Would that me a working method to run a DNM in Clearweb anonymously? : vendor_handbook | Torhoo darknet markets
I recently worked on a possible OpSec way to hypothetical (I do not intent to!) run a DNM in clearweb. I want you to rate that theory of OpSec I figured out.
First of all, of course, it is assumed that you use every website / service etc... only via, tails/whonix, with VPN, in public wifi networks, via tor and so on, and that all OpSec measures are taken when purchasing and paying with XMR.
1. You host the Site on an trusted Tor Onion Hosting Service and get a random .onion domain. Let s pick the example: xyz.onion
2. You use a Tor2Web Service to get your onion site, reachable without Tor
So you have the domain: xyz.onion.to
3. You use an anonymous offshore server provider in for example Rwanda or Iceland. You anonymize this server with Tor-Routing(extra Bridges) and configure it to be a reverse proxy server, using an anonymous opensource dynamic DNS Service to kind of have a static IP address or rather a domain.
4. You use a crypto accepting (onion) domain service, and there you create a CNAME record, pointing to your dynamic DNS service domain from step 3.
This makes the onion site accessible through the tor2web service from the clearnet, and the configured reverse proxy offshore server, links the onion.to domain to a legitimate clearnet .com domain. This makes it look like a normal .com website, but hosted on an anonymous onionized server on the darknet.
I m grateful for any thoughts and opinions!
Keep things organized, clean and sorted.