DNM Bible
DNM Bible
DNM Bible
https://vaiyo.io/dnm-bible/
DNM Meaning
The term DNM indeed stands for DarkNet Markets. These are hidden online
marketplaces that operate on the dark web, a part of the internet that is not
indexed by standard search engines and requires specific software,
configurations, or authorization to access. DarkNet Markets facilitate the buying
and selling of a variety of illegal goods and services, including drugs, counterfeit
items, malware, and other illicit materials. Transactions on these markets often use
cryptocurrencies due to their pseudonymous nature, which can provide a layer of
anonymity for users. Due to their illegal nature, DarkNet Markets are subject to law
enforcement actions and are often shut down, only to see new ones emerge.
Table of Contents
● DNM Meaning
● Introduction to the DNM Buyer’s Bible
● Overview
○ Preparation Guidelines
◆ Regarding Video Tutorials
● Operating System
○ Selecting your setup
◆ Tails
◆ Whonix
◆ Whonix/Qubes
○ Guidance on the Host Operating System
◆ Critical Advisory
◆ Advice for Mac Users
○ Tails
◆ Is Utilizing Tails Imperative?
◆ Do You Require a VPN?
◆ Previously Made Purchases Without Tails?
◆ Utilizing Tails on Your Own or Shared Computers
◆ Accessing Tails Via Your Personal WiFi
◆ Utilizing WiFi Networks That Require Login
◆ Do DNS Leaks Pose a Risk?
◆ Selecting a New Computer for Optimal Tails
Compatibility
◆ Do I always need to use the most recent version of Tails?
◆ Recommended Hardware for Tails Compatibility
◇ USB Flash Drives
◇ USB WiFi Adapters
◇ USB Ethernet Adapters
◆ Is It Safe to Purchase USB Sticks With Pre-installed
Tails?
◆ Why Is JavaScript Globally Enabled by Default With
Security Slider Set to Low?
○ Guidance on Installing Tails
○ Essential Settings and Advice as per the DNM Bible
○ Setting Up and Managing Persistent Storage
◆ Establishing Persistent Storage
◆ Removing Persistent Storage
○ Upgrading Process
○ Data Backup Strategy
◆ Cloning Tails
◆ Securing Persistent Storage with Backup Utility
◆ Securely Backing Up Persistent Storage Using Terminal
○ Installing Optional Debian Packages at Boot
○ Troubleshooting Common Issues
○ Whonix
◆ When you should use this guide?
◆ Guide Overview
◆ What is Whonix?
○ Setting Up Your Host Operating System for Whonix
○ Setting Up Whonix
○ Starting and shutting down Whonix
◆ Starting
◆ Shutting down
○ Optimizing Whonix Performance
◆ Optimizing Workstation CPU Utilization
◆ Optimizing Gateway RAM Usage
◇ Utilizing the Gateway
◇ Simplified Update Command Application
◇ Shutting Down the Gateway
◆ Switching to an SSD
○ Qubes/Whonix
◆ Understanding Qubes
◆ Whonix: A Privacy Fortification
◆ Prerequisites for Qubes/Whonix Setup
○ Setting Up Qubes
◆ Downloading and Preparing Installation Media
◆ Proceeding with Qubes Installation
◆ Configuring Qubes OS
◆ Familiarizing Yourself with Qubes Desktop
◆ Network Device Configuration
◆ Updating Qubes OS
◆ Installing Essential Software in Whonix Template
◆ Setting Up VeraCrypt on Debian-11 Qube
◇ Preparing VeraCrypt Installation
◇ Downloading and Installing VeraCrypt
◇ Proceed with the installation of the downloaded .deb
package:
◇ If the installation prompts any errors, resolve them
with:
◆ Configuring Software in Whonix Template
◆ Installing I2P
○ Mobile Security Guide
◆ Introduction to GrapheneOS
◆ Functionality of GrapheneOS
◆ Compatibility and Installation of GrapheneOS
◆ Security Features of GrapheneOS
○ Installation
◆ Installation Methods for GrapheneOS
◆ Preparing for Installation
◆ Starting the Installation
◇ Supported Browsers
◇ Enabling OEM Unlocking
◇ Preparing Linux for Non-root Flashing
◇ Booting into Bootloader
◇ Connecting Your Device
◆ Proceeding with Installation
◆ Securing Your Device Post-GrapheneOS Installation
◇ Essential Privacy Settings
◇ App Store and Recommended Apps
◇ Final Thoughts
● KeePassXC
○ Securely Managing Credentials with KeePassXC
◆ Essential Data for KeePassXC Storage:
◆ Launching KeePassXC:
○ Creating a KeePassXC database
◆ Establishing a Master Password
○ Opening a KeePassXC database
○ Inserting New Entries in KeePassXC
○ Retrieving Your Stored Data
● PGP
○ General
◆ Understanding PGP
◆ The Importance of Mastering PGP
◆ FAQ on PGP Usage
◇ Sending Messages Without PGP Encryption
◇ Market’s Built-in Encryption Reliability
◇ Necessity of Encrypting All Messages
◇ Decrypting Sent PGP Messages
◇ PGP vs. GPG
○ Generating a PGP Key Pair
◆ Market Account Security
◆ Managing Private Keys
◆ Tails
◇ Finding your public key
◆ Whonix
◇ Generating a 4096-Bit Key in Terminal:
◇ Exporting Your Public Key:
○ Importing a public key
◆ Tails
◆ Whonix
○ Encrypting a message with PGP
◆ Tails
◆ Whonix
○ Verifying a message with PGP
◆ Tails
◇ Steps to Verify a PGP Signed Message:
◆ Whonix
◇ Process Overview:
○ Decrypting a message
◆ Tails
◆ Whonix
○ Signing a message with PGP
◆ Tails
◆ Whonix
● Cryptocurrencies
○ Cryptocurrency Usage
◆ Key Points:
◆ Frequently Asked Questions:
○ Monero (XMR)
◆ Monero FAQ Guide
◇ Additional Resources:
◆ How to Buy Monero
◆ Setting Up Monero
◆ Creating Monero Wallets
○ Litecoin (LTC)
○ Installing Litecoin in Tails
◆ Installation Steps:
◆ Handling Electrum-Litecoin Data:
◆ Final Steps:
○ Bitcoin (BTC)
◆ Key Bitcoin Tips
◆ How to buy bitcoins
◇ 1. Cryptocurrency Exchanges
◇ 2. Peer-to-Peer (P2P) Platforms
◇ 3. Bitcoin ATMs
◇ 4. Brokerages
◇ 5. Direct from Someone You Know
◇ Considerations Before Buying Bitcoin:
◆ Configuring Your Bitcoin Wallet on Tails
◇ Electrum on Whonix:
◇ Electrum Setup Guide:
◇ Important Considerations:
◆ Transferring Bitcoin Safely
◇ The Transfer Path:
◇ Breaking the Chain:
◇ Sending with Electrum:
◇ Key Considerations:
◆ Understanding Bitcoin Transaction Confirmations
◇ Speeding Up Unconfirmed Transactions
◇ Frequently Asked Questions
● Shipping
○ Understanding Postal Systems for Mail Delivery
◆ Timing Between Orders: Best Practices
◆ Is it necessary to alter my shipping address?
◆ Package Received in Damaged Condition
◆ Is It Possible to Have Orders Delivered to a University or
Dormitory?
◆ Is It Advisable to Have Orders Sent to My Workplace?
◆ Is It Safe to Track My Package?
◆ In the event of receiving more items than you ordered,
additional products, or goods you didn’t request, what steps
should you take?
◆ Disposing of Packaging Material
○ Origin Countries
○ Countries of Concern for International Shipping
◆ Countries that Substantially Contribute to Illicit Drug
Manufacture, Transit, and Significant Source Countries
◇ Countries that are Major Illicit Drug Producers and
Predominant Drug-Transit Countries
◇ Countries Identified as the Primary Sources of
Precursor Chemicals for Illicit Drug Production:
◆ Countries known for strict customs enforcement on
inbound international mail
○ Stealth
○ Non arriving packages
◆ General
◆ Testing if your mail gets intercepted
◆ Got “Undeliverable as Addressed”?
○ Drop
◆ Is it advisable to utilize my genuine name when arranging
deliveries to my residence?
◆ Residing Under Your Parents’ Roof?
◆ Should I sign for the package/mail if asked to?
◆ Using a drop
◆ Is it possible to immediately start using my PO Box after
setting it up?
○ Controlled Delivery (CD)
◆ What Does “Controlled Delivery” Mean?
◆ How Does One Become Subject to a Controlled Delivery?
◆ What Occurs During a Controlled Delivery?
◆ How Much of a Product Triggers a Controlled Delivery?
◆ What Happens After You Accept the Package?
◆ How to Safeguard Against a Potential Controlled Delivery
◆ How do you protect yourself?
◆ Does receiving a controlled delivery mean my address is
compromised?
○ Monitored Delivery
◆ Understanding Monitored Deliveries
◆ Safeguarding Yourself from Monitored Deliveries
○ Love letter
● Harm Reduction
○ Resources
◆ Guidance on Dosage and Safety
◆ PsychonautWiki
◆ Erowid
◆ National Harm Reduction Coalition
◆ Tripsit
◆ DanceSafe
◆ Drugs and Me
◆ DrugWise
◆ SaferParty
◆ SocietalActivities
○ Labs
◆ Energy Control International
◆ DrugData
◆ Wedinos
◆ Get Your Drugs Tested
◇ How We Test Your Drugs
◆ Vancouver Coastal Health
◆ Drug Foundation
○ Suicide Hotlines
◆ United States
◆ Canada
◆ United Kingdom
◆ Australia
◆ New Zealand
◆ Ireland
◆ South Africa
◆ India
● Darknet Markets
○ FAQ
○ Important tips for using markets
○ Types of markets
◆ Multisignature (Multisig) Markets Explained
◆ Escrow
◆ Direct Deal
○ Choosing a Darknet Market
○ Choosing a vendor
◆ Tips
◆ When a Vendor Doesn’t Accept Your Order
○ Tips for Being an Effective Buyer
○ Getting a lawyer
◆ If you get in legal trouble.
◆ Selecting and Preparing for Legal Representation
○ Making a purchase
◆ Essential Tips for a Smooth Transaction
○ Providing Feedback
◆ Handling Threats or Blackmail from a Vendor
○ Operational Security in Real Life (IRL OpSec)
◆ The Cardinal Rule: Silence is Golden
◆ Communication Strategies
● Alternative Communication Strategies
○ Email
○ Jabber / XMPP
◆ XMPP Overview
◆ OMEMO Encryption
◆ OTR (Off-the-Record Messaging)
◆ Setup Gajim+OMEMO
◇ Initial Setup
◇ Installation Process
◇ Creating Your XMPP Account
◇ Chatting with Gajim+OMEMO
◇ Transferring Your XMPP Account to Gajim
◆ Setup Pidgin+OTR
◇ Setting Up Pidgin with the OTR Plugin
◇ Registering an XMPP Account
◆ Using pidgin+OTR (XMPP)
◇ Starting a conversation with someone
◇ Authenticating your buddy
◆ Services
● Miscellaneous information
○ Javascript
◆ JavaScript Warnings
◆ Disabling JavaScript
○ Removing exif data from images
◆ Understanding EXIF Data
◆ Secure Image Uploading Guide
◇ Taking Photos Safely
◇ Removing Digital Traces
○ OpenBazaar
◆ Introduction to OpenBazaar
◆ Setting Up OpenBazaar on Whonix
◆ Customizing the settings
○ I2P
◆ What is i2p?
◆ How Secure is I2P?
◆ How can I run I2P?
◆ How to install I2P on Tails?
◆ How to install I2P on Android?
◇ Prerequisites:
◇ Setup Instructions:
◆ How to install I2P on Ubuntu?
◆ Advanced Setup for Whonix on Qubes
◇ Compatibility and Prerequisites
◇ Preparing Your Whonix Workstation
◇ Adding the I2P Signing Key
◇ Setting Up the I2P Repository
◇ Installing I2P Packages
◇ Configuring I2P
◇ Maintaining Configuration Across Reboots
◇ Execution and Additional Steps
◇ Configuring Tor Browser for I2P Access
● Closing words
For the majority, Tails emerges as the optimal choice, providing automatic
encryption and a suite of tools for safety. Those interested in Whonix can find
more details in the DNM Bible.
For insights into how Whonix, Tails, and running Tor alone compare, further
reading is recommended within the guide.
Guidance on the Host Operating System
Critical Advisory
As we progress, grasping the significance of avoiding Windows or Mac for your
darknet activities is crucial. A common misconception is that running Whonix
within a VirtualBox environment on these platforms equates to security. While
using Tor on Windows might seem harmless to many, this guide aims to elevate
your security far beyond such basic measures.
Both Windows and Mac are fraught with vulnerabilities and have corporate policies
that do not hesitate to collaborate with law enforcement agencies. This guide’s
intention is to fortify your privacy and security measures. Operating on Windows
or Mac makes you more susceptible to law enforcement interception, likening
users to easy targets.
A paramount principle in darknet dealings is the absolute segregation of your
darknet persona from your real-life identity. Compromising your everyday digital
life with darknet activities is a risk no one should take.
Advice for Mac Users
Mac users might encounter compatibility issues with running Tails due to hardware
incompatibilities. This, however, should not be seen as a loophole to compromise
on operational security by resorting to VirtualBox as a workaround.
An effective solution is to acquire an affordable, used laptop via platforms like
Craigslist, eBay, or local pawn shops. A modest investment can secure a device
capable of running Tails efficiently, often for under $100.
For a comprehensive overview of the pitfalls associated with using Windows or
Mac and further justification for the recommended practices, the DNM Bible
provides detailed insights.
Tails
Tails stands as a portable operating system that can be launched on virtually any
machine using a DVD, USB stick, or SD card. Its primary goal is to protect your
anonymity and privacy by offering features that:
● Enable anonymous internet use and bypass censorship, as it routes all
online traffic through the Tor network,
● Ensure that no digital footprint is left on the device utilized, unless
explicitly permitted, and
● Provide advanced encryption tools for securing your files, emails, and
instant messaging.
Tails is exceptionally beneficial for activities you wish to keep private. Furthermore,
it’s fully equipped for darknet market activities without the need for additional
software installations. All necessary tools for purchasers are pre-installed.
The standard Tails desktop environment is designed for efficiency and ease of
use, embodying the operating system’s commitment to security and privacy as
highlighted in the DNM Bible.
Is Utilizing Tails Imperative?
Absolutely. You may consider yourself an insignificant target, believing that no
one would bother pursuing you. However, let’s examine a scenario to illustrate the
importance of Tails: Imagine you place an order using the Tor browser on a
Windows system, and all seems to proceed smoothly. Unfortunately, the package
is intercepted by customs due to improper packaging by the vendor. This leads to
law enforcement initiating an investigation into the attempted delivery of illegal
substances to your address. A likely strategy they might employ is a controlled
delivery, where the package is delivered, but followed by a raid on your premises
for possession of illegal drugs.
Operating on a Windows platform, which lacks robust security, would leave
tangible evidence for authorities to build a case against you. This predicament is
avoidable with Tails, as it leaves no digital footprint or evidence of your activities,
including any files saved in the persistent storage. Tails operates without leaving
any trace of its use on your computer.
Hence, the value of Tails extends beyond merely evading detection; it significantly
reduces the repercussions if you are, unfortunately, apprehended.
Do You Require a VPN?
Generally speaking, no.
Here’s a summary from the Tails website regarding VPNs:
The request for VPN support in Tails stems from a misconception that adding more
layers, such as VPNs, enhances Tor’s anonymity. This belief is fundamentally
flawed. VPNs can actually compromise anonymity by serving as a constant entry
point (if used before Tor) or as a fixed endpoint (if used after Tor).
Moreover, replacing Tor with a VPN does not align with Tails’ mission, as it
significantly degrades anonymity.
This is a direct quote from the official Tails website.
The primary purposes of using a VPN might be to a) conceal your Tor usage from
your Internet Service Provider (ISP) and b) introduce an additional layer of
security.
● a) To hide Tor usage from your ISP, Tails offers a configuration option
upon startup. By selecting More Options at the greeting screen, then
choosing This computer’s Internet connection is censored, filtered,
or proxied you can mask your Tor usage. This feature, however, is
intended for users in restrictive regimes where Tor is banned or
dangerous to use openly. Utilizing this option without necessity diverts
resources from those in dire need of it.
● b) In the scenario where law enforcement compromises the Tor network
to trace your IP address, they would identify your or the WiFi owner’s real
location. Using a VPN in this context would lead them to the VPN server’s
IP instead, assuming correct setup of both Tails and the VPN.
Nonetheless, law enforcement pursuing such an extensive effort to trace
a small-scale buyer through Tor de-anonymization is highly improbable.
No precedent exists of a buyer being caught this way, and it’s unlikely to
occur.
There are numerous operational security (OpSec) considerations more critical than
the combination of Tails with a VPN. Prioritize these areas first.
For those still interested in integrating Tor with a VPN, further reading is advised.
Previously Made Purchases Without Tails?
Not utilizing Tails for your prior transactions was an oversight. The immediate
concern isn’t necessarily that law enforcement will track you down for those
actions, but if issues arise later, evidence of past transactions could be discovered
and used against you. It’s crucial to eliminate any such evidence promptly and
enhance your operational security (OpSec) for future dealings.
Begin by removing all applications involved in your previous orders from the non-
secure operating system you used. This includes uninstalling the Tor browser, any
PGP encryption tools, Bitcoin wallets, etc.
Next, you’ll need to overwrite the unused space on your hard drive. This step
makes it more difficult for anyone to recover the deleted applications (and thus,
evidence that could compromise you), without affecting other files or personal
documents, such as photos in your home directory. This process ensures that the
spaces previously occupied by the uninstalled applications are overwritten, but
your personal files remain untouched.
