News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Tails OS. The easy & recommended OpSec guide for buyers who still use Tor on Windows. : OpSec | Torhoo darknet markets

Public Safety Notice and Guide to Using Tails for DarkNet Market (DNM) Buyers
/u/HeadJanitor ۩ 𝓜𝓘𝓐 ۩
4 points
6 months ago
Dear KetamineSpray,

I apologize for just now getting to your comment and request. I have been away from Dread and returned just days ago.

Thank you for that great post.

If you can please post it as well at /d/Tails and /d/Guides

I will make three posts in the next few days.

Two will be disturbing but need to get out there.
___________________________________________________________

As far as hard OpSec:

One thing about "Tails OS. The easy & recommended OpSec guide for buyers who still use Tor on Windows." is that, of course, Tails doesn't even require one to have an hard drive so Windows or not, it doesn't matter. Hard drive or not, no problem.

I would encourage you to edit the post to mention the use of USB 3.0 or greater.

Since you mentioned "KeepassXC" it would be better for OpSec to keep Dread's URL in there as well as other bookmarks as have always been a security hole issue. Recently, particularly with Windows and requires:

(I would advise you to state to make frequent backups for the KeePassXC file as they do get corrupted.)

___________________________________________________________

"Recently discovered in TOR Windows Desktop, if you go to upper right “hamburger” apps menu, then select Bookmarks, it displays at least the last 10 Recent Bookmarks visited. This is a pretty significant security issue. I have read through discussions here and general on-line searches. I find no simple way to shut this off. Have written a userChrome.css that works fine in Firefox, have tried about:config switches; nothing stops this in the TOR (windows) Desktop."

This is very serious for Windows users. BUT your audience is not using The Tor Browser Bundle for Windows.

Tor is different in Tails than it is in Whonix and it is different than the Tor Browser Bundle and it is different that Qubes-Whonix.

Thus, in Windows, months ago it was discovered that bookmarks leaks the ten most recent bookmarks.

https://github.com/arkenfox/user.js/blob/662eddbc2124d9d09774da7d5bc385f45c287c0d/user.js#L378-L388

Favicons are particularly dangers and require: browser.chrome.site_icons option.

toolkit.legacyUserProfileCustomizations.stylesheets = true

It is never wise to click on a bookmark. It is always best OpSec to paste the URL itself.

___________________________________________________________

I would remove that https://kevinsguides.com as it collects far too much information on you.

See if any one these can benefit you:

/d/GnuPG/wiki?id=a5f518cd

If not, I will find others.

___________________________________________________________

Now, for a MAJOR OpSec concern you have listed a lot of clearnet sites. That means your audience will consonantly be decrypted by the exit node.

In order to prevent that I made it simple for you.

Feather Wallet Onion
http://featherdvtpi7ckdbkb2yxjfwx3oyvr3xjz3oo4rszylfzjdg6pbm3id.onion/

Kycnot.me Onion
http://kycnotmezdiftahfmc34pqbpicxlnx3jbf5p7jypge7gdvduu7i6qjqd.onion/

anonymousplanet.org Onion
http://benzosbbvk7gu6taxbjpcpsi3u3dgg3wb3ewwr4jx7tholioxmnwagyd.onion/PDF/Hitchhikers/
___________________________________________________________

Now, I happen to be a major Darknet Host connoisseur and snob. OrangeFen was kicked out of the community until they squared away some issues and his is tied with Majestic Bank.
___________________________________________________________

The greatest non-KYC of the modern day is without a doubt:

Trocador.app/en

Trocador Onion Site
http://qkiw4pl4qlxui26nsbjnxei323x7ptqcf765a6koxlzcox35udmihsid.onion/en/

OrangeFen cannot compete.
___________________________________________________________

Do not even ever mention "darkwebinformer" as he is a phony, money-driven, con-artist. Who steals articles and puts up paywalls.
He is what you would call a scumbag. He is a F R A U D. Never visit is phony site.
___________________________________________________________

Tor gives away a distinct "odor" that wreaks "I am using Tor".

Personally, as a Linux user, I find Tor extremely restricted to use and Whonix to be such a breeze.

