Could you please provide the information or graphic which shows the results you posted are related to the tab sold by our shop?
I would be more than happy to provide a response but first would like to see the lab's descriptor of the tab being tested.
Edit: See this image for specifics on print detailing. Notice that it's attributes can be confirmed: https://anonfiles.com/file/02ae48b0eb83b34f4e7d3d5c8878016b
Also, please see my post here for more information regarding this accusation: https://www.reddit.com/r/DarkNetMarkets/comments/2xsgxj/lab_report_blueviking_200_mcg_lsd_tabs_on_marilyn/cp3u4wk
Donated 5 BTC. Stay safe everyone. Armour the tank before you enter the flank.
Transaction ID: a4ca8f3bb305e9ee1460f4f0e2a9e089675d6972394f33885d2d218f50855d2e
Donation link: https://tails.boum.org/donate/index.en.html
- Bank Transfer
I agree! You can donate here: https://www.gnupg.org/donate/
Edit: Just donated myself. If you placed an order on the original Silk Road and used PGP, this man's code probably saved your ass from LE.
Before using ShapeShift.io's services, please consider the fact that [ShapeShift's CIO is an advisor for law enforcement groups](/r/Bitcoin/comments/6q319b/shapeshifts_cio_is_an_advisor_for_law_enforcement/) and a member of the Blockchain Intelligence Group. ShapeShift also [publishes all transactions](/r/Bitcoin/comments/59c1kg/expect_no_privacy_from_shapeshift/d97avyb/) (amounts, times, currencies, etc.) on a public API, and [you should expect no privacy from ShapeShift](/r/Bitcoin/comments/59c1kg/expect_no_privacy_from_shapeshift/) for various reasons.
There are several ShapeShift competitors operating. Examples (sorted alphabetically):
XMR.to or xmrto2bturnore26.onion/nojs/
And many more on bestchange.com
/r/DarkNetMarkets does not endorse nor make money from any of the above services.
I am a bot, and this action was performed automatically. Please [contact the moderators of this subreddit](/message/compose/?to=/r/DarkNetMarkets) if you have any questions or concerns.
Well, you should donate to the TOR project becauase withtout it you would be getting ripped off by your local dealers who are being ripped off by thier suppliers etc and so on.
Shut down my pc and Practice saying "I am not answering any questions before I speak with my lawyer"
With A fully encrypted HDD and a 15 character random P/W
It would take a desktop PC about
12 trillion years
to crack my password
I have the archive. Though its like 900mb compressed, so I'd rather not upload it. Is any one else interested?
There are a lot of carding tutorials and stuff related to that. But I'm no thief so the only thing interesting was the banned books.
Edit: Here's the link. Thats the first upload site I found. Sorry if it sucks.
Well if they SAY they don't keep your logs then it must be true. You can certainly trust their word as long as it's only your personal freedom at stake. But just for argument's sake, how exactly can you verify that they're telling the truth? You know: just in case you're the paranoid type.
HideMyAss claimed that they didn't keep logs either, but when the Feds came knocking....
You're most likely not going to find a free VPN that won't log your traffic and will refuse to cooperate with the law. If you're adamant about getting a free VPN, I would recommend Spotflux. However, you'd be better off using NordVPN, as they're pretty anti-LE. It's also only like 60 bucks for a yearlong subscription. I feel like, if you're willing to go the extra mile of using a VPN to hide your Tor use, you should be willing to spend 5 bucks a month on it.
Privacy, privacy, privacy ! Anonymous !!!
Do a Google seach and read the first page of résults for Mullvad review
And you can pay with Monero if I remember correctly
You can buy for a year or more, cheaper, I think
Did anyone here laughing at the "block Tor" part in the title actually read the fucking article?
>After the recent Paris terror attacks, the French government is proposing to forbid and block the use of the Tor anonymity network, according to an internal document from the Ministry of Interior seen by French newspaper Le Monde.
>As for how the French government might enforce a legal ban on the use of Tor, it may be possible for an internet service provider to tell when one of its customers is using the anonymity network (although the ISP cannot see what sites the user is visiting.)
This proposed law would make it illegal to use Tor, and your ISP can tell when you're using it if you aren't behind a VPN. The majority of people here already do the bare fucking minimum like use TBB on Windows, and even order on Android and iOS. You think anyone is actually going to get a VPN?
But yeah. If this law passed and LE wants a warrant to search your place, they can use the fact that you use Tor to get that warrant.
Don't know but I'm going to guess that all the VPN providers whose privacy statement includes text like PureVPN's that they do not keep logs refers to routine day to day practice. If the FBI come along and ask for details about you, then a USA based provider will probably have no choice but to put a trace on your account so everything you do is specially logged for the Feds. In other words, you may not be fucked over routinely but can be fucked over at will. Or something like that.
Perhaps the best thing to do is to use a vpn to connect to the interweb and then, over that VPN run a second VPN channel with a different provider. That way, the first provider sees your real ip address but all traffic is headed to the the second one's ip because that's the clearnet equivalent of your exit point like Tor as it were. The second sees your traffic as all coming from the first provider's ip address and they have all the ip addresses you access, so the feds would need to have both sets of logs, to know that you own both accounts, and then they'd need to match your activity over time to bust you but a smart lawyer would probably find plenty of plausible deniability in that matching.... Eeesh.
