For the umpteenth time:
Unless you're a vendor, or a very large and frequent buyer (like more than $1000/wk on an ongoing basis), tumbling coins is a waste of time and money. It is so much easier to investigate people using clues from the U.S. Mail system -- package profiling, controlled deliveries, etc -- rather than speculative blockchain analysis.
Wherever you get your coins from, just send them to a random private wallet that you own first, and then from there, send them to the DNM. Get a private bitcoin client like Electrum. Done.
ipvanish appears to be solid; I use Private Internet Access myself. Believe I've heard some concerns about VyprVPN logging & providing logs to authorities.
Check out and definitely do good research otherwise, but a year's subscription for less than the cost of a good meal and the option to purchase entirely anonymously makes PIA a winner in my book ($39.95/year when I got).
https://www.paypal.com/webapps/mpp/security/chargeback-guide#fighting_chargebacks Every time I use lbc, I do cash deposits and send a pic of receipts that I have to write ""No refunds or reversal" on it and rip in half and send a pic to the btc seller.. Damn brother that's terrible and I hope paypal will fix it for you.
I never use any darknet stuff on my phone, so I may not know what I'm talking about, but doesn't Privoxy have to be chained to Tor?
http://www.privoxy.org/faq/misc.html (See Section 4.10)
The picture looks like it's interpreting ".onion" as a file extension, instead of a Tor site. Is Tor/Orbot on the phone to begin with?
F5ing is the only thing that works. When it does work, it often goes lightning fast. Then suddenly losing connection. Some other market(s) seems to be behaving similarly atm.
I don't think single users refreshing the page trying to access is what's causing the trouble.
I don't know why it occasionally seems to go very well, just takes a bit of refreshing..
while I know little about it all,especcialy running an internal .onion server and how the routing and all works, n unsure if it could help any.. mayb someone who'd bother can try look into the torrc file (named torrc-default or such w default browser bundle for win, in some subfolder.. ) and set the 'EntryNodes', 'Bridge' or such parameters.., and see if can lock to a static one or few nodes that seems to run smoothly with Agora that works,, or set up some nodes to play with different settings to see how if at all it can affect access.
Seems after a bit, refreshing and suddenly it doesn't work..using a new host? maybe try lock it to one , if some others dun work for whatever reason.. Atleast for some purposes, ifnot just for playing aroung to learn more.
https://www.torproject.org/docs/tor-manual.html.en
You can go balls-out on OPSEC... but I suspect for random buyers, the average person uses nothing more than the Tor Browser on Windows. That's it. Not saying that's good or bad, but there's a misconception that buyers get tripped up by not tumbling, or not using a VPN, or whatever. Buyers only really run into trouble if/when their vendors screw up -- bad stealth, package profiled, etc -- all of which is largely beyond the buyer's control.
The most important thing is learning how to use PGP, and encrypting your address or other sensitive information. Also, at least when starting out, stick to domestic ordering IMO...
TAILS can be interesting to play around with for a learning experience, and it's marginally safer than Tor on Windows, but I would say this is secondary to PGP. And you need to do a decent amount of reading to install it properly.
Download here and choose the same install path as the older bundle. Make sure Tor browser is closed when you update.
Probably 4GB, but you may as well just buy an 8GB or even 16GB... not much price difference.
If you're installing TAILS, it doesn't work with certain USB sticks, just take note.
most reputable vendors will cancel your order if you don't use PGP. it's for your own protection, so you should take the 10 minutes to learn how to do it.. Many good guides have been written on how to use pgp. Find one, read it, try it yourself. After that if you still have questions we'd be happy to help you! right now, though, you've gotta do some work on your own.
Neither IPVanish nor Tor is "illegal software". What are they going to do?
> Got IP vanish and tor on there, I bought this computer just for AG honestly
Unless you're a vendor, don't you think that's a bit overkill?? TAILS or even just Tor on an encrypted USB stick. Finished.
lol you use https://www.mailvelope.com/ as your pgp source, really?
good luck to anyone who tries this shit. even if they are legit you are trusting your address to someone who hasn't read an opsec 101 guide.
Personally I've just been using CyberGhost free. They aren't always at the top of the deep web list but from what I've read they don't store logs (even when LE grabbed their servers they said they didn't find anything). And for me it works just fine. After a few uses you have to wait for a free slot to open but it only take a few minutes.
Although since Agora is the way of the future, at least for me I may have to invest in a longer term more perm solution.
Cheers.
I'll give you a serious answer before someone bitches at you for not posting in /r/DarknetMarketsNoobs. Always use PGP encryption when contacting vendors. Also I don't think IPVanish is necessary. Tor already connects you with a random IP so it seems like overkill to me. Buyers rarely get busted. When SR 1.0 got shut down the feds had thousands of buyer's addresses (those who did not use PGP). There was a massive thread on the SR subreddit about it and I don't think anyone ended up getting fucked. There were only a handful of people that got busted and they were dealers of massive quantities. Anyway, just use PGP and you have nothing to worry about.