Instructions on how to execute this on Windows, Mac, and Linux are provided.
Keep in mind, this method isn’t foolproof. Your operating system may have
generated log files that indicate the use of software commonly associated with
DNM transactions (like PGP encryption tools). It’s imperative to adhere to the
outlined measures and, moving forward, confine all DNM-related activities to Tails.
Utilizing Tails on Your Own or Shared Computers
Operating Tails on any computer does not affect nor is it affected by the
computer’s existing operating system. This means Tails can be used
interchangeably on your personal computer, a friend’s, or even a public one at a
library. When Tails is shut down, the computer reverts to its original operating
system for normal use.
Tails is meticulously designed to avoid utilizing the computer’s hard drives,
including any swap space. It operates exclusively in RAM, which is cleared upon
shutdown, ensuring no remnants of the Tails system or its use remain. This feature
earns Tails its description as an “amnesic” operating system.
This capability ensures the safety of working with sensitive information on any
computer, safeguarding against the potential for data recovery post-shutdown.
While Tails avoids leaving traces on the computer, it still permits the explicit saving
of documents to external storage devices like USB sticks or hard drives for later
access.
In summary, Tails offers a secure environment for sensitive tasks on any computer
without necessitating the purchase of a dedicated device for these purposes.
Accessing Tails Via Your Personal WiFi
When operating Tails or utilizing Tor on your personal WiFi network, your Internet
Service Provider (ISP) can detect that Tor is being used but cannot discern your
activities. For users concerned about ISPs detecting Tor usage, Tails allows the
configuration of bridges during startup. This is achieved by selecting “Yes” to
more options on the welcome screen, then choosing the “My computer’s Internet
connection is censored, filtered, or proxied” setting. Employing bridges masks
your Tor usage from the ISP. However, this precaution is generally unnecessary
unless you’re in an environment where Tor usage is restricted or illegal. Utilizing
bridges without such a necessity diverts resources from those in urgent need.
The sole advantage of connecting to a network other than your own would be to
mask your actual IP address in the unlikely event of a de-anonymization attack,
presenting the network’s IP (like a coffee shop’s WiFi) instead. Yet, the feasibility
of such attacks targeting individual buyers is low, and the additional risks
introduced by using public networks (such as potential observation by others or
surveillance cameras capturing your identity) do not justify the method for buyers.
Adhering to the comprehensive security measures outlined in the DNM bible while
using your personal WiFi offers a more secure approach.
Utilizing WiFi Networks That Require Login
Engaging with WiFi networks that necessitate login credentials, occasionally linked
to your real identity such as university WiFi, is a consideration for Tails users. Tails
automatically alters MAC addresses, providing an added layer of anonymity by
making it appear as though a different device is accessing the network with your
credentials. This feature introduces a level of plausible deniability, allowing you to
assert that your login details were compromised and used on another device.
Moreover, the entirety of Tails’ internet traffic is funneled through the Tor network,
ensuring encryption and obfuscating the destinations of your online activities.
Consequently, using Tails on a WiFi network requiring login credentials is feasible.
Do DNS Leaks Pose a Risk?
Within the Tor network, DNS requests for websites you visit are not made by your
personal computer but by the exit node – the final relay in the Tor chain
responsible for directing your traffic. This mechanism is in place because Tor
supports TCP traffic but not UDP. By utilizing Tails, which automatically directs all
internet traffic through the Tor network, concerns regarding DNS leaks are
mitigated. The DNM bible emphasizes the importance of using Tails to ensure such
security measures are automatically handled.
Selecting a New Computer for Optimal Tails Compatibility
If you’re in the market for a new computer and intend to run Tails, most systems
will suffice. However, to ensure the best experience, the DNM bible suggests
adhering to the following advice during your selection process:
● Avoid purchasing an Apple product, such as a Mac or MacBook, as they
may encounter compatibility issues with Tails.
● Verify that the computer does not contain hardware components listed
under Tails’ known compatibility issues.
● Preferably, opt for a computer that does not come pre-installed with
Windows 8 or 10, as these operating systems have a higher likelihood of
causing conflicts compared to machines with older versions of Windows
or no operating system at all.
It’s been noted by some users that Alienware computers exhibit good compatibility
with Tails. Additionally, a list of laptops known to perform well with Tails is also
available for reference.
Do I always need to use the most recent version of Tails?
Definitely. Always use the latest version of Tails at all times. Updates are very
important because they often address security vulnerabilities that might otherwise
leave you unprotected. Therefore, it is highly recommended that you take a few
minutes to update Tails after you receive notification of an available update.
Recommended Hardware for Tails Compatibility
Encountering compatibility issues between Tails and your current hardware may
prompt you to consider alternative devices. If feasible, first attempt to use Tails on
a different computer. Below is a list of hardware that has been verified to work with
Tails, as detailed in the DNM bible:
USB Flash Drives
Confirmed compatible USB drives with Tails 3.0 include:
● Kingston Data Traveler SE9 G2 16GB
● Lexar Twist/Turn Jump Drive 16GB
● Mushkin Atom 16GB
● Onn 32GB (Walmart’s in-house brand)
● Transcend Jetflash 700 16GB
These drives are widely available online and are priced between $6 to $15. The
Onn brand is specifically available at Walmart stores, while Lexar drives are
commonly found at Target.
It’s worth noting that the Onn brand is produced by Sandisk for Walmart, a fact
discovered post-testing but considered valuable enough to retain in this list.
USB WiFi Adapters
Before considering the purchase of a new WiFi adapter, it’s advisable to try a
direct Ethernet connection as a simpler and often more reliable alternative.
For those requiring a USB WiFi adapter, the following models have been tested and
work with Tails:
● CanaKit Raspberry Pi WiFi Wireless Adapter/Dongle (available on
Amazon)
● Edimax EW-7811Un 150Mbps WiFi Adapter (available on Amazon)
● Belkin N300 High-Performance WiFi USB Adapter
USB Ethernet Adapters
For users needing an Ethernet adapter, the following USB Ethernet adapters are
confirmed to function with Tails:
● Plugable USB 3.0 to Ethernet Adapter (available at plugable.com/
products/usb3-e1000)
● Plugable USB 3.0 Hub with Ethernet (available at plugable.com/products/
usb3-hub3me)
Is It Safe to Purchase USB Sticks With Pre-installed Tails?
It is not recommended to buy USB sticks that come with Tails already installed.
The core issue is the risk of the seller having altered the Tails setup on the USB to,
for instance, capture and send your passwords to them. The DNM bible advises to
personally download, verify, and install Tails to ensure the integrity and security of
your setup.
Why Is JavaScript Globally Enabled by Default With Security Slider
Set to Low?
The decision to enable JavaScript globally and set the security slider to a lower
setting by default in Tails is aimed at accommodating users who may not be
technically proficient. Adjusting to high-security settings can be challenging for
those not familiar with the nuances of such configurations, potentially hindering
their user experience. As a result, the developers have opted for more accessible
default settings to facilitate a smoother experience for these users, as highlighted
in the DNM bible.
Nonetheless, it’s imperative for you to manually adjust the security slider to the
highest setting each time you launch the Tor browser. This is crucial for enhancing
your security, especially since these settings cannot be preserved between
sessions, even with persistence enabled.
Guidance on Installing Tails
For those looking to install Tails, comprehensive guides are available to assist you
through every step of the process, ensuring a smooth installation regardless of
your operating system.
● For Windows users, follow the specific guide tailored to Windows
installations.
● Mac OS users can access a guide designed for Mac environments.
● Linux users are not left out, with a guide available for installations from
Linux platforms.
Should you use a keyboard layout different from the standard American layout,
you’ll need to adjust this at the Tails welcome screen. Simply navigate to the
dropdown menu in the bottom right corner, scroll to find your layout, or choose
“Other…” and type in the name of your layout (for example, typing “ser” for
Serbian) until it appears. Select it, press enter twice, and you’ll return to the
welcome screen with the new layout activated.
It’s important to note that downloading Tails via the clearnet is perfectly legal and
doesn’t require Tor or a VPN. However, post-download, verifying the integrity of
the .iso file is crucial to avoid potentially compromised versions that could
jeopardize your security.
A handy tip for those having trouble accessing the BIOS/boot menu: holding down
the shift key while selecting restart will bring up the option to boot from a USB
device or navigate to advanced UEFI options, facilitating the boot process.
Essential Settings and Advice as per the DNM Bible
● Each session you initiate with the Tor browser, it’s imperative to adjust
the security slider to the ‘safest’ setting. This action turns off JavaScript
by default, a critical step since JavaScript can be exploited by websites to
compromise your anonymity, and activates additional security measures.
● For those times when you must access clearnet sites requiring JavaScript
(for example, to interact on reddit.com), modify the NoScript settings for
●
synchronization.
● Completion is indicated by an ‘Installation Complete!’ message.
Congratulations, you have successfully cloned Tails.
Securing Persistent Storage with Backup Utility
Note: For those initiating a backup to a USB for the first time, you must first boot
from your backup USB and activate the Persistent Volume along with any desired
features (such as Electrum, GnuPG, Dotfiles).
● After configuring your backup USB, reboot using your primary Tails USB—
the one you intend to back up. At the Welcome Screen, set an
Administration Password of your choice; this will be reset upon shutting
down Tails. (Look for the “+” icon at the bottom left to do this.)
● Once Tails starts with the Administration Password set, navigate through
Applications -> Accessories -> Files to access the file manager.
● Connect your backup USB stick to the computer.
● In the file manager’s sidebar, you’ll find an encrypted volume. Click on
this volume and enter the Persistent Storage password designated for
your BACKUP Tails.
● This action will mount the TailsData volume, making it visible on the
sidebar.
● Proceed to Applications ‣ System Tools ‣ Back Up Persistent Storage.
● Select ‘update’ to commence the backup process.
Congratulations, you have now successfully backed up your entire Tails drive,
ensuring your critical data is preserved.
Securely Backing Up Persistent Storage Using Terminal
Note: For first-timers backing up to this USB, initiate by booting from your backup
USB to activate the Persistent Volume along with any additional functionalities you
require (like Electrum, GnuPG, Dotfiles).
● After setting up your backup USB, reboot from your primary Tails USB—
the one you’re backing up. At the Welcome Screen, establish an
Administration Password of your choosing, which will reset upon Tails
shutdown. (Activate this by clicking the “+” at the bottom left corner.)
● With the Administration Password enabled, boot up Tails and navigate to
Applications -> Accessories -> Files to open the file manager.
● Connect your backup USB.
● In the file manager, look for an encrypted volume listed in the sidebar.
Click it and input the Persistent Storage password for your BACKUP Tails,
making the TailsData volume visible in the sidebar.
● Launch the root terminal by either searching for ‘terminal’ and selecting
‘root terminal’ or through Applications -> System Tools -> Root Terminal,
then enter the Administration Password you previously set.
● Execute the backup command in Terminal:
“`
rsync -PaSHAXv –del /live/persistence/TailsData_unlocked/ /media/amnesia/
TailsData/
“`
Upon completion, Terminal will display statistics about the data transferred,
indicating a successful backup:
“`
sent 32.32M bytes received 1.69K bytes 21.55M bytes/sec
total size is 32.30M speedup is 1.00
“`
Congratulations, you’ve effectively backed up your entire Tails drive! Future
backups won’t require a full drive clone; simply boot with the administrator
password, unlock your backup, and execute the command to update your backup
efficiently.
This process requires merely 5 minutes—commit to regular backups to safeguard
your valuable data.
Installing Optional Debian Packages at Boot
This section of the DNM bible is optional. Follow these instructions only if you find
it necessary to install additional packages beyond what Tails includes by default.
Tails comes equipped with all essential software, and adding extra applications
may introduce security risks. Nevertheless, Tails provides a feature for the
automatic installation of Debian packages upon startup.
● Boot Tails and activate persistence along with an administrative
password. To utilize this feature, activate the following persistence
options in the Tails persistence configuration wizard (found under
Applications -> Tails -> Configure persistent volume), ensuring they are
marked with a green check:
● APT Packages
● APT Lists
If these options were not previously activated, reboot your system for the changes
to apply. Upon restarting, re-enable persistence and set an administrative
password once more. Proceed to open a root terminal (Applications -> System
Tools -> Root Terminal) and input the following command to update your package
lists:
“`
apt-get update
“`
This update process might take around 5 to 10 minutes. For demonstration, let’s
install the GPA package (GNU Privacy Assistant, a graphical PGP client) with the
commands:
“`
apt-get install gpa
“`
Confirm the installation by pressing ‘y’. Then navigate to your persistent storage
directory:
“`
cd /live/persistence/TailsData_unlocked
“`
Open or create the `live-additional-software.conf` file with gedit:
“`
gedit live-additional-software.conf
“`
In the newly opened file, add the package name:
“`
gpa
“`
Save and close gedit. Although gedit may display warnings, they can be
disregarded. Normally, software installed via apt-get is not retained after
shutdown, necessitating reinstallation upon next boot. However, by configuring apt
persistence and listing packages in `live-additional-software.conf`, the system will
automatically reinstall these packages at each startup without significantly
delaying the boot process. A notification will appear once the installation is
complete, indicating “Your additional software / The upgrade was successful”.
To launch the GPA PGP client, navigate through Applications -> Accessories ->
GNU Privacy Assistant.
Troubleshooting Common Issues
Encountering challenges with Tails, from installation hiccups to boot problems, is
not uncommon. The DNM bible offers several strategies to troubleshoot and
resolve these issues effectively. Here’s a consolidated guide to assist you:
● Secure Boot: Verify if secure boot is disabled in your BIOS settings, as
it’s a frequent impediment to Tails functioning correctly.
● Known Hardware Conflicts: Check the list of known issues on the Tails
website for any hardware you’re using (like specific USB brands or
network cards) and apply any provided solutions. Testing Tails on a
different computer can help determine if the issue is hardware-specific.
● Tor Connectivity Problems: If Tor isn’t ready or you’re facing internet
connection issues, try waiting 5 to 10 minutes after logging into Tails
before rechecking. Persistent issues may require a reboot, or disabling
MAC address spoofing through the Tails greeting screen’s “More
Options”.
● Password Recognition Issues: Ensure the correct keyboard layout is
selected at the Tails greeting screen, as incorrect settings can lead to
password mismatches.
● Boot Issues Despite Correct Instructions: Confirm your USB stick isn’t
listed under problematic devices on the Tails website.
● Tails Freezing at Boot: If Tails freezes post-selection in the boot menu,
allow the countdown to complete without interaction. Repeated freezing
●
partitions.
● Set your timezone by navigating back to the main menu, then to ‘Date &
Time’.
● It’s recommended to keep the root account disabled for security
purposes.
● Create a user account, ensuring the password is robust and distinct from
your disk encryption password.
● Returning to the main installation window, initiate the installation by
clicking ‘Begin Installation’.
● Await the completion of the Qubes OS setup.
● Following a successful installation, opt to ‘Reboot System’, completing
the process.
Configuring Qubes OS
● Upon starting Qubes, ensure the Hypervisor is enabled for secure entry.
● Decrypt your disk as prompted to access the main Qubes OS selection.
● Choose the Qube templates you wish to install, such as Fedora 36,
Debian 11, or Whonix, tailored to your preferences and needs.
● Activate the option to use the sys-net qube for networking and USB
device management.
● Opt for system and template updates via the Tor anonymity network with
Whonix for enhanced security.
● Conclude the setup by selecting ‘Done’ followed by ‘Finish Configuration’,
and patiently await the installation of default templates, noting that
occasional freezing is normal.
Familiarizing Yourself with Qubes Desktop
● Log into your established user account to explore the Qubes environment
● The Qube Manager Tray, identified by a blue cube icon at the top-right,
allows for monitoring and management of your qubes.
● Utilize the Qube Manager for creating, deleting, and configuring your
qubes as needed.
● Access various tools and isolated application qubes from the System
Menu at the top-left.
● Manage connected devices and configure passthrough permissions for
specific qubes via the Qubes Devices menu, noting that USB
passthrough is restricted by default for security.
● The Network Manager, also at the top-right, facilitates connections to
WiFi and ethernet networks.
Network Device Configuration
● Open the Qube Manager and shutdown the sys-net qube to adjust
settings.
● In the sys-net qube’s settings, navigate to the devices tab to find your
●
USB controllers, keeping this window open until changes are finalized.
● Assign necessary USB controllers to the right panel for activation,
advised only if essential for USB storage or network adapters.
● Apply changes cautiously; improper USB passthrough configuration
might disable internal USB peripherals like keyboards, potentially
compromising your setup. Incrementally adjust USB passthrough
settings, restarting sys-net after each change to ensure internal
peripherals function correctly.
● Restart the sys-net qube and await its initialization for network adapter
access.
● Proceed to connect to the internet, ensuring all configurations are
securely applied.
Updating Qubes OS
● Access the Terminal Emulator from the System Menu located in the top-
left corner of your screen.
● Execute the update command appropriate for your Qubes OS version.
For Qubes R4.0 and earlier versions, use:
“`
sudo qubes-dom0-update
“`
For Qubes R4.1 and subsequent versions, input:
“`
sudo qubes-dom0-update –show-output –console
“`
● Initially, this command might not succeed, potentially triggering a
Connection Wizard pop-up to adjust your internet settings for Whonix.
● Retry the update command after configuring your connection. Note that
updates via the Tor Network can significantly extend the update duration.
● When the update process prompts for package verification, type Y to
proceed. Defaulting to NO will necessitate restarting the update
procedure.
