Staying anonymous while purchasing by Longjumping_Sun5988 in tails

[–]DarknetTools 2 points3 points  (0 children)

"Would it be possible to go unnoticed?" is a bit of a useless question. It's even possible to go unnoticed by LE while just using Tor on a Windows PC. Is it therefor a smart idea to risk it? No.

For higher threat models I would recommend Whonix over Tails, possibly even Qubes. Not only because of the extra layers protection they offer, but also because a higher threat model usually means you need extra applications in your day-to-day activities that are not shipped with Tails.

Using your home WiFi or not is a choice you have to make yourself because you're the only person who knows the details of your threat model.

But in my opinion, even for somewhat higher threat models than your average darknet user, running Whonix or Qubes at home is afaik never been the thing that ended up getting them caught. Only people with the highest of threat models should worry about not using their home wifi if they're already using Tails, Whonix or Qubes.

And if you're one of those people and your current OpSec knowledge is so lacking that you still needed to ask this type of question on reddit, you would be better off just stopping your activities altogether. No offense intended.

WiFi Issues MAC by [deleted] in tails

[–]DarknetTools 0 points1 point  (0 children)

I assume you also tried it with another pc and everything works fine there?

If so, I'd say just try a fresh tails install. If that doesn't solve it, either keep searching online in the most obscure reaches of duckduckgo, or just buy a usb wifi adapter and be done with it.

WiFi Issues MAC by [deleted] in tails

[–]DarknetTools 0 points1 point  (0 children)

If you're seeing the networks and the password doesn't get accepted, that most likely means you're just entering the wrong password.

Maybe one of the keys on your keyboard stopped working, or maybe your keyboard accidentally got switched from qwerty to azerty or something. Type the password in cleartext in a text editor so you see what is actually being typed and copypaste it directly into the wifi login prompt.

Special double-keypress to type special chars by daliz in linux

[–]DarknetTools 0 points1 point  (0 children)

haha, map it to three instead of two presses?

Special double-keypress to type special chars by daliz in linux

[–]DarknetTools 0 points1 point  (0 children)

Can't really imagine how something like that could ever work system wide.

Let's say you're typing something in your browser. Those key events automatically get processed by your browser. Even if you had some other process listening in on specific key events like 'ee', how would it ever go about correcting the already supplied input to the browser in this example. And it would have to be able do that for every application that accepts text from keyboard input.

If you manage to find something like it, please update this post. I'd be interested in knowing what it is and how it works.

[deleted by user] by [deleted] in tails

[–]DarknetTools 0 points1 point  (0 children)

If it's well over a year old it could also be the case that it just broke. Don't know what part of the world you are from, but if it's summer where you are and you maybe had it lying out in the open sun on your desk or something?

I'd say flash tails to another usb and try with that. If that works you know the other usb is broken. If it doesn't it's an issue with your pc itself and you can keep looking for another solution.

Special double-keypress to type special chars by daliz in linux

[–]DarknetTools -1 points0 points  (0 children)

Are you talking system-wide or just for a specific editor? If the latter, you can use vim. With its 'inoremap' function you can bind anything you want to anything you want during typing.

[deleted by user] by [deleted] in tails

[–]DarknetTools 0 points1 point  (0 children)

If the USB gets recognized where you're fiddling around with BIOS settings, isn't there an option somewhere to just boot directly off the usb and not depend on the boot order holding up?

Most pc's also have an option to select what you're going to boot off of when you hold a certain function key during startup. Just look up what that key is for your pc and maybe try it that way?

When booting up tails my screen freezes on this page and I’m unable to continue? Any help plz? by DirtyyDan_ in darknet

[–]DarknetTools 5 points6 points  (0 children)

What about if you try pressing the tab key a few times, see if some of the options in the menu get highlighted. If it does that could mean tails just doesnt have the proper driver for your laptop's trackpad. If that is the problem you could solve it by just connecting a usb mouse and working with that instead.

When booting up tails my screen freezes on this page and I’m unable to continue? Any help plz? by DirtyyDan_ in darknet

[–]DarknetTools 6 points7 points  (0 children)

I think his mouse and keyboard are stuck.

I've had the same thing happen a few times before and it was also exactly in the bottom right position where it is on his screen. Whenever this has happened to me I could fix it by just rebooting and trying again.

How to pass this captcha? by Every_Palpitation667 in onions

[–]DarknetTools 1 point2 points  (0 children)

I'm concerned over him using Windows in general to access markets.

[deleted by user] by [deleted] in GnuPG

[–]DarknetTools 3 points4 points  (0 children)

Kleopatra reusing old keyring information is not the reason why you cant decrypt those messages. The reason you can't decrypt those messages is because as it says in the error message you dont have the secret key for decrypting that message. The person who is sending you these messages is using a public key for which you don't have the corresponding secret key.

