The Art Of Staying Hidden Online | Ultimate Guide

This guide will include every bit of information that you will need while browsing
darknet sites and participating in darknet activity. To which extent you use the
tips pointed out below is entirely up to you. It also depends on whether or not
being identified as a certain darknet personality could mean a life sentence or
death. Please read carefully through those articles (all articles can be visited
without JavaScript and are clearnet links!): This Guide

Did they scare you? No? Well then you are stupid, crazy or simply that smart
that there is nothing you could possibly learn from this guide. If you still want
to continue, feel free to share your opinions and thanks afterwards. Following,
you will find a list of what this guide will cover:

A. OpSec

  1. Behaviour online & offline
  2. Usernames & Password 2.1. Personality Cross-interfering
  3. Trust
    B. TechSec
  4. The right OS
  5. Encryption
  6. TOR Setup
  7. PGP

C. HOW TO VANISH 1. How to vanish online 2. How to vanish offline
Now that everything I needed to say is out of the way, let’s start this adventure!

OpSec (Operational Security) is the term used to describe any action you take
(or don’t take) in order to keep your real identity a secret online.

  1. Behaviour online
    Behaviour online is probably the most important aspect to take care of if you are
    serious about staying in the shadows. Your behaviour must be excellent, never
    forget that the Internet never forgets… and never forgives! And by excellent I
    don’t mean your manners (still, don’t be an asshole!) but more what you say and
    post online. With other words - if you’re thinking about saying something that
    could identify you - DON’T. Unfortunately, LEA is so sophisticated nowadays
    that your name or IP or address isn’t the only thing that might be dangerous
    to tell online. Here’s a list of potentially dangerous information you should

• Name(First Name and Past Name!),past surnames,nicknames from other
services or clearnet,surnames,…

  • Address (not partially, not at all!)
  • Age
  • Your social status (many friends,lives alone,has a wife/husband,has 1/2/3/9
    kids etc.)
  • Weather (it’s always sunny in OnionLand!)
  • Current Time
  • Any clearnet activities not done with the TOR Browser
  • And many more!

Everytime you are about to post something, read carefully through what you
are about to share. Always think of messages and posts as if it is your ticket to
Hell. And indeed, it is.
Do not piss of people, talk only when absolutely necessary and don’t get provoqued by idiots. You’ll enjoy your warm coffee browsing through the DNet while
they will be the ones feeling “love from behind” in a cell.
Do not talk about your darknet activity! It is none of anyone’s business besides
yourself. Trust nobody - not even offline when it comes to that.

  1. Usernames & Passwords
    Do not use lame usernames & passwords! Make sure that they do not contain
    personally identifying information (your mom’s first name combined with the
    date you bought your kitten is NOT a good password) as well as that the
    password is filled with random Digits, at least 10 digits long.
    Just to make it absolutely clear:
    WisconsinMan49 darknetpass123
    ExodusRainbow s881bnxu5%%1=jsz&
    I know the examples above are a bit drastic but you get my point.

2.1 Personality Cross-Interfering
Also, you should make sure to NEVER use the same usernames & passwords on
TOR that you used on clearnet at any time. Preferably change your username
& password for each and every service you come along! This also counts for the
Behaviour Online (view point 1). Try to avoid acting on Tor like you act on the
clearnet. (Don’t access the same site, for example).

  1. Trust
    “Trust” is a word you should try to forget permanently. You can trust your
    grandma, but not the guy you will sell 50 grams of coke. DO NOT fall for anyone.
    Even if they seem to 100% legit and you know them for over 3 years and you are
    best buddies online - STILL TREAT HIM THE SAME LIKE ANYONE ELSE!
    Do not TRUST. I cannot stress this enough. Just a quick reminder: Some Silk
    Road Mods serve life sentences for having trusted the wrong person!
    B. Techsec

  2. The right OS
    Is there really the perfect operating system for darknet activity? No. There isn’t.
    Are there solutions that are way better than the average windows+outdated
    TBB? Yes. Definitely. YES!
    If you want to game, go with windows. If you need to do graphical tasks, go
    with MAC. If you want to browse the darknet, use a pro-security, pro-anonymity
    Linux Distro.
    Linux Distros worth mentioning here. Whonix:
    Qubes: Tails:
    They all have their pros and cons. For this guide, we will proceed assuming
    that you use Tails. However, Qubes and Whonix are great OSs and I definitely
    recommend checking them out. However, for beginners, Tails is an awesome
    solution as it takes care of most of the technical anonymization for you. E.g.,
    it runs all internet traffick through the TOR network, which means that all
    outgoing and incoming datapackages are encrypted and anonimyzed.
    Tails Homepage: Download & Install Tails:

  3. Encryption
    Encryption is extremely important, not to say crucial to your security and
    anonymity. You want to be encryption crazy! Encrypt everything, your drives,
    your flashdrives, your OS, your SD-Cards, everything. Make sure to use
    STRONG password (look up Usernames & Passwords).
    Good encryption software: VeraCrypt: https://www.veracryp…code/VeraCrypt/
    The good thing about Tails? If you choose to keep a persistent volume (the
    ability to save files after shutting down Tails) Tails asks you for a password. Tails
    encryption is extremely strong, so no need to use VeraCrypt for that. However,
    for your external or seperated internal drives you want to use VeraCrypt. Try
    to use different passwords.
    Never leave your device out of reach and unencrypted! The least you want is
    someone finding out about your darknet activity offline.

  4. TOR-Setup
    3.TOR needs to be secured to restrict dangerous or malicious attacks. For that,
    follow the steps:
    When you open a new browser window, click on the shield on the right upper
    corner. Set the security button to “Highest”.
    Type “about:config” into the address bar. Ignore the warning and click on the
    proceed button. Search for “java” and disable (toggle) “javascript.enabled”.
    This will block most of malicious files some sites can hold. Also, since you’re
    using Tails, a rather unknown OS, most virus are not made for your operating
    environment, but rather for Windows.

  5. PGP
    PGP (Pretty good privacy) is a sophisticated tool to encrypt/decrypt messages
    that are encrypted with powerful 2096bits.
    Check out GnuPG:
    For Tails users, click on the clipboard at the upper right corner on your screen.
    Press “Manage Keys”.
    Proceed with this tutorial from there: https://darkweblink…e-pgp-in-tails/
    If you followed these steps, vanishing shouldn’t be a piece of cake, but definitely
    easier than expected.

  6. Vanishing online
    Delete every account you ever had. Ask Site Admins to delete your accounts.
    If you cannot delete your account, at least delete every post you ever made.
    Delete Mails. Delete your PGP key-pair. If possible, spread misinformation
    about your persona (if you have reached a certain persona, otherwise, it would
    not be productive). Delete any software and files you kept. Format the drive 2
    times for security reasons.

  7. Vanishing offline
    DESTROY your hardware. Shatter it into thousand pieces and throw it away
    at different trashbins, lakes, rivers or anything else. Just make sure it is really
    destroyed. Decide if you need to leave the country. Get rid of everything that
    could be tied to you having anything to do with illegal activity. That also
    includes your pipes, needles and your unlicensed shotgun. Get rid of anything
    police could see as reason enough to arrest you. If you get arrested anyway, do
    not talk until you see your lawyer.

Thank you for reading through the article. Now go and read it a second time.

The information must be in your memories 4 EVA!


Thanks for sharing! Privacy on the internet is quite important and always an interesting topic for me to learn more and more. Thank you.

1 Like

Thank you very much, very informative

Thanks, man! privacy matters.

1 Like