News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Ways Law Enforcement Busts Dark Web Users : OpSec | Torhoo darknet markets

Sourced from /r/DNMBusts

Users of the dark web are protected by a veil of technological anonymity. This has given majority of the users a sense of security and belief that they are beyond the reach of law enforcement officer. This has been proven to be wrong in a large number of instances where users have been busted by these officers.

The Postal System
/u/HugeDildo666
66 points
6 years ago
URL bar: about:config
search: java
Disable Javascript.enabled :true
Will become: Javascript.enabled : false (disabled)
/u/thebaye
3 points
6 years ago
Thank you, this helped me
/u/futuritytaste
3 points
5 years ago
Thank you, i've been toggling noscript everytime I used tor for the past 4 years. Never knew it was that simple, but I guess you could say that for a lot of things here on the dw.
/u/pyrophilia
1 points
5 years ago
Thanks, this helped me as well.
/u/ForgetfulGazelle
1 points
5 years ago
on tails use this to auto disable java script every time worked for me https://old.reddit.com/r/tails/comments/9gtm8h/java_in_39/e66x44r/
/u/WhatIzThis0
3 points
5 years ago
Also disable webgl, and put your tor settings to SAFEST.
/u/dystopia_dev
1 points
3 years ago
Can you elaborate on this a bit more?
Maybe link any relevant information that explains how and what the implications of WebGL are.
/u/magiccontraceptive
0 points
5 years ago
where do i change these settings?
/u/montreal555
1 points
4 years ago
There is a settings part for Security issues > just google it and you will find it.
/u/goochmon
1 points
4 years ago
why cant i use google on tails?
/u/hyland
3 points
4 years ago
Google uses Java script. And will know you are using a TOR exit node.
/u/goochmon
1 points
4 years ago
ty for reply.. would i be safe googling "illegal" shit on my burner laptop with a vpn on home wifi?
/u/hyland
1 points
4 years ago
First, you shouldn't be using "GOOGLE" . Also, I really suggest you read the "DMB". It has a lot of useful (safe) tips.
/u/goochmon
1 points
4 years ago
ok what should i use? ty btw
/u/SmartWater
2 points
4 years ago
DuckDuckGo is good. I've even found that Yandex (Russian Google, basically) isn't bad. They have an english version, yandex.eu . Both work fine for me with javascript disabled and browser set on the highest security level.
/u/jeepskiier
2 points
4 years ago
What do you think of Ahmia.fi?
/u/some-body-else
1 points
3 years ago
you can even watch YT with this link https://www.youtube.com/html5
/u/ndQT5Q26
1 points
4 years ago*
a vpn hides your traffic from the internet company and no one else. it is not security. never do anything on vpn that you would not do without & assume vpn traffic is public
/u/silentsound
1 points
4 years ago
VPN hides your traffic from the internet company and your actual ip address from the sites you connect to. Especially with javascript disabled. It also hides your traffic from the public or home router (unless it is ON your router) and anybody who happens to be sniffing your wifi traffic, or trying to access it anywhere between your computer and your VPN server.

It hides pretty much all metadata from your ISP (except for amount of data sent/received, speed of transmission, the ip address of the VPN server, and the dates/times you are connected), especially when not using encrypted communications (http web browsing, ftp, p2p/bittorrent, etc) while also blocking info about your identity and location from the sites you visit if your VPN and OpSec are any good.

If you have a GOOD VPN, you can assume your traffic all the way up to the VPN server that you connect to is private, and if you use https, ssh, sftp (not actually sure this is all that secure these days since everybody seems to recommend ssh instead), or Tor it's safe even after leaving your VPN's server too.

VPN's can be excellent for your safety and anonymity. You just gotta know what you are doing and make sure you're using a good VPN, that's all.
/u/[deleted]
1 points
4 years ago
Google blocks requests made from a tor node...
/u/[deleted]
2 points
3 years ago*
There are ways around this, one i found useful is dorking for a site vuln to SQLi (coz it's easy) and uploading a proxy to it which you can then access google through Tor. Download the proxy here: https://github.com/emersion/phproxy, and see it here: https://web.archive.org/web/20210922235255/mounstar.com/proxy.php. However on the normal user side google is hit and miss so switch through 'new tor circuits' might yield a working google session. However the v3 onion address for DDG should be used over google: https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion
/u/LeadByDragon
1 points
5 years ago
Thanks good to know, i always thought the safest privacy setting took care of this
/u/[deleted]
1 points
5 years ago
Fuck thank you
/u/McDrugersun
1 points
5 years ago
Hello I done this from my handheld and it's saying Javascript.enabled:false.. Thts correct.?
/u/Oaron
1 points
4 years ago
Yes, it is.
/u/ladsjfljsafdlj
1 points
5 years ago
Why is java so insecure and what information can it leak?
/u/turtlebyte
11 points
5 years ago
Javascript is a user-side programming language meaning that it executes programs on the user's computer that the website author wrote. It's what makes the web so pretty and interactive. This can be as simple as changing the appearance of a visual element, or running a cryptominer in the background. If the browser implements javascript incorrectly or there's a vulnerability discovered, a webpage could potentially obtain information from other areas of your computer memory.