You're assuming that your VPN service won't give up your identity, even when issued a subpoena by the FBI or other government agency. If you think any company out there is willing to fight the US government to protect your illegal drug activity, then I've got some land to sell you. It's beautiful, undeveloped property in Northern Florida. Plenty of water and wildlife.
Read up on what happened between HideMyAss and LulzSec
You can alsu buy calibration weights, there are not expensive 10$. Some 1mg resolution scales come with calibration weight. I dont think that using coins or bill can give good accuracy. It can serve in "emergancy cases" where few 100mg more or less is not an issue, but for any viable scale accuracy, proper calibration weight must be used.
Here is amazon link for 10$ calibration weight set.
It has 50g,20g,10g,5g,2g,1g. then 500mg,200mg,100mg,50mg,20mg,10mg weights. There are also other weight set, just find most sutiable for you.
Why do ya guys keep on using shapeshift? It's not annoymous at all and the knowing cooperate with LE.
If you're gonna swap coins choose an exchange based in an Eastern country. Access it through Tor and don't submit ID.
2 decent exchanges are:
What do you suggest? Buying a carrier pigeon with carded gift cards, training it to relay your messages to a third party in North Korea and tying a PGP encrypted message to it's leg "bruh"?
Nobody needs to go to jail (see ). What jurisdiction does my government have over NordVPN in Panama? Or BolehVPN in the Seyshelles? Absolutely fucking none "bruh".
Would my ISP give me up? Yup, in a second.
So... using a privacy focused offshore VPN is vastly superior to using nothing.
Unless you can come up with a better realistic solution to checking clearnet sites for nefarious activities you can just go back to your homework. (And no I'm not going to McDonalds every 2 hours to use their wifi "bruh"... anyone who suggests that as a realistic solution is either a 12 year old or a moron... probably both)
Maybe they jump on the new sites because there's no risk of getting scammed.
Drug vendors and markets have to slowly build their reputation before running off with everyone's money.
Edit: What Gwern said: https://news.ycombinator.com/item?id=9852972
It's a cryptocurrency with true anonimity built-in. Nobody can analyze the blockchain and know how much someone has or where exactly it went. It's been around for a while, but it isn't yet user-friendly enough to attain mainstream adoption (no GUI - coming soon though. For now, only console, but it's simple enough to use).
For more info: https://getmonero.org/home
This shit is dope... I knew my donations were ending up some where...
Don't forget to donate to the Tails project if you think this shit is dope.
Tails release 1.3 will have Electrum built in. The ~~current~~ old version (1.2.3) does not have Electrum.
~~You can download and try a 1.3 release candidate from here:~~
Edit: 1.3 Just released! Download it from here:
If you are using persistence, enable "Bitcoin client" in the persistence tool.
(Applications > Tails > Configure persistent volume)
For Tails: By default, your ISP knows you're running Tor. If you select bridge mode, then they probably don't, docs. It probably doesn't matter.
The cable doesn't matter.
A rooted android means that someone would just have to compromise your Google account and install a malicious root app from the play store to own it. Also, Orbot is not as well tested as the Tor desktop client, and the VPN feature it has is marked "experimental use only". Do not do this.
Instead, purchase a cheap laptop in cash and use TAILS. If you're extra paranoid, take out the hard drive, camera, microphone and speakers, and store the TAILS USB somewhere else.
You can get TAILS here: https://tails.boum.org
Edit2: Added TAILS link
Just use Tails and send the coin from CoinBase to its built-in Electrum wallet, first. Don't do this with Electrum (or other "light" wallets) on other platforms, though, unless you really, really know what you're doing.
Since you ask i assume you didn't watch, so what he says is:
That LE told him (Roger Dingledine, Tor Project Leader, Director, Researcher) that the whole "Onymous" story was:
You're joking right?
They comply with governments: #comply
>It is necessary to avoid abusing users who exploit VPN Gate to hide their IP address for wrongdoing. An in case of such abusing were occurred, it is necessary to trace the source IP address of such illegal user. Analyzing VPN Connection Log is helpful to investigate the source global IP address of him.
They keep logs:
>We always keep VPN Connections Logs of VPN Gate Public VPN Relay Servers for three or more months
>Each VPN Gate Public VPN Relay Server keeps Packet Logs
>If you are a policeman, a prosecutor, a lawyer or a court who is authorized to and wants to request the disclosure of VPN Packet Logs, you must contact to the operator of the target VPN server. The contact address is listed on the VPN Severs List page. If your target VPN server is not on the list, or you cannot find the contact address, instead you have to contact the ISP who is responsible to manage the IP address. You can reach the appropriate administrator of the target VPN server via ISP if you are authorized by laws.
>If you are a policeman, a prosecutor, a lawyer or a court who is authorized to and wants to analyze the contents of obtained Packet Log files, we can help you to analyze the Packet Logs within rational and practical efforts if we can afford.
When the fuck will you morons learn to not use "free" VPNs. Jesus fucking christ.
Did you ever listen to The Art of War in your office on repeat and dunk everything you own, including your naked body in rubbing alcohol?