But Whonix doesn't give off an "odor" it screams "I am a virtual machine." But it is 100x better in so many ways.

___________________________________________________________

This is the biggest risk I found in the post:

"Click Privacy & Security, find security level and select safest."

You MUST go to about:config

type JavaScript.enabled and set it to false.
___________________________________________________________

Have NO fear in downloading Tails. You should remove that as it instills fear. It would violate the US Constitution. America is full of Linux enthusiants, developers, people who make YouTube videos.

People on Dread have a firm belief that Tor is illegal.

Yesterday it was discovered and published that tunnels aka VPNs led to 1/4 of all attacks to the individual.

Tool is a tool set - it is best not to mess with it. Some VPNs are terrible.

In this day and age I would recommend SnowFlake bridges and it makes you look like you are having a telemedicine, video-conferencing call.

When you write "You'll make your own PGP." You can edit to: "You'll make your own PGP Certificate or PGP Pair." One key is a PGP key. When combined they are now a Certificate or a Pair.
___________________________________________________________

Major: "Start up Feather, make a new wallet and store the password/seed in KeepassXC"
You IMMEDIATELY must save your keys and seeds in KeePassXC.
___________________________________________________________

"Tails doesn't make you invincible" - I do not think you wrote that but that sounds mythological, supernatural and God-like.

Tails is very inconvenient - it is an Amnesiac and designed for "NO EXCUSES".

It is very difficult to use for work and other things but for quick use, it's fine.
___________________________________________________________

What we need to do is break misconceptions:

TailsOS is not illegal.
Tor is not illegal.
VPNs are a trend and lead to disasters.
____________________________________________________________

***MAJOR***

The most striking statement: (I may be reading it out of context) "When making the PGP key, make sure the name is the same as your username on the market."

OMG is this a fatal move. Maybe because you did not mention what mean by "name".

You never want likability.
We never want likability.
I never want likability.

A market PGP key and PGP key on Dread profile would dox someone.

For every market a new key with a meaningless name.

This is THE CARDINAL RULE if there was one.

____________________________________________________________

***MAJOR***

You forgot to mention:
"Protect the generated key with a passphrase."

THIS IS A MUST
____________________________________________________________

***MAJOR***

Now, we forgot something major.

Backup your keys.
Then back your private key.
Then do it again.
Make two folders and archive them.
Then use 7zip and use AES-256 to place a secure password on them.
DO NOT STORE THEM ON THE SAME MACHINE.
____________________________________________________________

MAJOR

When you generate your keys, make sure you are completely disconnected from the Internet.

____________________________________________________________


MAJOR

The best and most proper way to make keys is V E R Y simple.
Do not use the GUI!

gpg --full-generate-key --expert
(9) ECC and ECC
(1) Curve 25519
0 = key does not expire
Key does not expire at all
Is this correct? (y/N) y
Real Name: -----
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O


***DONE*** Took 10 seconds

___________________________________________________

Everything I wrote about making PGP keys is in some way incorrect but it is good enough for buying drugs.

If we had to follow FIFS guidelines, we failed.

You would need to export 0AAB A2AB 04F1 766C your Public Key so that all people have is the ability to encrypt messges for you.

___________________________________________________

I hope this helped. I apologize about the delay.





/u/newbieforever2018 /u/Paris -- why did I just tag Paris? /u/mayehessman
Great comment as always!
Hiya /u/HeadJanitor

I'm glad to see your return. And I hope you're in good health.

I will carefully go over all your remarks and will implement changes accoringly. I will also most likely PM you ask you some questions to further improve this guide.

Thank you very kindly for your extensive critique. It's highly appreciated. I was smiling when I saw it, yet also made me more aware of my own ignorance. Thank you again.


Love,

KS


ps I have put a notice on top of the post to mention this guide is in active developement.
Hiya /u/HeadJanitor

(Response had to be split up 2 due to character limit. Part 1)

Let me preface my decisions for changes to this guide, guided by your advice, with the following thoughts.