Installing Essential Software in Whonix Template
For enhanced security and functionality within Whonix, installing additional
software is recommended:
● Navigate to the System Menu, locate the Template: whonix-ws-XX, and
launch the XFCE terminal.
● Begin by updating the Whonix template with:
“`
sudo apt-get update && sudo apt-get upgrade -y
“`
To incorporate PGP encryption capabilities, install Kleopatra with:
“`
sudo apt-get install kleopatra
“`
Conclude by closing the XFCE terminal.
Setting Up VeraCrypt on Debian-11 Qube
To enhance your security setup with VeraCrypt encryption tools, follow these
steps, noting that this process is specifically for a debian-11 qube within Qubes
OS.
Preparing VeraCrypt Installation
. Access the terminal from the System Menu under the Template:
debian-11.
. Update the system template with the commands:
“`
sudo apt-get update && sudo apt-get upgrade -y
“`
Downloading and Installing VeraCrypt
. Navigate to www.veracrypt.fr to obtain the VeraCrypt download link for
Debian 11. Ensure to verify the PGP signatures of the download to
maintain security integrity.
. Use the wget command to download VeraCrypt, replacing
`VERACRYPT_DOWNLOAD_LINK` with the actual link:
“`
wget VERACRYPT_DOWNLOAD_LINK -o vc.deb
“`
Proceed with the installation of the downloaded .deb package:
“`
sudo dpkg -i vc.deb
“`
If the installation prompts any errors, resolve them with:
“`
sudo apt-get –fix-broken install
sudo dpkg -i vc.deb
“`
Configuring Software in Whonix Template
. In the Qube Manager, locate the whonix-ws-XX template and access its
Settings > Applications.
. Add KeePassXC and Kleopatra to the selected applications by moving
them to the right panel.
. Apply the changes and confirm by clicking OK.
. Shutdown the anon-whonix qube via the Qube Manager, then repeat the
application configuration process for KeePassXC and Kleopatra, applying
the changes.
Installing I2P
With Qubes OS correctly installed and configured, you’re now ready to set up and
utilize I2P for anonymous networking. Follow the dedicated guide for I2P
installation and usage instructions.
Mobile Security Guide
This chapter of the DNM bible navigates the intricacies of utilizing mobile devices
securely. It’s critical to acknowledge that mobile devices are generally considered
less secure for OpSec purposes, recommended only under exceptional
circumstances. For comprehensive security, desktop operating systems like Tails
or Whonix, equipped with essential tools such as PGP and XMR, are preferred.
Introduction to GrapheneOS
GrapheneOS stands out as a mobile operating system prioritizing privacy and
security, featuring compatibility with Android apps. Its development is centered
around enhancing privacy and security technologies, including advanced
sandboxing, exploit mitigation, and a robust permission model.
Functionality of GrapheneOS
GrapheneOS distinguishes itself by fundamentally enhancing security and privacy.
It employs a variety of technologies to address and mitigate vulnerabilities
comprehensively, making exploitation more challenging. These enhancements not
only secure the OS itself but also bolster the security of applications running on it.
Importantly, GrapheneOS does not include Google apps or services, reinforcing its
security posture.
Compatibility and Installation of GrapheneOS
GrapheneOS is specifically designed for Google Pixel devices, although it can be
compiled for other devices from its source tree without modifications. Extending
support to additional devices often requires significant effort to meet
GrapheneOS’s security standards. Due to hardware and firmware limitations,
achieving a secure configuration on non-Pixel devices may be impractical. As of
this writing, the following Pixel devices are officially supported:
● Pixel 7 Pro (cheetah) — experimental
● Pixel 7 (panther) — experimental
● Pixel 6a (bluejay)
● Pixel 6 Pro (raven)
● Pixel 6 (oriole)
● Pixel 5a (barbet)
● Pixel 5 (redfin)
● Pixel 4a (5G) (bramble)
● Pixel 4a (sunfish)
● Pixel 4 XL (coral)
● Pixel 4 (flame)
Security Features of GrapheneOS
GrapheneOS’s security is not just surface-level; it’s built into the very foundation
of the operating system. Without any Google integration or bloatware, it leverages
Android’s native security features while introducing additional protections.
Features such as disk encryption, enhanced clipboard security, protection against
hardware identifier tracking, IOMMU-based baseband isolation, and an integrated
firewall with customizable rules, establish GrapheneOS as a formidable choice for
users prioritizing security and privacy.
Installation
It’s important to understand that mobile platforms generally offer inferior OpSec
compared to dedicated systems like Tails or Whonix.
Installation Methods for GrapheneOS
GrapheneOS supports two main methods of installation, catering to different levels
of technical expertise:
● WebUSB-based Installer: This is the preferred option for the majority of
users, designed for straightforward and accessible installation.
● Command Line Install: Aimed at users with advanced technical skills,
this method offers more control over the installation process.
Preparing for Installation
To ensure a smooth installation process, start by installing a compatible operating
system on your device. Your system should have at least 4GB of RAM and 32GB of
available storage space. The following operating systems are officially supported:
● Windows: Version 10 and 11
● macOS: Catalina (10.15), Big Sur (11), and Monterey (12)
● Linux: Arch Linux, Debian 10 (Buster), Debian 11 (Bullseye), Ubuntu 20.04
LTS, and Ubuntu 22.04 LTS
● Other: ChromeOS, GrapheneOS, Google Android (stock Pixel OS), and
certified Android variants
Before proceeding with the installation, make sure your operating system is fully
updated to avoid any compatibility issues.
Starting the Installation
Supported Browsers
For the installation, use a browser compatible with the WebUSB feature, except for
Ubuntu’s Chromium due to its limitations. Recommended browsers include:
● Chromium (for non-Ubuntu systems)
● Vanadium (specific to GrapheneOS)
● Google Chrome
● Microsoft Edge
● Brave
Ensure your browser is current, and avoid using incognito or private browsing
modes during the installation.
Enabling OEM Unlocking
● Activate developer options by navigating to Settings -> About this phone
and tapping the build number repeatedly until developer mode is
enabled.
● Within Settings -> Developer options, enable the OEM unlocking toggle.
Preparing Linux for Non-root Flashing
Specific to Arch Linux and Debian/Ubuntu, install necessary packages for device
recognition:
For Arch Linux:
“`
sudo pacman -Syy android-udev
“`
For Ubuntu:
“`
sudo apt-get install android-sdk-platform-tools-common
“`
Booting into Bootloader
● Restart your device, holding down the volume down button during boot
until it enters the bootloader interface.
Connecting Your Device
● Connect your phone to your computer. Linux users may need to
reconnect if udev rules were not established beforehand.
● Windows users without fastboot drivers should install them now for Pixel
devices or obtain the latest drivers.
Proceeding with Installation
● Visit the official GrapheneOS website, navigate to the install section, and
select the web installer.
● Continue to the ‘Unlocking the bootloader’ section as instructed on the
website.
● Follow the on-screen installation steps, noting that further detailed steps
require interaction with the website’s WebUSB commands.
Securing Your Device Post-GrapheneOS Installation
Following the successful installation of GrapheneOS, enhancing your device’s
privacy and security settings is crucial. Implement the following adjustments to
fortify your setup:
Essential Privacy Settings
● Disable Camera and Microphone Access: Navigate to Settings ->
Privacy and restrict access to both the camera and microphone to
prevent unauthorized use.
● Location Services: Turn off location tracking by going to Settings ->
Location -> Use location.
● Auto Reboot Schedule: Enhance security by setting an automatic reboot
time via Settings -> Security -> Auto reboot.
● Pin Scrambling: Activate pin scrambling under Settings -> Security to
add an extra layer of security during screen unlock attempts.
● Screen Lock Camera Access: Prevent camera access from the lock
screen by disabling it in Settings -> Security.
App Store and Recommended Apps
After adjusting your settings, proceed to install F-Droid from your browser, serving
as a reliable app store for open-source applications. Incorporate these
recommended apps to elevate your device’s functionality and privacy:
● OpenKeychain: Facilitates easy PGP encryption.
● AuthPass: A KeePass-compatible password manager.
● InviZible Pro: Enhances online anonymity and security.
● Fennec F-Droid: A privacy-focused web browser.
● Tor Browser for Android: Offers anonymous browsing via the Tor
network.
● Explore F-Droid for FOSS (Free and Open Source Software) alternatives
to conventional PlayStore applications.
Configure each app according to your privacy and security needs. For web
browsing enhancements, specifically with Fennec, consider following additional
setup guides for I2P browsing.
Final Thoughts
By completing these steps, you’ve significantly improved your mobile device’s
security posture. Remember, the effectiveness of these security measures largely
depends on your vigilance with app installations, permission management, and
active settings. Although using cellular services inherently compromises
anonymity, employing a faraday bag or box can mitigate tracking risks.
Stay vigilant and regularly update your system with the latest patches from
GrapheneOS. For comprehensive guidance and FAQs, the official GrapheneOS
website is an invaluable resource.
KeePassXC
Securely Managing Credentials with KeePassXC
KeePassXC serves as a robust password management tool, designed to securely
store your sensitive information such as usernames, passwords, and other
confidential details. This utility features an integrated password generator,
promoting the use of strong, unique passwords for each of your accounts to
minimize the risk of unauthorized access by hackers or law enforcement. All your
credentials are safely housed within an encrypted database, accessible solely
through a master password. This singular password approach simplifies secure
access to all your accounts, reducing the need to memorize multiple passwords.
Essential Data for KeePassXC Storage:
● Market Accounts and Forum Logins: Securely keep track of your
usernames and passwords.
● Cryptocurrency Seeds and Wallet Passwords: Safeguard your digital
currency access.
● PGP Key Passwords: Store passwords related to your PGP encryption
keys securely.
Launching KeePassXC:
● On Tails: Navigate through “Applications” -> “Accessories” ->
“KeePassXC” to open KeePassXC and start managing your passwords
efficiently.
● For Whonix Users: KeePassXC is also integrated within Whonix, allowing
you to use the same operational guidelines as provided for Tails users.
By adopting KeePassXC as recommended in the DNM bible, you enhance your
operational security, ensuring your sensitive information is well-protected and
easily accessible when needed.
Creating a KeePassXC database
To begin securing your passwords and sensitive information with KeePassXC,
ensure you’ve first initialized and unlocked the persistent volume on your device.
From the KeePassXC welcome screen, select ‘Create new database’. Alternatively,
navigate through the menu bar by selecting “Database” -> “New database”.
It’s crucial to save your new database within the persistent volume. Neglecting this
step means risking data loss upon restarting Tails.
Establishing a Master Password
● Master Password Creation: This step involves setting a robust master
password, the key to accessing your entire database of secrets. Choose a
password that’s both complex and resistant to brute-force attacks or
guesswork by potential intruders. This password encapsulates the
security of your entire database.
● Mnemonic Passphrase: For a strong yet memorable password, consider
creating a mnemonic consisting of at least five words. The KeePassXC
built-in passphrase generator can aid in this process. Access it by
clicking the dice icon, select “Passphrase”, adjust your word count, and
generate until a suitable passphrase is found. Utilize the “Copy” function
to save your chosen passphrase, then exit the generator.
● Memory Techniques: To facilitate recall of your mnemonic, weave the
words into a narrative or story. If there’s a concern about forgetting your
master password, temporarily note it down on paper and store it securely
until memorized.
After setting your master password, proceed by clicking “OK”.
It’s advisable to reboot Tails following these adjustments to verify that your
database persists correctly on the volume and remains accessible.
Opening a KeePassXC database
To open your database, select “Open existing database”. Proceed to locate the
directory containing your database file and double-click the .kdbx file to select it.
Input your master password when prompted, then confirm by clicking “Ok” to gain
access to your stored information.
Inserting New Entries in KeePassXC
Imagine you need to securely store the login details for a market account. Here’s
how to proceed in KeePassXC:
. Start by selecting “Entries” -> “Add new entry”.
. For the entry title, use the market’s name, and for the username, input
your specific market username.
. To create a strong password, click on the dice icon to the right of the
password field. To view the generated password, click on the eye icon
located directly below the dice icon.
Enhancing Your Password:
● Click on the button labeled “/*_…” next to the “0-9” button. This action
introduces special characters into your password, significantly enhancing
its strength. If satisfied with the generated password, click “Apply” to
confirm your selection.
Verifying Your Password:
● To double-check the accuracy of your password, use the eye icon above
the dice button. This will reveal the password you’ve chosen in both the
“Password” and “Repeat” fields. Once verified, click “OK” to finalize the
entry, which will then appear in your database list.
Always Save Changes: It’s crucial to save your database after making any
modifications to ensure no data is lost.
For Tails users, KeePassXC automatically saves changes after each modification.
However, when saving critical information, such as cryptocurrency seeds, take an
extra step to confirm the database’s integrity. Close and reopen your KeePassXC
database to check that your new entry has been correctly stored, safeguarding
your valuable data.
Retrieving Your Stored Data
To access your saved credentials or other information within KeePassXC follow
these steps:
. Locate the desired entry, such as one labeled with your market’s name for
which you wish to log in.
. Right-click on this entry to unveil a context menu that offers options to
copy either the username or password directly to your clipboard.
After copying, navigate to the corresponding site (like a registration or login page)
and paste the copied information where required. Remember, KeePassXC is
designed to automatically clear your clipboard after 10 seconds for security
purposes, so prompt action is necessary.
For accessing additional details stored in an entry:
● Right-click on the entry again and select “Copy attribute to clipboard” to
copy other stored attributes like URLs or notes.
To edit an entry:
● Double-clicking on an entry will open its editor window. Exercise caution
in this mode to avoid inadvertently modifying any critical information.
PGP
General
With the release of Tails 5.0, the Tails development team updated the PGP
encryption software used within the operating system. If you’re operating on an
older version of Tails, it’s crucial to upgrade to the latest release to follow the
modern encryption protocols. This guide is tailored for users of Tails version 5.0
and newer.
Understanding PGP
Pretty Good Privacy (PGP) stands as a cornerstone encryption tool, offering
cryptographic security for digital communication. Its application spans encrypting,
signing, and decrypting text, emails, and files, enhancing the confidentiality and
integrity of email exchanges.
For users navigating the darknet, PGP serves multiple essential purposes:
● Encrypting Messages: Encrypt sensitive information, such as shipping
addresses, ensuring that only the intended recipient, typically the vendor,
can decrypt and read the message.
● Decrypting Messages: Vendors often send encrypted messages
containing sensitive details like tracking codes, which require decryption
on the recipient’s end. Additionally, decryption is sometimes necessary
for market login authentication.
● Verifying Messages: Validate the authenticity of market links to guard
against phishing attempts, verifying that communications are legitimate
and untampered.
The Importance of Mastering PGP
Grasping the functionality of PGP is imperative for safeguarding your personal
information from unintended recipients, including law enforcement. The DNM bible
strongly advises dedicating time to fully understand and proficiently utilize PGP
encryption. To practice and refine your PGP skills, consider engaging with
communities or resources dedicated to PGP practices.
By adhering to the guidance provided in the DNM bible and staying updated with
the latest versions of Tails, you ensure a fortified layer of security for your digital
communications, essential for maintaining privacy in the darknet realm.
FAQ on PGP Usage
Sending Messages Without PGP Encryption
Q: What should I do if I sent a message containing sensitive information
without PGP encryption?
A: Immediately cease using the current market account and establish a new one.
This measure is not excessive; historical seizures of platforms like Silk Road
revealed numerous unencrypted messages with plaintext addresses. Law
enforcement agencies have utilized such information to apprehend buyers. To
mitigate risk, initiate a fresh market account dedicated to consistently encrypting
sensitive data, such as addresses, with PGP. This practice, as emphasized in the
DNM bible, prevents the accumulation of incriminating evidence.
Market’s Built-in Encryption Reliability
Q: Is it safe to rely on a market’s built-in encryption for messaging?
A: No. Messages processed through market’s built-in encryption are vulnerable to
interception if the server is compromised, as the server handles messages in
plaintext. Always encrypt sensitive content personally to ensure security.
Necessity of Encrypting All Messages
Q: Do all messages require PGP encryption?
A: Encrypt only messages that contain sensitive data, like addresses or packaging
details, typically exchanged between a vendor and a buyer. Generic messages,
such as expressing gratitude, do not necessitate encryption.
Decrypting Sent PGP Messages
Q: Can I decrypt a PGP message after I’ve sent it?
A: No, decryption is exclusively possible by the recipient who possesses the
corresponding public key used for encryption. However, including your own public
key alongside the recipient’s during the encryption process enables you to decrypt
the message. Detailed instructions on this process are provided later in the guide.
PGP vs. GPG
Q: What distinguishes PGP from GPG?
A: The differences between PGP (Pretty Good Privacy) and GPG (GNU Privacy
Guard) are delineated in the specified section.
Adhering to these guidelines from the DNM bible ensures that your
communications on darknet platforms remain secure, minimizing the risk of
exposure to unauthorized parties.
Generating a PGP Key Pair
Creating a PGP key pair is a fundamental step in securing your digital
communications. This process yields two distinct keys: a public key, which you can
share freely, and a private key, which must remain confidential at all times. Your
public key is used by others to encrypt messages intended for you, ensuring that
only you, with your private key, can decrypt and read them.
Market Account Security
When registering on a marketplace, you may be asked to provide a public key. To
safeguard your anonymity and prevent potential account linkages, it’s imperative
to generate a new key pair for each new account you create. Reusing a public key
across multiple accounts compromises your operational security.
Uploading your public key enables vendors to send encrypted information, such as
tracking numbers for shipments, securely. Additionally, it can act as a form of two-
factor authentication for market login procedures, where decrypting a message
with a unique code each time you log in verifies your identity.
Managing Private Keys
It is crucial not to retain private keys that are no longer in use. If you register a new
market account, ensure to delete the previous key pair and create a new one.
