News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

There is One and Only One Rule In OpSec : OpSec | Torhoo darknet markets

(This post was tremendously longer, so more posts to come on expanding on these subjects, especially in technical detail, even if I have to link posts together in a cohesive way.)

This is going to be a hard read because a lot will expose boldly things you do not want to read, believe, do or know about.


Let me get straight to the point: there is one and only one rule in Operational Security

Rule Number One: Do Not Get Caught
/u/Kawaii
8 points
1 year ago
I fucking love you. Also, tags broken, sadge.
Love you, ace. These broken tags are ridiculous. Fixing them.
/u/Kawaii
6 points
1 year ago
"All those rankings about “the top 10 best VPNs” are paid for. They’re all owned by the mostly the same companies."

Those fuckers are patting themselves on the back, it's a circle jerk. Nord VPN sponsored blog saying Nord VPN is the best VPN. LIKE WOOOW REALLY?
/u/walt3r69
1 points
11 months ago
i use nord :|..i dont understasnd then what should i use?
/u/Visconti
1 points
11 months ago
there is no anon vpn, but if you want the most PRIVATE vpn, then use Mullvad. Mullvad is the only vpn that i trust. even though they still have your home ip whenever you connect, they log nothing else, and they encourage you to pay with XMR.
/u/TmpNickname
1 points
7 months ago
what i dont understand. how people hack and stole crypto wallet and they dont get Caught if the vpns arent safe. what is the solution. im beginner trying to understand
/u/mcDoogle
0 points
1 year ago
[removed]
May you heal, heal strong, heal well and come out with your hands in the air triumphant.
/u/mcDoogle
1 points
1 year ago
[removed]
Mos definitely, /u/mcDoogle
If you really know what you are talking about you should be able to explain it to a five year old. This whole topic could have been condensed into three words:
"Don't be Newbieforever2018".
Newbieforever2018: Pillar of the Darknet
LOL. As I read along checking all of the boxes I realized, hey, he is talking about me!!!
Whoops, leaked my ip. No problem. I'll clean it up.
/u/Marcos_Esq2
1 points
8 months ago
Hey newb, I was gonna message you and ask but this thread seems like an appropriate place for the topic...
I understand there is no secure email service, but is there an anonymous one? One that i can set up through Tails without connection to a phone number or alternate email addy? Is Thunderbird OK to set up in Tails so long as i only send PGP encrypted messages? I've heard Proton was popular but I would have to disable java to set up an email through them i think (or at least that was the first thing i ran into when looking into proton), but maybe i was doing something wrong.

I'm only on the DN about once/week now. Just waiting for PoF to come back from vacay (again). Luckily i got an order in that will hold me over for a while but i would like to take advantage of his DD service if i can set up an anonymous email.

No rush to reply; again, probably won't log in for a few days or more.
http://itsbbbbbtbfx7ssxt7ljltkygewznyrlt47w2baiop3moiyz7ayawrqd.onion
Scroll down about 2/3 of the page to
"Secure & Disposable Email Hosts"
/u/Marcos_Esq2
1 points
8 months ago
Oh cool. Thanks for the resource! I will try this route instead of proton.
/u/miner21 P
3 points
1 year ago
This is a detailed reminder (actually with some stuff I hadnt considered before) post to everyone. Great write up
Thank you, /u/miner21. I'm glad it helped.
/u/Arch4femboys4
3 points
1 year ago
hey man what adivce you wanna give to the people that wanna get caught ....
Don't use PGP.
/u/T3ssla_Bat
1 points
6 months ago
attack a cop with product in your pocket prolly
/u/MoneyBigot
1 points
3 months ago
Create an account with your facebook username
/u/Gambetta
2 points
1 year ago
A very long time ago my late uncle turned to me one day and said the same, if you ever do x thing. Never get caught.
And, in the mafia, "always keep your mouth shut".
/u/Gambetta
1 points
1 year ago
haha, true, it was funny though because he turned to me and said it suddenly, while doing his legal job.
/u/Octopus Sea Spider
2 points
1 year ago
WELL WRITTEN, DEAR FRIEND! KUDOS!
Thank you, brother. As always.
/u/Octopus Sea Spider
1 points
1 year ago
Appreciate you!
Same here, brother.
/u/zachcity7
2 points
1 year ago
Well put I had no idea of the actual charges you could be charged with...the wording is insane. But this is the first post I've ever saved so bravo to you /u/headjanitor. I save it to come back and build on these ideas because this opsec post shouldn't be over with. I literally learned something and I know if I did, a handful of us had to. These ideas are great and can be expanded on. Operational security is something I like to change, your opsec can never be stagnant.
And LEARN PGP. VERIFY EVERYTHING. ITS THE DARKWEB.
Thank you, /u/zachcity7 Cheers to you, mate
/u/paranoiopsec
2 points
1 year ago
Design your house the way it will get raided, your belongings the way they will get seized, your information the way it will get uncovered, and your actions the way you will get arrested. Better safe than sorry - do it now otherwise regret it later. You need to be prepared for anything, especially the worst, because it may, and will, eventually happen. And when it does happen, having not been prepared for it you not only make it significantly worse for yourself but also realize everything would've been preventable if you saw it coming. That is, some people genuinely believe they are untouchable so when they get busted they incriminate the fuck out of themselves and draw a lot of unnecessary attention which could've been easily avoided if they behaved like everyone. You drew the feds' attention? Then you minimize it by looking as normal as possible. If they care anyway, deny absolutely everything and pretend to be an idiot. They raided your house? You were prepared for it so there's nothing to look for or any evidence of a crime, all evidence or even a suspicion of it was removed prior. They seized your belongings? You saw it coming, so you had nothing important or interesting to keep with yourself or anything suggesting a suspicion. If it were devices, you made sure that you encrypted absolutely everything (even the most irrelevant things ever) so they can not gather any evidence leading to suspicion, they just don't know. Your information got uncovered? You obviously made sure you never said a word or claimed to have done anything thus they can't prove anything. It would be of no value to them if they can't tie it to a crime, and that is your job to make sure of that. They will get you. Assume that all the time. You should do everything you can within your power to minimize the worst outcome possible and the chances of its occurrence, but it is essential to be prepared for it anytime of day.
Seriously, that simple?