Enabling javascript allows for the websites you visit to run possibly malicious code on your computer. Browsers try their best to contain each website's code and not allow leaks, but there will always be holes.
/u/ladsjfljsafdlj
1 points
5 years ago
Ah now I see. Thank you.
/u/haileystackzzz
1 points
5 years ago
hey i was trying to disable it but it wont let me change it to false this post was also made 2 years ago so m not sure if it will still work
/u/PostcardFromPablo
1 points
5 years ago
Double click it, or right click and toggle.
/u/pharms
1 points
5 years ago
mines is automatically on false is that correct ? it shouldnt be set as true?
/u/dgirl
1 points
5 years ago
That might be Tor update, they set false it to default now. That's my theory.
/u/Ronaldzblack
1 points
5 years ago
Thanks
/u/9ineinchnails
1 points
4 years ago
Thanks man
/u/G4slime
1 points
3 years ago
How do I enable it on android
/u/mhjuxo69
2 points
3 years ago
You follow the DNB and use tails not your phone
/u/DNricksanchez
37 points
7 years ago
well im all for throwing child porn mental nutcases in jail for life imo but let us just buy and sell drugs in peace!!!!!!!!!!!!!!!!!!!
/u/thedearpsychonaut
17 points
7 years ago
yeah, it is fucked up there are pedos who get less time than people for dealing drugs. Especially if you are a big level dealer you will often get punishment more harshly than someone who has hurt children. It is partially laziness on the part of law enforcement as well. its fucking easy to arrest someone for possession of drugs but way more difficult to bust someone for hurting children.

If you use something like Qubes with the anon-whonix virtual machine you could have prevented the deanonymizing malware that was spread to the Playpen users. They were discovered because the malware was able to see their real ip address and phone home. With Whonix especially inside of a virtual machine in its own internal network it is less likely that this type of attack could have managed to deanonymize you.
/u/T4shl4n
1 points
6 years ago
any way of implementing this via FONA chip?
/u/[deleted]
1 points
5 years ago
Thank God most Chomo's die in prison from intense rape and then murder because they diddle and kidnap children.....thank God
/u/policecameraaction
-2 points
7 years ago
That's not the case at all.
Drug dealers do see the light of day again.
A lot of the PlayPen scum got life or 90+ years
/u/sickTightLip
6 points
7 years ago
I hope this is true but i agree the drug sentencing needs to be laxed and sexual offenses sentencing increased across the board... college hacker gets more time Than the rapist he exposed was a news story not long ago
/u/efoam
4 points
6 years ago
I find it hard to believe they got 90+ years when THE CREATOR of playpen got 30 years

silkroad creator - lilfe sentence PLUS 40 years WITH NO PAROLE
/u/General100
1 points
5 years ago
The was unbelievably HARSH. But he was the first of his kind and an example needed to be made.
/u/thedragyn
2 points
5 years ago
I thought discrimination was illegal...
/u/0b1sh1n0b1
1 points
5 years ago
DPR sold drugs, and sometimes guns. He kept the conversation civil, an on staff doctor interested in harm reduction. He was very much interested in making sure everyone had a good time and got what they wanted. Very much stuck to the consenting adults enjoying themselves ethos. In the end no one was involved with Silk Road or did drugs they weren't explicitly their to buy or sell.

A lot of this pedo shit are just nasty people. They can't even say they "make love" to kids as sick as that'd be. They trade in shit like 'hurtcore" and other flat out abuse and torture...Of children. Children who weren't involved at all with the site. Shit was done to them for content for this "playpen". Not as children could consent anyways, but there wasn't even a pretense of that.
/u/supcap
0 points
5 years ago
silk road wasn't just a drug market though--chances are if it didn't have ads for hitmen and other such super shady listings it might not have been cracked down on quite as hard.
/u/[deleted]
1 points
4 years ago
And if Ross had not tried to get people killed with the assistance of HA (imposed by LE) he probably would have received a lighter sentence even though he was not convicted of this.
/u/isjhduhflrn
2 points
4 years ago
same with running a fucking multimillionaire business on a latop that he used the labrary wifi for....Oh Ross. I wish he'd have known what we now know, but damn I'd like to just thank him, he kinda got this whole thing started (not saying other peeps were maybe doing similar, ut silkroad was revolutionary as a concept)
/u/isjhduhflrn
2 points
4 years ago*
and wasn't DPR told that (the guy who has been fictionally killed) would spill the beans on everyone if he didn't pay? That's similar to a US slogan "we do not pay terrorists" - they just kill them. Better yet, prison slavery. But yeah I get it, don't try to kill people, govt or anyone else. Just don't. Even fent is baad news bears for any market now
/u/thedearpsychonaut
1 points
7 years ago
https://arstechnica.com/tech-policy/2017/03/doj-drops-case-against-child-porn-suspect-rather-than-disclose-fbi-hack/
/u/thedearpsychonaut
1 points
7 years ago
The case could be reopened I suppose, but for now the case against this pedo was dropped because the FBI did not want to reveal their technique to the court in order to avoid jeopardizing a future investigation. This pedo is literally walking free right now as far as I know while people rot for nonviolent drug offences. if someone has an update to this story I would love to see it so that I dont completely lose faith in our criminal justice system hunting actual criminals. lol
/u/Ross_Pirates_Dread
7 points
6 years ago
so that I dont completely lose faith in our criminal justice system


Yea I lost my faith as soon as I was old enough to understand how the system worked.
/u/foxymethoxy
1 points
4 years ago
old post but this thinking bothers me; it's very short-term.

Sourcing > hits. All sourcing is highest classification. Data is scrubbed to make it look like the source is unknown. When you see pictures of chatlogs without a big TS over it, it's bullshit

You could burn a source and then not be able to find five more suspects. Do you burn the one source and lose five more, or let one go to potentially get more? CP is assuming it's not the actual exploiter, but for instance, you catch one of Epstein's associates and giving the source tips off Epstein to the security flaw? That flaw is now useless, and you have to spend a bunch more money to find a new one.

It's always money.
/u/filmnoir
1 points
3 years ago
They couldn't have got the IP address by unpicking the route (undoing the 'onion' layer by layer), so it must have been some javascript that issued a separate HTTP request, exposing their IP address to the server.

Right?

So if the pedos had javascript disabled they would've been right.
/u/RoseXanBars
1 points
6 years ago
Good hope they put them in gen pop
/u/LilPeepsLastXan
3 points
6 years ago
Hillary Clinton gets to run for president while Ross spends his life in prison.