Similarly, if a market faces legal action or executes an exit scam, promptly remove
all associated keys. Limiting access to your private keys minimizes the risk of an
attacker decrypting sensitive information.
Tails
● create a new key first Open application -> Accessories -> Kleopatra
● File -> New Keypair
● Create personal OpenPGP keypair
● Enter a name: Usually your account name for this key. Not your real
name!
It’s advisable not to fill in the email field unless necessary. If email contact is
preferred, ensure it meets the criteria outlined in the email section.
● Advanced Configuration
● Opt for the 4096-bit encryption over the 3072-bit option for enhanced
security.
● Assign an expiration date for your key, typically one to two years ahead,
to encourage regular updates of your key pair.
Important Consideration: An expiration date doesn’t inhibit the decryption of
messages with the corresponding public key in the future. Should your private key
be compromised, it remains vulnerable to decryption by unauthorized parties even
post-expiration. The purpose of an expiration date is to act as a prompt for you to
update your key pair regularly, thus reducing the risk associated with a single
private key’s exposure. Upon updating your key pair, inform your contacts by
signing your new public key with the old one, ensuring a seamless transition.
Key rotation primarily concerns keys used outside of marketplaces, such as those
added to profiles on platforms like Dread. Market-related keys typically have
shorter lifespans and shouldn’t be retained for extended periods.
● Click ok
● Next
● Create
● Enter a strong password
● You will now see a message box creating your keys. Once it is done you
will see a notification letting you know it is finished.
Congratulations on setting up your PGP key pair, enhancing your digital
security and privacy.
Finding your public key
To locate your public key, simply double-click on the newly created key’s name.
Select the “Export” option. You’ll encounter a block of text resembling the
following:
“`
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2
mQGNBF0j2XYBDADsQj2L7HravPZHY622SSZ1sNOXeC+5gJED2W3VgJ0BpZYfW3
Bq
JQFIPRfEJgz8LsuP4A8QwR8DWVQO5qEUN0pLDqJZzPqEd+V0AikN3KxQKbTIy3k
L
5zyY5+QhO0qlJzK4V8ZvFpZUmYgDQUCPjYZ6c+KJUbK5xTIJN7BzRrJ3FWWj+mp
s
ay1uN2RwR2D9+HMIKSl0PhzKXIkH2PI8TnRiZGZqFy2h2ooMblO5H3sGkSgEdxpi
cCUFD2VJ3B3QePE3a3JQwz5Sh5PeJ8KHN0Q3VJbBq+GsDQDzjMvpH4gU5nS3E
3Sf
UkHr+vC/rqKxVrL5P/7LM5Vo5J8ARSzqD5K3JU3kYdWJw0J8Lb0+ZMdI5x9UjT3I
o3W3+ZUhVnkBj8ZqI/eM+KcF+jDs9vMzI+Mk3A7kSdI9I0W+UcN4FW6Lr9TeP4E0
AeLRR2EAEQEAAbQdTWFyaWUgRHVwb250IChOT05FKSA8bWFyaWUuZHVwb25
0QGV4
YW1wbGUuY29tPokB1AQTAQoAPhYhBBDZb4hJ5xS1BTTK1uMjI3mJAxLkBQJdI9l2
AhsDBQkDwmcABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEMjI3mJAxLkC
GyQM
AIBqAFvO5Vt9s3CiQPA7/u72C+SV1+HqPviYvLe8No8pfL+r2LXv4MQLVl5Z0jMg
RXkUpCQWIRHxF5Ujt0WGsRJSGeY8IYqP2T5HbTIq3kqJeBmStJbnj+tzBpSeq3sL
E2PPlL5C3EP286ZgGJ/lJq9LZ8Xl2WOK1+et2cIFFH45ndWJw0J8Lb0+ZMdI5x9U
jT3Io3W3+ZUhVnkBj8ZqI/eM+KcF+jDs9vMzI+Mk3A7kSdI9I0W+UcN4FW6Lr9Te
P4E0AeLRR2EAEQEAAbQdTWFyaWUgRHVwb250IChOT05FKSA8bWFyaWUuZHV
wb250
QGV4YW1wbGUuY29tPokB1AQTAQoAPhYhBBDZb4hJ5xS1BTTK1uMjI3mJAxLkBQJ
d
I9l2AhsDBQkDwmcABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEMjI3mJAx
LkC
GyQMAIBqAFvO5Vt9s3CiQPA7/u72C+SV1+HqPviYvLe8No8pfL+r2LXv4MQLVl5Z
0jMgRXkUpCQWIRHxF5Ujt0WGsRJSGeY8IYqP2T5HbTIq3kqJeBmStJbnj+tzBpSe
q3sLE2PPlL5C3EP286ZgGJ/lJq9LZ8Xl2WOK1+et2cIFFH45
—–END PGP PUBLIC KEY BLOCK—–
“`
Whonix
For optimal operational security, it’s recommended to use PGP keys of 4096 bits,
as the GNU Privacy Assistant limits key creation to 3072 bits and lower. This
process will be carried out in the terminal of the Whonix Workstation.
Generating a 4096-Bit Key in Terminal:
. Launch Terminal: Open a new terminal window.
. Generate Key: Input the command `gpg –full-generate-key`.
. Key Strength: Select `1` for RSA and RSA (default) and specify `4096`
for the key size.
. Expiration: Decide on an expiration date for your key and confirm with
`y`.
. Identity: Enter a pseudonym for your key. Avoid using real names or any
personal identifiers.
. Email: Optionally add an email address or press Enter to bypass this
step.
. Comment: Add a comment if desired or skip with Enter.
. Review: Confirm your details by typing `o` if all information is correct.
A password creation prompt will appear. Utilize KeePass to generate and securely
store a password for this key set. Engaging mouse movements during this phase
aids in the generation of your PGP key. Subsequently, your new key should be
visible within the GNU Privacy Assistant.
Exporting Your Public Key:
To share your public key, navigate to the “Key Management” window in the GNU
Privacy Assistant, right-click your key, and select the option to copy. This copies
your public key, ready for pasting where necessary.
A typical public key format:
“`
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2
mQGNBF0j2XYBDADsQj2L7HravPZHY622SSZ1sNOXeC+5gJED2W3VgJ0BpZYfW3
Bq
JQFIPRfEJgz8LsuP4A8QwR8DWVQO5qEUN0pLDqJZzPqEd+V0AikN3KxQKbTIy3k
L
5zyY5+QhO0qlJzK4V8ZvFpZUmYgDQUCPjYZ6c+KJUbK5xTIJN7BzRrJ3FWWj+mp
s
ay1uN2RwR2D9+HMIKSl0PhzKXIkH2PI8TnRiZGZqFy2h2ooMblO5H3sGkSgEdxpi
cCUFD2VJ3B3QePE3a3JQwz5Sh5PeJ8KHN0Q3VJbBq+GsDQDzjMvpH4gU5nS3E
3Sf
UkHr+vC/rqKxVrL5P/7LM5Vo5J8ARSzqD5K3JU3kYdWJw0J8Lb0+ZMdI5x9UjT3I
o3W3+ZUhVnkBj8ZqI/eM+KcF+jDs9vMzI+Mk3A7kSdI9I0W+UcN4FW6Lr9TeP4E0
AeLRR2EAEQEAAbQdTWFyaWUgRHVwb250IChOT05FKSA8bWFyaWUuZHVwb25
0QGV4
YW1wbGUuY29tPokB1AQTAQoAPhYhBBDZb4hJ5xS1BTTK1uMjI3mJAxLkBQJdI9l2
AhsDBQkDwmcABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEMjI3mJAxLkC
GyQM
AIBqAFvO5Vt9s3CiQPA7/u72C+SV1+HqPviYvLe8No8pfL+r2LXv4MQLVl5Z0jMg
RXkUpCQWIRHxF5Ujt0WGsRJSGeY8IYqP2T5HbTIq3kqJeBmStJbnj+tzBpSeq3sL
E2PPlL5C3EP286ZgGJ/lJq9LZ8Xl2WOK1+et2cIFFH45ndWJw0J8Lb0+ZMdI5x9U
jT3Io3W3+ZUhVnkBj8ZqI/eM+KcF+jDs9vMzI+Mk3A7kSdI9I0W+UcN4FW6Lr9Te
P4E0AeLRR2EAEQEAAbQdTWFyaWUgRHVwb250IChOT05FKSA8bWFyaWUuZHV
wb250
QGV4YW1wbGUuY29tPokB1AQTAQoAPhYhBBDZb4hJ5xS1BTTK1uMjI3mJAxLkBQJ
d
I9l2AhsDBQkDwmcABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEMjI3mJAx
LkC
GyQMAIBqAFvO5Vt9s3CiQPA7/u72C+SV1+HqPviYvLe8No8pfL+r2LXv4MQLVl5Z
0jMgRXkUpCQWIRHxF5Ujt0WGsRJSGeY8IYqP2T5HbTIq3kqJeBmStJbnj+tzBpSe
q3sLE2PPlL5C3EP286ZgGJ/lJq9LZ8Xl2WOK1+et2cIFFH45
—–END PGP PUBLIC KEY BLOCK—–
“`
Note that the actual key content will be more extensive than shown.
Important Consideration: An expiration date for your key doesn’t inhibit the
decryption of previously encrypted messages. It acts as a cue for key rotation,
minimizing the risk associated with prolonged use of a single key pair.
Importing a public key
To send encrypted messages, such as your address to a vendor, you’ll need to
obtain their public key. This can typically be found on the vendor’s profile page,
often labeled as “PGP key” or “Vendor public key.” Sometimes, the key may be
directly displayed on their profile.
Here’s an example of what a public key might look like:
“`
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2
mQGNBF0j2XYBDADsQj2L7HravPZHY622SSZ1sNOXeC+5gJED2W3VgJ0BpZYfW3
Bq
JQFIPRfEJgz8LsuP4A8QwR8DWVQO5qEUN0pLDqJZzPqEd+V0AikN3KxQKbTIy3k
L
5zyY5+QhO0qlJzK4V8ZvFpZUmYgDQUCPjYZ6c+KJUbK5xTIJN7BzRrJ3FWWj+mp
s
ay1uN2RwR2D9+HMIKSl0PhzKXIkH2PI8TnRiZGZqFy2h2ooMblO5H3sGkSgEdxpi
cCUFD2VJ3B3QePE3a3JQwz5Sh5PeJ8KHN0Q3VJbBq+GsDQDzjMvpH4gU5nS3E
3Sf
UkHr+vC/rqKxVrL5P/7LM5Vo5J8ARSzqD5K3JU3kYdWJw0J8Lb0+ZMdI5x9UjT3I
o3W3+ZUhVnkBj8ZqI/eM+KcF+jDs9vMzI+Mk3A7kSdI9I0W+UcN4FW6Lr9TeP4E0
AeLRR2EAEQEAAbQdTWFyaWUgRHVwb250IChOT05FKSA8bWFyaWUuZHVwb25
0QGV4
YW1wbGUuY29tPokB1AQTAQoAPhYhBBDZb4hJ5xS1BTTK1uMjI3mJAxLkBQJdI9l2
AhsDBQkDwmcABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEMjI3mJAxLkC
GyQM
AIBqAFvO5Vt9s3CiQPA7/u72C+SV1+HqPviYvLe8No8pfL+r2LXv4MQLVl5Z0jMg
RXkUpCQWIRHxF5Ujt0WGsRJSGeY8IYqP2T5HbTIq3kqJeBmStJbnj+tzBpSeq3sL
E2PPlL5C3EP286ZgGJ/lJq9LZ8Xl2WOK1+et2cIFFH45ndWJw0J8Lb0+ZMdI5x9U
jT3Io3W3+ZUhVnkBj8ZqI/eM+KcF+jDs9vMzI+Mk3A7kSdI9I0W+UcN4FW6Lr9Te
P4E0AeLRR2EAEQEAAbQdTWFyaWUgRHVwb250IChOT05FKSA8bWFyaWUuZHV
wb250
QGV4YW1wbGUuY29tPokB1AQTAQoAPhYhBBDZb4hJ5xS1BTTK1uMjI3mJAxLkBQJ
d
I9l2AhsDBQkDwmcABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEMjI3mJAx
LkC
GyQMAIBqAFvO5Vt9s3CiQPA7/u72C+SV1+HqPviYvLe8No8pfL+r2LXv4MQLVl5Z
0jMgRXkUpCQWIRHxF5Ujt0WGsRJSGeY8IYqP2T5HbTIq3kqJeBmStJbnj+tzBpSe
q3sLE2PPlL5C3EP286ZgGJ/lJq9LZ8Xl2WOK1+et2cIFFH45
—–END PGP PUBLIC KEY BLOCK—–
“`
Tails
To import a public key using Kleopatra, follow these steps:
. Select the notepad icon to open a new text field.
. Copy and paste the public key you wish to import into this field.
. Choose the option to import from the notepad.
. A notification will appear, prompting you to certify the imported key.
○ If confident in the key’s authenticity, proceed by clicking ‘Yes’, then
‘Certify’.
. A confirmation message, ‘Certified successfully’, will display upon
successful certification.
. Return to your keyring by selecting the notepad icon once more, where
you’ll find the imported key listed by name.
Whonix
To import a public PGP key into GPA, follow these steps:
. Locate and copy the desired public key to your clipboard.
. Open a text editor, such as Mousepad, and paste the public PGP key into
a new document.
. Save this document with a name like “vendor.asc”.
. Launch GPA and select the option to import keys.
. In the window that appears, navigate to and select the file you’ve just
saved containing the public PGP key.
. Upon successful import, a confirmation message will be displayed. Close
this window by clicking “OK”.
Next, verify the key has been added to your list of PGP keys:
. Locate the newly imported key in your GPA key list.
. Right-click on the key and choose “Key Properties”.
. In the “Owner trust” field, change the setting to “Ultimately” using the
dropdown menu, then confirm by clicking “OK”. This adjustment
streamlines the process of encrypting messages for the corresponding
vendor.
Troubleshooting:
● If you encounter an error stating “Key importing failed…”, the issue likely
stems from a formatting error in the key. Ensure you include the complete
key in your copy, including the “—–BEGIN PGP PUBLIC KEY BLOCK—–”
and “—–END PGP PUBLIC KEY BLOCK—–” lines, as well as the five
dashes at both the beginning and end. PGP keys require precise
formatting to be recognized and imported correctly.
Encrypting a message with PGP
Always personally encrypt sensitive information using PGP. Relying on a market or
third-party service for encryption is not secure.
Tails
To securely send a message using PGP, you must first have the recipient’s public
key imported, enabling you to encrypt messages meant for them.
Here’s how to do it using Kleopatra:
. Launch Kleopatra and select the Notepad feature.
. Compose Your Message: Enter your message into the text area
provided.
. Navigate to Recipients: Switch to the Recipients tab.
. Uncheck “Sign As”: Opt out of signing the message if preferred.
. Encrypt for Yourself: If you wish to access this message later, ensure
“Encrypt for me” is checked and select your key. This step is optional;
skipping it means only the intended recipient can decrypt the message.
. Encrypt for the Recipient: Select “Encrypt for others” and enter the
recipient’s name as it appears on their public key.
. Encrypt the Message: Click on “Encrypt Notepad”. A confirmation,
“Encryption succeeded,” will appear, alongside additional details.
Upon returning to the Notepad tab, you’ll find your message encrypted, looking
something like this:
“`
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2
mQGNBF0j2XYBDADsQj2L7HravPZHY622SSZ1sNOXeC+5gJED2W3VgJ0BpZYfW3
Bq
JQFIPRfEJgz8LsuP4A8QwR8DWVQO5qEUN0pLDqJZzPqEd+V0AikN3KxQKbTIy3k
L
5zyY5+QhO0qlJzK4V8ZvFpZUmYgDQUCPjYZ6c+KJUbK5xTIJN7BzRrJ3FWWj+mp
s
ay1uN2RwR2D9+HMIKSl0PhzKXIkH2PI8TnRiZGZqFy2h2ooMblO5H3sGkSgEdxpi
cCUFD2VJ3B3QePE3a3JQwz5Sh5PeJ8KHN0Q3VJbBq+GsDQDzjMvpH4gU5nS3E
3Sf
UkHr+vC/rqKxVrL5P/7LM5Vo5J8ARSzqD5K3JU3kYdWJw0J8Lb0+ZMdI5x9UjT3I
o3W3+ZUhVnkBj8ZqI/eM+KcF+jDs9vMzI+Mk3A7kSdI9I0W+UcN4FW6Lr9TeP4E0
AeLRR2EAEQEAAbQdTWFyaWUgRHVwb250IChOT05FKSA8bWFyaWUuZHVwb25
0QGV4
YW1wbGUuY29tPokB1AQTAQoAPhYhBBDZb4hJ5xS1BTTK1uMjI3mJAxLkBQJdI9l2
AhsDBQkDwmcABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEMjI3mJAxLkC
GyQM
AIBqAFvO5Vt9s3CiQPA7/u72C+SV1+HqPviYvLe8No8pfL+r2LXv4MQLVl5Z0jMg
RXkUpCQWIRHxF5Ujt0WGsRJSGeY8IYqP2T5HbTIq3kqJeBmStJbnj+tzBpSeq3sL
E2PPlL5C3EP286ZgGJ/lJq9LZ8Xl2WOK1+et2cIFFH45ndWJw0J8Lb0+ZMdI5x9U
jT3Io3W3+ZUhVnkBj8ZqI/eM+KcF+jDs9vMzI+Mk3A7kSdI9I0W+UcN4FW6Lr9Te
P4E0AeLRR2EAEQEAAbQdTWFyaWUgRHVwb250IChOT05FKSA8bWFyaWUuZHV
wb250
QGV4YW1wbGUuY29tPokB1AQTAQoAPhYhBBDZb4hJ5xS1BTTK1uMjI3mJAxLkBQJ
d
I9l2AhsDBQkDwmcABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEMjI3mJAx
LkC
GyQMAIBqAFvO5Vt9s3CiQPA7/u72C+SV1+HqPviYvLe8No8pfL+r2LXv4MQLVl5Z
0jMgRXkUpCQWIRHxF5Ujt0WGsRJSGeY8IYqP2T5HbTIq3kqJeBmStJbnj+tzBpSe
q3sLE2PPlL5C3EP286ZgGJ/lJq9LZ8Xl2WOK1+et2cIFFH45
—–END PGP PUBLIC KEY BLOCK—–
“`
Note: The “gibberish” portion, your encrypted message, will typically be longer.