All security professionals are now tearing up their years of experience with ave; all military personnel of the world throwing away their bulletproof vests and camouflage and run in tears not to get caught; all IT world defenders throw all their useless protective gadgets to the fire watching the firework; all OpSec teams responsible for the security of the operations break in tears now and throw away their OpSec Cycle bulshit, asking gods for forgiveness for their stupidity.

Run Forest, run, run, run!

Now all is solved and we are all finally safe - everyone from everyone else, forever!

Wada miracle! _/0\_
Just face it. Nothing will ever satisfy you.
HeadJanitor made his own DN bible!!

Amazing work here brother.
If that's what it takes. Thanks, /u/EmpBomb
/u/redsavina
2 points
1 year ago
Good article! It contains much information that is incredibly important for a newbie and extremely good topics to review for even the most tenured dark web enthusiast.
Thank you very much, /u/redsavina
/u/AbraCadaver P
2 points
1 year ago
Great stuff, thanks.

Dont be slackin out there!
/u/heavyweaponsguy
2 points
1 year ago
Brilliant content that is so important and complete that it should be darknet scripture. Thank you HJ.

BTW:
On secure email hosting.

Email privacy claims sold by any service are false. Like the cock.li admin said:
How can I trust you?
You can't. Cock.li doesn't parse your E-mail to provide you with targeted ads, nor does cock.li read E-mail contents unless it's for a legal court order. However, it is 100% possible for me to read E-mail, and IMAP/SMTP doesn't provide user-side/client-side encryption, so you're just going to have to take my word for it. Any encryption implementation would still technically allow me to read E-mail, too. This was true for Lavabit as well -- while your E-mail was stored encrypted (only if you were a paid member, which most people forget), E-mail could still technically be intercepted while being received / sent (SMTP), or while being read by your mail client (IMAP). For privacy, we recommend encrypting your E-mails using PGP using a mail client add-on like Enigmail, or downloading your mail locally with POP and regularly deleting your mail from our server.
I would argue that self can reveal self to self, it just takes proper training and most people don't know how or don't care. Otherwise, awesome post.
Thank you very much, /u/PissjugSupreme
/u/OrderItNeat
2 points
1 year ago
Thank you /u/HeadJanitor. Couldn't agree more. The convenience of maintaining potentially compromised accounts for buyers isn't worth the risk even if it's .001% risk. Burn it down.
/u/Lisan_al_Gaib
2 points
1 year ago
so today is my first day darkwebbing and i am trying to educate myself on OPSEC before even thinking about entering the markets. Cash paid laptop, using Tails, using public wifi, put Tor to safest option. Is there anything i should be doing? I read the 'VPN' section and am a little lost. Are you saying i should not be using a VPN at all or i should be? Is just using Tor on a public Wifi enough?

Great post! Learnt a lot already
You don't even need the Public WiFi. You're safer using your own your Internet, for countless reasons. Just make sure that the funds to the market go from your wallet and not from the exchange.
/u/MoneyBigot
1 points
3 months ago
When you say your own internet? what do you mean
Cellular or Private WiFi
/u/echorunner
2 points
1 year ago
this needs to be on the frontpage of dread honestly
I don't even belong in the credits as the guy who holds the ladder.
/u/echorunner
2 points
1 year ago
you're too modest :( its some great wholistic info
Thank you, /u/echorunner. Just glad to be with you all.
/u/Hitler101
2 points
11 months ago
What would you say about the services proton offer?
I ave nothing to say about Proton except that they do they a terrific job in marketing and sales.
/u/Hitler101
2 points
11 months ago
Agreed
Right on!
/u/FlipItNow
2 points
10 months ago
/u/HeadJanitor exactly.

