yellowcat1771



Offline



Activity: 70

Merit: 0







NewbieActivity: 70Merit: 0 Ultimate Darknet Guide Staying Anonymous+Best Marketplaces jan/24/2016 January 24, 2016, 02:53:51 PM #1

After reading through these forums for a little while i have yet to find an updated guide on 2016 marketplaces and anonymity.

I sort of wanted to make this guide because i know not all of you are not hardcore technologically savvy. Each and everyone one of us has there own skill sets we acquire in life, that is what makes society beautiful,our differences not our similarities.



Download Tor from

How to Download Tor Video -



1. If you already have a tor browser installed go over to the onion in the top left and click on it, go to -> Privacy and Settings -> Set this option to high. Thank me later



2. Never use the same usernames or passwords. Any username from any website that can be traced back to your clearnet(normal internet) Social media accounts such as Gmail Facebook Youtube Ect. is Taboo. The reason why not using the same password is recommended is because if a website/marketplace is hacked the attackers will most likely use your credentials on all other marketplaces.



3. Stay away from Windows Windows in general is an unsafe operating system especially if not patched correctly, it has numerous exploits that can allow easier access for attackers.I highly suggest you watch this video for downloading Tails on USB. Many members can vouch that Tails is a well known anonymity operating system. Tails deletes all information from each session every time you shut it down.

https://www.youtube.com/watch?v=qD54_uQdYO0



4. Virtual Machines Pretty much these allow you to run an operating system within you Host operating system. If configured correctly you can mitigate most malware and prevent them from harming your Host operating system Here's a tutorial for setting one up, I do highly recommend that you use tails instead, as these virtual machines may leave information on your hard drive.

https://www.youtube.com/watch?v=8S28SrhrqXs



5. How to destroy and delete Hard drives

Some knowledge on hard drives. Whenever you delete a file on a operating system the information is not actually deleted. Operating systems have something called pointers. These point to sectors of data. The act of deleting a file simply redirects the pointer to another sector on the hard drive. You have to actually overwrite information in these sectors to successfully delete them. DBAN is an old school well known piece of software that will overwrite all sectors on the hard drive and replace it with 1's and 0's .

For a tutorial on how to use DBAN go to this video

Once you have overwritten your hard drive with DBAN it's best to encrypt it using Truecrypt. Truecrypt is a common encryption software that allows you to encrypt your hard drives usb's and even folders.

Encrypt Usb with Truecrypt video -

Encrypt Hard drive with Truecrypt video -

Ghost data What is ghost data? Well remember how we talked about pointers and sectors before? Sometimes those sectors become segregated from the hard drive. This makes it impossible to read or write to them without the necessary tools. DBAN will not be able to overwrite these sectors.So just a heads up there is always a chance you could have these lonely sectors of ghost data on your harddrive.

Best way to throw out the harddrive?

DBAN -> Extremely long and complex Truecrypt ->microwave -> hulk smash ->throw into lake/ocean



6. Proxies

I recommend the software Proxychains. It allows you to use Tor -> into multiple proxies.

if you haven't heard of it yet check it out here

You can get free proxy lists from here )

Proxy browsers are websites that allow you to search the web through them, simply go to google and type "proxy browser" thousands of proxy browser websites will pop up each with there own Ip address. But be mindful you never know who is on the other end watching



7. PGP encryption PGP encryption is used in every darknet market place. It is used to help secure that the message being delivered is kept safe and secret from prying eyes.If you are going to be buying from the darknet it is best practice to know how to use PGP.

How to use PGP -







Top Darknet markets of 2016 [LAST UPDATED 1/24/2016]



AlphaBay Currently Largest Market on Darknet - http://pwoah7foa6au2pul.onion/affiliate.php?ref=redm00n



Dream Market -



Valhalla (Silkkitie) -



OutLaw Market -





One last tid bit of advice. Marketplace's tend to either get raided by feds or the market owners will do something known as an "Exit Scam"

*cough cough evolution*

Be weary of this, Never leave large amounts of bitcoins in a market place for long periods of time.

These types of sites can go bottoms up at any given time. It has happened before and is sure to happen again.