Finally, copy this encrypted message and paste it into the desired communication
platform (marketplace or email service) in the appropriate message field and send
it. This process ensures that only the holder of the corresponding private key can
decrypt and read your message.
Whonix
To securely send a message using PGP, you must first have the recipient’s public
key imported, enabling you to encrypt messages meant for them.
Launch GPA and navigate to the clipboard option to begin the encryption process
for your message, such as your address.
. Input Your Message: Type the text you wish to encrypt directly into GPA.
. Initiate Encryption: Click on the encryption icon to proceed.
A dialog box will appear, prompting you to select the recipient of your encrypted
message. Confirm your choice by clicking “OK”. If you encounter a warning about
an “unknown key,” it indicates that the trust level for the key wasn’t set during
importation. If you trust the key, proceed by selecting “Yes.”
Upon successful encryption, the text in the editor will be transformed into an
encrypted format, resembling the following structure:
“`
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2
mQGNBF0j2XYBDADsQj2L7HravPZHY622SSZ1sNOXeC+5gJED2W3VgJ0BpZYfW3
Bq
JQFIPRfEJgz8LsuP4A8QwR8DWVQO5qEUN0pLDqJZzPqEd+V0AikN3KxQKbTIy3k
L
5zyY5+QhO0qlJzK4V8ZvFpZUmYgDQUCPjYZ6c+KJUbK5xTIJN7BzRrJ3FWWj+mp
s
ay1uN2RwR2D9+HMIKSl0PhzKXIkH2PI8TnRiZGZqFy2h2ooMblO5H3sGkSgEdxpi
cCUFD2VJ3B3QePE3a3JQwz5Sh5PeJ8KHN0Q3VJbBq+GsDQDzjMvpH4gU5nS3E
3Sf
UkHr+vC/rqKxVrL5P/7LM5Vo5J8ARSzqD5K3JU3kYdWJw0J8Lb0+ZMdI5x9UjT3I
o3W3+ZUhVnkBj8ZqI/eM+KcF+jDs9vMzI+Mk3A7kSdI9I0W+UcN4FW6Lr9TeP4E0
AeLRR2EAEQEAAbQdTWFyaWUgRHVwb250IChOT05FKSA8bWFyaWUuZHVwb25
0QGV4
YW1wbGUuY29tPokB1AQTAQoAPhYhBBDZb4hJ5xS1BTTK1uMjI3mJAxLkBQJdI9l2
AhsDBQkDwmcABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEMjI3mJAxLkC
GyQM
AIBqAFvO5Vt9s3CiQPA7/u72C+SV1+HqPviYvLe8No8pfL+r2LXv4MQLVl5Z0jMg
RXkUpCQWIRHxF5Ujt0WGsRJSGeY8IYqP2T5HbTIq3kqJeBmStJbnj+tzBpSeq3sL
E2PPlL5C3EP286ZgGJ/lJq9LZ8Xl2WOK1+et2cIFFH45ndWJw0J8Lb0+ZMdI5x9U
jT3Io3W3+ZUhVnkBj8ZqI/eM+KcF+jDs9vMzI+Mk3A7kSdI9I0W+UcN4FW6Lr9Te
P4E0AeLRR2EAEQEAAbQdTWFyaWUgRHVwb250IChOT05FKSA8bWFyaWUuZHV
wb250
QGV4YW1wbGUuY29tPokB1AQTAQoAPhYhBBDZb4hJ5xS1BTTK1uMjI3mJAxLkBQJ
d
I9l2AhsDBQkDwmcABQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAAoJEMjI3mJAx
LkC
GyQMAIBqAFvO5Vt9s3CiQPA7/u72C+SV1+HqPviYvLe8No8pfL+r2LXv4MQLVl5Z
0jMgRXkUpCQWIRHxF5Ujt0WGsRJSGeY8IYqP2T5HbTIq3kqJeBmStJbnj+tzBpSe
q3sLE2PPlL5C3EP286ZgGJ/lJq9LZ8Xl2WOK1+et2cIFFH45
—–END PGP PUBLIC KEY BLOCK—–
“`
Note that the encrypted message (“the gibberish in the middle”) will likely be
longer in your case.
Important: Once encrypted, you cannot decrypt the message yourself unless
you’re among the selected recipients. To read the encrypted message later,
ensure you also select your own key as a recipient during the encryption process.
Following encryption, simply visit the intended platform (market or email service),
paste the encrypted message into the message field, and send it.
Remember to close the clipboard window after completing these steps, securing
your communication effectively.
Verifying a message with PGP
Verification of messages through PGP is a crucial step for confirming the
authenticity of market links. Markets often release signed messages with links
directing to their platforms. Possessing the market’s public key enables you to
authenticate these messages, ensuring they indeed originate from the market and
that the contained links are valid.
Additionally, market operators, vendors, and moderators frequently sign their
announcements or alerts. Employing PGP verification for these communications
further guarantees their legitimacy and source integrity.
Tails
To authenticate a PGP-signed message, you first need to acquire and import the
public key of the individual who signed the message. This could be found on a
vendor’s profile within the marketplace or on related community platforms.
Steps to Verify a PGP Signed Message:
. Importing the Public Key: Locate the public key, often available on the
signer’s market profile or official communication channels, and import it
to your PGP software.
. Using Kleopatra:
○ Launch Kleopatra and select the Notepad feature.
○ Copy the entirety of the PGP signed message and paste it into the
provided text field. The message will typically start and end as
follows:
“`
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512[Text of the PGP signed message.]—–BEGIN PGP
SIGNATURE—–[PGP Signature]—–END PGP SIGNATURE—–
“`
. Verification:
○ Click on the “Decrypt/Verify” button to proceed with the verification
process.
○ If the signature corresponds with a public key you’ve previously
clipboard.
○ Select the “Sign/Verify” option to initiate the verification process.
Should the verification be successful, a notification will appear indicating a “Good
signature from [name of the key pair that signed the text]”. This confirms the
integrity and origin of the signed message, verifying that it has not been tampered
with and originates from the expected source.
Decrypting a message
Tails
● First open Kleopatra and click Notepad
● Copy and paste the PGP message into the text field
● Click Decrypt/Verify
Whonix
Launch GPA and navigate to the clipboard feature. Here, paste the encrypted
message into the provided text area. Choose the decrypt option to proceed.
You’ll be asked to input the password associated with your key. After entering your
password, the decrypted message will be displayed.
Signing a message with PGP
Signing a message with PGP is a process distinct from encrypting sensitive
information like your address or private communications.
By signing a message, you authenticate it as your own creation. Anyone in
possession of your public key can confirm your signature’s validity. While signing
messages is typically not a requirement for standard DNM transactions, should the
need arise, here’s how to proceed.
Tails
To sign a message with PGP using Kleopatra, follow these steps:
. Launch Kleopatra and select the Notepad feature.
. Enter the message you wish to sign in the text field.
. Navigate to the Recipients tab.
. Activate the option “Only sign as:” and specify the key you intend to use
for signing.
. Deselect “Encrypt for me” and “Encrypt for others.”
. Choose “Sign Notepad,” then return to the Notepad tab.
Your message will now be formatted as a signed PGP message, resembling the
following structure:
“`
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
This is my signed message.
Anyone with my public key can verify that I signed it.
—–BEGIN PGP SIGNATURE—–
[PGP signature details]
—–END PGP SIGNATURE—–
“`
The encrypted portion of your message will be more extensive. To share this
signed message, simply paste it into the appropriate field on a marketplace or in
an email and send it as needed.
Whonix
Initiate GPA and navigate to the clipboard feature. Enter the message you intend to
sign within the text area. Upon completion, opt for the “sign the buffer text” option
and select the key you wish to use for the signature. You’ll be prompted to input
the password associated with your key.
Upon successful signing, the clipboard content will be formatted as follows:
“`
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512
This is my signed message.
Anyone with my public key can verify that I signed it.
—–BEGIN PGP SIGNATURE—–
[PGP signature details]
—–END PGP SIGNATURE—–
“`
Note, the “gibberish” section, which is the actual signed part of the message, will
likely extend further in your actual message. Now, simply proceed to the intended
platform—be it a marketplace or an email service—paste the signed message into
the appropriate area, and dispatch your message or email.
Conclude by closing the editor window, selecting “Discard” when prompted
whether you wish to save the document, effectively completing the process of
signing your message.
Cryptocurrencies
Cryptocurrency Usage
Cryptocurrencies are essential for transactions on the darknet, offering a means to
purchase goods or services while striving to maintain anonymity. Among the
various cryptocurrencies, Monero (XMR) is recommended for its enhanced privacy
features. Whenever feasible, convert your assets to Monero to obscure their trail
back to your identity. If starting with Bitcoin or Litecoin, consider converting them
to Monero as a crucial step for privacy.
Key Points:
● Public Ledger: Remember, all Bitcoin and Litecoin transactions are public
and traceable via the blockchain. Opt for Monero when initiating
transactions for an added layer of privacy.
● Conversion to Monero: If your transaction requires Bitcoin or you initially
possess Bitcoin/Litecoin, refer to guidelines on converting your funds to
Monero to safeguard your anonymity.
● Direct Transfers: Avoid sending cryptocurrencies directly from an
exchange to a vendor or marketplace. This practice can jeopardize your
privacy and security.
Frequently Asked Questions:
Is converting to XMR essential? Aren’t the fees high?
Absolutely, converting to XMR is crucial for maintaining privacy. Just as you
wouldn’t openly transact with a dealer in a risky environment, you shouldn’t
compromise your anonymity online. The necessity to use XMR is unequivocal.
How does the fluctuation in cryptocurrency prices affect DNM listings?
Market listings remain priced consistently in fiat currency terms. A $20 item
remains priced at $20, regardless of cryptocurrency value fluctuations. It’s the
crypto equivalent that adjusts according to current rates, impacting the vendor’s
profit margin post-transaction, especially if the cryptocurrency’s value decreases.
Do both the sender and receiver’s wallets need to be active simultaneously
for a transaction?
No, simultaneous wallet activity isn’t required for transactions. Bitcoin
transactions are processed automatically on the blockchain, ensuring your
transfers are completed even if the recipient’s wallet isn’t online at the moment.
Following privacy-preserving practices detailed in subsequent sections is critical.
What is a Satoshi?
A Satoshi represents the smallest unit of Bitcoin available, recorded on the
blockchain. It equals one hundred millionth of a single Bitcoin (0.00000001 BTC),
offering granularity in transactions and value representation. Further information
on Satoshi units can be found in detailed cryptocurrency resources.
Monero (XMR)
Monero (XMR) is a privacy-focused cryptocurrency designed to offer secure,
private, and untraceable transactions. It was launched in April 2014 and operates
on the principle of anonymity and decentralization. Unlike Bitcoin and many other
cryptocurrencies, Monero transactions obscure the sender, recipient, and amount
transferred using several advanced cryptographic techniques:
. Ring Signatures: This technique combines a user’s account keys with
public keys obtained from Monero’s blockchain to create a ‘ring’ of
signers, making it extremely difficult to trace the origin of the transaction.
. Stealth Addresses: These are one-time addresses, generated randomly
for each transaction on behalf of the recipient, which ensures that the
true destination of the transaction is hidden from outsiders.
. Ring Confidential Transactions (RingCT): Introduced in January 2017,
this feature hides the amount of XMR being transferred, further
enhancing privacy.
Monero’s strong focus on privacy and security makes it a popular choice for users
seeking anonymity in their transactions. It uses a proof-of-work (PoW) consensus
mechanism to validate transactions and secure its network, similar to Bitcoin, but
with a different hashing algorithm called RandomX, which is designed to be ASIC-
resistant. This means it’s more accessible for individuals to mine Monero using
standard computer hardware, promoting greater decentralization.
Monero’s blockchain is intentionally opaque. It records all transactions, but
disguises the parties involved and the amounts exchanged, making it very
different from transparent blockchains like Bitcoin’s, where transactions can be
traced and wallet balances viewed by anyone.
The privacy features of Monero have led to its adoption for a range of uses, both
legitimate and illicit. On the one hand, it offers a means for individuals to keep
their financial transactions private, away from the prying eyes of corporations,
governments, or malicious actors. On the other hand, these same features have
made it a preferred currency for darknet markets and other illegal transactions.
Despite the controversies surrounding its use, Monero remains an important
project in the cryptocurrency space, highlighting the demand for digital currencies
that offer privacy and security. Its development is ongoing, with a strong
community of developers and users dedicated to enhancing its privacy features
and user experience.
Monero FAQ Guide
Routing Coins Safely:
Transfer your cryptocurrencies using the path: Exchange -> Monero Wallet (on
Tails or Whonix) -> Destination. Refer to subsequent posts for in-depth guidance.
Dealing with Bitcoin-only Vendors:
Convert Monero to Bitcoin via an exchange service, then transfer to the
destination, or Monero Wallet -> Exchange Service -> Bitcoin Wallet ->
Destination. Utilize Tor with an instant exchange service for anonymous
conversions. To avoid payment delays, especially for time-sensitive orders,
transfer Bitcoin to your personal wallet first.
Purchasing Monero on KYC Exchanges:
For most scenarios, purchasing Monero directly on a KYC-compliant exchange is
considered safe.
Direct Purchase vs. Conversion:
Directly buying Monero is preferable to purchasing Bitcoin and converting it,
minimizing exposure to transparent blockchains.
Anonymously Acquiring Monero:
Use cash-by-mail options on platforms like LocalMonero.co for anonymity.
Transaction Visibility Issues:
Ensure your wallet is up-to-date and synchronized. Verify transaction existence on
block explorers like xmrchain.net. For non-appearing transactions, follow specific
wallet guidance for importing or rescanning transactions.
Outgoing Transaction Failures:
Address failed transactions in Feather by resending, or in GUI by changing nodes
and rescanning wallet balance. Report persistent node issues for community
assistance.
Remote Node Connection over Tor:
Connecting to remote nodes via Tor is safe for most users. Rotate nodes between
sessions for enhanced security, a feature automated in Feather wallet.
Running a Full Node on Tails:
Consult available guides for setting up a full node on Tails.
Setting Up Remote Nodes:
For public/private remote node setup, refer to comprehensive guides.
Speeding Up Synchronization:
Switching remote nodes can enhance synchronization speed. Follow wallet-
specific instructions for node changes.
Transferring Addresses Between Machines:
Transfer your address using a secondary USB, encrypted email, or scanning the
QR code with another device.
Wallet Technical Issues:
For wallet malfunctions, contact community moderators with detailed information
for troubleshooting.
Morphscript / MorphToken Usage:
MorphToken has restricted all Tor exit nodes, affecting Morphscript functionality
on Tails/Whonix. Explore alternative exchange services listed in the community
resources.
Additional Resources:
Block Explorers:
● Non-Javascript: https://xmrchain.net/
● Onion service: http://
theblock755bysooet2texualb4detjjcvkxs2nxuiumln4bacjh3rqd.onion
This FAQ addresses key aspects of using Monero for transactions within the
context of privacy and operational security.
How to Buy Monero
Setting Up Monero
Due to frequent updates and modifications in the Monero ecosystem, we advise
consulting our comprehensive Monero Guide for the latest instructions and
recommendations.
Access the guide at: http://
xmrguide25ibknxgaray5rqksrclddxqku3ggdcnzg4ogdi5qkdkd2yd.onion
This resource covers a range of topics, including various wallet options available
for installation and their usage, ensuring you have the most current and effective
information.
Creating Monero Wallets
Due to frequent updates and modifications in the Monero ecosystem, we advise
consulting our comprehensive Monero Guide for the latest instructions and
recommendations.
Access the guide at: http://
xmrguide25ibknxgaray5rqksrclddxqku3ggdcnzg4ogdi5qkdkd2yd.onion
This resource covers a range of topics, including various wallet options available
for installation and their usage, ensuring you have the most current and effective
information.
Litecoin (LTC)
Litecoin (LTC) is a cryptocurrency that was designed to offer fast, secure, and
cost-effective payments by leveraging the unique properties of blockchain
technology. It is based on the Bitcoin protocol but differs in terms of hashing
algorithm, hard cap, block transaction times, and a few other factors. Litecoin is
known for its short block time of 2.5 minutes and low transaction fees, making it
suitable for micro-transactions and point-of-sale payments. The cryptocurrency
was created by Charlie Lee, a former Google employee, with the intention of
making Litecoin a “lite version of Bitcoin.” It has become popular due to its
simplicity and clear utility benefits, being accepted by over 2,000 merchants
worldwide.
Litecoin was launched via an open-source client on GitHub on October 7, 2011,
and went live on October 13, 2011. Since then, it has been widely adopted and
remains among the top cryptocurrencies by market capitalization. As of January
2021, there were 66.245 million LTC in circulation, out of a total maximum supply
of 84 million, with estimates suggesting it will take over 100 years to reach full
dilution.