Proton's privacy-first promise is so legit, one can pay for services using BTC, but not XMR... This fact alone speaks volumes!

I wonder how many have even considered what the exact purpose of the proton .onion might be?

A 'honey pot trap' has always been my suspicion.

In 2013 the NSA cracks down hard on TOR across the board and completely wreaks havoc across the Darknet!

At the same time in 2013, like clock work, protonmail is founded. During DN secure email take-downs, which is highly suspect.

2014 protonmail enters into public beta, let the data gathering begin.

2017, Proton Mail announced a Tor onion site... post clearnet trust and confidence building of the brand and the like.

The rest of the DD noobs can do by RTFM. Starting with the 'protonmail wiki page'. If interested, branch out from there.

Noobs, when you are sitting at the poker table and you cannot identify the mark, step away from the game.

The mark is you. ;-)
So, /u/FlipItNow does the impossible: /u/FlipItNow brings humor AND intellect to /d/OpSec. We need you here more often.

When I read that first line about BTC, I was like "I wonder where this is going?" and it only got better and better.

You nailed it. What a delight to have these facts shining bright with both humor and precision and the display of human herd mentality.

Such beauty!

How I hate Proton and their "Privacy" marketing. But I do appreciate them as a 'business'. I'm sure they are making a killing with all their different offerings. Suckering people in. I'm waiting for their browser and maybe even an OS someday.

Well done, truly, well done.
/u/FlipItNow
1 points
10 months ago
/u/HeadJanitor thank you very much for your very kind words and remarks to my random ramblings.

I will do my level best to support /d/OpSec when and where I can, as time permits. Humor touches the very soul and helps some move past the burden of RTFM and all...

Deep dive due diligence coupled with impeccable OPSEC are king.

Noobs must learn to deep dive OSINT plus... the fuck out of everything before ever making moves. Doing so is the key to a long and productive life in and outside of the DN. Ones personal safety must always reign supreme.

It is a big bad world out there, where one can be easily eaten by the wolves. Should he or she choose not to adhere to the pure principles of OPSEC as you have so graciously outlined herein.


F.I.N.

"Forever the student, a master of none, keeps one safe under the sun!"

"Arrogance is an enemy within, tame it immediately, or it will become one's end..."
Beautiful capture of the essence, always remain teachable, /u/FlipItNow, and the world will teach not harm.
/u/ABoyNamedFuckYou
2 points
10 months ago
great stuff. It cannot be reiterated enough, do not tell people offline. Not a soul. It only takes a jealous family member or jilted ex to ruin your shit. And yet, people run their mouths. Just, shut it.
Thank you, u/ABoyNamedFuckYou. That's right. Compartmentalize this world.
/u/Thereis1way
2 points
10 months ago
Thank you, appreciate the effort and consideration in the making of the post.
Thank you, /u/Thereis1way. There shall be more!
/u/Kev69 P
1 points
1 year ago
"...you are being watched."

Best quote ever!
ESPECIALLY on the clearnet. And it's not your encryption they want, it's your meta. Who you talk to, where you visit, what you look for; your persona to all the 3rd parties.
/u/fapinator
1 points
1 year ago
Hold up now I'm trippin. If using tails we need to update Tor? It's updated whenever Tails drops an update, right?
Here is the calendar for releases:
https://meel.puscii.nl/home/tails-rm@puscii.nl/Calendar.html?view=month

Here is how to do a manual upgrade (if necessary):
https://tails.net/doc/upgrade/index.en.html#manual
/u/fapinator
1 points
1 year ago
What I meant was if I upgrade Tails every time I am prompted to, does that take care of upgrading Tor? Or do I need to upgrade Tor in between Tails updates? Ty for the schedule that is rather nifty.
You'll be good to go unless (randomly) an emergency bug is announced and they will have a patch for download for Tails, but that is an unlikely situation, just saying, that would be the only time.
/u/fapinator
1 points
1 year ago
Alright, phew. Cool. I was a bit nervous to post that question here, as you put a few training wheels on my trike when I was fresh meat here a few years ago. I was having PGP issues and you helped me practice with your key till I got it. Glad your still here Janny, thanks for all of your contributions.
/u/amaturetester
1 points
1 year ago
Great post HJ, the use of PGP is a gimme, but there still remains a small danger if a busted vendor gives up his private key and stored messages/drops to LE correct?
/u/[deleted]
1 points
1 year ago
Correct. But that is something that you have to trust in the vendor. Like HJ said "Do your homework on your vendor". PGP's biggest attribute is being able to prevent intercepted messages from being read. It is up to the vendor to not store buyer's messages and also store their private key in a secure environment.
/u/caenum
1 points
1 year ago
Genuine question, how can we still recommend PGP (RSA/ECC) when we know it will be broken within a decade? With the current LE standard of, 'harvest now decrypt later', what are the best options to stay secure?