This guide is meant for people who:

- Use Tor/Windows (without using any other safety measures).
- Save their passwords/PGP in a notepad on their Windows environment.
- Have little understanding of tech/OpSec and subsequent nomenclature.
- Don't know how to get/use XMR. Directly deposit their Fiat bought XMR from a CEX to a DNM market.
- Use unsafe passwords.
- Don't even know how to use PGP and send their private data without encryption to a vendor.

I want to find a balance between a bad OpSec based on ignorance & false hope, and allowing people be educated to increase their OpSec in a reasonably simple & safe matter, without having an information overload.
I find that a hard balance to maintain, and I appreciate your recommendations.

The darkweb and it's markets, must become/remain somewhat reasonable to reach. And an all encompassing guide to what /d/OpSec should consider 'the basics' needs to exist. Right now, this information is fragmented to many posts, platforms and people, so it's too diffuclt to find. We can't reasonably expect most inexperienced people to educate themselves based on these patchworks of information - This will not lead to a lively community, rather.

I've made changed with your suggestions, yet have to question others on their feasability to be implemented. Oke, here we go.

___________________________________________________________

As far as hard OpSec:

One thing about "Tails OS. The easy & recommended OpSec guide for buyers who still use Tor on Windows." is that, of course, Tails doesn't even require one to have an hard drive so Windows or not, it doesn't matter. Hard drive or not, no problem.

I would encourage you to edit the post to mention the use of USB 3.0 or greater.

Since you mentioned "KeepassXC" it would be better for OpSec to keep Dread's URL in there as well as other bookmarks as have always been a security hole issue. Recently, particularly with Windows and requires:

(I would advise you to state to make frequent backups for the KeePassXC file as they do get corrupted.)


Response:
- Made changes to refer to USB 3.0 or greater.
- Advised to make Backups of KeePassXC files after every new addition to KeePassXC.

___________________________________________________________

"Recently discovered in TOR Windows Desktop, if you go to upper right “hamburger” apps menu, then select Bookmarks, it displays at least the last 10 Recent Bookmarks visited. This is a pretty significant security issue. I have read through discussions here and general on-line searches. I find no simple way to shut this off. Have written a userChrome.css that works fine in Firefox, have tried about:config switches; nothing stops this in the TOR (windows) Desktop."

This is very serious for Windows users. BUT your audience is not using The Tor Browser Bundle for Windows.

Tor is different in Tails than it is in Whonix and it is different than the Tor Browser Bundle and it is different that Qubes-Whonix.

Thus, in Windows, months ago it was discovered that bookmarks leaks the ten most recent bookmarks.

https://github.com/arkenfox/user.js/blob/662eddbc2124d9d09774da7d5bc385f45c287c0d/user.js#L378-L388

Favicons are particularly dangers and require: browser.chrome.site_icons option.

toolkit.legacyUserProfileCustomizations.stylesheets = true

It is never wise to click on a bookmark. It is always best OpSec to paste the URL itself.


Response:
- Another good reason to use TailsOS rather than Windows.
- I have found no known vulnerabilities regarding bookmarks and Tor in Tails. For this guide I won't make the recommendation to save the exclusively in KeePassXC.

___________________________________________________________

I would remove that https://kevinsguides.com as it collects far too much information on you.

See if any one these can benefit you:

/d/GnuPG/wiki?id=a5f518cd

If not, I will find others.


Response:
- Changed https://kevinsguides.com to biblemeowimkh3utujmhm6oh2oeb3ubjw2lpgeq3lahrfr2l6ev6zgyd.onion/content/bible/pgp/index.html
- The /d/GnuPG/wiki?id=a5f518cd were too dense with information for most people

___________________________________________________________

Now, for a MAJOR OpSec concern you have listed a lot of clearnet sites. That means your audience will consonantly be decrypted by the exit node.

In order to prevent that I made it simple for you.