Exactly how much MDMA should you put in your ass in one setting?
Did you ever mix meth, cocaine, 2CB, MDMA and MDA in a capsule?
Has anyone asked you for jenkem?
On a scale of 1 to 10, how would you rate how big your balls are? Did you ever have to hit a guy with a wrench?
What was your diet like when you vended? Did you eat a lot of cheeseburgers and rum?
It depends on what type of heroin you are getting. In the USA, you're going to find either black tar (Western US and parts of the South) or ECP (East Coast powder) heroin, both available plentifully on the darknet markets and generally specified as one or the other. Stamp bags are always going to be ECP, not tar.
Black tar can be smoked or injected; East Coast powder can be snorted or injected. Either way, the two types of heroin both have their own route of administration that does not require injection if you so choose. Both have poor oral bioavailability so oral consumption is not recommended. r/opiates can give you information on plugging it if that's your cup of tea.
I get the feeling that you like snorting; if this is the case, I'd recommend East Coast powder heroin. You're probably best off getting some stamp bags because they're pre-measured amounts and it's easier to dose than eyeballing lines out from a large amount like a gram and good heroin requires so little that it's very easy to miscalculate and overdose. Smoking black tar/"chasing the dragon" requires a bit of skill and technique that is best learned from someone else and difficult to master on your own so personally I'd recommend not going that route but I'm sure there are YouTube videos showing how to do it or something.
Using WiFi that isn't tied to your name is a great way to (usually) improve your anonymity. You should be able to use Tor as you would on any network, although if the network you're on blocks Tor, you may have to use a Tor Bridge to access the network. There is good info available about using Tor Bridges online.
HOWEVER, it is then very important that you use a spoofed MAC Address for your wireless card when connecting. Not all wireless cards support this, either. If you're using Tails, which you should be anyway, one of the "More Options" available when you boot and opt to look at them is MAC Spoofing. Note that the system may not inform you whether or not the spoofing was successful, so proceed with caution. It may pay to invest in a wireless card that is fully supported with Free, Libre Software, like one made by Atheros. They're available on eBay (and elsewhere) for less than $10.
Definitely use a live distro, and specifically Tails . It can take some time getting used to, but it is as secure as it gets and the site has nice documentation. It has everything you'll need, a bitcoin wallet, tor browser etc. Using a dedicated laptop is not needed at this case, but if you insist you can install the distro on the hard disk. However, I'd suggest you just use a small usb stick, since it's much more inconspicuous and easier to hide.
There isn't any proof, because there isn't any need for any.
On a computer, you can run a fully open-source system like Tails and know with a very high degree of certainty that there isn't any secret code running in background that may compromise your security.
With Android and iOS devices, on the other hand, the OS itself requires a huge amount of secret, closed-source blobs of code that are in fact demonstrated to be able to remotely activate the device, its location beacon, its microphone, etc.. There is no way to work around this closed-source code, there is no way to modify it, there is no way to mitigate its abilities on your mobile device. And of course, any code running with superuser privileges on the device can read out private keys from memory, record keystrokes, messages, sites visited, etc.
If you think that a mobile device can be as secure as a full-fledged computer, you simply haven't studied the issue sufficiently, and that's all there is to it.
A VPN adds about as much anonymity to Tor as racing stripes add speed to a hot rod. Misery loves company, and people here that burn their money on VPN snake oil love telling other people how "essential" VPNs are for this stuff. They aren't.
You're fine. Or at least as fine as you were with the VPN.
But you'd be way, way better off using Tails for this stuff. That will actually make a big difference in your anonymity.
EDIT: And make sure you always bring the Security Slider in Tor Browser up to "High," or use NoScript to disable all JS and embeds, and keep your software up to date.
If you have the seed, you're good.
Just go to Wallet --> New; then choose "restore from seed." You'll get access to your coins back, and you can set a new passphrase if you like. It'd probably be wise to back up the wallet first, though, just to be sure.
The only thing you'll lose is any labels you've added for transactions or addresses.
It's also probably worth just mentioning that if you're using any copy of Electrum except the one that comes pre-installed with Tails, well, you're gonna have a bad time.
Two main problems:
A virus or other malware on your Windows host system could compromise your virtual machine as well. Example: A keylogger installed on Windows would also log all of your keystrokes in the VM. It could capture passwords for accounts or passphrases for secret PGP keys or anything else you typed.
If Windows decides to swap the virtual machine from RAM to disk for some reason (low on memory perhaps), things in the Tails VM RAM that should disappear when Tails is shut down could get saved to your hard drive.
More secure than running on Windows alone. A bug in the Tor Browser won't immediately be able to de-anonymize you. They would need to have a root exploit as well to disable the Tails firewall.
Easy way to put a VPN between you and the Tor network as a last line of defense against a Tor network de-anonymization attack like the one CERT / FBI used in Operation Onymous. Since Tails doesn't currently support full VPNs, you can run a VPN on the host system so that all packets from the Tails VM are first sent over the VPN and then to the Tor network.
If you wanted to use Tails in a VM to get a VPN solution, it would be better to run it as a VM on a Linux machine, since most viruses / malware are written for Windows and you really can't trust Microsoft to not backdoor you in some way.