Are you aware of any post-quantum cryptography standards being developed that will supersede RSA/ECC?
Super-aware. At the front-lines. We stick with ECC until Cryptographers makes implementations into GnuPG. We're going to be just fine.
/u/Akumu
1 points
1 year ago
It keeps getting smaller and smaller,I mean comment section.Thank you!! I think I've done it. What's next?
/u/[deleted]
1 points
1 year ago
If i want to just browse darknet forum. like this. I always using public wifi. Different location each time. Even just for browsing.

What is recommenation for this? If i use Tails on any wifi close to me it can be potentially trace back to me.

Even if i put a rPi near a public wifi and put a ssh server on it i still need to connect to a wifi to ssh into the pi.

How can i hide tor activity without public wifi?
/u/lilpotato
1 points
1 year ago
how bout persistent file in tails? is it safe to keeping your persistent file for a long period?
As long as you keep that flash drive safe and in your possession.
/u/lilpotato
1 points
1 year ago
yes what i worried is ,lets say worst to worst i get caught and they compromise my pendrive
/u/RashanSpai
1 points
1 year ago
Love u man, great job for putting this out here.
Thank you very much, /u/RashanSpai
Much love!
/u/immortaldread
1 points
1 year ago
thankyou. you are doing gods work.
/u/gtown89
1 points
1 year ago
What do you do if you sent a sensitive address to a vendor without PGP? How bad is this, what are ramifications, what can be done?
It's a cardinal sin. Very bad. Once, it's done there is nothing that can be done to go back in time and un-do it. If they get seized it is collected as evidence of a transaction.
/u/TheBMF
1 points
1 year ago
Amazing post thank you.
Thank you, /u/TheBMF
/u/WHITE2BLACK
1 points
1 year ago
nice post
/u/FreshBread
1 points
1 year ago
Diamond Post
Thank you, ♦ /u/FreshBread
/u/jetsetradiooo P
1 points
1 year ago
Excellent! Came to this /d/ about to ask many Qs that were answered in this!
Thank you, /u/jetsetradiooo Welcome and bring the questions on.
/u/useriamnotabot
1 points
1 year ago
But can I use a VPN like MullvadVPN before Tor? Since they don't seem to keep logs. Because I think it would look better, if you ever get investigated, if the ISP has only logs about you using a VPN and not about you using Tor, because Tor looks more suspicious.
A VPN means you're hiding something.

This is where using a bridge like Snowflake comes in to make it look like you are on a Zoom session.

Tor is primarily intended for allowing you to browse ordinary websites anonymously, and only about 3% of Tor traffic is to onion sites.

If you read the original Tor specification, onion sites are practically an after-thought, almost the entire proposal is about using onion routing to reach the open web.

Nothing on the Tor project's front page or their about page even mentions onion sites or the darknet or markets.


3% -- Think of a population and think of 3% of that entire population. You are going to get a very small number.
/u/useriamnotabot
1 points
1 year ago*
Thank you. I read on other posts, regarding this topic, that 50% of the Tor network nodes are owned by the US and Germany and therefore it would be easy for them to get your IP address, shouldn't you use in that case a VPN or is Snowflake enough?
Every node you connect to must be in a different geography so I see no threat there.
The VPN won't help one bit as you on are Onion Routing.
The Snowflake bridge will only mask your traffic to make it look like a Zoom call.
I'm not a conspiracy theorist.
You're fine.
/u/useriamnotabot
1 points
1 year ago
Ok thank you. And thanks for your great post.
/u/zuberdriver Atlas
1 points
1 year ago
Don't post any opsec on here! Or anything at all if you plan to start an online business that isn't legal.
Care to elaborate? My God, if you knew how many hours a week I work a real job, you'd be shocked.
/u/zuberdriver Atlas
1 points
1 year ago
If you post your security setup you give clues to attackers. It exposes your attack surface I think is the pro expression.
You don't know how many different security setups I have or what they consist of. You're reading general information. Now, what about my dissertation?

I would hope that attackers are sophisticated enough to be able to run several non-credentialed vulnerability assessments to keep up with the multitude of setups I use. Forget use, fortify.
/u/zuberdriver Atlas
2 points
1 year ago
Your dissertation is common sense to me, I didn't feel the need to comment.
True, I don't know what security setups you have, maybe my post didn't make the point of security through obscurity.

And you sound a bit grumpy so I'll just go to the bar and get a drink.
"And you sound a bit grumpy so I'll just go to the bar and get a drink."

You are freaking awesome. (I don't drink) but you've got great humor. No, I just answer questions and I'd be the saddest target anyone ever got.