-_-
/u/DNricksanchez
2 points
7 years ago
/u/thedearpsychonaut "If you use something like Qubes with the anon-whonix virtual machine you could have "

If i ever actually look into vending i might look into this thanks!
/u/NdzADmo
2 points
7 years ago
Qubes is absolutely the best (using it right now). Just make sure you use it on the right hardware!
/u/sickTightLip
2 points
7 years ago
If it would support common WiFi drivers i would use it exclusively
/u/Ethiopiop
1 points
5 years ago
It does have the same drivers that Fedora has. Its support for hardware comes from what's in your sys-net template distribution. That's Fedora by default.
/u/Onionshop
1 points
7 years ago
I've heard that a lot recently. Just wondering: how is Qubes better than Tails?
For Qubes to work you need to manually install Whonix? And it gains access to your harddrives so you'd have to remove them. Which is also recommended for Tails. But in Tails you can not access your harddrives.
/u/NdzADmo
3 points
7 years ago
It depends on your threat model. Single use darknet purchase? Tails from a coffee shop. Regular general purpose, secure laptop/ desktop? Qubes from home.
/u/outtatime
2 points
7 years ago
Tails is better at protecting against physical, in-person attacks on your computer since it is amnesic and doesn't write anything to the hard drive. Qubes/whonix is better at protecting against internet attacks, as it highly compartmentalized through virtualization.
/u/Shroomtastic
6 points
6 years ago
Tails is annoying to use. I have a photoelectric sensor installed at my door, that opens a relay and turns off power to all computers. LE won't get my LUKS password.. DDR3 and up hold data only for 3-4 seconds without power, so no successful cold boot attack on my machines.
/u/u-dont-exist-dot-com
6 points
6 years ago
But LE just read your post and now they'll break in thru your window. Oh well you tried..
/u/frontstage
3 points
6 years ago
No you'll just go to jail until you hand over your LUKS key...............
/u/dgirl
1 points
5 years ago
Yeah that's why dummy is important, people!

I'm not gonna tell it to LE
/u/oldtimer2
1 points
6 years ago
Interesting very interesting. Care to share more about how you set this up? I would like to also set something like this up.
/u/boodycut
1 points
5 years ago
I would love more info on running qubes if you could be so kind...currently still on tails..where do i start?
/u/DNricksanchez
1 points
7 years ago
/u/blackm00se thanks will loook into it youre da bomb ;)
/u/RoseXanBars
1 points
6 years ago
Yes exactly this should be a child porn operation more than drug operation

Fuck fentanyl too tho
/u/blackm00se
0 points
7 years ago
/u/DNricksanchez trust me, Qubes is the shit. Just use a VM with whatever decent OS you want, but it also depends what you wanna do. If you want to sell shit, whonix or tails is your shit. if you wanna card, you might wanna try Windows 7.
/u/dexmuth12
1 points
5 years ago
Why specifically win7 and not win10? I could include proxies in win10 as well but what's the reason behind win7?
/u/throwsmeways
0 points
7 years ago
windows 7 and proxies! they are very safe!
/u/Inferno
6 points
7 years ago*
OK credit where credit is due

⚠️Basics of OPSEC (tips, numbered)⚠️ Has really good LE points and is a good know-How on the subject
Thanks for /u/2happytimes2 for that list

Edit* Fixed link
/u/Inferno
3 points
7 years ago
/u/MJA20WithA3

LUL

will fix
/u/MJA20WithA3
2 points
7 years ago
Did you link the correct thing?
/u/mushcanada
6 points
6 years ago
Can't say as I feel sorry for the Playpen motherfuckers
/u/DoctorPhawkes
4 points
5 years ago
"His biggest mistake however was depositing large numbers of packages at US post offices while wearing latex gloves. This caught attention of the postal staff."
I've never laughed this hard at a dread post before. Was this dude tweaking or something, for fucks sake lmao.
/u/foxymethoxy
1 points
4 years ago
yeah wtf

sounds like nothing else really mattered.
/u/PolarisLabora
1 points
3 years ago
thats a fucking dead giveaway
/u/poboy420
4 points
4 years ago
Some folks need to chime in on some recent busts on DN Live and fill in the noobs on what they did that everyone can learn from. Opsec is the key to keeping a good thing up and running so if y'all know some new more up to date tips and tricks, let it be heard. Please & Thank ya!!
/u/deathfromabov3626
3 points
7 years ago
Not changing your fucking shipping locations and methods especially if your well known is a problem your pack gets pulled and they will triangulate your drops pretty easily and profile your customers too for additional evidence
/u/TheFBI
3 points
5 years ago
snitch
/u/GreenDragon78
3 points
5 years ago
You could just cut your hands off to avoid fingerprints.
/u/deepak84
3 points
5 years ago
remember to put condoms over your nubs so you dont leave a dna trace
/u/CyberCivilDisobedience
2 points
6 years ago
With Regards to OP's first paragraph:

The Chukwuemeka Okparaeke bust. Its clear that he made some glaring mistakes. He also got lucky for a long time based on the fact that he operated without being suspected, reported, investigated and arrested immediately...

The way he went about actually posting the packs of fent was flawed, but you must at some point acquire the stamps/postage and send it. Walking into a USPO is pretty inevitable if youre sending priorty/Express/International. If you only use First class you can buy stamps without raising suspicions and drop them in blue boxes but then you risk non-tracked packs and customers disputing non-arrival without the ability to prove to mods/admins on the MPs that it was infact sent.

So what is the best way to acquire priority or Express postage and get it into the mailstream en route to customers destination, without sacrificing anonimity & plausible deniability?!