The only direct xmr/fiat are KYC exchanges like bitfinex and kraken, which can also work but then be sure to "churn" a couple of times before moving to the other wallet.
For now, I think simplest is getting Bitcoins and converting via shapeshift.io or any alts exchange allowing anon registration/logins/withdrawals. Problem is, the Bitcoins you sent to them could be traced back to where you originally got them at and then it's not much different from KYC exchange, again requiring a couple of "churns" with monero. The whole point of monero is to avoid all that hassling with thinking about taint of Bitcoins. Even if you get monero from the devil himself, even if he owned all the markets he wouldn't be able to link you buying from him and you spending on a market he owns if you put some distance from the 2 transactions, as described above.
There's also the https://bitsquare.io/ decentralized marketplace and recently some attempt at building a localbitcoins variant for alts is taking place: https://liberalcoins.com/
Not sure how those 2 services are, though. Bitsquare is touted as a good solution but maybe it's not so user-friendly, haven't tried myself.
You can upgrade, but I used to use Tails and I've found Whonix less of a hassle to use. It's best with a decent PC/SSD.
As long as you use full disk encryption you're fine. You just download the two VMs, verify the signature (if you want) and run them. With virtual box you can share a folder and import your old pgp keys.
Whonix is WAY MORE SECURE.
Edit: Besides the stats, Whonix is essentially more fit to you if you are IT savvy and can run several machines. One for whonix, other for what not, etc. Although one laptop is enough. Security is much better than Tails.
With Evo gone, ALL the current markets will experience growth. SR was the seed, Evo and Agora are the second stage.. Think about it as any new field of tech/business with extreme potential for growth and money to be made.
Check out this site http://www.worldometers.info/ (use in clearnet) and see in real time how much drug money is being made per second along with how much pollution is being released and a bunch of other cool information..
My Point is there are only several reliable vendors who have the supply consistently and many many more users willing to pay, even getting scammed once or twice, just to find that honest, real, intelligent, and morally sound vendor. So there is much more room for growth, especially when you see how much money is spent on illegal contraband every minute.. Also heres a site http://drugs.globalincidentmap.com/ that tells you every day who and where got arrested for every type of drug... Just my two cents
Tails users that have Windows as their main operating system can use this program to backup an image of their Tails USB to their Windows hard drive:
If your USB drive fails or is lost, you can write the image back out to a new USB drive that is the same size or larger and be good to go in minutes.
Since this program creates a complete image of the USB, it will also back up the persistence partition (if you have one configured). Because the persistence partition is encrypted, that part of the USB image will also be encrypted on your Windows disk.
You should create a new image anytime you make an important change to your Tails system (you generate a new PGP key, new electrum wallet, before an upgrade, etc.)
Buy two flash drives of equal size to test it out. Setup Tails on the 1st USB drive, then use the tool to copy an image of the 1st USB to the hard drive. Restore the image out to the 2nd USB and boot from it to make sure it works for you.
When you make a backup using the USB Image Tool, you want to make sure that you use it in "Device Mode" so that you back up the complete USB including the boot blocks.
I use ExpressVPN. Used them for over a year and have had no problems. I would say they are a little on the expensive side compared to some others tho.
A bonus is they have a Deep Web website, Bitcoin for payment and don't keep logs, for the paranoid folk out there!
For a vpn, I can't say I've ever heard anything bad about Private Internet Access.
I would say make an entirely new account within tor and only access it using tor. Don't login to any accounts used outside of tor within tor. Keep the two worlds completely separate and disconnected from each other.
Well, flash is actually blocked by default when using the Tor browser bundle. https://www.torproject.org/docs/faq.html.en#TBBFlash
Just use Tails. It's not that hard. If you have any questions, just ask me here and I'll get you un-stuck.
Just using Electrum as you are doing is a terrible mistake and is compromising your security and anonymity (though only - and I mean only - ever opening Electrum while connected via the fast food wifi is a decent mitigation, but still not great).
Also, unless your friend is like an absolute blood brother/sister, delivering to their house is a big mistake. If shit goes down and LE tries to make a bust, it's very likely that your friend will snitch on you and you'll be in a way, WAY worse situation than if you just had it shipped to your own house and kept your damn mouth shut and told them that you'd like to see your lawyer (and remember - say nothing else).
I suspect that there may be other mistakes going on here, too, and if you explain a bit more about your setup maybe I can help.
Download and Learn how to properly use Tor
Learn PGP. find a guide and use it.
If you feel very smart, ditch Windows OS. Learn how to run an OS from a USB and/or DVD. Start out with ubuntu and an old laptop to experiment and learn. Then download Tails and learn to use.
Finally, generate a PGP private and public key with tails, log onto the market, and buy something. Make sure you encrypt your address Using the sellers Public Key.
This whole process may take over a month. I might be making an entire subreddit on beginning on the dark net markets.
No data was compromised during and after the attack. It was from several hackers and one state-sponsored cyber-terrorism. How do you know it's from Israel? Granted, I personally don't like Israel one bit.
Again, no sensitive information was stolen, exposed, or breached. Protonmail is very secure as of right now, and even more secure after they upgraded their infrastructure to ward of DDOS attack in the near future.