I do mix around setups a lot though. But I doubt I do that for security reasons.
/u/zuberdriver Atlas
1 points
1 year ago
Running this site must be a big job and what you contribute, I have respect.
In my previous life I was a cryptography and IT security programmer and probably should not say any more.
Damn, /u/zuberdriver , that means a lot. Thank you so much.
/u/Wishallthebest
1 points
1 year ago
Thank you so much for this such a comprehensive post! Appreciate a lot!
/u/fazer
1 points
1 year ago
real
saving
Thank you, /u/fazer
/u/FlipItNow
1 points
11 months ago
Well fucking said boss! All who did not read to the end, read again and comprehend!

If I may add: Never ever use your personal system to access the DN. If you can afford drugs and the like.

You have the means to buy a used PC and set up shop there.

A gallon of Nitric acid in the garage is handy to have around too. Just in case you need to cook the guts out of your DN system.

Never get greedy and always remember, you can start a new, but this cannot be achieve if you are sitting behind bars!
Absolutely, /u/FlipItNow. One thing that we must always take into consideration is that we must do it perfectly 100% of the time. Law enforcement can make a hundred mistakes. But one mistake and we are done for.
/u/FlipItNow
1 points
11 months ago*
Noobs, take the time to read, reading is the key...! Always RTFM. Learn the rules, then play the game.


/u/HeadJanitor Your statements are exactly 100% correct! I have heard this with my own two ears roll off of LEO's forked tongues. Every LEO is taught this in their training, it is the very next commandment, after loyalty to their badge, lulz... For me, OPSEC is number fucking one. So many people today go down by OSINT it is not even funny. LEO barely has to work for it anymore. A person must always go into every situation understanding that one is being recorded in some manner.

People have become complacent, button pushing, swipe bots, which is very sad.

If I even think I smell Bacon and believe my OPSEC has been compromised, I will cook a system with the quickness. Build another burner one in a few days (with all new creds and user names) and get back up and running. Never reuse burnt hardware. All hardware is serialized and asset tagged from the manufacturer. Reusing old hardware is sloppy OPSEC and another way peeps get found, don't be cheap.

People always talking burner phones, but you rarely hear them talking about burner systems. Which for me is 100x more important than any burner phone. They are a huge problem for LEO, when you ghost them, they have to begin looking again from scratch. This helps drain their budget too... Never use anything S.M.A.R.T. you will be fucked sooner or later.

Noobs, take your time, never get sloppy, encrypt everything you do and do not let greed end you. Take the time to RTFM and trust no one. That does not mean one cannot further your education here, buy goods, do work or sell on the DN. I am simply saying never expose ones self, ever! No matter the promise made. The promise of riches, coupled with poor OPSEC which leads to easy OSINT for LEO... is what takes the majority out.

Greed kills! It is your greed that will take you out. LEO knows and are taught this as well. If it sounds too good to be true, it most likely is. Walk away from the offer. No matter how bad you want it, there is most likely bacon behind it.

DN message boards are more congested with LEO than any other public message board on the clearnet. LEO knows what they seek is congregated here, so they heavily patrol these waters. Do not become a victim, they are always lurking and participating. Always remember your OPSEC and do not deviate from it, period. Do not allow LEO to trick you via social engineering. They are highly trained and skilled at lying and psychological manipulations, be aware of this.

Also keep in mind that there are all flavors of LEO here. They all move differently, but have the same agenda. Which is to lock your ass up, get some cudo's from their boss and a bonerous on top of their nickle 98 pay check they serve for. Always take everything into account before making any moves. If your gut says some shit is not right, walk away.

Noobs, almost everyone here asking for crazy work to be done or asking for help out of questionable situations is LEO.

Remember, LEO are slaves to the System. The system is nothing more than the biggest mafia conglomerate in the world, designed by the oligarchy to squash all competition. A system of oligarchical power, which allows them to create more laws to fuck our freedoms and keep us under control.

OPSEC matters. Extract every dollar you can from oligarchy, avoid LEO like the plague, Fuck 'The man'..!
/u/[deleted]
1 points
10 months ago
I'm like 100x more paranoid after reading your guys posts, but in all seriousness tysm. Will take everything into consideration and study/learn more before making moves.
/u/FlipItNow
1 points
10 months ago
Paranoia will destroy ya!

Make moves, simply move right. Always be concerned about and question everything it is that you do. Double and triple check everything. Have enough discipline to walk away, even if it cost you cash and or the deal.

Always keep in mind, your OpSec is all that matters, everything else is shit.

Do not trust anyone nor let them pressure you into thinking everything is alright and a deal is a go. Stick to your plan. Pushy deals are generally LEO, walk away from them, take a sabbatical. Full speed ahead into a brick wall will get you fucked every time. Never ever forget greed kills.