Feather Wallet Onion
http://featherdvtpi7ckdbkb2yxjfwx3oyvr3xjz3oo4rszylfzjdg6pbm3id.onion/

Kycnot.me Onion
http://kycnotmezdiftahfmc34pqbpicxlnx3jbf5p7jypge7gdvduu7i6qjqd.onion/

anonymousplanet.org Onion
http://benzosbbvk7gu6taxbjpcpsi3u3dgg3wb3ewwr4jx7tholioxmnwagyd.onion/PDF/Hitchhikers/


Response:
Changed all to clearnet links to .onion links. Except anonymousplanet, because there's zero .onion links found working.

___________________________________________________________

Now, I happen to be a major Darknet Host connoisseur and snob. OrangeFen was kicked out of the community until they squared away some issues and his is tied with Majestic Bank.


Response:
Removed OrangeFren as a suggested crypto-crypto exchanger

___________________________________________________________

The greatest non-KYC of the modern day is without a doubt:

Trocador.app/en

Trocador Onion Site
http://qkiw4pl4qlxui26nsbjnxei323x7ptqcf765a6koxlzcox35udmihsid.onion/en/

OrangeFen cannot compete.


Response:
Added trocador and OpenMonero

___________________________________________________________

Do not even ever mention "darkwebinformer" as he is a phony, money-driven, con-artist. Who steals articles and puts up paywalls.
He is what you would call a scumbag. He is a F R A U D. Never visit is phony site.

Response:
- There's no mention of it now.
PART 2:



___________________________________________________________

Tor gives away a distinct "odor" that wreaks "I am using Tor".

Personally, as a Linux user, I find Tor extremely restricted to use and Whonix to be such a breeze.

But Whonix doesn't give off an "odor" it screams "I am a virtual machine." But it is 100x better in so many ways.


Response:
- I would recommend Qubes/Whonix route if TailsOS wasn't so fool-proof to use. For beginners of both Linux/Tor, I would recommend TailsOS as the perfect solution.
People are hard to change, and prefer to take the route of least resistance. So we must educate people to allow them the reasonable choice to desire change.

___________________________________________________________

This is the biggest risk I found in the post:

"Click Privacy & Security, find security level and select safest."

You MUST go to about:config

type JavaScript.enabled and set it to false.


Response:
- Added the step to change aboug:config to JavaScript.enabled to false on every start of Tor.

___________________________________________________________

Have NO fear in downloading Tails. You should remove that as it instills fear. It would violate the US Constitution. America is full of Linux enthusiants, developers, people who make YouTube videos.

People on Dread have a firm belief that Tor is illegal.

Yesterday it was discovered and published that tunnels aka VPNs led to 1/4 of all attacks to the individual.

Tool is a tool set - it is best not to mess with it. Some VPNs are terrible.

In this day and age I would recommend SnowFlake bridges and it makes you look like you are having a telemedicine, video-conferencing call.

When you write "You'll make your own PGP." You can edit to: "You'll make your own PGP Certificate or PGP Pair." One key is a PGP key. When combined they are now a Certificate or a Pair.


Response:
- Just because it's not illegal, doesn't mean it's not considered suspiscious by secret agencies of many nations. I have to stand by my suggestions, that in certain circumstances, u should download Tor in a public library or internet cafe. As more internet surveillance is becoming the norm, and everyone being profiled by increasingly techonlogically power hungry entities, I am concerned about network observers.
Privacy tools like Tails can be scrutinized in contexts where anonymity is seen as a threat to national security or law enforcement efforts. As according to leaked documents from 2014: ''The NSA has targeted Tails users, labeling it as "a comsec mechanism advocated by extremists on extremist forums"''. Law enforcement agencies do scrutinize people more who look into ''privacy online''. It should be considered to stop a profile being build about a person.
- I don't recommend a VPN, but certain cases might benefit from it. And not all VPN's are equal, it's a careful consideration.
- Changed "You'll make your own PGP." to You'll make your own PGP Pair."

___________________________________________________________

Major: "Start up Feather, make a new wallet and store the password/seed in KeepassXC"
You IMMEDIATELY must save your keys and seeds in KeePassXC.


Response:
- Changed the language to make sure it's understood as important.

___________________________________________________________

"Tails doesn't make you invincible" - I do not think you wrote that but that sounds mythological, supernatural and God-like.