Buying postage online still requires accounts with emails, names, phone#, and sensitive info that could Doxx you. So buying from a website is not a valid option which leaves only walking into a PO to post your packs in person....any advice on this aspect?...
/u/DeeMoliTion
1 points
6 years ago*
[/b] VISA SERVE. THEY'RE READY TO USE WITHOUT REGISTERING AND IMMEDIATELY. SEARCH YOUR AREA FOR USPS KIOSK. TRY TO DISGUISE OR SEND A FRIEND TO THE KIOSK. PARK YOUR CAR ANONYMOUSLY AND WALK ON PROPERTY. ONLY LOAD ENOUGH FOR 5 STAMPS. USE EM ONLY ONE TIME. THE PRINTED STAMPS GOT A SCANNER..SO LOAD UP TO REDUCE EXPOSURE. USE SECLUDED BLUE BOX (NO CAMERAS IN SIGHT)
Ima new DMT vendor (with the only GODZILLA SZ CRYSTALZ )bout to pop off on Empire (1-2DAYZ)and WSM when they get their shit together and fix the BTC link for new vendors
/u/DeeMoliTion
2 points
6 years ago
Plus you can get a walmart smartphone burner. leave your phone in the car with some bullshit excuse of how you don't have one. Buy (cash)an Android smartphone and data plan ($60-$80 for decent to unlimited data AND phone included)use the phone in the electronic department to call and set it up using fake name. Use their other phone to call the new phone to make sure its working. Use the new phone to set up a new anonymous gmail account ( text verify and also in the same name as you used when you called to set up the new phone) You need this so you can download apps from the Playstore. You can get a VPN (outside the 14 eyes anyone??)using cash to buy the Visa Serve card IF you're that paranoid and will be bringing this phone near your other phone/car/house or anywhere else that the gps may log. Download Bitpay and create an account with this same name (text verify and trust me this is the fastest and best for privacy i've found UNFORTUNATELY and despite wanting to throw a fiery brick through their window..story for another day - BUT SERIOUSLY, I ran into multiple opsec issues with every other wallet suggested from every noob discussion board for weeks literally! Find a BTC atm (text verify)- RESEARCH THE COMPANY FIRST it took me 4 places to find one that didn't jepordize my opsec but sad to report for the random guy I had now created. I was put on the spot and had to enter a home address - so I just looked up the fake name/est birth date range and found my victim...fuck I hope he's straight for his sake - whatever happens was meant to! Scan the receive BTC code and show it to the BTC ATM.....New anonymous phone number; new anonymous gmail account; new anonymous bitpay account; new anonymous BTC; I feel like I cantaking a bow now haha. If anyone can find holes in this please inform me otherwise I'll leave it posted for maybe a week then prolly get paranoid if not sooner and delete
/u/DeeMoliTion
1 points
6 years ago
Can anyone see possible opsec issues with the TMobile alcatel wifi hotspot for on the go laptop use instead of pub wifi? Considering if the device and several months on unlimited data plan were paid upfront with cash and without having an account at TMobile?
/u/SayYoToDrugs
1 points
4 years ago
"So buying from a website is not a valid option which leaves only walking into a PO to post your packs in person....any advice on this aspect?"

But almost all vendors are buying from a website. It works for vendors if they're super careful but it never works for buyers. All of those sites generate labels with markings that can be traced. LE poses as buyer and receives a package with those label markings, then later looks for similar labels in the system. You might ask "isn't is the vendors LE really wants?" Yes, but they'll be happy to go after a buyer if any type of quantity is involved.
/u/foodbitch
-1 points
6 years ago
Pay somebody cash to go pick postage up for you.
/u/RelatableCyclotron
2 points
6 years ago
Yes so when they get arrested they will just say it was that guy
/u/DreadIrateRobertz
1 points
6 years ago
What do you suggest?
/u/einstein2
2 points
6 years ago
visit po and use cash and never get more than one hundred dollars worth at a time. Visit several po's if needed but careful to not visit same ones to often make sure you only repeat once a month or whatever you feel isnt looking bad. I dont see anyting wrong with a friend getting them for you every now and then but i wouldnt make it the method. It seems with dnet operatins you dont want to be predictable and prob dont want to keep the same schedule ie logging onto dmkts same time every day, dropping packs same time everyday etc. Try to do things at diff times. If you must use a po to drop packs park blocks away not on camera and go in drop packs in collection bins and leave. In other words have your labels and postage done dont get in line and do it at po. In this case I would also have a legit legal piece of mail large enough to obstruct camera views of other packages. try toblock them from camera view using large legit envelope mail so its not so clear to cameras what packs were under the legit ones. Also if using blueboxes in public same tactic is smart so if someone can place you at the box you have legit legal mail in it that you can admit to. If other packs are forensically straight then burden beyon reasonable doubt may help but a legit piece of mail justifies you being at the box. just some ideas.
/u/fuckwaddd
1 points
5 years ago
not necessarily, real criminals know the pentalties for tellin
/u/mushcanada
2 points
6 years ago
Yeah, resist the urge to wear latex gloves dropping off packages.
/u/4444
3 points
5 years ago
Put a drop of superglue on each of your finger tips.
/u/DonutHole
1 points
4 years ago
would this actually work?
/u/sigg
2 points
6 years ago
Wear some gloves made of leather, silk, or cotton instead.
/u/CookingWithGlass
2 points
6 years ago
Hold up, a fent vendor was operating from mobile? That is wild. No surprise he got caught.