Build an empire, but secure yourself. Don't be a future Dread Pirate Roberts. Keep in mind the alphabet boys are the biggest breakers of the law around the world and they are always around you. All levels of LEO are the glorified servants and slave army of Oligarchy. All of whom in one form or another protect their criminal masters via 'THE LAW', lulz. Some LEO are aware of this, most are not or have yet to figure this out. Only time served shows them.

LEO's only job is to ensure the super rich stay rich and maintaining their power. All laws exist to keep you and every other competitor down and out. Oligarchy hate competition and will smear, harass, imprison or kill, all whom get in their way. Never feel guilty about taking from them. They ALL took from everyone to get where they are today!
/u/a2b2c2
1 points
11 months ago
I saw someone suggest the Tor option that comes on Brave browser is reliable, is that true?
Stick with Tor. Why go for an alternative when you can have the official, genuine asset?
/u/thepisya
1 points
11 months ago
Great guide. Only thing I didn't understand. What does it means?

"Do not trust your VPN. If you think you are connecting to Luxembourg and it "takes 4 hops, you are connecting to the next state over with a Luxembourg IP or a New York IP. You're being fooled!"

Thank you for explanation!
That server has a Luxembourg IP but is placed in somewhere cheap like Delaware. Think of the mileage between you and Luxembourg. Think of the amount of underwater submarine cabling. Think of how many hops it would take to get to Luxembourg.
/u/thepisya
1 points
11 months ago
but its only about latency or some security issues come as well?
It's about $$$$$$
I advertise that my server is in Luxembourg. You fall for it.
You're really in Delaware but now you're my customer under US jurisdiction.
/u/thepisya
1 points
11 months ago
Oh, ok, gotha. So.. how to check that server is in location I requested? Should I run traceroute to/from server and check IPs?
Exactly.
/u/potentmessenger
1 points
10 months ago
I believe latency would be a better indication rather than using the number of hops since tunelling traffic through their network is common.

Very good post, thank you for sharing.
Thank you very much, /u/potentmessenger.
Or a simple traceroute to see you where you went.
/u/tiptronic
1 points
10 months ago
[removed]
Thank you, /u/tiptronic. I am truly a nobody, I am just another Darknet/Dread user, just like you and everyone else. I always remain approachable to anyone that needs help, if I can. And I truly hope that nobody ever thinks I am above them in any way whatsoever.
/u/JohnG1913
1 points
10 months ago
Very nice mate thanks
/u/[deleted]
1 points
10 months ago
Fuck. THIS IS GOOD!
Thank you, /u/Al4kr1ty.
/u/Dasho
1 points
10 months ago
Correct me if I'm wrong. Please - I would like to know.

So you say that “Your sole protector on the darknet is PGP.” - I think a tool like AGE is a better tool than PGP, or even modern ED25519 SSH Keys which allow for message (and file) encryption. They're faster and - in the case of AGE... simpler?

Thoughts?
Yes, even symmetric AES-512, and so much more, but no markets or forums have implements any of the above.
/u/Crewless
1 points
10 months ago
Great OpSec article, I had the feeling to read a good old Phrack Magazine! Hey! Talking about that! Why not make a good old ASCII OpSec Mag like in the ancient times ?
Show me a picture and we might get crazy. Thank you, /u/Crewless
/u/strenuous
1 points
9 months ago
Just dont be a drug dealer or a drug addict, be a law abiding citizen, its much easier that way
The one beauty in that is that the American Medical Association made it a Federal law that you cannot be punished or criminalized for being an addict. That, in a way, stems back to the Bible. Other countries do not share that perspective.
/u/blackcreamcake
1 points
9 months ago
so is it just better to not use a vpn at all :I
When there is a need for one, use Mullvad, paid for with Monero.
VPNs are for the clearnet.
Tor is for the darknet.
/u/loveuhoneyy
1 points
8 months ago
Hi to all,
I have one query does using DPNs (Decentralized Private Network) will provide any additional security for tor network. and should i install DPN at my location or not. any views and ideas from expert advice. also options for some good hardware base DPNs. one more query is there any challenge using onions over DPN.
thanks in advance
I had to look this up, research it for a minute and comment a couple months back. No comparison to Onion Routing. I forget the name of the product the OP had in question, but it didn't seem like it revolved around security.
/u/loveuhoneyy
1 points
8 months ago
my question is if i put DPN before entering onion just add extra layers of anonymity
/u/FreeSpectator231
1 points
8 months ago
I dont really have any plan to get in on drugs, but this is still super helpful. I am really more interested in the fraud world or getting hands on with burglary on businesses. That being said with doing both of those my major concern is not leaving any physical or digital fingerprints that can trace back to the real me.

One of the things I am surprised about so far is the fact that there is like zero info on burglary that I have found yet, stolen goods marketplaces dont seem like a thing, nor resources / writeups.