Tails is very inconvenient - it is an Amnesiac and designed for "NO EXCUSES".

It is very difficult to use for work and other things but for quick use, it's fine.


Response:
- This guide is for casual DW user and/or DNM buyers. It's an easy introduction to both Linux (Debian) and a fool-proof OpSec method. For anything beyond the intented purpose groups, this guide is not recommended.
The convienience comes from having a DW 'work station' that u can just put in any old device and start up from the USB.

___________________________________________________________


***MAJOR***

The most striking statement: (I may be reading it out of context) "When making the PGP key, make sure the name is the same as your username on the market."

OMG is this a fatal move. Maybe because you did not mention what mean by "name".

You never want likability.
We never want likability.
I never want likability.

A market PGP key and PGP key on Dread profile would dox someone.

For every market a new key with a meaningless name.

This is THE CARDINAL RULE if there was one.


Response:
- Made language more specific. The public username on the market should be the same as the usename associated with Public PGP, as this would help a vendor.
- Now recommend to change PGP across platforms.

____________________________________________________________

***MAJOR***

You forgot to mention:
"Protect the generated key with a passphrase."

THIS IS A MUST


Response:
- Was mentioned: ''Then click ''add a new entry'' and let KeepassXC create a password for the upcoming PGP.'' But changed for better language.

____________________________________________________________

***MAJOR***

Now, we forgot something major.

Backup your keys.
Then back your private key.
Then do it again.
Make two folders and archive them.
Then use 7zip and use AES-256 to place a secure password on them.
DO NOT STORE THEM ON THE SAME MACHINE.


Response:
- I've decided not to include this. The encryption on TailsOS, LUKS2 with Argon2id, should be sufficient to not require a further encrypted folder with private PGP keys. The private PPG exctraction is already password protected by Kleopatra, and the password is within KeePassXC, which is also password protected.
- I have already included backup steps to both the KeePassXC file and to get an optional 2nd USB to back up the whole persistent drive. For the intended users of this guide, it is sufficient.

____________________________________________________________

MAJOR

When you generate your keys, make sure you are completely disconnected from the Internet.


Response:
- I think this is a good practise. And I'll include it in the guide as a reminder.

____________________________________________________________


MAJOR

The best and most proper way to make keys is V E R Y simple.
Do not use the GUI!

gpg --full-generate-key --expert
(9) ECC and ECC
(1) Curve 25519
0 = key does not expire
Key does not expire at all
Is this correct? (y/N) y
Real Name: -----
Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? O


***DONE*** Took 10 seconds


Response:
Takes 10 seconds for you, yes. But using the terminal can feel really quite intimidating for most people.
Most people use Windows & Chromium, most people don't know about the DarkWeb and think it's scary. The people who do manage to get here, should be guided without being overwhelmed. I think it should be a cummulative experience. Succesfully using the terminal for the first time is quite a rush. I hope people get to do that, but this guide isn't for that.

___________________________________________________

Everything I wrote about making PGP keys is in some way incorrect but it is good enough for buying drugs.

If we had to follow FIFS guidelines, we failed.

You would need to export 0AAB A2AB 04F1 766C your Public Key so that all people have is the ability to encrypt messges for you.


Response:

-I think it's quite sufficienct for these specific practical purposes.
-What are the FIFS guidelines?

___________________________________________________

I hope this helped. I apologize about the delay.


Response:
It helped very much. Thank you kindly.


Love,

KS
/u/NarcoFarm P
1 points
6 months ago
great guide! im baffled by how many people still use windows to access the DW. It takes little to no effort to read up on a bit of OPSEC, glad people still share some great guides :P
Hiya,

Thank you. You're free make it your own and send it to your clients.
Yes, but often, people don't even know why they need OpSec. Most people have never even hear about the term 'OpSec'. All of this is new to them, and I think we should guide them through the darkness.


Love,

KS
I agree with most everything here. Definitely a useful write up
Hiya PS,

Thank you. Let me know if u see anything I might've missed.


