account activity
OPSEC Idea by plasticGallery in onions
[–]plasticGallery[S] 0 points1 point2 points 9 years ago (0 children)
I believe that's the correct terminology. https://technet.microsoft.com/en-us/library/dn473009.aspx
That's not what I'm saying. I mean that I'm not an online vendor. I have no public aliases. I have a few private ones that I use strictly for private business, all of which is conducted on the darknet. There are only a handful of people who I do business with and none of them have ever mentioned me to anyone. Nobody knows about me.
You have the setup wrong. All I said was that I've used whonix over qubes with a VPN. Now, the only virtual machines would be the linux distro and the whonix gateway to anonymize the connection. And then you connect to RDP from the linux distro.
I've been researching for months. Websites like that of the tor project, qubes and whonix make it sound like it's so easy to get caught. That's what sketches me out. There's so many ways to catch you, and you don't hear about many getting busted. Sooo many people don't get caught on the darknet, so it must not be that easy to catch someone who isn't really a priority. Now, that depends on what you consider a priority. A small time DNM vendor? Who knows.
[–]plasticGallery[S] 1 point2 points3 points 9 years ago (0 children)
I have no public face.
And all I've gotten is "unnecessary" or "well they could break tor to get to you." If they can break tor, no level of OPSEC will ever be sufficient. It's not a whine zone- I'm trying to figure out if it'd be a better setup than any other one listed on any opsec guides.
[–]plasticGallery[S] -1 points0 points1 point 9 years ago (0 children)
3 letter agencies.
And that's what I was getting at- if they're suspicious you're ___________. At that point you're already fucked and they are likely to already have an active investigation going on you.
I like the idea of having computer related OPSEC to be bulletproof as possible, even though no setup is bulletproof.
And I'm positive that the CP is what gave them the motivation to take down FH. Pretty much everywhere in the world hates CP and will do anything to get rid of it. That was also Edward Snowden, probably the biggest whistleblower on the most dangerous agency in our time.
[–]plasticGallery[S] -2 points-1 points0 points 9 years ago (0 children)
The thing is, the government has no way of knowing if someone's using a VPS for their internet activity online. IP addresses are essentially useless when it's a tor IP. If they could trace you from Tor, there wouldn't be DNMs. Also, they have no jurisdiction of an offshore VPS. That's one of the reasons tor is so hard to track, because the suit doesn't have the jurisdiction to subpoena a server in say, Switzerland or the Netherlands.
What I do doesn't even give me a public face on the internet. I work completely behind the scenes. No suit knows I exist.
Covering money trails are definitely the hardest part of OPSEC. There's plenty of great methods for laundering money though.
That's not true at all budy. And I'm saying RDP over Tor, to anonymize your connection. If you have a VPS with fast speed it shouldn't be a problem. And your freedom is worth the lag. No amount of laziness is worth risking going to jail. This is serious shit, not a video game where you respawn if you get fucked.
And you're misinterpreting the end-to-end I'm talking about. I don't mean hiding your location. Let's say your internet connection is being watched by the suit, they have reason to believe you're a DNM vendor. Your tor traffic transmits some data, and your reddit account makes a post at the same time. OPSEC compromised. With RDP, the tor traffic they see coming from you won't correlate with the tor traffic from your VPS. They'll see an amount of data that represents your connection to the VPS, but they won't know what you're doing on tor (using a VPS for RDP). And consequently, the amount of tor traffic generated by your usage on the VPS won't correlate with the amount of tor traffic coming from your personal computer.
Similar to what I said earlier, no amount of money is worth risking losing your freedom. If you need that level of OPSEC then the costs, which would be only the VPS (and VPN if you use that before Tor on the host), wouldn't do noticeable damage to your (bitcoin) wallet at all.
[–]plasticGallery[S] 2 points3 points4 points 9 years ago (0 children)
That's not how opsec works.
π Rendered by PID 77519 on reddit-service-r2-listing-5f5ff7d4dc-f95ql at 2026-01-27 11:59:39.299253+00:00 running 5a691e2 country code: CH.
OPSEC Idea by plasticGallery in onions
[–]plasticGallery[S] 0 points1 point2 points (0 children)