>I created a firefox extension to help me with orders with my vendor account
You created a unique firefox extension that only you have? Hmmm geee. That's not a mind blowingly easy way to uniquely identify you. Really.
https://stackoverflow.com/questions/5188908/detecting-installed-plugins-under-different-browsers
Well for your host OS, id use something like Linux Mint(http://linuxmint.com/) or Debian. As for good opsec, id try to use tails(https://tails.boum.org/) on a bootable USB.
Also gpg4usb is a really good pgp program, id include that with your private keys in the encrypted container. Veracrypt/Truecrypt are pretty good options for creating a encrypted container on your usb drive.
Hope that helps.
Tails - https://tails.boum.org/ Burn to a CD, boot it up, install tails to a USB. Boot the USB, Configure Persistence and you can use KeepassX . Your persistence is encrypted and you have to set up a password and then your KeepassX will also be encrypted which I suggust you use a different password.
>Some users have requested support for VPNs in Tails to "improve" Tor's anonymity. You know, more hops must be better, right?. That's just incorrect -- if anything VPNs make the situation worse since they basically introduce either a permanent entry guard (if the VPN is set up before Tor) or a permanent exit node (if the VPN is accessed through Tor).
TAILS doesn't work with some USB sticks. Mostly Cruzers in fact.
TAILS is overkill for random buyers. Most just use the Tor Browser on their normal OS.
If you're sending from any service tied to your identity (Coinbase etc), yes, an intermediate private wallet is almost mandatory. Otherwise, Circle/Coinbase will shut down your account sooner or later.
I'd recommend Electrum at this time, but even a random blockchain.info web wallet would work since it's only temporary.
Reddit uses Markdown (with some slight alterations), so the most suitable way to format it would be with a code block:
Message goes here.
Those are grave accents, and mark the start and end of the block. You can get the same result with 4 spaces in front of each line, but that's a bit more cumbersome.
VPNs have been useless for a long time now
If they want you, they'll get you friend. For example, NSA has has backdoors built into RSA and god knows what else for some time now.
Tor itself isn't all that secure. Just do a Google search for that MIT paper...I'm too lazy and already linked twice
Tails is pretty easy to get started with. Grab a USB stick 8gb should do. Download the Tails ISO, and use linuxLive (http://www.linuxliveusb.com/) to install on the key. Be sure to change the BIOS to boot from USB You can google that for specifics on your computer.
Tails has a Window look alike desktop that makes it an easy transition. plus you can hie a USB key easier than a computer if needed.
Always be safe! http://agorahooawayyfoe.onion/vendor/TheBartender
Is the disk working at all? If not, you could try to find a matching PCB from ebay and attach it to the disks. Not hard, just need some torx screwdrivers.
If your computer still can detect the disk, you should try http://www.cgsecurity.org/wiki/TestDisk
I do but its on my instagram, im not trying to go through imgur to upload. http://websta.me/p/886235477659409512_234543894 see if that works. and if it does, then here: http://websta.me/p/886245124072070485_234543894
It was late. and I left out that what I meant was. I meant, you now have my PGP public key.
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: Mailvelope v0.13.1 Comment: https://www.mailvelope.com
xsBNBFN57j4BCACYxtLe9/rC1Xc4zMCn2ILGzvd2jyRUgWymlnqeddIHWmnt l49O3mlHTiFltxR0skSOWJxeTnB6Li1kfu/mxwPyKIn3nabYRIPQecSbPa/n LNkdcfZzGVxFHL3ULYQycCf9ykbIIxxWjAgp18lgtXaC++zNpcd9tyb/a94T AUYTJxx9ODnAvjBM4yPHN0Mx52J9U8Q0WzRJwAGck0cXWTa2yGP7A46PdGYP Bi0OsmMfl1kBeupHWvWElDhUhSNYOlwx4GzAtCDqQb2FFJt+ZZXEQezPT7A5 G4HJ6nzQurRn9cAD6xSNQlTikk0KXnNA8+QynMBawAzHAjdlj9yrIvVvABEB AAHNH3hzdHVkZW50IDx4c3R1ZGVudEBvdXRsb29rLmNvbT7CwHIEEAEIACYF AlN57k0GCwkIBwMCCRDUD8ifqdS9ZgQVCAIKAxYCAQIbAwIeAQAAw7sH/jjP M4vI4Rry6ZgKnzarNspTVBLN/xmGAgWd+EgIjncQoEesxTcEv50HqXbWNseL ARzgxMTr7hqCnlSE/LFKkjjCQKe4GPRxSjHRK893JDrKT86TSiiyVz2gGQnq 26PRe0LK4TY6xZBDYhZgi2K3lk/cHSgIpMI8xbHhd2+aqwB3A1hyaT5891VE m1vKGQdSVGV2U+rpGVoMRfA6AUtI+ShAVUjw2qB/DEGyiSjuQ7/t4U94PtDm m7GJzovIK2xDSh7y5M7Oa97pj+QDK8U5lxQjEyFhnZ3TzPcylTYplBu8O1XC /gFy4BRq05fIOxYdFdAu8kzSKRK33gouYDC6Gi3OwE0EU3nuTQEH/3AkcnEU rGM9df0Ojhvpl+0nWuAda2Ij28cHzz912KgJiRQiJDJWUOXN26SUQYRIth9X