Is dread and the connected network mostly just a drug side of the darknet? Does there exist anywhere where I could learn more about casing targets, disabling security systems, and accessing restricted areas and social engineering?
There are more technical forums that are about hacking. Dread is a known resource for drugs.
/u/Alexei
1 points
7 months ago
Outstanding! Thank you. You're a fucking god.
Thank you very much, /u/Alexei
IF I am a god, I would be the god of mistakes and failures.
/u/Alexei
1 points
7 months ago
Don't forget modesty and self-effacement.
You are wonderful, /u/Alexei
We are in a place that is found of deceit and distrust, but I do not have it in me to lie.
I'm learning, slowly, even while making mistakes I've previously made and along the way, it doesn't bother me at all. I have no problem owning and admitting to who to blame. I rather have morals than deceive myself. It is perfectly fine because I neither harm anyone and I get one shot at life.
I hope the path for you is exactly as you want it or needed it.
/u/Alexei
1 points
7 months ago
I hear what you're saying, and I agree, until my head hits the pillow. Then the ruminations begin – intrusive, self-critical thoughts. I think drugs are the only way to keep those demons at bay.
Meaning you are having "intrusive, self-critical thoughts"?

Ironically, I'm more of a listener type than a thinker. I have to reminder myself to remember even important things. I feel more "silently connected" than ever hearing a voice in my head.
/u/Alexei
1 points
7 months ago*
I'm not talking about "hearing voices," like for a schizophrenic. I'm talking about ruminations.

Ruminations are the psychiatric term (or so I've been told) for thoughts like "I can't believe I said that!", "I'm such a loser" and "Why can't I stop doing that?" that keep coming back after you push them away. Hence the description: "intrusive" and "self-critical."

It sounds like your thinking is pretty healthy stuff. Good for you!
/u/Thinkpad
1 points
7 months ago
High quality poostin from the head janny.
Thank you! You are my favorite laptop to the point where I have four of you! Not kidding.
/u/Peterbo
1 points
7 months ago
[removed]
/u/Peterbo
1 points
7 months ago
[removed]
/d/GnuPG
Kleopatra
And/or depends on your operating system.

Feel free to message me and I'll show you various ways and many options and made sure you get the latest release. But, it also depends on your OS.

And there are unwritten rules. Such as, you cannot store your Private key on a cell phone. It's super easy and it's the way the entire world is heading.
/u/Peterbo
1 points
7 months ago
[removed]
Awesome will check it out asap.
/u/Peterbo
1 points
7 months ago
[removed]
Just messaged you to make it easier for you.
/u/Str8Drop
1 points
6 months ago
In opinion, can someone tell me the safest way for us to access the market, stay anonymous, and have a long vendor success rate being one and staying off the radar...
What I'm trying to say is what's the safest way in your opinion to do this and now get caught, if I didn't know anything and you were giving me directions as my brother what would you tell me to do so I don't get caught, now keep in mind that the person isn't tech savvy and know what this means, for the most part.. how do you connect to a vpn after accessing tor?
"how do you connect to a vpn after accessing tor?"

-- You do not. It's like asking, "how do you elevate to 60 feet altitude in an aircraft then decide to see the flight would feel gliding on the ocean."

You are desperately trying to condense "experience" into a manual. I wish it possible.
/u/IDontSmokeMeth
1 points
6 months ago
Correct me if I'm wrong- couldn't you use Whonix as the source for internet of the VPN in Qubes? Of course, there would be a LOT of leaks- but aside from the leaks (which of course invalidates it) what else makes it impossible?
Sure, you can install a VPN in the Gateway. You can even install a VPN system-wide in Qubes. You can even install one in your/a router if desired. So many options.

But it kinda defeats the purpose of Tor and is repeatedly mentioned by the Tor Project developers not to use a VPN but then begs the question of why not use Whonix for the purpose of traveling from country to country and using Tor and then make a Qube based on the protocol of your choice whether Wiregaurd or OpenVPN and then you'd have more tools in your toolbox. But you could pretty much do "anything" -- in Debian there is a saying of "Do not break Debian".

https://wiki.debian.org/DontBreakDebian where they call it out as "Don't make a FrankenDebian".

But the big and real issue here is that it has become known now that VPNs were among the top leading attack vectors this year to an astonishing degree. "Security Impact of Open Tunneling Hosts"...

https://papers.mathyvanhoef.com/usenix2025-tunnels.pdf
/u/cryptopunk69
1 points
6 months ago
The attack surface of VPN's are really the only problem I have. The argument about "keeping logs" or not can be applied directly to your ISP. Furthermore, as far as vetting for honeypots goes, it is true that they are once again to be considered targets for malicious actors (see: attack surface). On the other hand, many ISP's are already operational monopolies in regions. Are they not to be considered under the same scrutiny? The customer for a VPN at the very least has a seemingly limitless option of vendors to do service with, instead of being locked in totally to their ISP.
/u/decaptchamyass
1 points
6 months ago
VPN over Tor is helpful when you are trying to defeat guard discovery attacks. It comes with it's own caveat as you said.
Except in this era. I will soon post about this era. A recent discussion over at Tor involved the topic of the waning darknet. Aside from that contrary to what people believe the NSA has the darknet at the bottom of their list. But every inch of the clearnet is theirs and most of all--underwater submarines. Right now is the "safest" (what a word) time on the darknet ever.