What do you think the most common mistake in opsec would be that gets people jammed up?
/u/MrWhiteHat
3 points
6 years ago
Thinking that working on Windows and Android With VPNs makes you inevitable "anonymous Haxor". Using Services like Facebook Google Microsoft Docs & Reddit on same Tor IP that you use to do some hokey shit. Not Encrypting the drives. Bragging on social media How you "ball" and how youre the "dope dealer" and the list goes on and on.
/u/Kangdonkeyballz
1 points
6 years ago
I'm always suprised to learn how many actual retards there are that do these kinds of things lmao, like grow a fuckin brainstem dude
/u/MrWhiteHat
2 points
6 years ago
The reaches of Authorities go wayy beyound these basic notes. Especially in last 5 years, Feds of different nations have built a spider web of traps over millions of websites. That web may include fake vendor account with high trust ratings & even malicious Exit Nodes [Probably use a VPN in the first place]
/u/FullMetalHerbalist
1 points
6 years ago
Fake rated or too good to be true deals on VPN's are always a red flag. Even better, replace your VPN service every 3-6 months. Better VPN's usually allow payment by crypto too. Use that or PP Visa.
/u/AZERTY
2 points
6 years ago
Some VPN providers also take gift cards. Pay cash for GC, no fee like the mastercard GCs have.

Probably best to sit on the GC for a bit to make sure if they trace the GC to a store there's no CCTV to pull.
/u/McDrugersun
2 points
5 years ago
Is using android to surf the dark web doable? I mean I use tor, orbot, I switch identitys often. Use VPN mode through orbit use bridges if need be. Have pgp don't give out my personal unencrypted. I'm a late bloomer on this drk web shit. So I'm learning but losing crypto to scammers is the only hard way of learning things is as far as I wann get. Meaning I don't want my life lesson of being shitty at opsec being taught to me by metal brackets at the gray bar motel.. Pls advice would be greatly appreciated
/u/sleevey
2 points
5 years ago
I understanding asking questions is important, but resaerching is important. Smart phone use is very insecure.
/u/McDrugersun
1 points
5 years ago
I get it with the smart phone not being idea, however I personally don't use any social media whatsoever, have Java disabled through out my phone http everything, and wipe data e erhtine I logout out of tor, also u don't use tor to browse any websites except the dnm
/u/[deleted]
1 points
5 years ago*
if this is your personal phone, absolutely not. /post/9eb7d61cecc593f1c1aa
a burner phone? still too many risks. /post/731b0187bd2919f64bf9
a phone in which you *physically* disconnected mobile access, camera, mic, rooted and installed stock Android, then secured with Orbot and never accessed any site or app that can link personally to you? maybe.

there's so much background communication going on between phone (firmware, native apps, installed apps) and the mobile towers that phone just isn't secure. Orbot, Signal, Wickr help, but i just wouldn't use a phone for anything more than brief, circumspect communication.

YouTube /watch?v=VFns39RXPrU
/u/stillslingin
2 points
5 years ago
tails should have this disabled default instaed of noobs not knowing to do this everytime booting up

(i used to be that guy)
/u/slappywhite
2 points
5 years ago
Don't use USPS apps on your phone, dont check pack deliveries on your phone period. Once you've set up Informed Delivery, configure it to send text messages for packages. Mute the conversation and let it push all the updates to you via SMS. This will keep a longer history than the ID page or app. You have plausible deniability because you get updates on ALL your amazon shit. Let them PUSH the data to you, don't PULL it.

Don't use your phone to check on deliveries.
Don't use your phone for anything DNM related.
Don't hit the tracking info for the same pack.
They track your IP and # of hits and will use this against you. TRUST ME, I KNOW.
/u/Socialist
1 points
5 years ago
Amazon ships with UPS, a private company that is allowed to check all your mail as far as they please. It's a completely different service to the USPS. Please inform yourself comrade
/u/slappywhite
1 points
5 years ago
Not sure where you're from comrade, but Amazon ships 80% of my shit via USPS. I wish it were different, because aorund here UPS is the most unreliable shipper imaginable.
/u/Socialist
1 points
5 years ago
Ah. I live in a major city, so I was just speaking based on personal experience. Sorry for the rude tone.
/u/foxymethoxy
1 points
4 years ago
I check informed delivery so much. How can you say that you aren't checking it for, you know, everything else?

Not all places ship via amazon's delivery system. Sometimes it goes into USPS, but I buy lots of stuff from ebay, etsy, other stores, etc etc. They can't tell one prio box from another. I usually have no idea what box is which even :\

no one cares about your tracking info just never ask for it from a vendor unless it's contesting
/u/funktioningadct
1 points
4 years ago
My fucking god, I had NO idea. Ive been checking ID since the moment I ordered stuff. Not doing it thru my phone or laptop ever again moving forward. Thanks for this
/u/druglizard21
2 points
4 years ago*
I've read at least one article where they caught the vendor because of the sheer number of packages coming through that region of the Postal System (no doubt all looking similar). Then they started an investigation and one thing led to another... busted

That's why I think people should limit the amount of business they do if they become big-time vendors. A "big fish" is always going to get caught sooner or later, just due to the volume of mail, chances their customers getting caught and working with LE, etc.. Better to be a small or medium fish and keep it that way.
/u/Pointer
2 points
4 years ago
To add on your highlights i would say :
1.Going undercover.This can be a highly effective tactic where the undercover agents penetrate the wider dark web organizations.In a way ,law enforcement have taken advantage of the protections offered by Tor to blend in with everyone's else-on the dark web,you never really know who is on the other end of a conversation .
.
2.Open Source Information .Even if criminal"s business exists primarily on the dark web ,they might have left digital bread crumbs -in forum posts or public documents that lead to investigators to the suspect"s identity .

