killab Posted July 22, 2018 Share Posted July 22, 2018 This site is hands down the best most up-to-date resource for anyone wanting to know about all things crypto and DNM (darknet market) related. They have a ton of great informative articles as well as how-to's. Check out jollyrogers security guide. Also there is a great article detailing now to route all your jabber traffic through tor. You can also get the latest news on any DNM (darknet markets) and DNV (darknet vendors) if your so inclined. https://www.deepdotweb.com/ 1 Link to comment Share on other sites More sharing options...
cwade12c Posted July 23, 2018 Share Posted July 23, 2018 Jolly Roger's Security Guide for Beginners: https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/ INTRODUCTION TO SECURE COMMUNICATION – TOR, HTTPS, SSL PGP, TAILS, VIRTUAL BOX PGP CONTINUED WHOLE DISK ENCRYPTION AND FILE SHREDDING JAVASCRIPT VULNERABILITIES AND REMOVING PERSONAL METADATA FROM FILES GENERAL SECURITY PRECAUTIONS WHEN POSTING ONLINE, LEARN FROM OTHERS’ MISTAKES EXIF DATA RETAINING A LAWYER, HOW TO HANDLE GETTING CAUGHT OR INTERROGATED COMBINING TOR WITH A VPN COMBINING TOR WITH A VPN CONTINUED CONNECTING TOR -> VPN FOR WINDOWS USERS TRACKING COOKIES LEARNING FROM OTHERS’ MISTAKES. LIBERTAS, DPR, SABU, LULZSEC HOW FAR WILL LAW ENFORCEMENT GO? FRAUDULENT PRIVATE MESSAGES LEARNING FROM OTHERS’ MISTAKES. HOW THEY BUSTED SABU LEARNING FROM OTHERS’ MISTAKES. SABU BECAME FBI INFORMANT AND BETRAYED JEREMY HAMMOND WHERE YOU MIGHT CONSIDER RUNNING TO, IF YOU HAD NO OTHER CHOICE SECURING YOUR ACCOUNT FROM FBI MONITORING INVINCIBILITY MINDSET, FEDERAL GOVERNMENT BULLYING TACTICS HOW TO CONNECT TO TOR OVER TOP OF TOR HOW TO VERIFY YOUR DOWNLOADED FILES ARE AUTHENTIC VERIFYING SIGNED MESSAGES WITH SIGNATURES AND SIGNING YOUR OWN MESSAGES AN EXAMPLE OF REALLY BAD OPSEC – SMARTEN UP! TOR CHAT! OBTAINING, SENDING AND RECEIVING BITCOINS ANONYMOUSLY CLEARNET VS HIDDEN SERVICES – WHY YOU SHOULD BE CAREFUL THEY ARE WATCHING YOU – VIRUSES, MALWARE, VULNERABILITIES! MONITORING YOU WITH AN ANTENNA! COOKIES & JAVASCRIPT REVISITED, PLUS FLASH COOKIES AND OTHER BROWSER TRACKING A FEW SIMPLE RECOMMENDATIONS COLD BOOT ATTACKS, UNENCRYPTED RAM EXTRACTION THE STRENGH OF CRYPTOGRAPHY AND ANONYMITY WHEN USED PROPERLY – PGP/GPG EMAIL ADDRESSES ANOTHER SCAM EMAIL – BEWARE AN INTRODUCTION TO AN EXPERT ON OPSEC, PLUS MD5 & SHA-1 CHECKSUMS IT IS OBVIOUS WHEN YOU ARE USING TOR ARE YOU USING SAFE-MAIL.NET ? YET ANOTHER EXAMPLE OF HOW STRONG CRYPTOPGRAPHY AND PROPER OPSEC CAN PROTECT EVEN PEDOPHILES LOCALBITCOINS PART 1 – POLICE ARE WATCHING IT! LOCALBITCOINS PART 2 – THIEVES, SCAMMERS AND COUNTERFEIT BILLS! LOCALBITCOINS PART 3 – MORE SCAM STORIES LOCALBITCOINS PART 4 – SELLERS BUSTED FOR MONEY LAUNDERING HIDING TOR FROM YOUR ISP – PART 1 – BRIDGES AND PLUGGABLE TRANSPORTS CAPABILITIES OF THE NSA WHY YOU SHOULD ALWAYS BACK UP YOUR DRIVES, ESPECIALLY ENCRYPTED DRIVES BITCOIN CLIENTS IN TAILS – BLOCKCHAIN AND ELECTRUM Link to comment Share on other sites More sharing options...
killab Posted July 24, 2018 Author Share Posted July 24, 2018 Yea, he should update that shit to include monero as well. Link to comment Share on other sites More sharing options...
killab Posted September 12, 2021 Author Share Posted September 12, 2021 Feds took the site down, topic closed. Link to comment Share on other sites More sharing options...
Recommended Posts