Right now, Healthcare is about to take punches left and right for now having cared about protecting data but there is something bigger going on I was intending on writing about tonight but lost time to one question after another, despite well over 500 pages of government published proof I had to dig into.

With VPNs... almost all are owned by 3 people. And they lie hard. There is probably two that are worthy of "trust". I should have published nights wasted on chasing the geography of fictional servers.
/u/decaptchamyass
1 points
6 months ago
> A recent discussion over at Tor involved the topic of the waning darknet
Can you link this discussion?
/u/EmilioGaviria66
1 points
6 months ago
So you should not use vpn if you use tails?
No, you should not. The reasons would have to come at another time as they would take at least thirty minutes, especially if you don't have a background in networking.
/u/staticthroatplay
1 points
6 months ago
This was the most important post I read this morning. Thank you for this.
Thank you, /u/staticthroatplay. I'm glad it helped.
/u/[deleted]
1 points
6 months ago
Another rule worth considering is that your OPSEC better be better than our operations.
/u/BholaBhau
1 points
5 months ago
Great stuff!!!!
/u/zerofs
1 points
5 months ago
I'm kinda new to all of this, but this post has been real insightful on the do's/dont's.
Thanks for the info. Kudos.
/u/upjo3lll
1 points
5 months ago
Awesome post. Thank you for sharing it.
Can I ask you guys for some resources where I can learn more about how to use PGP? or the most common info found on Google should be suffice for starters?
Thanks again
/u/capor
1 points
4 months ago
the 5 year plan.
/u/capor
1 points
4 months ago
yo I'm using brave browser's built-in Tor. Is it safe?
/u/TentaKun
1 points
2 months ago
When using Brave with built-in TOR, your online identity is further masked. Additionally, Brave's Private Windows mode provides an extra layer of protection, as stated in their disclaimer: 'Brave doesn't store browsing activity from Private Windows.' With Tor connectivity enabled, it becomes even more challenging for websites to identify your true IP address and for network observers to track your activities. However, if you're planning sensitive or high-risk online activities, consider using a secure operating system paired with the official Tor Browser for maximum anonymity.
/u/btxtrippy
1 points
4 months ago
/u/HeadJanitor check inbox
/u/PAID
1 points
4 months ago
Oh thanks.
- I wanna ask this, you made emphasis on vpn are you also saying those with vpn should off their vpn after login to the browser?
-Which is the best form: vpn before browser or browser before vpn?
/u/tyson88
1 points
3 months ago
Genius
/u/K4wn_
1 points
3 months ago
does all this apply only to usa or to entire world
/u/hivebee1990
1 points
3 months ago
Good stuff. something for everybody
/u/imu_pertrauka
1 points
1 month ago
Bless you!!!
/u/xeitiex
1 points
1 month ago
Thank you for this. Thank you
/u/Akumu
-1 points
1 year ago
I'm looking for a professional hacker to help me out with one job. there is full information of a iranian bank account with good amount of money in it. But the account is blocked so I need a pro one. can you help me? thank you!
Try d/jobs4crypto or /d/hacking
/u/Akumu
1 points
1 year ago
ppl there are legit?
You have to see for yourself. Be careful.
/u/Akumu
1 points
1 year ago
thanks my man.
No problem, Aziz.
/u/Akumu
1 points
1 year ago
this is so weird! How you can type that word? it's pure persian... I feel scared asf.
Nah tars. Adanemeh koobam.
/u/Akumu
1 points
1 year ago
I like you. really. can you please show a hacker you trust? I got scammed two times...Please mehraboon.
Put a PGP key up.
/u/Akumu
1 points
1 year ago
I don't know how :(
https://gnupg.org/

Windows: https://gpg4win.org/download.html
Linux: https://download.gnupg.com/files/gnupg/gnupg-desktop-2.4.3.0-x86_64.AppImage
/u/Akumu
1 points
1 year ago
thaaanks!! It's everything I need. what's next? :)
Make a Key using either 4,096 or preferably ECC. (Curve25519) No expiration. STRONG PASSWORD.
/u/Akumu
1 points
1 year ago
How can I dm you here?
Just click my name and 'message'.
/u/FuckReality
1 points
1 year ago
cant find ECC (Curve25519) in Cleopatra when creating new key.
where do u create such a key?
https://dump.li/image/get/43d6367102638578.png