FlVoVUqT15s9VOzOgnyy/zqnbl00hrubuPAZkf+mMl8/U6dUGkSuypim000r 2LHljVY43TcAdRrCUWPAEphCmSHVrsbQUclTv7pN4gV1ftloDmcboJHkcK7I 5iloI64+WxSKV0DxmEmPwolY8AAa3IF2JlBy3pLPRWCJcnaAle3K0W3zj6jO ze1OV30nMYGpAC5OgKv/+F+hCIl8gpOeN2t+YW1GRkuUGr2AOYBLqquQtsQ2 8CApyDkeKkqLMvAUfbI3Ulq8Z4sm7mhR8ZUAEQEAAcLAXwQYAQgAEwUCU3nu VAkQ1A/In6nUvWYCGwwAAJhbB/4/DnYLFG+Fmh2HUWmo84dxQb0R2pr8oLKg icYrDEsSg1pofKQ9FDcvxJjZkfdGx6NnUlMtSz4K48DjZokABvwuiYCHveyi OCX97cxMBjPPuarRmCfLeyerUMSEQ55F1GJBB0HsreB996J6DQXdctZ5Z3LG mbTkaPDJCRyPrEX8Z6SX8RBIXKUbSQQ6RHZTYUaAm14/ACKjO/dxO8m/7aIY z1siR7NBhjunqzA8tA1MWeCqDTz6zSDhf2jO9pfZtwe78zDZHGrud0QP6xWb eM+VmX4PJAR4rITxOh0LywttDhNwepekJnAozc7gDf84ptO0z7p30gaaXLPP +K7smOqK =0/7E -----END PGP PUBLIC KEY BLOCK-----
So Feel free to message me via PGP-encryption using this key. About BlackBank , etc.
This is what 10/g OD should look comparable to Got this from another vendor. Its completely covered and has a very good quality to price ratio.
So.....yeah everyone can be the judge now.
https://anonfiles.com/file/49d4f100331dd1ac67893de433b9896b
https://anonfiles.com/file/3c0ea6326a21105da941eb3954d29859
The smell is fucking powerful. I can't emphasize that enough. I can't open the bag without my whole house smelling up.
wow you didn't even use TOR? Tails is an operating system. The blockchain logs the incoming IP for every single transaction which means anything you sent from electrum without a VPN with forced DNS has your personal IP directly associated to you. You can find a slow free VPN or pay the $5 bucks a month for a great one. AirVPN is recommended, cheap, and you can pay with BTC. They log IPs but have an internet protection policy which doesn't allow them to give the associated inbound IPs with their outgoing ones, ALWAYS MIX YOUR COINS! Even with a face to face transaction you could easily be buying from LE or if you use a bank they have a nice pic to trace it right back to. Do not underestimate the blockchain if you get used to reading it; it is very easy to follow transactions. EDIT Also become very familiar with PGP ALSO a decent video for noobs never use a password twice!:
AirVPN have a good mission statement and overall policy on the face of it. More importantly their entire stack is open source as far as I can tell. This is good as you (or a programmer friend) can verify there is no dodgyness occuring in their connection state they don't use older or known vulnerable crypto tech thereby keeping you and your connection safer (theoretically).
No protocols are restricted and you are allowed 3 concurrent connections on one account. Bandwidth is not throttled either (in general or at the protocol level).
They also have detailed guides on using their VPN together with TOR and how to prevent data leaks through known vectors. Their forum is a wealth of info in this regard.
I have no experience of the providers you mention so it would be unfair of me to comment on them. I would however suggest you CAREFULLY research the HISTORY of any vpn provider you choose. Are there reports of them turning over logs (which they may deny keeping)? Do they cooperate with law enforcement without court warrant? Where are their servers located? Through which jurisdictions is your connection routed?
Of course your level of paranoia should be dictated by what you intend to do. Bypassing geo blocking to watch tv is one thing but some peoples lives depend on remaining anonymous (think activists under oppresive regimes).
I should also state that this is based on my experience with AirVPN and your mileage may vary.
EDIT: Found this review site which may be helpful to you
I personally use CyberGhost 5 as a VPN. Free and easy to use. It takes two seconds for an added barrier of security. I also use Tor in a Tails Virtual Machine, but considering Windows is my base browser it probably doesn't do anything but help my peace of mind. In all honesty though, if your only buying small/moderate amounts of stuff, you should be fine with just Tor and maybe a VPN. The feds are more worried about catching big-time vendors and most of all shutting down whole markets than getting little guys like us.
this is true, I use Private Internet Access. from what i have read and come to know about them is that they are one of the best and and you can pay with btc so thats a plus. if im doing anything that will get me in trouble i take very long strides to stay anonymous.
get one of these and realize even a scale like this is possibly off by as much as 2-5mg, volumetric dosing might be your best answer.