3.Following The Money .Dark web market places typically use the pseudo- anonymous currency bitcoin,for all transactions the idea being that transactions can be carried out with no link to the buyer or sellers real identity .Homeland Security Investigations (HSI),part of the Department of Homeland Security however has set up dedicated task force for tracking down those who launder their proceeds with bitcoin and other cryptocurrencies.
/u/earthian
2 points
3 years ago
It's good when they catch pedos, why wouldn't they concentrate on them and leave us alone?
/u/a100percentAss
1 points
7 years ago
So are Tor users still susceptible to the same Network Investigative Technique used in operation pacifier?
/u/NdzADmo
2 points
7 years ago
From what I read of it, it was a bug in an outdated version of Firefox. Tor users are supposed to keep their browsers up to date. After the Tor Project fixed the bug, the FBI managed to de-anonymize those users running outdated versions of the Tor Browser Bundle. Really 135 seems low to me. I'm glad pedo's went to jail but at the same time, it is kind of a fucked up way to get them arrested. The same thing could be used on people just trying to safely buy drugs, for instance. Precedent is everything. The users arrested should have been arrested but allowing the FBI's use of the NIT by the courts in the future, in my view, was a mistake. Part of me wants to say "kudos to the FBI", but also "this has serious implications for internet privacy in the future".
/u/sickTightLip
1 points
7 years ago*
Didn't they have to gain access to the server in order to implement the nit ...? Had playpen servers never been siezed the users would have been still anonymous... ? Its good to think of the market as run by le anyhow to make sure your covered but we generally hope markets are run by not the police... this is why I'm suspicious of new markets and have more faith in dreams track record... fud is fud until someone's in the news
/u/Quasar
1 points
7 years ago
No mention of correlation attacks? That's one of the biggest ways TOR users get busted
/u/AZERTY
2 points
6 years ago
Tor doesn't claim to protect against a global passive adversary.

As a practical matter, I'd either do your business on public wifi or snarfed wifi accessed via an antenna.

(Ex: maybe a neighbor has a weak WPA2 key, or you can set up an antenna to get access to a nearby business that most couldn't reach from your place).

Browse JS off, use a secure OS, and even if they punch through and get an IP, all they get is some library, coffee shop etc.

Change up your location often and you should be gold, they can't sit on some spot for months and even if they do they probably don't know what you look like.
/u/policecameraaction
1 points
7 years ago
Correlation attacks are extremely extremely low.

You need to be watching traffic going into the network (guard) and out (exit) or the guard and webserver.

As .onion sites don't use exit nodes, the malicious party has to get lucky for 2 of the 6 relays, and even then with the amount of traffic going through them, it's hard to pin point a user.

This is why they hack the user rather than intercepting traffic.
/u/Quasar
1 points
7 years ago
Ah right, didn't think about the relays
/u/jinx69
1 points
7 years ago*
Depending on the country, isps (the bigger ones) are supposed to implement methods of targeting customers connecting to TOR, if you use your home\work Internet access, connect to tor and immediately do something that raises alerts (fake bomb email or something worse) it greatly narrows down the list of possible suspects. If a tor site shows the timestamps of messages or logins, it creates some additional vector of correlation.
/u/[deleted]
0 points
6 years ago
This is why you use a VPN.
/u/NdzADmo
1 points
7 years ago
Extremely low for now. We are rapidly approaching the era of the global adversary, the era of total surveillance. In the next few decades cryptographic tools will have to become far more complex and innovative if privacy is to survive. Tor as it exists today could not survive a global adversary or decryption via a quantum computer.
/u/DonutHole
1 points
4 years ago
Quantum computers exist today. You really think LE doesn't have access to them?
/u/upsgang
1 points
6 years ago
absolutely very useful
/u/RelatableCyclotron
1 points
6 years ago
You forgot doing through your garbage
/u/sigg
2 points
6 years ago
They may go through your garbage when they search your house. So it's a good idea to get rid of evidence somewhere else.
/u/RelatableCyclotron
1 points
6 years ago
Also Garbage is only public property once it is put out to the street.
/u/B31b82b13
1 points
6 years ago
Great information, also a lot of the common themes I've read in the bast about people getting caught was they completely forgot about their OPSEC. They ended up shitting where the slept so to speak. More often than not a lot of the arrest were made due to the target using his DN username on some clearnet website 10 years ago. What it comes down to is complacency.
/u/sigg
1 points
6 years ago
You should always create new user names for every site you use.
/u/zntmj2019
1 points
6 years ago
Do you think LE can track transactions from a seized market to electrum and then from electrum to the bank (bitcoin provider) ?
/u/sigg
2 points
6 years ago
Definitely. All bitcoin transactions are public. If they know the wallet of the market, it's trivial to see where the money went. Especially if it's the same amount being forwarded. You always need to launder your coins. A bitcoin tumbler is good, buying a different crypto currency like monero is better.
/u/einstein2
2 points
6 years ago
i just read that the usps inspectors were able to deanynomize admins of wsm by following the btc and it was tumbled or mixed as well but they were able to follow it. Im thinking tumblers arent that safe or protective and that btc should be turned into monero and then back to btc. Tumbling before buying monero prob cant hurt. Splitting up the total into smaller diff size amounts and sending them to diff addresses (same wallet is prob ok but dont repeat same addresses more than once). Just saying tumbling doesnt seem to protect the user
/u/[deleted]
4 points
6 years ago
here's where i am lost. if the original method is to tumble, then you say it doesnt work. new method, use monero & tumbler, why bother with tumbler if it will take $ and it can be identified???
/u/CookingWithGlass
1 points
6 years ago
Depends. If you sent your coins from coinbase to electrum, and then electrum to a DNM, they can almost certainly figure it out and I doubt coinbase would stick its neck out for you.

