u/BTC-brother2018

⚠️ Warning for Haveno / RetoSwap users.

⚠️ Warning for Haveno / RetoSwap users.

##⚠️ Warning for Haveno / RetoSwap users

Read about it in this Link

There is an active warning going around about a serious Haveno/RetoSwap protocol bug involving the arbitrator multisig system.

According to the report, attackers were able to hijack the arbitrator role during trade setup by abusing an out-of-order ACK message before the multisig was fully created. In simple terms: the trade could be compromised before the safety mechanism was even properly in place.

What users should do right now:

Remove open offers, avoid starting new trades, and wait for an official patched release before using Haveno/RetoSwap again. This is not something better OpSec fixes, because it is a protocol-level issue.

Stay cautious, verify updates from official sources, and don’t assume “non-custodial” means risk-free.

u/BTC-brother2018 — 2 hours ago

Dark Web OSINT Tools Investigators Use to Find OPSEC Mistakes

Remember that

Dark web investigations usually do not involve “breaking Tor.” More often, investigators connect public clues: reused usernames, PGP keys, metadata, exposed server details, blockchain mistakes, clearnet mirrors, screenshots, writing style, and repeated behavior patterns.

This post is for education and defensive OPSEC awareness only. Do not use OSINT to dox, harass, threaten, stalk, or target anyone.

1. Onion Search Engines

Tools:

  • Ahmia
  • Torch
  • Haystak
  • OnionLand Search
  • DarkSearch
  • Fresh Onions / onion index mirrors when available

How investigators use them:

Investigators search onion indexes for usernames, site names, market names, PGP fingerprints, crypto addresses, contact info, repeated phrases, mirrors, scam clones, and old forum posts.

Hypothetical mistake:

A user posts on one onion forum as BlueCrow92, then uses the same username on another onion forum, a Reddit account, or a clearnet forum.

Why it matters / OPSEC lesson:

A search engine can index those public pages. Searching the username later may show multiple accounts connected by the same handle. Do not reuse usernames, site names, bios, PGP keys, contact info, or unique phrases across different platforms.

2. Evidence Capture and Case Documentation Tools

Tools:

  • Hunchly
  • Webrecorder
  • Browser screenshots
  • SingleFile browser extension
  • ArchiveBox
  • Obsidian / Joplin for note organization
  • Maltego case graphs

How investigators use them:

Tools like Hunchly are designed to collect, preserve, and organize online evidence, including URLs, timestamps, hashes, notes, screenshots, and page captures. These tools help investigators keep records of pages before they disappear or change.

Hypothetical mistake:

A vendor, forum user, or onion-site admin posts something risky, deletes it an hour later, and assumes it is gone.

Why it matters / OPSEC lesson:

Someone may have already captured the page with Hunchly, Webrecorder, screenshots, or an archive tool. Deleting a post later does not mean it was never saved. Public onion pages, forum posts, screenshots, and profiles may be captured permanently.

3. Onion Service Auditing Tools

Tools:

  • OnionScan
  • OnionScan rewrites / newer forks
  • OnionScout
  • OnionScanner
  • WhatWeb
  • Wappalyzer
  • Shodan / Censys for clearnet infrastructure correlation
  • Nmap, only when used on systems the investigator is
    legally authorized to assess.

How investigators use them:

These tools may be used to identify OPSEC mistakes, misconfigurations, exposed technologies, server banners, linked clearnet resources, reused infrastructure, or technical fingerprints that connect an onion service to another site.

Hypothetical mistake:

An onion service uses the same site title, favicon, server banner, error page, analytics code, or web-app configuration as a clearnet site run by the same person.

Why it matters / OPSEC lesson:

Auditing and fingerprinting tools may notice matching technical details between the onion service and clearnet infrastructure. Putting a website behind Tor is not enough. Server headers, banners, file paths, clearnet resources, reused configs, and exposed metadata can all create risk.

4. Metadata Analysis Tools

Tools:

  • ExifTool
  • Metadata2Go
  • FOCA
  • MAT2 / Metadata Anonymisation Toolkit
  • file
  • strings
  • PDFInfo
  • Local EXIF viewers

How investigators use them:

Metadata tools inspect images, PDFs, documents, archives, and media files for hidden information such as author names, software usernames, timestamps, GPS data, device names, file paths, editing software, and timezone clues.

Hypothetical mistake:

Someone uploads a PDF guide, image, or screenshot that still contains metadata showing an author name, software username, device name, timezone, or file path.

Why it matters / OPSEC lesson:

Metadata tools can reveal hidden information that is not visible when casually viewing the file. Images, PDFs, Office documents, screenshots, and uploads can leak more than what is visibly shown.

5. Clearnet Search Engines and Search Operators

Tools:

  • Google
  • Bing
  • DuckDuckGo
  • Yandex
  • Brave Search
  • Search operators like site:, quotes, usernames, emails, PGP fingerprints, crypto addresses, and unique phrases

How investigators use them:

Investigators use clearnet search engines to look for mirrors, copied text, old posts, pastebin leaks, GitHub repos, reused usernames, PGP keys, contact addresses, social accounts, forum profiles, and branding that appears both on Tor and the clearnet.

Hypothetical mistake:

A person copies the same exact bio, rules page, product description, support text, or unique phrase from an onion profile to a clearnet profile.

Why it matters / OPSEC lesson:

Quoted searches can find unusual repeated wording across different sites. Never mix darknet identities with clearnet identities. One reused handle, phrase, email, or key can connect separate identities.