Yes, a bit like how torrenting works. Bisq is an example of a decentralized market for cryptocurrencies, for example:
There's also the beginnings of the decentralized web, an example of which is ZeroNet:
A, B & C might be EZ, but they are not secure.
They are 3rd party sites that can collect and store your unencrypted messages.
Don't use them!
Download and install GPA from here: http://www.gpg4win.org/
> He was a Dutch cook and flew to Shanghai to a factory where they had dozens of tons of PMK they couldn't sell because it had been recently banned. He put 2mil upfront he borrowed off the author of the book and had the factories entire stock converted into this new precursor and shipped a bit to Australia and the rest to Europe. The author of the book was an Australian cook the Dutch guy met when they were both in jail in the US a decade or so earlier. and thus since 2012ish onward the dutch have switched recipes to due access of safrole and have switch to this chemical instead as it is super cheap around $200 kilo non bulk (4kg) and (400) per single.
> There's an ebook called 'Pills Of God' on Amazon about one of the guys involved in the discovery of this process, it happened much earlier than 2012 though.
That is correct.
Funny enough, that method the Dutch chemist used was outlined in Strike's book Total Synthesis II, published in 1998. It's "Method #12" iirc. It was developed starting in 1938 and a patent filed for in the early-mid 1940's.
> We Do Not monitor user activity nor do we keep any logs. We therefore have no record of your activities such as which software you used, which websites you visited, what content you downloaded, which apps you used, etc. after you connected to any of our servers. Our servers automatically record the time at which you connect to any of our servers. From here on forward, we do not keep any records of anything that could associate any specific activity to a specific user.
Even though this is CLEARLY worded badly, it shows that they stop collecting data after you connected to their servers. Answers the entire thread and extent that people should be wary of using PureVPN. Find someone who doesn't track before or after using the server.
The bad advice on here is amazing. Tor usage will only only attract attention in corrupt countries that block access and even then you use obfuscated bridges to hide your usage first.
Ipvanish is not a well reputable VPN and use to log in the past. Many superior options exist like PIA and AirVPN although they are not needed and are a risk. Tails is an amnesiac bootable OS that only connects to tor and is not recommended to use a VPN with. Tails is recommended for every dnm user and advocating against it is dumbassery it is far superior to the TBB in everyway. If you are a small time buyer tails is all you need and the only thing you need. This guy is an idiot.
https://www.reddit.com/r/DarkNetMarketsNoobs is where you need to go. Look at the side bar in that sub first. You might find an answer there.
VPN's are a completly unknown third party. There is no way of knowing if they keep logs or if they are an LE operation all together. I suggest looking into tails. It's free and open software and is proven to work. It also comes preinstalled with a btc wallet, a pgp applet, a password generator, exif data remover, and loads of other privacy tools. Donate that money you would spend on that VPN to tails, they're worth it.
>By just connecting to the markets the only danger I could see is a compromised exit node.
When visiting a hidden service one does not exit the Tor network so an exit point is not used. For more information click here
HackerNews discussion: https://news.ycombinator.com/item?id=8401627
Also, I feel it's worth it to repost a really good comment from over there, by PeterWhittaker, which summarizes the affidavit:
> Quite an interesting read. Summary? Silk Road used a pair of nginx servers, one as front-end, one as back-end. The server images (captured forensically) show that the then-in-place configuration made it impossible for the FBI agent to do what he claims, that is, connect to the back-end by using the server's IP address (the allow/deny settings forbade this). The log files on the servers lack entries to support FBI claims.
> Furthermore, FBI agents describe using other techniques to obtain information, e.g., fuzzing and packet sniffing. Not only do server logs NOT contain any evidence of this, but the agents did not preserve any evidence of their packet sniffing activities, despite having training in forensic investigation techniques and claiming expertise in these areas.
> While it is possible that there were bugs in either the Ubuntu 12.04 hosts or the nginx servers themselves that would have allowed these activities to occur, unlogged, I suspect it would now be up to the prosecution to establish reasonable grounds for believing this to be the case. Likewise, while it is possible that the handful of lines of log pertaining to FBI activities might have been removed from the several million (yes, you read that correctly) lines of log later captured in forensic image, that does strain credulity; again I suspect the prosecution would have to establish that, somehow.
> I've no particular interest in this case or in Silk Road, but I cannot help but conclude that the lawyer filing this brief just seriously schooled the FBI.
/r/DarkNetMarketsNoobs - read through the sidebar
Virtual machines are only as secure as the host system. Keep that in mind always.
Most people here use or recommend Tails - the documentation on that site is great, read as much as you can stand - especially the Warnings (which are almost all relevant to Tor in general, as well): https://tails.boum.org/doc/about/warning/index.en.html
Always completely disable scripts and plugins in the browser - this can be achieved easily in Tor Browser by setting the Security Slider to "High." This will prevent you from being able to post on reddit (but you can still read).
Whonix is generally more often recommended for those who are hosting hidden services, but it does also offer a lot of value for clients as well. If you can work it out to run on two separate physical machines, that is best - keep in mind that the gateway machine can be very inexpensive, e.g. a micro embedded system like an ODROID.
