×

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

Search results

  1. TyperTech

    Wateringhole Attack: how they catch vendors with perfect opsec

    Im gonna loweffortpost this since NSFW is full of junkie retards but maybe this might help some noob who is starting out or considering vending from making a bad decision. The following attack has been documented in a few arrest reports, the first case i saw this was a small scandinavian weed...
  2. TyperTech

    Insta's incredibly revealing bust: OpSec Perspective

    As some of you may know, a cocaine vendor by the handle "Insta" got busted not too long ago. Well, the article contains a ton of information we don't normally have the luxury of receiving as far as how they were busted. Here's a little summary I made on some of the OpSec mistakes they made: The...
  3. TyperTech

    How phones are targeted for wiretaps, location tracking and intrusion.

    Sometimes LE has a person of interest, sometimes they have a phone, a SIM, a MAC address, a physical location, an account on an app or website or any combination them. How do they get from that to tracking your every move and reading every message? You, John Doe, you are a suspect. 1. You have...
  4. TyperTech

    Maintain Your Honor, Should the Worse Happen Defy and Resist the Authorities

    This is for everyone but best fits in opsec. By using the dark web you are entering a community of honorable criminals. I know it sounds like a contradiction in terms but this is indeed the case. I've met people/worked with vendors here that I would trust more than some members of my own family...
  5. TyperTech

    Using KeePassXC Can Increase Password Security While Simultaneously Increasing Ease of Use

    Before I realized the actual capabilities of KeePassXC I was trying to memorize insane passwords and this discovery made my life much easier. So, I figured I'd share this information with the rest of you. Sorry if this is a redundant, oft-covered topic. From the inception of my DNM endeavors...
  6. TyperTech

    A very Lovely tips for VENDORS by Former Administrator.

    "If you rely only on Tor to protect yourself, you're going to get owned and people like me are going to laugh at you." The first tip is to not mix your dark web identity with your real one. You shouldn't work "from your mother's basement, or any location normally associated with you," and...
  7. TyperTech

    Cross-device tracking. Deanonymization of users of Tor, VPN, proxy using sound beacons

    Cross-device tracking is a type of attack that represents the ability to track a user through multiple devices as the same time. This is an old dream of marketologists, but not only they liked this technology, it appeared to be effective in deanonymizing cybercriminals who use Tor, VPN and proxy...
  8. TyperTech

    Vendors and the Basic Opsec Mistakes They Keep Making

    This topis is very common and people help each together for this reason I want too give you my experience and knowledge how I am more than few years safe without any compromised account or etc like first in long term you will need Linux ( there some people who use Tails but I think you need to...
  9. TyperTech

    Definition of simple OpSec

    This topis is very common and people help each together for this reason I want too give you my experience and knowledge how I am more than few years safe without any compromised account or etc like first in long term you will need Linux ( there some people who use Tails but I think you need to...
  10. TyperTech

    But What is Metadata?

    What Metadata actually is. Few people actually discuss what metadata actually is. Probably because it's confusing. Or that there are at least several forms of metadata. From philosophy we know that 'meta' means 'higher'. So metadata comes to us a a Signifer: it's a way to point at data that...
  11. TyperTech

    A short, but simple OPSEC guide for newer members.

    Hey gang; These are tips you here a lot when browsing forums like TMG or The Hub. But I feel it would be good to make a thread so new members can understand a bit of opsec and will not need to ask much questions. 1. Set security slide to safest. Disable javascript too at about:config, search...
  12. TyperTech

    Privacy Coins and Why You Should Care

    I. Anonymity and Cryptocurrency Anonymity is something that users should be largely familiar with at the point you’re reading this article. On the off chance that that’s not the case, IMMEDIATELY familiarize yourself with the ideas of privacy and anonymity. Briefly, privacy revolves around...
  13. TyperTech

    Discussion: OpSec Lessons from the Flugsvamp 2.0 Bus

    I've been combing through the data dump⚠️ from the Swedish Police investigation into the Flugsvamp 2.0 market, seeing what OpSec lessons can be gleaned from it. Pushing up against character limits, so without further ado: Summary description of connections between servers This document...
  14. TyperTech

    [TUTORIAL] - From the basic things in a Vendors life to the serIous business.

    FROM THE BASIC THINGS IN A VENDORS LIFE, TO THE SERIOUS BUSINESS PROLOGUE: Before you even start. Please read the whole guide from start to end. Some absolutely crucial things for the worst case scenario are only mentioned at the very end. Before you even start the process by creating any...
  15. TyperTech

    The Complete Guide to Qubes & Whonix

    The Complete Guide to Qubes & Whonix Table of Contents Introduction What is Qubes? What is Whonix? Prerequesites Installation Configuration Device Passthrough Updating Qubes Recommended Software Installing I2P Conclusion Introduction Welcome to...
  16. TyperTech

    Guide to Installing Gajim, the Popular XMPP Client on Tails

    Guide to Installing Gajim, the Popular XMPP Client on Tails Sponsored by eGangster, a clearnet OpSec educational site (https://egangster.org) If you are on Tails you already have a great XMPP client, Pidgin Internet Messenger. The name is about as uncool as Gajim yet the latter has risen to...
  17. TyperTech

    For Vendors: Anatomy and Breakdown Leading to Arrest

    • A regular employee of the Postal Service had regularly provided information about White to federal investigators. • Postal worker told investigators that an individual, later identified as White, had purchased $100 worth of Sleeping Bear Dunes Priority Express stamps. • On the same day...
  18. TyperTech

    If you have ever wanted to understand what Tor is, its goals, its design, its flaws ...

    ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏...
  19. TyperTech

    Dead drop OPSEC basics for BIG DUMMIES

    How people got caught doing dead drops. Controlled purchase. Bitcoin traced to crypto exchange account owned by vendor. Controlled purchase. Vendor used GPS on phone to get coordinates to give to customer. Phone GPS consists of GPS, wi-fi access points in range, cell towers in range. Vendor...
  20. TyperTech

    Some great Tools for VENDORS to protect yourself and to check your OpSec

    TinEye: Reverse image search https://tineye.com/⚠️ WHAT IT IS TinEye is an image-focused web crawling database that allows users to search by image and find where that image appears online. USE CASE You can uploads an image to TinEye or searches by URL. TinEye constantly crawls the web and...
Top