If possible, get btc through other means, without any connection to your bank.
/u/racewarjohnny
1 points
6 years ago
what other means are there to get BTC?

should i transfer btc from my wallet to another wallet?
/u/sigg
1 points
6 years ago
Splitting up the amount and transferring it through another wallet is a start.
/u/einstein2
1 points
6 years ago
Read about wsm admin busts. The usps inspectors were able to track btc of admins even after tumbling. Seems if you cant do complex btc maneuvers to obfuscate then utilize btc to monero then back to btc. If you vend and your product u sell is bought in real world for cash then maybe use your btc to buy weed or something and put a trusted friend on consignment. Dont even need to profit greatly off the shit the real profit is converting to cash anonymously. Of course its not ideal to have to source products with your btc and sell those products in real world to get cash but btc cash out is a tough obstacle for vendors who need cash. If you are lucky enough to reup in btc and sell for btc you have no worries. Cash out is tricky and putting a trusted friend on consignment with a pound of weed will turn that btc to cash to fuel your vending product. Its all about creativity and analziing every angle.
/u/psychthedoor
1 points
5 years ago
Great read
/u/gate
1 points
5 years ago
Thanks for post have not fully read it yet but will wen i have some extra time thanks
/u/Superjerry420
1 points
5 years ago
So there is really a risk in the shipping methods. How come most still get thru?
/u/paranoidandroid
1 points
5 years ago
"The tool was used to expose IP addresses of those accessing the site on the assumption that they were either trying to distribute or access child pornography."

Leaving the morality of child porn aside, what actual proof did they have other than having user's IPs?
If they were using Tails for example, they wouldnt have any proof of them actually browsing through the site. For example, someone else could have been using their WiFi (cracking it, etc).
Also, how exactly did they obtain their IPs? Shouldnt Tor mask them? Or is it because they enabled java temporarily to view/download media?
/u/dj1n
1 points
5 years ago
Thanks for the input

I suppose the moral is, nothing is 100% secure,100% of the time.
Always be paranoid.
/u/miked
1 points
5 years ago
Is there a better way to send priority then buying stamps?
/u/labourallude
1 points
5 years ago
great info thanks
/u/ccStock
1 points
5 years ago
Amazon delivery hiring a bunch of drivers. Feels like good opportunity to infiltrate
/u/0b1sh1n0b1
1 points
5 years ago
Firefox plugins
1. NoScript - fine grain control of what is blocked for what sites
2. FoxyProxy - Proxy Switcher, fine grain control of what sites get what proxies
3. User Agent Switcher - If you aren't running Tor Browser, set your useragent to TOR Browser

optional - greasemonkey for hacking appearance of sites client side.

Disable web RTC. Make sure flash and web-java are uninstalled. Both are obsolete and chances are you don't need them anymore.
/u/Pressergoal
1 points
5 years ago
Good Info!! Create more awareness
/u/Kill_Covid
1 points
5 years ago
does Opsec record suspicious bitcoin addresses? And how do they find/collect them?
/u/farinelli
1 points
5 years ago
Why Tor browser is still legal then.
/u/dreadditard
1 points
4 years ago
Because the US army likes to use it when they want to invade countries they don't like
/u/dumblemoose
1 points
4 years ago
See I don't get this. Why don't they just set up a shared VPN network like all companies do for remote employees?

The fact that there have been seemingly no attempts to shut public down TOR browser projects is suspicious to me.
/u/karmakurez00
1 points
5 years ago
I appreciate you postin, it is a good collection of relevant examples and concepts.
Just want to suggest adding SEing and psychology under the hacking section. There was an intriguing case (maybe fentmaster or etiking?) where they used a phrase- "hiya" -to pinpoint the area so a smaller radar.

Thanks again for your post
/u/S0cks0verBadPr0xy
1 points
5 years ago
Keep digging settings and options - otherwise you're done.
/u/iProvide
1 points
5 years ago
Great information even for a seasoned user of the darknet.
/u/sunrisesun44
1 points
4 years ago
I think we need to really uodate this post seeing all recent events that have happened!
/u/dr0ik
1 points
4 years ago
open dashboard on ublock origin and check boxes for block javascript-remote fonts-webrtc
/u/codeinecrazy
1 points
4 years ago
thank you for posting this
it is a huge help
/u/bobby23
1 points
4 years ago
very good Articel....THX
/u/BlueberryBlades
1 points
4 years ago
Good post.
/u/Jumpred
1 points
4 years ago
I'm seeing a lot of people recommend using Qubes and whoonix for solid Opsec. Would that have similar protection as running tor on an Oracle Virtual Machine? And this might sound really noobish, but does layering another VPN like Mullvad with Tor do anything?
/u/dumblemoose
1 points
4 years ago
Layering with Mullvad is definitely a good idea. I don't want my ISP to know I use TOR, or frankly anything at all. Mullvad's linux client supports "only allow network access via VPN" mode. Use that. Pay with monero (duh).

Layering with a VM does absolutely nothing at all if your network device is still your system's network card. Setting up whonix is piss easy to do and will fix this problem (and many others). You literally just run virtualbox with the image package you download from the whonix site. After that you're safer.
/u/geraldbiggums
1 points
4 years ago
Does anyone know if this is all still pretty much up to date? Wondering if there has been any recent techniques they've discovered etc that we should be worried about. I'm assuming just being a lowly buyer I am safe so long as I follow the bible and the wonderful information posted here but you know what they say about assuming...
/u/Heliumadmin
1 points
4 years ago
URL bar: about:config
search: java
Disable Javascript.enabled :true
Will become: Javascript.enabled : false (disabled)

Above is just just one thing. If you don't want to get caught always use KeyScrambler for windows i suggest https://www.qfxsoftware.com/ for linux users you can do this yourself

Drop iptables rules

their are tones of things to do according to your distro anyway stay safe ;)
/u/funktioningadct
1 points
4 years ago
Can someone mention if it's likely that personal users get caught?