For utmost safety, buy a second hand burner laptop that's a few years old, pull out the hard drive, and use Tails on it exclusively. You may also buy a high-powered USB WiFi dongle, like a 2000mW Alfa with a decent antenna, and steal WiFi from a somewhat distant location. You could read up on cracking wifi networks to expand your options. In any case, you'll ideally want a wireless card with an Atheros chipset. They're available very cheap online.
In addition to the excellent point that /u/ziz1 raises, references to Tor Browser may also appear in locations that your operating system maintains, such as "Recent" folders, etc. If you're using Windows, one of the better ways to eliminate this kind of forensic information is to use CCleaner or a similar tool, and then be sure to follow it with at least one or two passes of free space overwriting, as ziz1 mentions.
However, I would say that even doing all this, it's likely that a skilled adversary would still be able to determine that you had once had and ran TBB, if you are using Windows or OSX. And even if you're using GNU/Linux or *BSD, eliminating all forensic evidence could potentially still be challenging.
If this is a concern for you, I would very, very highly recommend using Tails, as this kind of forensic "cleanliness" is one of its primary design goals. It also offers numerous security, anonymity and usability benefits for users, and includes right out of the gate many useful tools like a GPG applet, the Electrum Bitcoin Wallet, Tor Browser, etc.
If you want to be extra safe, use both the about:config setting and NoScript.
600+ and counting:
Most of the new ones are useless and their biggest value is in day trading them. Even the Monero hype was largely a pump from people who trade the coin. People believe these coins have an actual purpose and buy into something they don't understand. Sometimes the hype last a few weeks or months before it dies down. The uninitiated (non-traders) are usually left holding bags not knowing what the fuck just went down. It is a great market if you're a trader or miner...
Tails 1.3 has already been out for nearly a month, and yes, it has Electrum 1.9.8 built in. If you're using an older version of Tails, it's imperative that you upgrade immediately, and that you develop a habit of using the latest version of Tails at all times.
Electrum 1.9.8 does NOT have native multi-sig support, but Electrum 2.x does, and was released a couple of weeks ago. In theory, Tails 1.4 is likely to include this newer version of Electrum.
loooool, yeah kids a retard. But everyday when im browsing i see retarded reviews, here ill post another 1 in a minute that is hilarious, just gta find it
here it is : https://anonfiles.com/file/3b093b315bb170336996adeea6f8171d
I was 100% not trading with an imposter account, Imposter accounts generally do not result in a raid/CD on your house.
Feel free to PM me if you wish to resolve this issue.
There are a lot of differences, a few being: I2P is packet switched, as opposed to circuit switched like Tor; I2Ps directory servers are untrusted and changing as opposed to Tors method of using central servers to manage the network. I2P was designed for hidden services, as a result they're much faster than Tor hidden services but I2P can't access clearnet like Tor can with its exit nodes. Some of this functionality has been replaced by outproxies, but they're mostly run as a public service and the network isn't designed for them.
There are a lot of differences in what are seemingly similar protocols. You can find more info here, it's pretty interesting. There's an interview with I2P developers where they discuss so called Garlic routing here that's worth a listen.
Here is another must read about the Undercover and Informant tactics:
Always good to be unpredictable and do some surveillance and a background check on potential customers. This kind of stuff intrigues me because a friend of a friend met an undercover DEA dog handler via Plenty of Fish, apparently they love to look for targets and informants(generally the idiot variety) on online dating sites.
-----BEGIN PGP SIGNED MESSAGE-----
Please install a PGP program. If you are using a Windows OS, install this:
If using Tails or other Linux, PGP is built in.
Create a PGP key and upload it to the keyserver system. Here is my key on one of the keyservers:
Start signing your messages so that we know it's you if your account gets banned
or taken over by somebody else. Not joking.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----
I don't know why everyone here isn't listening to the guy above, this is all common sense and a little bit of research. Never use the main machine you work or play on for this stuff, a small lightweight laptop that is fully encrypted with an encrypted backup as well like he said in case you need to Dban. As for VPN sure it is very useful for this stuff. I don't want my ISP to see I'm using TOR so that is what the VPN is for, nothing more. Just another layer. I wouldn't have the exit server in the US or any allied country, I'd have it exit to TOR in Romania, or Cyprus, Hong Kong is a good one. You think the Chinese give a fuck? They are the ones selling the precursors. Either way, it will encrypt you all the way to say Butt Fuck Hong Kong, to gather up all the IP's that then left that exit server would be a massive effort and the Chinese will NOT help out when the server is on their soil. Then you use TOR to go about your business and wash, and forget. Keep it simple so you don't mess up as easy. TAILS is great the best way for a lot of people but I like using the VPN to mask my activity from comcast or any ISP all the way to some far away non helpful nation. Then go to TOR from there. ProtonVPN offers this exact service if you want.
As a cybersecurity analyst and blackhat, I can full-heartedly recommend Private Internet Access. Please do not listen to the other comments that you hear, those services may advertise "no logs" and "no warrant compliance" but fuck every customer over as soon as the government is involved.
PIA has proven in the past to not comply with requests from the government and will be more than enough unless you are forwarding a botnet or rat thru a port.