One of the significant updates to the Litecoin network was the MimbleWimble
Extension Block (MWEB) upgrade, which promises to enhance privacy and
scalability for users. This upgrade, however, led to some regulatory challenges,
particularly in South Korea, where several exchanges delisted LTC due to concerns
over its enhanced privacy features making compliance with specific financial
transaction regulations difficult.
Overall, Litecoin’s success can be attributed to its fast and cost-effective
transactions, making it an appealing choice for both users and merchants alike.
Installing Litecoin in Tails
To get started with Litecoin on Tails, ensure you’ve activated both the persistent
volume and dot files. If they’re not set up, remember to perform a system reset
after enabling these features.
Installation Steps:
. Download Electrum-Litecoin: Visit the official website at https://
electrum-ltc.org/ to download the Linux app image.
. Save the App Image: Transfer the downloaded file to the Tor Browser
(Persistent) or another folder within your Persistent storage. This step
prevents the need for re-downloading after rebooting Tails.
. Enable Execution: Right-click the App Image, navigate to Properties ->
Permissions, and tick the option “Allow executing file as program.” Close
the window afterward.
. Launch Electrum-Litecoin: Double-click the App Image to open
Electrum-Litecoin. Set it up following the same procedure as for the
standard Electrum wallet. Refer to the Bitcoin section for detailed setup
instructions.
Handling Electrum-Litecoin Data:
Unlike its counterpart, Electrum-Litecoin doesn’t support a portable mode,
meaning Tails won’t automatically preserve your wallets across sessions. To
address this:
● Option 1: Manually save your wallet’s seed phrase, possibly using
KeePass for secure storage. This method requires you to restore your
wallet with each new Tails session.
● Option 2 (Recommended): Move the Electrum-LTC data to a persistent
location.
○ Open Places -> Home and press Control+H to reveal hidden folders.
○ Locate and drag the .electrum-ltc folder into the Dotfiles directory in
the sidebar.
○ Reboot your system to verify that your wallet data is preserved.
Final Steps:
Upon successful setup, a blue indicator at the wallet’s bottom-right corner
signifies a connection to the Litecoin network. If encountering issues, such as
seeing a red indicator, check your proxy settings to ensure “Use Tor proxy at port
9050” and “Use proxy” are selected.
Following these steps ensures you have Litecoin ready and operational on Tails,
with secure and persistent wallet management.
Bitcoin (BTC)
Bitcoin (BTC) is a form of digital currency, known as a cryptocurrency, which
operates independently of a central bank. It was invented in 2008 by an
anonymous person or group of people using the name Satoshi Nakamoto. The
network came into existence in 2009 with the release of the first open-source
Bitcoin software and the mining of the genesis block of bitcoin.
Key features of Bitcoin include:
● Decentralization: Bitcoin operates on a decentralized network of
computers (nodes) around the world. No single institution or government
controls the Bitcoin network, making it a decentralized digital currency.
● Blockchain Technology: Bitcoin transactions are recorded on a public
ledger known as the blockchain. This technology ensures transparency
and security, as the ledger is maintained by a network of nodes following
a consensus protocol.
● Limited Supply: The total supply of Bitcoin is capped at 21 million coins.
This scarcity mimics the properties of precious metals like gold and is
intended to prevent inflation.
● Mining: New bitcoins are created through a process called mining, which
involves using computer power to solve complex mathematical problems
that validate transactions on the network. As a reward for their services,
miners are awarded newly created bitcoins as well as transaction fees.
● Peer-to-Peer Transactions: Bitcoin allows for direct transactions
●
3. Bitcoin ATMs
● Description: Physical machines located in public places where you can
buy Bitcoin with cash or debit card.
● Pros:
○ Anonymity for smaller purchases.
○ Instant acquisition of Bitcoin.
● Cons:
○ High transaction fees.
○ Limited availability in some areas.
4. Brokerages
● Description: Firms that buy and sell Bitcoins on your behalf, not unlike
stock brokerages.
● Pros:
○ Simplicity and ease of use.
○ Suitable for beginners.
● Cons:
○ Higher fees than exchanges.
○ Less control over purchase prices.
point.”
○ Transactions: Enable “Replace-By-Fee,” “Use multiple change
If your package has been marked as “Undeliverable as Addressed” and it’s been
less than a day since this occurred—for instance, if it’s 12 pm and your package
was marked undeliverable at 7:30 am—here’s a structured approach to address
the situation:
. First Attempt: Call the Local Post Office
– Start by calling the post office where your tracking information
indicates your package is currently located. It might be challenging to get
through as local post office numbers often lead to dead ends, or the staff
may not answer. However, if you do get through, explain your situation
calmly, providing your name and the correct shipping address. They
might suggest you come to pick up the package personally.
. Visiting the Post Office
– If calling doesn’t yield results, your next step is to visit the post office
mentioned in your tracking details. Bring identification (ID or proof of
residency at the shipping address) with you. Although not strictly
necessary, having your package’s tracking number can be very helpful.
Approach the staff courteously, addressing them with respect, and
explain that you were directed to pick up a package that couldn’t be
delivered. When asked, provide your ID and the tracking number. They
should be able to locate your package if it’s there.
. Dealing with Service Challenges
– If your visit to the post office does not resolve the issue, or if the
interaction is less than pleasant, don’t lose hope. Your next step is to
contact the USPS customer service via their toll-free number. Expect to
be on hold for a significant period, ranging from 30 to 90 minutes. Once
connected with a customer service agent, explain your situation clearly,
providing your name and the accurate address.
. Follow-Up and Patience
– The customer service representative will likely assure you that they’ll
attempt to redeliver your package. Be prepared for a wait of an additional
5 to 10 days for the delivery. This timeframe allows for the retrieval of
your package and the update of its shipping label. Note that if a
considerable amount of time has passed, updating the label might not be
possible, but this initial period should not pose such an issue.
This approach balances proactive steps with the need for patience and respect in
interactions with postal service workers and customer service representatives.
Remember, the goal is to resolve the situation with your package while maintaining
a positive and polite demeanor throughout the process.
If your eagerly awaited package has been tagged with the dreaded “Undeliverable
as Addressed” status for more than a day—let’s say it’s January 15th and the
status changed on January 13th—here’s a streamlined guide to navigate this
hiccup.
Firstly, arm yourself with patience and dial the USPS customer service hotline (a
quick search will reveal the toll-free number). Prepare for a bit of a wait, ranging
from 30 to 90 minutes. Yes, it might seem like an eternity, but perseverance is key
here. Once the hold music graciously bows out and a customer service agent
graces your call, present them with the situation, courteously providing your name
and the accurate address.
The agent will likely assure you with a hopeful “We should be able to resolve this,”
but it’s wise to temper expectations. Anticipate a waiting period of an additional 5
to 10 days for the delivery, contingent on whether they can intercept and relabel
your package. Occasionally, this might not be feasible.
This snag often arises if the attempt to rectify the “Undeliverable” status of the
package is made belatedly, limiting the USPS’s ability to amend the shipping
details and relegating them to merely redirect it back to your city. However, don’t
let despair set in. Provided you act swiftly this round, following the outlined steps
should reunite you with your package. Patience and timely action are your allies in
ensuring a joyful parcel retrieval.
Drop
Ensure your surroundings are pristine and devoid of any questionable items or
substances, such as drug paraphernalia, whenever you’re anticipating the arrival
of a delivery. This precaution extends beyond your primary residence to any
property associated with you. The reason is straightforward: in the event of an
unforeseen complication, there’s a significant likelihood that your premises may be
subject to a thorough search. Should the authorities discover any illegal items
during their inspection, defending your innocence and law-abiding status in a legal
setting becomes considerably more challenging, especially if there are allegations
involving illicit substances mailed to your address.
Is it advisable to utilize my genuine name when arranging deliveries
to my residence?
Indeed, this question ranks among the most hotly debated by purchasers since
time immemorial, culminating in a unanimous consensus: Opt for your authentic
identity. Dismiss the notion that your strategy is groundbreaking or that you’re
somehow an exception to the established norm. Employing your actual name does
not inherently heighten your culpability. The rationale behind this strategy is to
ensure your parcel seamlessly integrates with the rest of your incoming mail. The
United States Postal Service (USPS) meticulously records the names associated
with delivered parcels. An alias is glaringly conspicuous to your local mail carrier
and the sophisticated USPS tracking systems.
In the event of a package interception, the critical factor is not the name on the
label but the ability to substantiate your involvement in the order. Adherence to the
guidelines laid out in the DNM bible significantly diminishes the likelihood of such
a predicament. Using your real name enhances the prospects for a hassle-free
delivery process.
Residing Under Your Parents’ Roof?
Navigating life under your parents’ roof comes with its set of unspoken rules,
particularly when it comes to respecting their space and privacy. It’s crucial to
remember that, regardless of whether they monitor your mail or are unaware of
your activities, inviting trouble to their doorstep is a gesture far removed from
gratitude. A seemingly minor slip-up, such as receiving an improperly sealed
package from a vendor, could escalate quickly, potentially leading to an
unwelcome visit from law enforcement. Imagine the distress and disappointment
that would follow, especially considering the years of care and support they’ve
provided you.
The wise move? Opt for a P.O. box for receiving your parcels. This ensures your
privacy and keeps your home environment secure and respectful. If you’re
underage or find the process daunting, it’s a clear sign to steer clear of deep web
markets and related activities. These platforms are intended for mature audiences,
with age restrictions in place for good reason. The allure of exploring the hidden
corners of the internet and experimenting may seem tempting, but it’s a journey
fraught with risks, especially for those not fully prepared to navigate its
complexities.
Should I sign for the package/mail if asked to?
Whether to sign for a package or mail when requested can be a nuanced decision,
shaped by local laws and the specific circumstances surrounding the delivery. In
certain areas, signing may be necessary for official matters, while in others, it may
not be as critical.
However, in scenarios involving controlled deliveries—situations orchestrated by
law enforcement to catch individuals receiving illegal items—choosing not to sign
won’t necessarily prevent subsequent arrest. Law enforcement’s strategy doesn’t
hinge solely on obtaining a signature; their focus is on the broader context of
illegal activity. Refraining from signing could even raise suspicion.
It’s important to note that signing for a package doesn’t automatically imply guilt.
The legal system requires proof beyond just accepting a delivery. Signing typically
serves as confirmation of receipt for the postal service, ensuring they’ve fulfilled
their delivery responsibilities. This process is particularly common for international
shipments.
The reluctance to sign, prevalent among some communities, especially those
involved in risky activities like darknet transactions, stems from a desire to
maintain control and minimize risk. It reflects the anxiety and paranoia associated
with receiving potentially compromised packages. Ultimately, once a package is in
transit, individuals have limited control over law enforcement’s actions.
Using a drop
In the intricate world of managing discrete mailing addresses, utilizing a “drop”
presents itself as an unconventional yet resourceful method. This guide outlines
the nuanced strategy behind setting up a drop—a location detached from personal
ties, used for receiving sensitive correspondences.
While the reliance on drops is not universally recommended due to its complexity
and potential risks, those who proceed must do so with creativity and adaptability
as their guiding principles. The effectiveness of a drop hinges on its believability
as a legitimate address, and here’s a streamlined approach to establishing one:
● Strategically Selecting a Drop Location: Look for a residential property
currently unoccupied (ensuring it’s not bank-owned) to serve as your
drop. The aim is to create the illusion of habitation—this includes basic
yard maintenance and the occasional placement of everyday items
outdoors. Regular visits to the property over a period of one to three
weeks are crucial. These visits, coupled with subtle interactions or lack
thereof, should foster a general awareness among neighbors of someone
residing there, without making your identity discernible.
● Familiarizing the Mail Delivery System: To integrate the drop into the
local postal service’s routine, start by sending non-essential mail and
packages to the address under the chosen delivery name. This step
acquaints the mail carrier with the address’s active status. Note the
distinction in delivery services (e.g., Amazon’s use of UPS versus USPS
for standard mail), and adjust your strategy accordingly. Regularly collect
and store the mail inside the premises, adopting a cautious approach to
its handling.
● Alternative Methods: For those without direct access to vacant
properties, opening a PO box under another’s name or even in your own
name in a different state offers a viable alternative. This method
simplifies the process, requiring no false identification, and maintains a
layer of separation between the box’s user and its registered owner.
It’s essential to view this guide as a starting point rather than a comprehensive
manual. The intricacies of establishing a drop are vast, with many variables
dependent on the specific circumstances of the drop location. Attention to detail
and situational adaptability are paramount in navigating this complex terrain
effectively.
Is it possible to immediately start using my PO Box after setting it
up?
Immediately utilizing your PO Box after its establishment is possible, though
exercising a bit of patience is often advised. A prudent approach involves
dispatching inconsequential, lawful items initially to ascertain the operational
status of your PO Box. It’s not uncommon for new users to encounter initial
hiccups; instances such as overlooked activation by the postal staff have been
noted. Imagine the inconvenience should these teething problems coincide with
the delivery of sensitive parcels. Opting for a self-sent test package or placing an
order through mainstream online marketplaces like Amazon or eBay serves as a
wise preliminary step. Additionally, diversifying the contents of your deliveries,
perhaps by exploring /r/freebies on Reddit, can be a strategic move to avoid any
unwanted attention towards your PO Box, especially if you aim to maintain a low
profile.
Controlled Delivery (CD)
What Does “Controlled Delivery” Mean?
A controlled delivery involves law enforcement allowing a package suspected of
containing illegal drugs to be delivered. The goal is to use the acceptance of this
package as grounds for conducting a search of the recipient’s home. The rationale
behind this tactic is that accepting the package can be seen as probable cause,
suggesting that the recipient was expecting the package and aware of its
contents. It’s important to note, however, that not all packages requiring a
signature are part of a controlled delivery operation.
How Does One Become Subject to a Controlled Delivery?
Individuals may find themselves targeted for a controlled delivery through various
scenarios. Often, this occurs when someone orders a significant quantity of
products from overseas. Law enforcement (LE) might detect a surge in packages
arriving from the same sender, decide to inspect one, and subsequently begin
profiling the recipient. The likelihood of being subjected to a controlled delivery
increases with the size of the order, especially if it’s from another country.
Conversely, domestic shipments containing smaller quantities are less likely to
attract attention. In cases where the amount is deemed personal use, the recipient
might instead receive a warning letter, commonly referred to as a “love letter,”
which typically marks the end of the matter. Additionally, law enforcement may
initiate monitoring of the individual’s mail as part of their investigation.
What Occurs During a Controlled Delivery?
In a controlled delivery, law enforcement (LE) agents will deliver a package
suspected of containing illegal substances directly to you, mimicking a standard
delivery process. If executed properly, there should be no visible signs that this
delivery is anything but ordinary. Contrary to popular belief, this scenario does not
involve a SWAT team forcefully entering your home and engaging in a shootout.
Instead, once you accept the package, the officers will reveal themselves,
announce their presence, and then instruct you on their next steps, which typically
involve asking you to exit your home.
How Much of a Product Triggers a Controlled Delivery?
The threshold for what constitutes enough of a product (such as illegal
substances) to warrant a controlled delivery (CD) is influenced by a multitude of
factors. These can include your location, criminal history, age, the resources and
priorities of your local law enforcement agency, among other considerations. As
such, there is no one-size-fits-all answer applicable to everyone, everywhere. It’s
crucial to exercise good judgment. The term “bulk” is subjective and varies widely;
if you’re considering ordering large quantities, it’s wise to use alternative receiving
methods, like a drop location. Ultimately, making informed and cautious decisions
is key.
What Happens After You Accept the Package?
Upon accepting the package, law enforcement typically proceeds to search your
residence for additional illicit substances or evidence of drug orders. They often
search for empty letters and packages that might have return addresses linked to
the shipment. It’s a misconception that your computer will always be confiscated;
however, without any admission from you, it’s less likely they’ll connect the
delivery to a dark net market (DNM). It’s crucial to communicate with the police
solely through an attorney you’ve selected and researched in advance. Remember,
saying less often means revealing less, so it’s advisable to let your legal
representation do the talking.
How to Safeguard Against a Potential Controlled Delivery
To minimize the risk of becoming involved in a controlled delivery (CD), there are
several indicators you can watch for. Extended delays in shipment beyond the
expected delivery time might suggest complications, potentially related to law
enforcement scrutiny. Receiving a seizure notice, especially following a significant
order, is another red flag. Additionally, if the vendor you’ve purchased from is
apprehended and their outgoing mail is confiscated, this could also increase the
likelihood of a CD involving their shipments. Being vigilant about these signs can
help you assess and mitigate risks associated with receiving packages under
surveillance.
How do you protect yourself?
For optimal operational security, it’s crucial to adhere closely to established
guidelines. For starters, using your own residence as the delivery address is
surprisingly the safest option. It’s less likely to raise suspicion if you use your
genuine name and address. Regardless of where you direct your shipments – be it
an unoccupied property or a post office box – if authorities are determined, they
will find a way to link you to the order, potentially endangering the sender as well.
Therefore, it’s advisable to keep shipments directed to your home under your real
name.
In the event of a controlled delivery (CD) suspicion, the immediate step should be
to ensure your environment is clear of any illegal or even questionable items, such
as drug paraphernalia. This preemptive measure significantly lowers the risk of
legal repercussions, as the absence of incriminating evidence makes it difficult to
prove wrongdoing. Particularly if you’ve been utilizing Tails for online activities,
there’s no direct trail leading to your recent or past orders. Remember, a CD itself
doesn’t imply inevitable punishment; concrete proof of your involvement in the
order is required for legal action.
Does receiving a controlled delivery mean my address is
compromised?