Love,

KS
Well the main thing I remmber (I'm sorry, I'm not going to go thorough everythng again) is that yu dont want to auto connect to a bridge, especially if using it as normal traffic at home. You could connect to a tinted/controlled one and other issues (I don't claim to be any sort of expert). I've come to understand that should only be used in contires where it needs to hide ( and if shouldn't connecting to a random one anyway) or if the public wifi is trying to stop you
/u/snowonthabluff420
2 points
6 months ago
thank you. bc that's what i was thinking as well. That connecting to a bridge is not necessary and should only be used if you live under a repressive regime where using tor is illegal. if not, they say not to use it. that's where i was confused as well.
Hiya /u/powderedSlut and /u/snowonthabluff420

This should clarify some things:
https://www.whonix.org/wiki/Warning#Use_of_Tor_is_Obvious
https://www.whonix.org/wiki/Hide_Tor_from_your_Internet_Service_Provider
https://www.whonix.org/wiki/Bridges#Before_Configuring_a_Bridge
https://www.privacytools.io/guides/using-tor-bridges-in-hostile-environments


Love,

KS
Still, if there's no need to hide it, don't
Hiya,

As written in the new and old guide:

''Tails/Tor is legal in most countries in the world. Unfortunately, data is being harvested on you by your ISP, and government organisations have been known to make lists of 'privacy orientated individuals' for a while now.

In certain circumstances, u should download Tor in a public library or internet cafe, which you rarely visit, through an anonymous device. As increasing internet surveillance is becoming the norm, and everyone is being socially profiled by increasingly technologically power hungry entities - I am rightfully concerned about network observers.
Privacy tools like Tails/Tor can be scrutinized in contexts where anonymity is seen as a threat to national security or law enforcement efforts. As according to leaked documents from 2014: ''The NSA has targeted Tails users, labeling it as "a comsec mechanism advocated by extremists on extremist forums"''. Law enforcement agencies do scrutinize people more who look into ''privacy online''.

These facts should be considered to minimize any continued profile build-up on you.''

Unfortunately, there's always a reason to hide, when there's forces always trying to invade your privacy.


Love,

KS
Guess it really depends on your threat level, but 99% of user have no reason to worry about ISPs or whoever knowing they use TOR
Hiya,

Again, I disagree. That's not something you can say with certainty, and that's the problem. As we don't know the parameters of sercret services used to moniter their populations. And what we do know is that Tor users are labeled as ''extremists'' by the NSA. And that was in 2014. You think it's any better by now? It's probably much worse, and with the increasing use of AI/Machine Learning we need to make increasing attempts to not just remain hidden, but also unnoticed in our attempts to remain hidden.

Being a 'tor user' can be used for profiling, and part of proper OpSec is preventing to be noticed as well.

Yes, I agree, most cases don't require this extreme thinking and can use Tor without any problem at all. And there's no real good way to hide using Tor without going into significant effort - Including as you mentioned in your original comment, and as send in the sources I send, that even using should not be used unless needing to bypass cenconsorship such as 'the great firewall' of China.

Love,

KS
The way I see it, the more people that fearlessly use TOR when they have no reason to fear that being known, the better it is for the community as a whole
Hiya,

I think I still agree and disagree.
Because It depends on a persons situation. As you said yourself, using Tor fearlessly depends on having no reason to be afraid. But, I'd like to argue, that fear is a great initial motivator, for someone to educate themselves.

Because you need reasons to be and remain fearless. Remaining ignorant will not help anyone to overcome fear.

Both Tor and XMR depend on some level of randomized probability that causes plausible deniability, which makes harder to track a specific adversary - So yes, in that case, it strenghtens Tor to have more (visible) users.

Yet, an argument could also be made, that if you're a Tor user, and you do require/prefer some increased form of obfuscation, it shouldn't be disuaded.
Because the fact remains that the internet, and the DW even more, is a hostile environment continiously monitored by different governmental forces - Which are considered the most adverserial forces.

Yet, even governmental resources and time, need to be spend arguably wise. As it takes quite an investement to build up a case. And even with the plausible deniability of Tor, in some cases, people just need some better than just plausible deniabillity.

My legitimate fear is also to future-proof Tor and increase obfuscation. As machine learning, data gathering and subsequent advanced profiling could be worrisome in the future.