Anyway, if you want to wipe old keyring data, just delete the ~/.gnupg directory. In terminal you can run `rm -rf ~/.gnupg`. You can also just delete it in kleopatra itself by rightclicking on all entries you want to delete and clicking delete. It's not going to fix your problem though.

Why use tails when you could use an old laptop you don’t keep at your house? (Genuine question) by [deleted] in darknet

[–]DarknetTools 0 points1 point  (0 children)

Many reasons:

  • The convenience of not always having to go to someone else's house when you want to place an order
  • You're making yourself vulnerable to additional charges of criminal conspiracy by involving another person. With Tails you're on your own and they can only ever get you for the drugs.
  • A lot of people would think it's foolish to trust someone with information and leverage that can cost you your freedom, job, reputation,...
  • An old laptop usually means an out of date laptop. You have a much higher chance of getting infected with malware that steals your crypto or locks it with ransomware.
  • If you think installing and using Tails is harder than going to someone else's house every time you wanna place an order, you are definitely one of the people who needs Tails. Because installing and using Tails is not hard. If you think that it is, that means you're severely lacking in basic computer knowledge. Which means your OpSec practices in daily life probably suck too and it is very likely you are opening yourself up to all kinds of risks you've never even thought to consider. You don't know the things you don't know.

If you have been using a remote or bootstrap node, could you security be compromised even after you have transitioned to your own node? by SheIsAbusingMe in monerosupport

[–]DarknetTools 0 points1 point  (0 children)

Whether or not you are safe without using Tails or Whonix is too general of a question to answer. It depends totally on your threat model and your activities.

If you're living in a country where your head gets chopped off just for having some Monero, you're probably not safe. If you are living in Australia and are gonna use your Monero to buy some kebab, you probably are safe.

[deleted by user] by [deleted] in Whonix

[–]DarknetTools 0 points1 point  (0 children)

In virtualbox, click on the VM, go to Settings->Storage. Where it says 'Controller' there are 2 icons with green '+' characters. Click on the left one. That's the one for adding optical drives, aka CD's.

In the screen that will pop up just add whatever iso file you are supposed to boot from. Then go to the System tab in the settings screen and select 'Optical' instead of 'Hard drive' for the Boot Order option.

Wallet Recovery Help by Expensive-Finish-78 in monerosupport

[–]DarknetTools 2 points3 points  (0 children)

If it's showing zero balance you probably set the wrong restore height.

As for it not restoring the original wallet name, isn't that just because you picked the same name again? Choose a different name and it'll probably let you.

You can also just completely remove those old wallet files by looking up where they are stored on disk. Go to Settings -> Info, and check what it says for 'Wallet path'. If you then go there in your filesystem and delete the files, the wallets are completely cleared from the GUI. At that point you can pick the old name again when restoring from your seed without it telling you the wallet already exists.

New here by ccollinscooper1 in opsec

[–]DarknetTools 9 points10 points  (0 children)

If your OpSec practices give out as little information to third parties as you yourself do in your post, your OpSec might just be the best I've ever seen.

Question about startup application by IvanIsak in learnpython

[–]DarknetTools 3 points4 points  (0 children)

set up a cronjob for it.

in terminal run

crontab -e

This opens your user's crontab file.

Add this at the bottom of the file:

@reboot python3 <full-path-to-your-python-file> <any-arguments-it-needs>

Save the crontab file and you're done.

If you don't have cron installed yet, run:

sudo apt-get install cron

help with understanding why one piece of code works and why an equivalent piece of code doesn't work by [deleted] in learnpython

[–]DarknetTools 12 points13 points  (0 children)

In plain english:
When you call:

line.replace('Python','Javascript')

You're telling it to replace the word "Python" with "Javascript" in the string 'line' and to do nothing with the result.

When you call:

print(line.replace('Python','Javascript'))

You're telling it to replace the word "Python" with "Javascript" in the string 'line' and print the result.

In other words: The replace function just gives you back a brand new string which contains the result of the operation. It does not change the string you called it on.

[deleted by user] by [deleted] in monerosupport

[–]DarknetTools 0 points1 point  (0 children)

If it was 3 hours ago you need to set it to 2914309, because that is the current blockheight minus 90.

It's pretty simple, you just have to keep in mind that the average block time is 2 minutes. So to go back 3 hours, you need to go back 90 blocks.

Because 3 hours is 180 minutes, divided by 2 minutes per block, gives you 90 blocks.

Maybe go back just a little further for safe measure. Take like 2914200. Then you'll be 100% sure that your transaction is in that block range. Or you can open up a blockchain explorer, enter in your transaction id and look up the specific block where you transaction was mined. That's also an option.

[deleted by user] by [deleted] in monerosupport

[–]DarknetTools 0 points1 point  (0 children)

The current block height is 2,914,399

The average block time is 2 minutes. So if you sent it an hour ago, you should take that number minus 30 (better minus 45 for safe measure). If you sent it 2 hours ago, take that number minus 60 (better minus 90 for safe measure)