If you experience a controlled delivery (CD), it’s highly probable that your address
will be under surveillance thereafter. In such a scenario, you have a couple of
options. You could either cease ordering from darknet markets (DNMs) entirely or
consider having your orders sent to a friend’s address. However, using a drop
location is not advisable. If authorities discover that you’ve redirected your
activities elsewhere following a CD, they’re more likely to take decisive action
against you. Should you choose to use a friend’s address, ensure it’s done with
their consent and use their name for the order. This way, if a CD occurs at their
location, it won’t be directly linked to you, assuming your friend maintains
discretion.
Monitored Delivery
Understanding Monitored Deliveries
Monitored delivery stands in contrast to controlled delivery, presenting a less
common but strategic approach by law enforcement. This method involves the
deliberate delivery of illegal drugs by authorities who then initiate surveillance on
the recipient. The objective? To collect evidence over time, potentially spanning
months, that supports a broader investigation into the recipient’s unlawful
activities. This meticulous strategy allows law enforcement to construct robust
cases against individuals with otherwise strong operational security.
Real-Life Instances:
● Community Alert:
A cautionary tale shared by T00N highlights the risks involved. A student
known to T00N’s acquaintance faced arrest by the DEA for distributing
substances like Xanax and cocaine. The twist? Law enforcement had
intercepted a package destined for him seven months prior but continued
the deliveries to amass evidence. A grim reminder of the vigilance
needed.
● A Cautionary Example:
In another case, a person experienced the ramifications of monitored
deliveries firsthand with the importation of large drug quantities. After
receiving a shipment of MDMA, they were trailed from the drop-off point
back to their residence, where further surveillance documented their
activities. Despite being found with a significant cache of drugs, including
MDMA, LSD, and ketamine, the individual received a relatively lenient
sentence. Notably, federal agents overlooked additional substances
hidden within their home. Scheduled for release in 2019, this story serves
as a stark illustration of the unexpected outcomes in drug enforcement
operations.
These examples underscore the serious and unpredictable nature of monitored
deliveries, emphasizing the need for awareness and caution.
Safeguarding Yourself from Monitored Deliveries
Protecting oneself from a monitored delivery presents significant challenges,
primarily because individuals often remain unaware of ongoing law enforcement
activities. Typically, these surveillance tactics target drug distributors rather than
individuals purchasing drugs for personal use.
To mitigate risks, you might employ certain strategies to discern whether your mail
is under scrutiny, though these methods are not foolproof. Packages might not
show signs of tampering, making detection difficult. Reducing the frequency of
your orders can also help, potentially leading law enforcement to deduce that
there are no forthcoming shipments.
The legality of monitored deliveries varies by country. In the United States, such
practices are indeed utilized by law enforcement. Being aware of your local laws
and regulations can provide some guidance on what to expect and how to navigate
these situations more safely.
Love letter
A “love letter” might sound endearing, but in certain contexts, it’s anything but.
This term refers to a notification from postal authorities indicating the seizure of
illegal substances or contraband mailed to you. Essentially, it’s their way of saying,
“We’ve caught something you shouldn’t have sent or received. We’re letting you
off this time, but we’re keeping an eye on you. Don’t let it happen again.”
International and Domestic Seizure Notices: A Closer Look
Internationally, customs agencies, including those in the United States, often issue
these “love letter” notices for small quantities of illegal drugs found in mail. The
message is clear: you’ve been spared from legal action, but the incident hasn’t
gone unnoticed. If you receive such a letter, it’s wise to consider your address
compromised for any future illegal shipments.
Interestingly, receiving a fake seizure letter is within the realm of possibility,
adding a layer of complexity to this issue.
On the domestic front, the situation differs significantly. It’s rare to receive a
formal seizure notice for contraband sent within the same country, particularly in
the United States. More commonly, if illegal drugs are discovered in domestic mail,
authorities opt for a controlled delivery to apprehend the recipient directly.
Therefore, any seizure notice for a domestic shipment of drugs is likely a hoax,
except in rare cases involving the interception of cash.
This distinction underscores the seriousness with which postal authorities and law
enforcement agencies treat the interception of illegal goods, emphasizing the risk
and consequences associated with such activities.
Harm Reduction
Embarking on the adventure of exploring different substances requires a
fundamental understanding of what exactly you’re introducing into your system.
We’re not here to preach a black-and-white message of “Drugs are bad!” Rather,
we encourage you to spend a moment perusing the chart below, which outlines
potentially hazardous drug interactions. Dive into the available resources to ensure
your safety.
Investing in a test kit for any substances you’re considering is a wise move. These
are readily available on numerous websites, including DanceSafe.org and even
Amazon. Not only are these kits straightforward to use, with clear instructions and
examples provided, but they’re also cost-effective and capable of conducting
several tests—potentially lifesaving.
Additionally, there are services available that offer detailed analyses of the
contents of your substances. Leveraging these resources can be a crucial step in
safeguarding your well-being.
Avoid putting yourself in harm’s way by mixing substances without understanding
their interactions or skimping on testing. Safety and informed choices should be
your top priorities.
Note: To get a better view of the chart mentioned, you can right-click to save the
image or select “view image.”
Resources
Dedicate a moment to explore the wealth of information provided in these
resources. They offer comprehensive insights on various drugs, the science
behind their effects, and direct access to advice from experts. Whether you’re
seeking guidance during a challenging experience or simply curious, everything
you need is accessible here.
Guidance on Dosage and Safety
Embarking on the journey with a new substance, especially if your tolerance has
diminished, requires informed preparation. Explore Erowid and PsychonautWiki for
reliable advice on appropriate dosages.
Additionally, familiarizing yourself with the “Recovery Position” is crucial. This
knowledge could be lifesaving, and it only takes a minute to learn. Please make
sure to review it.
PsychonautWiki
[Link to PsychonautWiki]
PsychonautWiki stands as a community-curated digital encyclopedia dedicated to
the comprehensive exploration of psychonautics, presented through a lens of
scientific integrity. Our mission is anchored in several core objectives:
– Thoroughly cataloging the full spectrum of psychonautic theory and practices,
ranging from meditation and lucid dreaming to the use of psychoactive substances
and beyond, all from an evidence-based, scholarly standpoint.
– Offering easily accessible educational resources, advocating for safe practices,
and contributing to the cultural shift towards accepting the responsible use of
psychoactive substances by leveraging both expert knowledge and community
contributions.
– Fostering an environment of free thought and individual sovereignty by providing
essential information that enables informed decisions regarding the modification
of one’s physical and mental states.
Erowid
https://www.erowid.org
Erowid serves as a pivotal, member-supported platform dedicated to delivering
unbiased, accurate information on psychoactive plants, chemicals, and their
associated realms. Our collaborative efforts with experts from academic, medical,
and firsthand experiential backgrounds enable us to create, enhance, and expand
the reach of valuable resources. Beyond the dissemination of knowledge, we are
committed to safeguarding this information as an archival treasure for generations
to come, ensuring that insights into psychoactive substances and their impact
remain accessible and accurately represented.
Tripsit
https://tripsit.me/
At TripSit, our core mission revolves around fostering an environment where open
conversations about harm reduction are not just encouraged but integral. We
champion the use of harm reduction tools like test kits and provide guidance and
support for safer drug use practices. Our community is deeply committed to
sharing knowledge on scientific, medical, and philosophical aspects of drug use,
alongside offering advice drawn from personal experiences—a treasure trove of
insight for those navigating similar paths.
We stand ready to assist or ‘tripsit’ individuals who find themselves struggling
during drug experiences. Our network includes an IRC chat team, offering round-
the-clock live support, from providing quick facts to guiding someone through
challenging moments. Additionally, our resources include a comprehensive drug-
information wiki for immediate knowledge needs and a live radio service to offer
musical solace to our community members.
DanceSafe
https://www.dancesafe.org/
DanceSafe is a nonprofit public health organization dedicated to promoting safety
and well-being within the nightlife and electronic music scenes. Established in
1998 by Emanuel Sferios in the San Francisco Bay Area, DanceSafe has expanded
nationwide, establishing chapters in various North American cities. Our Initiatives
and Services include:
● Creating safe environments for open discussions on health, drug use, and
personal safety.
● Distributing free water and electrolytes to combat dehydration and
heatstroke.
● Providing complimentary safe sex materials to prevent unintended
pregnancies and the transmission of STIs.
● Offering free ear plugs to protect against hearing damage.
● Delivering accurate, impartial information about drugs to help individuals
make informed choices.
● Serving as a nonjudgmental first point of contact for individuals facing
risky or difficult situations.
● Conducting drug checking services to reduce the risk of overdoses and
fatalities.
● Collaborating with event organizers and local partners to prioritize safety
measures.
Through these efforts, DanceSafe champions a health-first approach, ensuring
that the nightlife and electronic music communities are informed, protected, and
supported.
Drugs and Me
https://drugsand.me/en/
Drugs and Me is an educational platform offering accessible, impartial, and
thorough resources aimed at minimizing the immediate and enduring risks
associated with drug use. Our team consists of scientists, educators, and analysts
who bring a wealth of experience to the field of drug education. Motivated by a
desire to curb the rising incidents of accidents and fatalities globally due to
inadequate drug knowledge, we strive to make a difference by enhancing
awareness and understanding.
DrugWise
https://www.drugwise.org.uk/
DrugWise is a comprehensive resource dedicated to providing up-to-date drug
information, crafting new reports, and offering a wealth of archival materials from
DrugScope, including all Druglink articles since 1986. Beyond its focus on drugs,
DrugWise extends its scope internationally, covering issues related to alcohol and
tobacco, particularly the debates surrounding e-cigarettes and diverse
perspectives on drug policy and practice.
Recognizing the challenge of scattered resources, we’ve established I-Know, an
international knowledge hub designed to consolidate a wide array of information,
policy, and practice materials related to drugs, alcohol, and tobacco. Hosted on
our server, I-Know aims to develop into a robust library, ensuring these valuable
resources remain accessible for those seeking comprehensive and authoritative
insights into these critical public health issues.
SaferParty
https://www.saferparty.ch/
Saferparty.ch is a service provided by the social department of the City of Zurich,
managed by Saferparty Streetwork. This initiative offers guidance and support to
young individuals up to the age of 28 facing crisis situations, with a special
emphasis on the prevention of party drug misuse. Through consistent outreach
and relationship-building efforts, Saferparty Streetwork engages with youth who
might not connect with other available services. Together with those seeking
assistance, it crafts personalized solutions aimed at fostering autonomy and
responsible decision-making. This service is available to teenagers and young
adults on a voluntary, confidential, and free-of-charge basis.
For inquiries related to substance use, specific substances, or information about
our drug checking service in Zurich, please feel free to reach out to us. We’re here
to help and look forward to assisting you.
SocietalActivities
https://www.societalactivities.org/
SocietalActivities.org is a resourceful platform dedicated to offering valuable aids
such as complimentary fentanyl test strips and Narcan spray. Our primary mission
addresses the challenges posed by pervasive attitudes of selfishness,
individualism, and egotism. While recognizing that these traits can be essential
and motivating at a personal level, we also understand that, when magnified
across society, they contribute significantly to contemporary issues. By providing
these tools and fostering a community of care and support, SocietalActivities aims
to counteract these societal tendencies and promote a more collective and
empathetic approach to solving problems.
Labs
On this page you can find some labs and drug test results. Curious about the
precise composition of your substances? This resource is tailored for you.
Particularly for those purchasing in large quantities or intending to distribute, it’s
crucial to invest time in obtaining a laboratory test. This step ensures you’re fully
informed about the product’s contents, helping prevent any unintended harm.
Energy Control International
https://energycontrol-international.org/
Energy Control International is a collective of individuals, united by a shared
concern for the challenges associated with drug use, both in recreational
environments and within society at large. Our mission transcends the boundaries
of personal drug use, focusing instead on the development of Harm Reduction
strategies. We aim to mitigate risks and minimize harm through the provision of
information, personalized advice, and educational efforts concerning drug
consumption.
Our services include a Drug Checking Service, designed to enlighten users about
the contents of their substances, enabling us to guide them towards safer
consumption practices. We pride ourselves on delivering tailored, scientifically-
backed, and judgment-free drug information specifically aimed at users. This
initiative, which began in Spain in 1999, expanded in 2014 to encompass an
International Drug Testing Service.
Visitors to our website can access comprehensive reports from our International
Drug Testing Service, alongside a wealth of significant peer-reviewed scientific
publications. Additionally, our contributions to international congresses, scientific
gatherings, and the presentation of conference posters are readily available for
those seeking in-depth knowledge on the subject.
DrugData
https://www.drugsdata.org/
DrugsData, previously known as EcstasyData, operates as the autonomous,
anonymous laboratory testing initiative under the umbrella of the Erowid Center.
This program is dedicated to the acquisition, evaluation, management, and
dissemination of laboratory test results. These results include both our own
findings and those sourced from various analysis projects around the globe. Our
aim is to provide comprehensive and reliable data on substances to inform and
educate the public.
Wedinos
https://wedinos.org/
Wedinos provides a crucial insight into the emerging concerns surrounding new
psychoactive substances (NPS) usage within the UK and Europe. Evidence
suggests that individuals engaging with NPS face significant risks, including
immediate physical, psychological, and behavioral consequences, alongside an
elevated likelihood of encountering the criminal justice system. The long-term
effects, although largely undocumented, present an area of concern that this
project aims to address. Through comprehensive research and analysis, Wedinos
seeks to enhance our understanding of both the immediate and prolonged impacts
of NPS use, offering valuable information to inform public health and policy
decisions.
Get Your Drugs Tested
https://getyourdrugstested.com/ (Canada)
GetYourDrugsTested offers a groundbreaking service in Canada, enabling
individuals to understand precisely what their street drugs contain. As the world’s
most extensive database of street drug analyses, this initiative is a community-
focused service powered by the Medicinal Cannabis Dispensary. Despite being
recognized by Vancouver Coastal Health as an Overdose Prevention Site, it
operates without government funding, maintaining its independence.
How We Test Your Drugs
Our facility employs a cutting-edge “FTIR Spectrometer,” a device capable of
identifying and analyzing drug samples within minutes, all without destroying the
sample. By directing an infrared laser onto the substance, the spectrometer
examines the reflected light spectrum to pinpoint the exact components of the
drug.
Additionally, we provide test strips specifically designed to detect even minuscule
amounts of fentanyl or benzodiazepines, enhancing our testing capabilities.
We offer our drug testing services nationwide via mail, ensuring accessibility for
all. For those in Vancouver, samples can be directly submitted for analysis at our
880 East Hastings location during business hours.
Drug Foundation
https://www.drugfoundation.org.nz/ (New Zealand)
At the Drug Foundation, we provide a wide array of resources and guidance for
individuals using drugs, their families, those who support them, and communities
affected by alcohol and other substances. Our mission is to collaboratively
eradicate the adverse effects of drug use in Aotearoa New Zealand.
Our harm reduction initiatives currently encompass a variety of services: “Did You
Know” for parents, “Living Sober,” “PotHelp,” “DrugHelp,” and “Drugs in Bars,”
along with efforts to broaden the availability of complimentary drug checking.
We’re also building an Acute Drug Harm Community of Practice for healthcare
providers and professionals; collaborating with agencies to set up an early warning
system for drug risks; assisting employers, including the NZ Defence Force and
Maritime NZ, to mitigate workplace impairment hazards; supporting employment
readiness programs; and enhancing the approach schools take towards drug-
related issues.
Suicide Hotlines
For anyone finding themselves in a moment of despair, it’s crucial to remember
that there is hope and assistance readily available. Across the globe, numerous
organizations and helplines are dedicated to offering a compassionate ear and
professional support during times of crisis.
Below, I will outline a selection of suicide prevention hotlines by country, designed
to serve as a beacon of hope for those in need:
United States
National Suicide Prevention Lifeline: 1-800-273-TALK (1-800-273-8255)
Crisis Text Line: Text HOME to 741741
Canada
Canada Suicide Prevention Service: 1-833-456-4566 (In Quebec:
1-866-277-3553)
Crisis Text Line: Text HOME to 686868 in Canada
United Kingdom
Samaritans: 116 123 (free from any phone)
Campaign Against Living Miserably (CALM): For men in the UK who are down or
have hit a wall for any reason, who need to talk or find information and support.
Call 0800 58 58 58.
Australia
Lifeline: 13 11 14
Suicide Call Back Service: 1300 659 467
New Zealand
Lifeline Aotearoa: 0800 543 354
Suicide Crisis Helpline: 0508 828 865 (0508 TAUTOKO)
Ireland
Samaritans: 116 123
Pieta House: 1800 247 247 or text HELP to 51444
South Africa
The South African Depression and Anxiety Group (SADAG): 0800 567 567
Lifeline
0861 322 322
SMS 31393
India
Snehi: +91 9582208181
Aasra: 91-22-27546669
Please remember, if you or someone you know is in immediate danger, contact
your local emergency services right away. There are people who want to help, and
it’s important to reach out for the support you deserve.
Darknet Markets
Darknet markets refer to online marketplaces that exist on encrypted networks,
like Tor or I2P. These platforms primarily act as clandestine bazaars, facilitating
the sale and distribution of illicit goods, including narcotics, unauthorized
medications, and steroids, among other items.
FAQ
● If I’m purchasing only legal items from a market, that means I’m not
violating any laws, right?
Regrettably, the situation isn’t that straightforward. Even if the items are legal,
you’re indirectly supporting a criminal enterprise through market fees and
circumventing tax laws of your country. However, it appears law enforcement
doesn’t prioritize this issue, meaning it’s unlikely you’ll face legal repercussions for
buying legal goods through such a market.
● Is (Random Market) currently unavailable?
If you’re unable to access the website, it’s likely due to a site-wide outage, and
you’re probably not the only one experiencing this issue. To confirm, visit the
market’s specific subdread to see if others are facing similar problems. If the issue
persists for several hours, consider looking through forums for any updates or
announcements about the site’s status.