I already mentioned the quote of 2014 NSA, which is ample evidence to be somewhat concerned. There's also the consideration that Tor users versus clearweb users are very few.
If a government is worried about drugs by mail, they could, by monitoring the flow of the internet of the entire country, which they do, know who Tor users are. And in return, flag their addresses in the postal system for extra inspections.
This is purely speculation, but it's not an unrealistic scenario to imagine, as the technology and groundwork has exists for some time now.
In short, knowing who uses Tor could potentially lead a government entity to build up a profile on you.

For most cases though, I'll recommend purist Tor use. Just Tor.
If you go on Dread/DNM, disable your javascript in the about:config and put it browser on the safest mode in settings.


Love,

KS
Yeah I'd say we agree. I do still beileve connecting to a bridge, especially a random one could be a indentification risk if I understand correctly
/u/Balintix
1 points
6 months ago
Bridges should work instead of a VPN, no?
Hiya,

Yes. Bridges are recommended over VPN.

Use bridges for censorship circumvention: If you are in an environment where Tor access is blocked, using bridges is advisable as they enhance your ability to connect without revealing your intentions. Caution with VPNs: If you choose to use a VPN with Tails, ensure it is dedicated solely for use with Tails and that you trust the provider completely. However, this setup can complicate your anonymity and should be approached with caution:

  • When you use a VPN with Tails, it can create a permanent entry or exit point for your traffic. This means that if the VPN is compromised or logs your activity, your anonymity is at risk. A VPN can act as a single point of failure, allowing your traffic to be traced back to you if the provider keeps logs or is subject to legal requests.
  • Trusting the Provider: Not all VPNs are trustworthy. If you use a VPN that logs user activity or is not independently audited, it could expose your identity or browsing habits. This contradicts the purpose of using Tails, which aims to enhance privacy by routing traffic through multiple Tor nodes.
  • Fingerprinting Risks: Using a VPN can lead to unique browser fingerprints if you access non-anonymous services while connected to the VPN. This could make you identifiable even when using Tails, as your activities could be correlated with your real identity.



For most users, using Tails with bridges is recommended over a VPN unless there are specific needs that require both.
/u/noahsboatmosessplit
1 points
6 months ago
How about running Whonix in a VM on Windows?

Is that secure? Since the whole traffic is routed through the Whonix TOR Gateway?

Or do I leave any trails / fingerprints?
Hiya,

Going the Qubes/Whonix route would be the better setup. Because if you're gonna run Whonix, do it in Qubes, not in Windows. But that's only required if your threat models require it.
I would recommend running TailsOS rather than Whonix in a VM of Windows.
Windows comes with it's own additional threats, as it's not torrified. And the VM might be compromised, and just as windows, it can send back indentifiable data to their servers. It just adds complexity and potential vulnerabilities.

Here's what Tails OS says about virtualisation https://torhoo.cc/go.php?u=YUhSMGNITTZMeTkwWVdsc2N5NXVaWFF2Wkc5akwyRmtkbUZ1WTJWa1gzUnZjR2xqY3k5MmFYSjBkV0ZzYVhwaGRHbHZiaTlwYm1SbGVDNWxiaTVvZEcxcw==#

I would go with the simplest solution, if your threat model allows it: TailsOS. Or if u need Whonix, use it through Qubes.

This guide is aimed at people who use Tor on Windows. I don't have the expertise to advise you. I'd recommend to follow paths that already work.
Here's a list that compares the 2:
https://torhoo.cc/go.php?u=YUhSMGNITTZMeTkzZDNjdWQyaHZibWw0TG05eVp5OTNhV3RwTDBOdmJYQmhjbWx6YjI1ZmQybDBhRjlQZEdobGNuTT0=#


Love,

KS
/u/buildmebetter
1 points
6 months ago
When do I connect to Wi-FI?
Hiya,

When to connect to Wi-Fi?

It's a good question that I missed to answer in the guide properly. That really depends on your Threat Model. But I'll add it to the guide, let me write it up.