Also are there sort of signs to tell if a vendor is LE undercover?
As a new buyer, Ive been really only using those who have a good amount of reviews on the market AND dread..
/u/jimmytimmy
1 points
4 years ago
I am wondering the same thing. Do they bother looking into the personal user's if they use the standardopsec like tor, VPN and encrypting address?
/u/some-body-else
1 points
4 years ago*
for hiding IP there is a old hack who can still be use
1. take a burner phone and registrate the SIM using fake ID (phone registration with fake ID based on a real person or something close or even take a psd photoshop template and make your copy of ID card as you need)
2. Use the 3G/4G to access internet through your cellphone with a USB cable and of course pay the communication via prepaid card in cash on your local retaillers

I think if there is no ISp moder/routeur only a burner phone control by a anon SIM there never get your IP because using 4G

Is it possible and still safe to do this guyzz today?
This idea was from a friend who does it 15 years ago already
/u/[deleted]
1 points
4 years ago
Honestly I feel that there should be a way for individuals that use this forum to verify themselves before they can even access this subdread. The cops are constantly reading stuff on all platforms. I really appreciate this advice from /u/Cannablys. I think that the intuition of each user is probably their best weapon against law enforcement. Below are some pysch. tips to better suit yourself if you are speaking to an undercover cop.
1. Look at all their comments and posts before speaking with them. (Generally you can weigh cops out by looking at context of each post.)
A. Are they asking more questions than providing answers.
B. Are they seeming to be too informative.
C. When you communicate with them do they immediatley ask you to connect on a less annonymous forum such as( telegram, wickr,)
D. Do they respond immediatley after you pm them or respond to them. Look at the time incriments between comments. A good rule of thumb is if they have a habit of responding your messages withing 2-3 minutes time consistently this is a good indication that they have nothing better to do or that they are trying to get as much info out of you.
2. If you move to another platform (such as; wikr, telegram, ex)
A. Again watch their response times to your converation.
B. Ask them questions( not too specific but general questions about what they do and what their goal on the dw is)
C. Common Questions they may ask are... Bro I can text you-it is safe I am using an untraceable number(they want your cell for location purposes) They will ask questions that seem like they are too ignorant.... Do you know any vendors that sell... Do you know how I could buy this... Do you use cashapp... Offering to video chat withing 4-5 hours of linking up with you...Asking specifics about a certain vendor...Offering to give help and offering a less secure mode of comz.
3.If you suspect that you are talking to a cop
A. Immediatley make sure that you are 100% sure.
B. Look at your opsec. If you are communicating via mobile apps like tell and wickr make sure that your vpn is active and that your personal info is turned off. I know that tele gives you an option to remove your phone number from veiwability. You should have that diasabled anyway. You should also be using a burner number when using telegram. DO NOT USE YOUR PERSONAL NUMBER. TELEGRAM CAN BE ACCESSED BY AUTHORITIES IF THEY GET THE RIGHT CONNECTIONS.
C. Block and delete them if you are sure and make sure to get their alias and usernames. Let people in the community know. If they disapper on all forums under that alias then your inclination was correct. They have been busted and they know they can't use that alias to spy on people.

Below is a renstated example of a conversation that I had with an undercover cop: VIA TELEGRAM
He tried to use an alias that he knew I would respond to...


Him: Hey who is this?
Me: My alias begins with C and yours starts with A if you can confirm both we can chat
Him: Hold on man
Me: You should know without thinking if you are who you say you are
Him: Bro I am really busy man just a second
Me: You reached out first
Him: Text me bro I got a new number (he provides, I run it and it is showing to be attached to lapd)-fucking idiot he is
Me: Nope you didn't
Him: We have everyone kid: you are next we know who you are
Me: LMAO if you were serious you wouldn't be waisting the time texting me trying to get info
(I blocked him asap and purged the account and phone to be safe.)
Best of luck yall.
/u/opsecopsec
1 points
3 years ago
I found this awesome site which has over 100 opsec tips on it, i really learned a lot and it opened my mind, it also lists best operating systems for anonymity and other anonymity services i find it really good, so i decided to share it here. Only - side is, that it uses some js for its theme, but i found no tracking at all, not even tracking fonts, it safe to use.

LINKS:
-----------------------------------------------------------------------------------------------------------------------------------
clearweb: https://cybertoolbank.cc/
-----------------------------------------------------------------------------------------------------------------------------------
/u/[deleted]
1 points
3 years ago
usual moral of the story: no matter how amazing the technology is, the human factor will always pose a security threat.
/u/Dark_Valley
1 points
3 years ago
Thank you,so informative.
/u/Cayson
1 points
3 years ago
Thank you .But you shouldn't be using "GOOGLE"
/u/Theeghost
1 points
3 years ago
Thanks so helpful
/u/digdug
1 points
3 years ago
thanks for the tip it was very helpful
/u/PolarisLabora
1 points
3 years ago
the pedos got what was coming to them
/u/SameSame
1 points
3 years ago
This is very helpful! Any thoughts on financial transactions?
/u/tots2
1 points
3 years ago
THank you for the wealth of knowledge. Both refresher courses and knewly obtained. Was wondering what the hell the best way to turn cash into usable crypy without having to sit down an teach every degenerate under the sun about crypto, I havnt gotten to the point of cashing out. Im sure I will take a hit but I'm worried about making it that long. Fcked up in the bengeiining for like 2 monthss. haveebeen much more on top of it lately but stil not enought coin coming in to operate at full capacity.

Thanks in advances if any1 wishes to pm me on this one as to not spill the beans feeel free.

Thanks for your time, Always stay safe.

-T

ps.dont have some massive conglomerate running. nowhere close but u know how they do. follow the money trap a small fish casr en back out to catch a 50lbs striper
/u/LouraWinchester
0 points
7 years ago
props for the well made list, i would probably not spend time on this because of my shitty attention span so +1 for you.
/u/simple
-4 points
5 years ago
Are you all fucked up Child Abusers, or why else would you care about Tails and disabling JavaScript in the browser config so much???
/u/dreadditard
1 points
4 years ago
Nice try FBI