⚠️
Security is Not Optional

Poor operational security has led to countless arrests and losses. Take every recommendation seriously. A single mistake can compromise your entire operation.

✅ Quick Security Checklist

DO ✓

  • ✅ Use Tor Browser exclusively
  • ✅ Enable PGP 2FA on your account
  • ✅ Encrypt all sensitive messages with PGP
  • ✅ Use Monero for payments
  • ✅ Verify mirror links from multiple sources
  • ✅ Use unique, strong passwords
  • ✅ Access only from secure locations
  • ✅ Use Tails OS when possible
  • ✅ Keep your system updated
  • ✅ Clear cookies and cache regularly

DON'T ✗

  • ❌ Never use your real name or details
  • ❌ Never access from home WiFi without VPN→Tor
  • ❌ Never discuss activities on clearnet
  • ❌ Never reuse passwords
  • ❌ Never click links from messages
  • ❌ Never ship to your real address
  • ❌ Never brag or share screenshots
  • ❌ Never save sensitive data unencrypted
  • ❌ Never trust finalize early with new vendors
  • ❌ Never use a phone for market access

🌐 Connection Security

🧅

Always Use Tor

Tor Browser is mandatory. Never access .onion sites with regular browsers. Download only from torproject.org.

🔌

VPN + Tor (Optional)

Using VPN before Tor hides Tor usage from your ISP. Choose no-log VPNs that accept crypto. Not required but adds a layer.

🌉

Use Bridges if Blocked

If Tor is blocked in your country, use bridges. Get them from bridges.torproject.org or use built-in obfs4 bridges.

📍

Location Awareness

Never access from locations linked to your identity. Coffee shops and public WiFi (with VPN→Tor) are safer than home.

🔐 Account Security

Password Requirements

  • ✅ Minimum 20 characters
  • ✅ Mix of uppercase, lowercase, numbers, symbols
  • ✅ Unique for every account (never reuse)
  • ✅ Generated randomly (use a password manager)
  • ✅ Stored encrypted (KeePassXC recommended)
Example Strong Password (generated)
kX9#mP2$vL7@nQ4&bR8*wY3!hT6%

🔑 Enable PGP 2FA

PGP-based two-factor authentication is the most secure option. Unlike SMS or TOTP, it cannot be bypassed by phishing attacks.

Setup Guide →

🎣 Phishing Protection

Bookmark verified links. Never click links in messages. Always verify the URL before entering credentials. Use PGP 2FA as the ultimate protection.

Learn More →

💬 Communication Security

Golden Rules of Communication

1

Always Encrypt Sensitive Information

Shipping addresses, personal details, and any identifying information MUST be PGP encrypted before sending to vendors.

2

Verify Vendor Keys

Before encrypting to a vendor, verify their PGP key fingerprint through multiple sources. Scammers may post fake keys.

3

Minimize Information Shared

Share only what's absolutely necessary. Don't over-explain, don't make small talk, don't mention personal details.

4

Never Discuss on Clearnet

Don't talk about market activities on social media, forums, Discord, or anywhere linked to your real identity.

💰 Financial Security

💜 Use Monero

Monero is untraceable by design. Bitcoin can be traced through blockchain analysis. Always use XMR when possible.

Monero Guide →

🔀 Break the Chain

Never send crypto directly from KYC exchanges to markets. Always go through a personal wallet, preferably swapping BTC→XMR.

💳 Minimize Market Balance

Don't keep large amounts on the market. Deposit only what you need. Markets can exit scam or be seized at any time.

⚠️ Avoid FE

Never Finalize Early unless you have extensive history with a vendor. Escrow exists to protect you—use it.

📦 Physical Security (For Buyers)

📬
Shipping OPSEC

Your shipping address is the weakest link. Think carefully about how you receive packages.

  • 🏠 Consider alternate delivery locations - PO boxes, trusted friends, or drop addresses reduce risk to your home
  • 📝 Use plausible names - But be consistent, as random names may flag packages
  • 📦 Don't sign for packages - Signing creates evidence of receipt
  • Let packages sit - Don't open immediately; plausible deniability
  • 🗑️ Dispose of packaging properly - Shred labels and packaging materials
  • 🚫 Never order large quantities - Larger orders attract more scrutiny
  • 📊 Vary order timing and amounts - Patterns can be detected

💻 System Security

💿 Use Tails OS (Highly Recommended)

Tails is an amnesic operating system that routes all traffic through Tor and leaves no trace on your computer. It's the gold standard for darknet OPSEC.

Tails Setup Guide →

🔄 Keep Software Updated

Outdated software has known vulnerabilities. Update Tor Browser, your OS, and all security tools regularly.

🔐 Encrypt Everything

Use full-disk encryption (VeraCrypt, BitLocker, LUKS). Encrypt any files related to market activities.

🗑️ Secure Deletion

Regular deletion doesn't remove data. Use secure deletion tools. Tails handles this automatically.

📵 Separate Devices

Ideally, use a dedicated device for market access. Never mix personal and market activities on the same device.

🚨 Common Mistakes That Lead to Compromise

Bragging Online

Posting about activities, showing packages, or hinting at involvement on social media has led to many arrests. Keep silent.

Reusing Identities

Using the same username, password, or PGP key across platforms creates links. Each identity should be completely separate.

Trusting Too Easily

Fake vendors, phishing sites, and scammers are everywhere. Verify everything. If a deal seems too good, it's probably a scam.

Getting Comfortable

Security fatigue is real. After successful transactions, people get lazy. Maintain the same precautions every single time.

Remember: Security is a Chain

Your security is only as strong as its weakest link. One mistake can unravel everything. Stay vigilant, stay paranoid, stay safe.

Full OPSEC Guide Tails OS Guide