If you have any questions or need any help please post below or you can message me on skype

If you have any suggestions please post below

My Skype Name yellowcat1771

My Bitcoin Address 3JnpnAfNzVS1Ssf1j9efu4yu6JXzKNguhY Greetings and salutations everyone, My name is yellowcat1771 glad to make your acquiescence.After reading through these forums for a little while i have yet to find an updated guide on 2016 marketplaces and anonymity.I sort of wanted to make this guide because i know not all of you are not hardcore technologically savvy. Each and everyone one of us has there own skill sets we acquire in life, that is what makes society beautiful,our differences not our similarities.Download Tor from https://www.torproject.org/download/download.html.en How to Download Tor Video - https://www.youtube.com/watch?v=NQrUZdsw2hA 1. If you already have ainstalled go over to the onion in the top left and click on it, go to -> Privacy and Settings -> Set this option to high. Thank me later2.use the same usernames or passwords. Any username from any website that can be traced back to your clearnet(normal internet) Social media accounts such as Gmail Facebook Youtube Ect. is Taboo. The reason why not using the same password is recommended is because if a website/marketplace is hacked the attackers will most likely use your credentials on all other marketplaces.3.Windows in general is an unsafe operating system especially if not patched correctly, it has numerous exploits that can allow easier access for attackers.I highly suggest you watch this video for downloading Tails on USB. Many members can vouch that Tails is a well known anonymity operating system. Tails deletes all information from each session every time you shut it down.4.Pretty much these allow you to run an operating system within you Host operating system. If configured correctly you can mitigate most malware and prevent them from harming your Host operating system Here's a tutorial for setting one up, I do highly recommend that you use tails instead, as these virtual machines may leave information on your hard drive.5.Some knowledge on hard drives. Whenever you delete a file on a operating system the information is not actually deleted. Operating systems have something called pointers. These point to sectors of data. The act of deleting a file simply redirects the pointer to another sector on the hard drive. You have to actually overwrite information in these sectors to successfully delete them. DBAN is an old school well known piece of software that will overwrite all sectors on the hard drive and replace it with 1's and 0's .For a tutorial on how to use DBAN go to this video https://www.youtube.com/watch?v=lwCCim2V_Jw Once you have overwritten your hard drive with DBAN it's best to encrypt it using Truecrypt. Truecrypt is a common encryption software that allows you to encrypt your hard drives usb's and even folders.Encrypt Usb with Truecrypt video - https://www.youtube.com/watch?v=NQhyJma3ZJI Encrypt Hard drive with Truecrypt video - https://www.youtube.com/watch?v=coAMTC7uFxA What is ghost data? Well remember how we talked about pointers and sectors before? Sometimes those sectors become segregated from the hard drive. This makes it impossible to read or write to them without the necessary tools. DBAN will not be able to overwrite these sectors.So just a heads up there is always a chance you could have these lonely sectors of ghost data on your harddrive.Best way to throw out the harddrive?DBAN -> Extremely long and complex Truecrypt ->microwave -> hulk smash ->throw into lake/ocean6.I recommend the software Proxychains. It allows you to use Tor -> into multiple proxies.if you haven't heard of it yet check it out here https://www.youtube.com/watch?v=diYBHlnbbrk You can get free proxy lists from here http://proxylist.hidemyass.com/ (Tip: Try to go through as many different countries as you can and research there lawsProxy browsers are websites that allow you to search the web through them, simply go to google and type "proxy browser" thousands of proxy browser websites will pop up each with there own Ip address. But be mindful you never know who is on the other end watching7.PGP encryption is used in every darknet market place. It is used to help secure that the message being delivered is kept safe and secret from prying eyes.If you are going to be buying from the darknet it is best practice to know how to use PGP.How to use PGP - https://www.youtube.com/watch?v=DhEhmgAfSKs Top Darknet markets of 2016 [LAST UPDATED 1/24/2016]Dream Market - http://lchudifyeqm4ldjj.onion Valhalla (Silkkitie) - http://valhallaxmn3fydu.onion OutLaw Market - http://outfor6jwcztwbpd.onion One last tid bit of advice. Marketplace's tend to either get raided by feds or the market owners will do something known as an "Exit Scam"Be weary of this, Never leave large amounts of bitcoins in a market place for long periods of time.These types of sites can go bottoms up at any given time. It has happened before and is sure to happen again.If you have any questions or need any help please post below or you can message me on skypeIf you have any suggestions please post belowMy Skype Name yellowcat1771My Bitcoin Address 3JnpnAfNzVS1Ssf1j9efu4yu6JXzKNguhY