For now I'll refer you here:
OpSec FAQ Series: Using Tor from Home or Public WiFi by /u/SilverTeam:
/post/f12b38fc9337bce6ae34


Love,

KS
Good write up! I appreciate that you referenced my article.
/u/buildmebetter
1 points
6 months ago
cool shit. thank you much
/u/501NoAccess
1 points
6 months ago
Nice guide... And on that post about Qubes, while its a great OS, it is overkill when compared to things like Tails. Keeping it simple means you have less factors to check.
Hiya,

Thank you. Yes. the Qubes/Whonix route, although really good, is complete overkill for most cases. We should keep things simple, clear and clean. Getting into OpSec is already scary enough for most people. And most people, just need a simple solution.
This guide aims to find a good balance of OpSec and simplicity for the common DNM user.


Love,

KS
/u/snowonthabluff420
1 points
6 months ago
wait, why do we have to connect to tor with a bridge? in the bible it says that you dont have to do it with a bridge, and then other places say that you don't have to unless you live under a repressive regime and/or using tor is illegal in your country and to NOT use it if you don't live in one of those places bc it will take away a resource from someone who actually needs it. isn't all the bridge is doing is hiding the fact youre using tor from your isp? other than that, it doesn't really do anything? or am i wrong?
/u/snowonthabluff420
1 points
6 months ago
i can't select the default bridge? any suggestions? and is it necessary to use a bridge?
/u/Shislotzi
1 points
6 months ago*
Be careful with this point highlighted in red as per instructional post:
------------------------------------------------
Requirements:

USB with 16GB memory. USB version 3.0 minimum. (Buy 2 and make a back-up. Might as well do it now. Trust me.)
Internet connection.
A laptop/computer with USB slot (A disposable laptop bought with cash if your threat model requires it. Most people don't need a dedicated DarkWeb laptop. TailsOS is amnesic and it's activity on the RAM is quickly overwritten during the shutdown procedure.)
Save this text somewhere for reference while you're using Tails.
Optional: Get a VPN if you live in a country where using Tor is seen as suspicious or worse.
Use a device with internet connection to put on the VPN and let the laptop with TailsOS go through the phone.
Optional 2: Get an additional USB for a back-up. It's very easily done by using the 'tails cloner'.
--------------------------------------------------------

If you are indeed hot spotting your TailsOS laptop's interwebs connection through your phone that has a VPN running...

Try this to check please everyone.

Check your phone is indeed connected to the VPN.
On your phone using a browser do an IP location check.
Now while still using the phone as the laptop hotspot connection do a web browser check on that laptop to see what the laptop IP location is.

Some of you may have hearts racing now?

I hope some of you haven't done much that you shouldn't have before checking this.
Hiya,

Thank you. I've completely forgot.

As yes, many phones do not route hotspot (tethered) traffic through their VPN by default, so your laptop’s IP may be exposed even if your phone shows the VPN IP.
Checking the IP on both devices is required to avoid accidental leaks.

I'll put more emphasis on using Tails:

  • Tails always sends your laptop’s traffic through Tor, hiding your real IP from websites.
  • If your phone’s VPN doesn’t cover hotspot traffic, your ISP can still see your real IP or that you’re using Tor before traffic enters Tor.
  • So, checking IPs on both phone and laptop when tethering is important to know what your ISP sees.
  • Tails protects your anonymity online, but the phone’s VPN hotspot setup affects what your ISP/network can detect.



If using a 2nd device, I'd recommend a router over a smartphone.

I'll add your advice to the guide.


Love,

KS
Don't use VPN. The VPN provider will have all you metadata available. It is a very bad idea.

Get remote connection to the far away public, crowded wifi and be rotate properly.
/u/Crypsis
1 points
5 months ago
Thank you /u/KetamineSpray for a HJ Thread. HJ is probably the only one on here that knows what they are talking about.

On another note, I recently had a Samsunf All-in-One crap out on me and when I get some time, want to use it as an R&D comp for Opsec starting with the ripping out the processor but I first need to source a processor off the grid in some way along with memory and a drive.

P.S. Ketamine Spray, great thread to start a WWHJD?