News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

The complete guide for DNM users. How to: TailsOS, OpSec, PGP and XMR. : OpSec | Torhoo darknet markets

This public safety guide can be used in either a sequential or modular way for TailsOS, PGP (Pretty Good Privacy), XMR (Monero), DNM (DarkNetMarket) and general OpSec (Operational Security) improvements, and the guide doesn't need to be applied fully, yet going sequentially, step by step, is highly recommended. Following the full guide would be a one-time investement of about an hour and will continue to pay off in safety and time saved, every time you use it. I've added an extreme short-form version of the guide in this preface, and the long form after the Table of Contents.

This guide is a hommage to the ⚠️DNM Buyer's Bible⚠️.
⚠️AnonymousPlanet⚠️
And of course the https://torhoo.cc/go.php?u=TDJRdlQzQlRaV009# & https://torhoo.cc/go.php?u=TDJRdlZHRnBiSE09# community on Dread.


The complete guide to use DNM: TailsOS, OpSec, PGP and XMR.

You might think, "Why should I do this when I can just use the Tor Browser already?" Here's why:

  • Tails OS has a Tor-only connection, encrypted persistent storage, a password keeper (KeepassXC), and has a PGP tool (Kleopatra) installed. These are all the tools you need to be on the DNM, and it will organize and separate your normal life from your Dark Web life.
  • You've made it this far to the DNM, but you're just human, and you will fuck up in ways you don't even understand until it's too late.


The guide is meant for DarkWeb (DW) users who do any of the following:

  • Use Tor with Windows. And don't separate their normal activity from their DW activity.
  • Save their unsafe passwords and PGP information in a notepad on their Windows environment.
  • Have little understanding of OpSec tech and subsequent nomenclature.
  • Don't know how to get or use XMR.
  • Don't even know how to use PGP and send their private data as an non-encrypted cleartext to their vendor.


For you, this will be your reference guide.
For IT professionals and extreme threat models, look elsewhere: ⚠️ Qubes+Whonix⚠️
Don't worry about Qubes/Whonix ''being better''. OpSec is a relative-to-the-circumstances matter. OpSec is about balance, to do what is necessary for your threat model. There's often a sacrifice of convienience for security, and Tails will be more than enough for most cases. If you want perfect digital OpSec, get rid of all your digital devices.

With this guide I want to find a balance between preventing bad OpSec practises people use (often based on ignorance and false hope), and helping people to educate themselves in a reasonably simple & safe matter, without having an information overload.
I'll give you the extreme short-form now, and long-form will come after the Table of Contents:



tl;dr "Tails is good OpSec, use it."


This guide will remain in development. I want to thank the community and https://torhoo.cc/go.php?u=TDNVdmFHVmhaR3BoYm1sMGIzST0=#, I've looked into every comment to improve this guide. Always freel free to let me know if you have critique or ideas.

This guide is updated with the comments left on the old guide:
https://torhoo.cc/go.php?u=TDNCdmMzUXZNbVkzT0RsbU5EWTFNVE0wTW1WbU5HUmlNREk9# (This is where OpSec veteran https://torhoo.cc/go.php?u=TDNVdlNHVmhaR3BoYm1sMGIzST0=# commented his critique and recommendations)
https://torhoo.cc/go.php?u=TDNCdmMzUXZaR0l6TnpoaU1HSmhaV0k1TldZek56UXpNV009#
https://torhoo.cc/go.php?u=TDNCdmMzUXZaV0k1T0RoaU5EZGtObVpsTm1ZNE9HWmlPRGc9#

Thank you.


Table of Contents
This is a great post, thank you.

I have a somewhat different viewpoint which I explain here: /post/ddefa14b8258d540c4e3/#c-2af94a97bb7d91638d

But these are the basics which everyone should know and use depending on their threat model. Regardless of what I said in my post linked in the sentence above, everyone should know what you're posting and understand it. It's Dark Web 101.
Hiya,

Thanks. I agree with your comment.
Most people can just use just pure Tor/Tails without a problem. But this remains a fact:
''Privacy tools like Tails/Tor can be scrutinized in contexts where anonymity is seen as a threat to national security or law enforcement efforts. As according to leaked documents from 2014: ''The NSA has targeted Tails users, labeling it as "a comsec mechanism advocated by extremists on extremist forums"''. Law enforcement agencies do scrutinize people more who look into ''privacy online. ''

Using Tor offers plausible deniability. Ordering drugs, and it gets caught to your name/address, also offers plausible deniability. Yet, intelligence agencies are increasingly leveraging AI/Machine learning to profile users - And it's not slowing down any day soon.
I must reiterate that using tor pure, without VPN/Bridge, is still the best way to go about it.

Tor is 100% legal in most countries around the world, but we want to prevent profiling. Because to order drugs on the DW, you need to connect to Tor, so to check drugs-mail can be narrowed down to 'addresses asscoiated with Tor use'. We don't know if intelligence and postal agencies are working together in that regard, but it could be a reasonably safe assumption they do.

I also don't agree with your statement that ''small amount of drugs won't be persecuted''. Yes, there's double plausible deniability as mentioned before. Yet, we know LE will pursue at least an interview at their bureau to extract information at least and a confession at worst - It'll also be documented somewhere.
And how many times have we seen LE planting drugs on unsuspecting citizens? Drugs have been used in the USA through the the entire 20th century in many different cases to wage cultural and proxy wars.

Europol has also prosecuted buyers on the DW. They want market owners, vendors and buyers to be afraid, in their useless war on drugs. And they will try to at least strike fear into end users of illicit substances. They want all trade related to illicut substances to stop, because they have been tasked to control that, that's what they get paid well for and believe in.

Don't give them a a reason, and don't give them an inch. They deal with the scum of the world every day, to keep society in check in how the ruling political class decides it to be - It's rough job, and if you got a hammer, everyone starts to look like nail.


Love,

KS


ps Little rant:
1800s the two Opium wars when the UK forced the independent country of China to allow opiates to be traded legally.
Remember when USA banned cannabis and LSD to be used as a politicla tool to wage a cultural war (of covert racism), while also using LSD in project MK Ultra to try brainwash/reprogram people?
Remember when CIA was probably complicit in cocaine import into the USA to be distributed in Black neighbourhoods as crack-cocaine?
/u/IThinkImMe
1 points
2 months ago
Wait, so I wasn't supposed to write a check with 'For Drugs' in the memo section and post a screenshot of said check to my social media while simultaneously emailing the vendor my personal info?
Hiya,

You'd be surprised the amount of people who still do this.


Love,

KS
/u/IThinkImMe
1 points
2 months ago
Can you send me their info? For science!
Hiya,

They might be idiots, but they're my idiots. And I don't blame them, being on the DW and ordering drugs can be confusing for someone with no technical skills. And that's why I wrote them this guide.


Love,

KS
/u/kherrera
1 points
2 months ago
Default bridges is better than sending the obsf4 bridges email?
Hiya,

For most cases, it might be best to use no bridges altegether. Both default/requested bridges are fine. But do your own research and feel free to update us here.


Love,

KS
/u/postmate
1 points
2 months ago
wonder how secure requesting bridgez from telegram
is nowadays with da news dat happened a few months ago
Hiya,

Telegram is not recommended in the DW/DNM scene. But, requesting bridges that are recommended by official Tor sources, are perfectly fine.


Love,

KS