⚠️
This Guide Could Save Your Freedom

Poor operational security has led to countless arrests. Take every recommendation seriously. One mistake can compromise your entire operation.

The OPSEC Mindset

OPSEC (Operational Security) is about creating a complete separation between your real identity and your darknet activities. Think of it as building an airtight compartment—any leak, no matter how small, can be fatal.

Core Principles

  • 🔒 Compartmentalization - Keep identities completely separate
  • 🔇 Silence - Never discuss activities with anyone
  • 🔍 Paranoia - Assume you're being watched
  • 📚 Knowledge - Understand your tools thoroughly
  • 🔄 Consistency - Maintain security every single time

Identity Separation

Never Cross-Contaminate

Darknet Identity
  • Unique usernames
  • Unique passwords
  • Unique PGP keys
  • Unique writing style
  • Separate device/OS
Real Identity
  • Real name
  • Regular accounts
  • Personal devices
  • Normal browsing
  • Social media

⚠️ These two worlds must NEVER overlap

Technical OPSEC Layers

Layer 1: Hardware

  • Dedicated device for market activities
  • No personal data on the device
  • Disable webcam and microphone
  • Use wired connections when possible

Layer 2: Operating System

  • Tails OS (Recommended) - Amnesic, leaves no trace
  • Whonix - Runs in VM with Tor gateway
  • Full disk encryption if using standard OS
Tails Guide →

Layer 3: Network

  • Tor is mandatory (not VPN alone)
  • Optional: VPN → Tor for ISP hiding
  • Use bridges if Tor is blocked
  • Never access from home without protection

Layer 4: Financial

  • Use Monero (XMR) exclusively
  • Never send from KYC exchange directly
  • Break chain: Exchange → Personal Wallet → BTC→XMR Swap → Market
Monero Guide →

Behavioral OPSEC

  • 🤐 Never talk about activities - Not to friends, family, or online
  • 📵 Never use phone for market access - Phones are tracking devices
  • 🕐 Vary your patterns - Don't access at predictable times
  • ✍️ Change your writing style - Different vocabulary, punctuation
  • 📸 No photos - Never photograph packages or products
  • 🗑️ Destroy evidence - Shred packaging, clear data
  • 😌 Stay calm - Don't panic if something goes wrong

Common OPSEC Failures

❌ Reusing Identifiers

Same username, email, or PGP key across platforms creates links.

❌ Bragging Online

Showing off on social media or forums has led to many arrests.

❌ Using Real Photos

Image metadata contains location, device info, and timestamps.

❌ Trusting Others

People talk. Friends become informants. Trust no one.

❌ Getting Comfortable

After success, security gets lazy. This is when mistakes happen.

Remember: You Are the Weakest Link

Technology is only as secure as the person using it. Stay disciplined, stay paranoid, stay safe.