Privnote and the like are total shit, and it's disgusting that anyone in this community uses them for anything. It's like handing your messages over to LE personally. I mean what the fuck people, stop having "trust a third party 100%" be a part of your security model. It's amazing to me that people still don't get it.
HushMail sold out its users. HideMyAss sold out its users. Crypto AG was a front from the get-go. Safe-mail sold out its users. These are just a few of the services that we know about. When the option exists, why would anyone not ensure their own security/privacy, with software running on their own computer?
For anyone with questions regarding CISA and PIA, here is our official statement:
''Congress, recently passed the CISA or Cyber Security Information Sharing Act by adding the text into a consolidated spending bill. While the law does not require internet service providers to log and record all internet traffic, it does make it easier for private companies to share information with government agencies regarding alleged threats. The bill also creates a framework for federal agencies to receive information from private companies regarding alleged threats.
However, this bill changes nothing about the way Private Internet Access does business and the commitment to privacy we have to our customers. Private Internet Access will not participate or take advantage of any incentives offered to private companies to disclose and share user activity with governmental agencies. We will continue to monitor pending privacy and cybersecurity bills and we will stand against any and all bills that fail to protect a free and open internet.''
You can check out the statement in our Knowledge Base as well here:
If anyone has any questions regarding this or anything else please don't hesitate to contact us!
You can find our 24/7 live chat support via our website:
Alternatively you could send us an email ticket directly to
We also offer phone support as well. Our phone agents are available Monday - Friday, 9am - 5pm PST. They can be reached at 1-866-389-6788.
I recommend Private Internet Access. They don't keep logs of their customer's activity so when the NSA comes knocking, they can't give them your information anyway. Other VPNs like Hide My Ass do have a history of keeping/turning in logs, so look around and make sure the one you decide on is reliable.
Well damn....Its a wonder what using freaking Google will turn up!!!! Took me a whooping 34.69 seconds to find this link!!!! Send BTC OP...9000 comes through once more...Bahahahahaaa!!!!
GPG Suite For MAC / http://download.cnet.com/GPG-Suite/3000-2092_4-75335253.html
You're on a mac. The other people are talking about using Kleopatra, a Windows/Linux program.
This comment tells how to use GPGTools on Lion.
This page from GPGTools' website may also be useful.
It depends on what you mean by "crack."
Are they able to do passive decryption with nothing available except targeted GPG ciphertexts? No, I don't think so. And if you think otherwise, I would say that then a response like "lol" is appropriate.
However, there's more than one way to groom a cat...
The number one threat to GPG message security is endpoint security. Insecure software (and potentially hardware), as well as manipulated implementations of the OpenPGP spec are a serious threat, and should not be disregarded. Booting up-to-date Tails is probably one of the best pragmatic things that users can do to mitigate this threat, and that's a large part of why Tails exists. And if a person is actually using the closed-source, corporate- and American-made software tool actually known as "PGP," then, well, yeah... they're doing it wrong.
Then, there's side channels. RF and acoustic emanations have seen some wonderful and brilliant attacks from the Tel Aviv lab in the last couple of years, and there are likely a couple more channels that are yet to be found. In addition, some of those attacks are virtually impossible for an end-user to mitigate without incredibly cumbersome and expensive equipment and procedures. However, the worst-offending aspects can usually be patched in software, such as by using constant-time algorithms and things like the RSA blinding patch that was added to GPG last year.
I could go on, but at this point I think it'd be more appropriate to ask what evidence you have that the FBI or NSA can "crack" "PGP," and how they might go about that. I'd also be curious what you think about the phrase "No decrypt available for this PGP encrypted message," as appeared in some of the documents leaked by Edward Snowden.
How about http://www.cnet.com/news/judge-americans-can-be-forced-to-decrypt-their-laptops/
This is still a hotly contested arena, but there is some precedent. Then, say they try and get your for drug trafficking and ties to terrorism, see ya at gitmo.
I wanted to share a comment about whyusheep's claims.
When is pushing a person to the point where they feel like killing themselves considered a moral tactic? This is against any real ethics and hackers do have ethics.
I want to reassure everyone that if whyusheep does have a database, the information does not have to be leaked to prove the claims.
We have multiple accounts on several markets and have provided whyusheep with an account to provide us with the cleartext or at least hashed password.
This will provide whyusheep with a method to prove the claims without endangering anyone.
As whyusheep has never once replied, we know that the claims were simply FUD to defame Agora.
Yummly is where I get most of my recipes from. I like it because I can just punch in what I have in my fridge and get some ideas of new shit to throw together. Its been awhile since I've actually made any myself but its seriously great if your a seafood fan.
There are lots of recipes for sourdough grilled cheese with crab on there also. <em>LOUD GUTTURAL MOAN</em>
"How can you run a laptop with fde?"
Just because the data is wrapped up on an encrypted disk doesn't mean you can't serve the data. Applications and services interact with the decrypted data but you cannot just clone the disk and access the data.
Here's one example. https://www.linode.com/docs/security/full-disk-encryption
If your Tails live USB was created by the Tails Installer, you can enable "persistence" on it. That will create an encrypted persistence partition on the same USB. Your imported PGP keys will automatically be saved and restored when you boot Tails if you enable persistence and have checked "GnuPG" in the persistence configuration tool.
