months and interrogate you throughout the process so you will lose your sanity and spit whatever is on your mind without any control whatsoever at the end?

.by the way throwing an ssd into a microwave to fry ssd will have you fried in the court for tampering with evidence, just saying. forensics may not be able to extract any meaningful data from the fried ssd flash cells but you will very likely be asked why did you throw an ssd into a microwave just before your home was stormed.

.you are far better of not using tor for the unintended and unethical purpose of carding,drugs and guns type of activities but using it for avoiding mass surveillance .

.don't believe the shit he wrote. it is utterly false.

I bet you even use bitcoin for darknet transactions. With such operational security practices, it will honestly not be surprising.

AUTHORITIES ARE NOT (THAT) STUPID. USE TOR RESPONSIBLY SO YOU CAN HAVE A GOOD ANONYMITY AND EVADE THREE LETTER GUYS. NOT FOR COMMITING CRIMES TO MAKE A QUICK BUCK
/u/Ghwbushsr
1 points
3 weeks ago
.if you have encrypted data, you either give the keys or give your freedom when the le demands you to provide them the keys. not complying with le is a crime, as simple as that. no, a lawyer won't save you.


This sounds like some bullshit "obstruction" charge a cop would add on because he's mad you're not helping him with his investigation

What if you actually can't remember your password. do you have any idea how much data I've actually lost because I really couldn't fucking remember??