● Is it safe to just browse Darknet Markets (DNMs) without making any
purchases, and without using Tails?
Absolutely not. Should you be caught, or if law enforcement conducts a search of
your premises for any reason, evidence of your DNM browsing could be
discovered. Convincing a judge of your innocence and law-abiding intentions
would then become significantly more challenging, as your plausible deniability
would effectively disappear. Therefore, it’s crucial to take the brief time required to
boot up Tails, ensuring you’re not making yourself an easy target.
● Can I recover access to my Darknet Market (DNM) account if I’ve lost
it?
The ability to regain access to your DNM account varies by market and hinges on
the details you can share with their support team. Generally, your most effective
approach is to register a new account on the market and reach out to support from
there. Offer as much proof as you can to establish that you are the legitimate
owner of the account in question, such as details of messages sent, orders placed,
account creation date, and so on. After providing this information, the next step is
to wait and hope for a positive outcome.
● Why are the prices so high?
The principles of supply and demand govern pricing. It’s possible that the prices
you encounter on the street are lower than those you find on the market. For
instance, the market prices for cocaine in Colombia, MDMA in the Netherlands, or
cannabis in California aren’t likely to undercut the street prices you’d find in those
locations.
● Is it legitimate for a vendor to request payment through PayPal,
Western Union, or cash in the mail?
Absolutely not! Such requests are a red flag for potential scams. If a vendor
suggests bypassing the escrow system, you should report them to the website’s
administration immediately.
● I deposited bitcoins into my account, but blockchain.info indicates
they were sent to a different address!
Many sites employ a built-in bitcoin ‘tumbler’ mechanism to obscure the final
destination of deposited coins. After this process concludes, your account balance
should accurately show the deposited amount. It’s important to note, however,
that this market system doesn’t function as a true tumbler because it handles only
‘dirty’ bitcoins (those associated with drug transactions) and doesn’t incorporate
‘clean’ bitcoins as a genuine tumbler would.
● Do prices adjust based on changes in the Bitcoin exchange rate?
The majority of sites anchor their prices to the USD, meaning prices automatically
recalibrate in response to Bitcoin value fluctuations. This ensures the displayed
USD price remains consistent, regardless of the Bitcoin exchange rate.
● What are the odds of getting caught?
While it’s impossible to quantify with an exact figure, the risk is generally low if you
meticulously follow all the guidelines outlined in the DNM bible.
● Is it feasible that law enforcement (LE) might set up a new vendor
account to entrap buyers?
The likelihood of this strategy being employed by law enforcement depends on the
legal context within your jurisdiction. Generally speaking, yes, it’s possible.
However, historical patterns suggest that law enforcement tends to prioritize
capturing vendors and subsequently taking control of their accounts to identify
customers. Caution is advised if a vendor’s behavior suddenly seems suspicious.
In cases of doubt, request the vendor to authenticate their identity by signing a
message with their PGP key (and ensure you know how to verify such a signed
message).
Should a vendor change their PGP key without verifying the new one with the old
key, it’s wise to avoid transactions with them until they provide such verification.
● What are the safest items to buy and ship?
Certain products, like LSD, are simpler to conceal and ship compared to others,
such as cannabis. However, the key factor isn’t necessarily which items are safer
to purchase, but rather what you intend to buy. By adhering to the guidance
provided in the DNM bible—particularly the section on ‘How to choose a good
vendor’—you’re likely to significantly reduce the risk of your order not arriving.
● I visited a market without disabling JavaScript/setting the security
slider to high, am I fucked?
It’s unlikely you’ll face immediate issues, but it’s crucial to prevent this from
happening again. Ensure you disable JavaScript and adjust the security slider to its
highest setting each time you use the Tor browser in the future.
Important tips for using markets
● Always encrypt sensitive information, like your address, yourself. Relying
on the market’s encryption leaves a vulnerability: the market could retain
the unencrypted original of your message while sending an encrypted
version to the vendor. This illusion of security means both you and the
vendor might believe the information was securely encrypted, even
though the market has access to the plaintext. Moreover, if law
enforcement takes control of the market, they could collect unencrypted
data sent through a ‘PGP encrypt’ checkbox, all while continuing to
forward encrypted messages to vendors to avoid raising suspicion.
Personal encryption is the only way to ensure true security.
● Implement Two-Factor Authentication (2FA) for an additional layer of
security. This method requires you to decrypt a PGP message with your
public key every time you log in, beyond just entering your username and
password. Utilizing 2FA significantly enhances your credibility when
seeking support from the market, such as in instances of lost funds. It
makes unauthorized access to your account considerably more difficult,
preventing support from dismissing your concerns as a simple case of
phishing. To activate 2FA, navigate to your DNM account settings and
select the option to enable 2FA. Ensure you’ve uploaded your public PGP
key in the settings if it’s not already done. Follow these steps to create a
robust PGP key.
● Avoid using markets that necessitate enabling JavaScript. To understand
the risks involved, it’s crucial to educate yourself on the subject. [Read
about why here.]
● Always transfer only the amount of bitcoins you need to the market,
ideally right before you’re ready to make a purchase. This minimizes the
time your funds are in your market wallet, reducing the risk of theft by the
market itself. It’s risky to leave funds in your market wallet for any length
of time, as they could be stolen at any moment.
● It’s crucial to keep your activities on Dark Net Markets (DNM)
confidential. The importance of discretion in this matter cannot be
overstated.
● Always ensure you use unique usernames, passwords, PINs, or PGP key-
pairs for each market you participate in. If a malicious individual or even
untrustworthy market staff were to access your account on one platform,
they could potentially compromise your accounts on other markets,
leading to greater losses such as theft of your funds or deletion of your
accounts.
● Avoid using usernames or passwords that could reveal your identity.
Ensure your username doesn’t provide any hints about your real identity,
such as including your birth year or any other personal identifiers.
● Steer clear of services like Privnote that promise self-destructing
messages. There’s no guarantee these services won’t retain your
messages after they’re supposed to have been deleted. Additionally, they
require JavaScript, which poses a significant security risk. Instead, use
PGP encryption for your messages, just like other market users, and
communicate through the market’s internal messaging system. Also, it’s
wise to avoid vendors who rely on Privnote or similar platforms for
communication.
● Avoid tracking your package unless it’s significantly delayed beyond the
expected delivery time. Tracking it won’t speed up its arrival and only
serves to leave digital traces. For further information, refer to the section
on non-arriving packages. If you find it absolutely necessary to check
tracking (which ideally should never be the case), avoid using Tor, as it’s
a known red flag for law enforcement monitoring Dark Net Market (DNM)
users. Instead, opt for third-party tracking websites like TrackingEx or
PackageMapping, rather than the official site of your mail carrier. Also, do
not use your personal WiFi to check the tracking number. Utilize a
network not linked to your identity, such as public WiFi at a cafe, or use a
VPN set to a server in your country to avoid suspicion.
● Avoid making your purchase decisions based solely on a vendor’s market
dominance or their advertisement presence on darknet markets or other
websites. Frequently, smaller vendors excel by offering superior products
and customer service, surpassing larger competitors in quality and
experience.
● Struggling to differentiate between a lowercase ‘l’ and an uppercase ‘I’ in
●
future customers.
● Context: Understand the unique nature of transactions on the darknet
compared to mainstream platforms like Amazon. Consider the significant
impact of ratings on a vendor’s business, and strive to be fair and
reasonable.
● Resolution: Before leaving negative feedback or a less-than-perfect
rating, attempt to resolve any issues with the vendor. A courteous
approach may lead to a satisfactory resolution, allowing for positive
feedback.
Handling Threats or Blackmail from a Vendor
Encountering threats or blackmail from a vendor can be alarming. Occasionally,
vendors might escalate situations unreasonably, including threats to disclose your
personal information (doxxing) or alert law enforcement. If you find yourself in this
predicament, it’s crucial to maintain your composure and take strategic steps to
protect yourself. Moreover, promptly reporting the vendor to the marketplace
administration is essential. When communicating with the market staff, ensure
your message is clear, polite, and devoid of panic or insults. This approach
maximizes your chances of resolving the issue favorably and potentially getting
the vendor banned.
If you’ve adhered to the principles of being a conscientious buyer, maintaining
polite and respectful communication, you’ll likely be in a more advantageous
position. The market staff will be able to discern your reasonable demeanor,
contrasting with the vendor’s irrational behavior.
Threats of involving law enforcement are generally empty, as executing them
would compromise the vendor’s operational security and be unduly burdensome
just to target one buyer. These threats are often intended to intimidate you into
compliance.
Nevertheless, as a precaution, ensure your residence is free of any illegal or
suspicious items. In the unlikely scenario of a law enforcement visit, this
preparation helps maintain your innocence. The possibility of the vendor physically
confronting you is minimal; such threats are typically bluffs by individuals hiding
behind the anonymity of the internet. It’s also wise to pause any new purchases
until the situation is fully resolved.
You have the option to publicly call out the vendor on platforms like /d/
DarknetMarkets, provided you also share evidence of their misconduct. This step
should be taken with caution, ensuring you do not compromise your own privacy
or safety.
Operational Security in Real Life (IRL OpSec)
This section focuses on enhancing operational security (OpSec) in aspects of your
life that aren’t directly linked to Darknet Markets (DNMs). It covers practices such
as reselling, which might be relevant if you’re engaging in activities that your
acquaintances wouldn’t typically support or understand, like setting up secure
communication channels just for basic interactions.
The Cardinal Rule: Silence is Golden
The most critical principle in maintaining operational security is absolute discretion
about your sources and methods. You should never disclose the origin of your
products to anyone, under any circumstances. The pressure to share your secrets,
even with close friends, must be resisted to safeguard your operations and
personal security.
Remember, once information is shared, it cannot be unspoken. If even a single
person is privy to your activities, there’s no telling how far that information might
spread. Invariably, when someone is cornered by law enforcement, they might
divulge everything they know to lighten their own legal burdens. This could lead
directly to your doorstep, potentially costing you not just your privacy but also
significant legal expenses.
Real-world examples abound of individuals facing legal consequences because
someone else failed to maintain secrecy:
. An investigation into 18-year-old Ryan Andrew Backer followed after
authorities were tipped off about LSD shipments from the Netherlands to
him.
. The arrest of a university student for ordering and reselling LSD
originated from a suspicious package received from Hawaii, leading to
police intervention and legal action.
When questioned about your sources, a vague response citing an unspecified
“guy” without further details is prudent. Persistent inquiries should prompt you to
reconsider the nature of your relationship with the questioner. Anyone who cannot
respect your privacy is a potential risk.
Communication Strategies
Expect confusion or resistance when suggesting the use of PGP encrypted emails
to friends or customers. Adapting your communication methods without
compromising evidence is crucial.
● Securing Communications: Familiarize yourself with and follow security
guidelines for iPhone or Android devices to minimize prosecutable
evidence. Encourage the use of encrypted messaging apps like Telegram
or Signal among your contacts, ensuring features like automatic message
destruction (e.g., after 24 hours) are utilized. Advocate for full disk
encryption on devices with a strong passphrase.
● Avoid Cloud Backups: Disable iCloud or Google Cloud backups for
messages and photos, as law enforcement can easily access these with a
subpoena.
Adhering to these principles not only enhances your operational security but also
significantly reduces the risk of legal repercussions stemming from your activities
or associations.
Alternative Communication Strategies
Typically, the internal messaging system of the marketplace suffices for buyer-
seller interactions. Nonetheless, under circumstances such as the marketplace
experiencing downtime, the need for alternative methods of communication may
arise to maintain contact with vendors. The subsequent sections will focus on how
to employ these alternative strategies effectively, ensuring your operational
security (OpSec) remains uncompromised.
Email
It’s important to remember that email services, particularly those hosted on .onion
domains and operated anonymously, can unexpectedly cease operations. This has
occurred frequently in the past and is likely to continue. To mitigate risks, regularly
back up essential emails and avoid linking critical accounts, such as those used for
two-factor authentication (2FA) on significant Bitcoin trading platforms, to these
email addresses.
For secure email communication, consider the following guidelines:
● Select a Reputable Email Provider: Opt for a provider with a strong
reputation for security and privacy. Research on platforms like Dread can
help identify services that accommodate Tor users and are known for
their resistance to government inquiries.
● Javascript Disabled: Choose an email service that functions fully
without the need for Javascript, enhancing your security.
● Encrypt Your Communications: Utilize Pretty Good Privacy (PGP)
encryption for all outgoing emails and confirm that your correspondents
do the same. This step is crucial for maintaining the confidentiality of
your messages.
● Be Cautious with Email Subjects: Avoid divulging sensitive information
in the subject line. Even with PGP encryption, the subject remains
unencrypted and could reveal too much. Instead of specific details like
“about the $4k drug deal we made,” use neutral placeholders such as
“subject” to maintain privacy.
Jabber / XMPP
XMPP Overview
XMPP (Extensible Messaging and Presence Protocol) is a versatile communication
protocol that facilitates instant messaging between two or more participants
across networks, akin to services like Skype or Facebook Messenger. Originally
called Jabber, this protocol is sometimes still referred to by its original name.
By following the guidelines provided, you can enable real-time, end-to-end
encrypted messaging at no cost.
OMEMO Encryption
Developed by Andreas Straub, OMEMO is an advanced XMPP extension designed
for secure messaging across multiple devices. Utilizing the Double Ratchet
Algorithm, OMEMO ensures that messages are encrypted end-to-end, supporting
synchronization across several clients, even when some are not online. The
acronym “OMEMO” stands for “OMEMO Multi-End Message and Object
Encryption,” highlighting its capability for secure multi-device communication. As
an open standard, it leverages both the Double Ratchet Algorithm and the
Personal Eventing Protocol (PEP, XEP-0163) to offer features like future and
forward secrecy, deniability, and the ability to deliver messages offline.
Compared to OTR (Off-the-Record Messaging), OMEMO provides additional
benefits such as group chat encryption, message queuing for offline users, file
sharing, and both verifiability and deniability, albeit with a minor increase in
message size.
OTR (Off-the-Record Messaging)
Although OTR and the messaging client Pidgin are included in some security-
focused software bundles like Tails, their technology is becoming outdated.
Transitioning to OMEMO is highly recommended for enhanced security features.
Pidgin is a versatile, open-source messaging client that supports various
messaging protocols, enabling users to connect to different messaging services
like Facebook, Google Talk, and AIM from a single platform. Pidgin is renowned for
its Off-the-Record (OTR) plugin, which provides end-to-end encryption for secure
conversations. To use this feature, both parties must have the OTR plugin
installed, though it is not necessary for both to use Pidgin. The OTR plugin
employs Perfect Forward Secrecy to prevent third parties from intercepting
messages, though it cannot prevent a chat partner from logging conversations.
Setup Gajim+OMEMO
This guide is your go-to resource for mastering communication via Gajim and
OMEMO, the preferred method for interacting with XMPP clients. For those with an
existing XMPP account from applications like Pidgin, we’ll walk you through the
seamless transition to Gajim and introduce you to the essentials of utilizing
OMEMO. Remember, encrypted conversations are only possible if both parties
have OMEMO installed; otherwise, your messages will be unencrypted. Encourage
those without OMEMO to install it for secure communication.
Important: Gajim does not support OTR by default.
Initial Setup
Before diving into Gajim on Tails, ensure you’ve activated persistent storage and
enabled the Additional Software option, along with setting up a root password
upon startup.
Installation Process
Follow these steps to install Gajim:
. Navigate to Applications -> System Tools -> Synaptic Package Manager.
. In the Package Manager, use the search function on the right to find
“gajim-omemo.”
. Select “gajim-omemo” for installation and confirm your choice.
. After clicking “Apply,” confirm again in the new window and set Tails to
install Gajim upon each startup.
Creating Your XMPP Account
New to XMPP? Here’s how to create your account and set up OMEMO:
● Choose a service provider; we recommend calyxinstitute for this guide,
●
checked.
○ – Select it and click “Configure Plugin”.
○ – Enable the following options:
◆ – “Enable private messaging”
◆ – “Don’t log OTR conversations”
◆ – “Automatically initiate private messaging”
○ – Close both the configuration and plugin overview windows.
Registering an XMPP Account
To communicate via XMPP, you’ll need an account. XMPP servers have varying
policies on data logging, but those listed in our services are privacy-conscious. If
using Tor (via Tails or Whonix), your privacy is further enhanced. Note that some
servers might require you to register through their website.
. Account Creation:
○ In the “Buddy List” window, select Accounts -> Manage Accounts.
○ Click “Add” and input the following:
◆ Protocol: XMPP
◆ Username: YourDesiredName
◆ Domain: jabber.calyxinstitute.org (or another server from the list)
◆ Resource: Leave this blank.
◆ Password: Choose a strong, unique password.
◆ Ensure “Create this new account on the server” is checked.
. Advanced Settings:
○ Set Connection Security to “Require Encryption”.
○ Connect Port: 5222
○ Connect server: jabber.calyxinstitute.org
○ Leave File transfer proxies and BOSH URL blank.
○ Opt for a hidden service server if possible.
. Finalizing Setup:
○ Click “Add”, then log in with your new credentials when prompted.
○ Accept any certificates if necessary.
○ Enable your new account in the “Accounts” window to go online.
to false.
○ Set up the proxy by searching for `network.proxy.http` and changing
it to 127.0.0.1.
○ Configure the proxy port by finding `network.proxy.http_port` and
setting it to 4444.
○ Ensure DNS queries are not proxied by setting
`network.proxy.socks_remote_dns` to false.
○ Adjust HTTPS settings by setting `dom.security.https_first_pbm` and
`dom.security.https_only_mode` to false.
◆ Note: Some settings might revert to their defaults upon restarting