If your live USB was not created by the Tails Installer, you can boot from it and use it to install Tails to a 2nd USB. You will be able to enable the persistent partition on this 2nd USB.
> I2P has been around as long as Tor and no one, I repeat no one, did you get that the first time? NO ONE has gone to jail.
The most secure network is one that nobody uses.
Forget secure network design, come back to us when the i2p devs figure out how to write Java that can parse a packet without leading to remote code exec
There is a reason that piece of shit hunk of Java is disabled by default in Tails
If you are not using your own computer, it is extremely dangerous to your future employment to be browsing darknet markets from work. You should consider any state owned computers to be completely compromised by monitoring software installed by the state IT group. If you are allowed to use your own computer on the state network and it would not be suspicious to your supervisor to be using your own computer, you should consider buying a used laptop and booting Tails on it.
You could also boot Tails on your state computer if the BIOS isn't locked down, but that might also set off alarms at the state IT department.
Be very careful. I'm sure that it would be no fun to get fired from a good job.
They can still be subpoenaed (even assuming they aren't lying about the logging; lies are cheap & can save the VPN's ass); there are a lot of international treaties these days for information sharing. Being in Iceland didn't save the Silk Road server, being in Hong Kong didn't save the users of a VPN from being caught, etc. Multiple jurisdictions these days are a speed bump, not a wall.
Ok guys, time to take off the tinfoil hat. I messaged Blueviking today regarding this question and he ensured me that everything is alright and we're too paranoid. Reddit BTFO'd.
It's a bit like Tor, but it's designed explicitly for hidden services instead of for using the global internet (although people voluntarily run "outproxies" to the global internet from I2P, but this isn't its suggested or typical use). And it's not just websites - it also has integrated anonymous BitTorrent, IRC, and many, many other types of services (there's even been telnet BBSes, and there are more exotic datastores on I2P as well like Tahoe-LAFS, a GNUtella/edonkey2k network, etc.). This is partly because it can support anonymization of nearly any kind of internet traffic, not just TCP streams.
It's also much more decentralized that Tor, in many ways, because most (or many, anyway) I2P users are also relay nodes for traffic. This also means that it self-scales much better than Tor, but it can also mean that the performance is not quite as good because more of the relays are on home connections as opposed to real servers in datacenters, which is the case for most of Tor's relays.
Having a greater number and greater diversity of relays can make anonymity much stronger. But what really makes I2P theoretically more anonymous than Tor is the fact that an I2P user who is relaying traffic for others (called "Participating Traffic") has their own traffic "covered" by a multitude of other traffic streams, making timing and correlation attacks much more difficult. This protection is enhanced greatly if one's I2P router has good uptime and lots of shared bandwidth, as the rest of the network will not relay very much through a router if it's not reliable in those ways. For that reason, it's recommended to keep an I2P router running as close to 24/7 as possible, with as much shared bandwidth as you can offer.
There's tons of great documentation on their website, feel free to check it out.
Also, I2P has been around since 2003, about the same length as Tor, and is pretty mature, with a solid dev team (but they're always looking for help!).
The other day I realized July Suicide looks almost exactly like me. I don't have the tats or the piercings (or dem legs...short girl problems), but everything else is pretty damn close.
First of all, you barely read the article, cybercrime godfather isn't referred to me but to the author of the article.
I have never posted most of the stuff for free of that encyclopedia on TR forums or Hansa, again disinformation.
Are you kidding me? Bannedebooks course was just a copy paste course and way more inferior of what I teach, you haven't read my guide and that proves it.
Browser spoofing Nonsense, Ok I think you are either trollign or just rambling, if you think without spoofing you are going to get charges approved, then good luck with it. I bet you still charge from a windows server with RU keyboard rdp
I clearly state on the guide VIP72 are blacklisted but worth mentioning because they have a wide range of IP's from several locations, your post is just defamatory
You were notorious for approving shitty guides back in GRB times, and you have the balls to claim my guide would be rejected? Seriously?
I smell alot of jealousy here, anyway, I've been lazy with the guide and wrote only around 20% of what I know, I'm about to quit fraud and the darknet, and before that I will launch an update that will include everything I know, even retirement fraud.
Thanks for pointing that out - it's some small reassurance in this difficult environment to think PIA are less compliant than Purevpn was.
It's always possible that since they don't routinely log they can't can't go back in time - the article says they couldn't provide data for some bomb threats issued at a specific time. OTOH I'm guessing they can set up a trigger to log whatever a specific account did in the future like it seems PureVPN did?
Whether PIA or any other provider is obliged or willing to do that probably depends on what LE are chasing and from which jurisdiction.
Assuming ad-supported since you're basically the product at that point.
If you don't want/can't afford a solid VPN, check out ProtonVPN, from the same folks who run Protonmail. Without a good bit of research, they're the only free VPN provider I'd trust offhand, since they support the service with via their other paid VPN and mail plans.
I just did a fresh reinstall on my system, lemme get Tor on there and I'll cross check
IPVanish is located in USA(5 eyes country and NSA)
I wouldnt trust any VPN company that is in the USA