6. Archive and Historical Capture Tools

Tools:

  • Wayback Machine
  • archive.today / archive.ph
  • ArchiveBox
  • Webrecorder
  • Common Crawl
  • cached search results
  • Hunchly captures
  • screenshots saved by third parties

How investigators use them:

Archive tools can preserve older versions of pages. Investigators may compare old and new versions, recover deleted clues, and find earlier OPSEC mistakes that were later removed.

Hypothetical mistake:

An onion service or clearnet mirror accidentally exposed a contact email, username, crypto address, or server clue months ago, then removed it.

Why it matters / OPSEC lesson:

Old versions may still be saved in archives, screenshots, private captures, or search-engine caches. Fixing a mistake later does not guarantee the old mistake disappeared.

7. Username, Email, and Identity Correlation Tools

Tools:

  • OSINT Framework
  • Sherlock
  • Maigret
  • WhatsMyName
  • SpiderFoot
  • Recon-ng
  • Maltego
  • Holehe
  • GHunt
  • Have I Been Pwned
  • DeHashed / breach-data services, where legally permitted

How investigators use them:

These tools help check whether a username, email, domain, crypto address, PGP fingerprint, or phrase appears across forums, social media, breach data, GitHub, paste sites, public records, or other searchable sources.

Hypothetical mistake:

A user has the same handle across Reddit, GitHub, Telegram, forums, and onion services.

Why it matters / OPSEC lesson:

Correlation tools can quickly check where the same username appears. Even if one match is weak, several matches can create a stronger pattern. Identity reuse is one of the easiest ways to burn anonymity.

8. Blockchain and Crypto Analysis Tools

Tools:

  • Mempool.space
  • Blockchair
  • Blockchain.com explorer
  • BTC.com explorer
  • OXT.me
  • WalletExplorer
  • Blockstream Explorer
  • Chainalysis-style commercial platforms
  • TRM Labs-style commercial platforms
  • Elliptic-style commercial platforms
  • CipherTrace-style commercial platforms
  • Monero block explorers, with the important note that Monero does not expose the same public transaction graph as Bitcoin

How investigators use them:

Investigators may look for address reuse, direct exchange withdrawals, exchange deposits, donation addresses, public vendor addresses, seized wallet addresses, transaction timing, and clustering patterns. This is much easier with transparent chains like Bitcoin than with privacy-focused systems.

Hypothetical mistake:

Someone reuses the same Bitcoin address for donations, market payments, forum tips, and a clearnet profile.

Why it matters / OPSEC lesson:

Transparent-chain activity can be searched and compared. Reused addresses can link activity that was supposed to stay separate. Address reuse, direct exchange-to-market payments, and sloppy wallet behavior can create a permanent public trail.

9. Image and Screenshot Analysis Tools

Tools:

  • Google Lens
  • Yandex Images
  • TinEye
  • Bing Visual Search
  • OCR tools like Tesseract
  • ExifTool
  • FotoForensics
  • InVID / WeVerify
  • Screenshot comparison tools
  • Basic image editing tools for zooming/cropping analysis

How investigators use them:

Investigators inspect screenshots for usernames, browser tabs, bookmarks, local time, language settings, file names, window titles, browser extensions, notification icons, cropped-out content, reused avatars, and reused images.

Hypothetical mistake:

A user posts a screenshot and forgets that it shows browser tabs, bookmarks, a logged-in account name, local time, filenames, or extension icons.

Why it matters / OPSEC lesson:

Small screenshot details can reveal habits, tools, locations, accounts, and other identity clues. Screenshots are dangerous because they often leak background details the poster did not notice.

10. Writing Style, Timing, and Behavioral Pattern Analysis

Tools:

  • JStylo / Anonymouth
  • Writeprints-style stylometry research tools
  • Python NLP libraries like spaCy, NLTK, and scikit-learn
  • Maltego timeline graphs
  • Gephi
  • Obsidian / spreadsheets for timeline mapping
  • Forum post history analysis
  • Manual comparison of slang, spelling, grammar, punctuation, and posting hours

How investigators use them:

Investigators may compare writing style, spelling habits, slang, punctuation, repeated phrases, greetings, sign-offs, posting schedules, time zones, and behavior patterns. They may use these clues to see whether two accounts might be controlled by the same person.

Hypothetical mistake:

A person uses the same unusual spelling, slang, punctuation style, greeting, sign-off, or posting schedule across multiple accounts.

Why it matters / OPSEC lesson:

Writing habits and timing patterns can act like fingerprints, especially when combined with other clues. Your writing style, schedule, and habits can become part of your identity trail.

The Bottom Line is:

Tor protects network traffic, but it does not protect users from bad OPSEC. Most deanonymization comes from mistakes like reused identities, metadata leaks, clearnet overlap, bad server setup, blockchain trails, screenshots, and careless posting.

The point of studying these tools is not to target people. The point is to understand what investigators look for so users can avoid making the same mistakes.

One clue may mean very little by itself, but repeated clues across usernames, PGP keys, metadata, screenshots, crypto addresses, writing style, archives, and infrastructure can create a pattern over time.

#Sources:

https://info.publicintelligence.net/SilkRoadComplaint.pdf

https://www.torproject.org/

https://www.europol.europa.eu/media-press/newsroom/news/massive-blow-to-criminal-dark-web-activities-after-globally-coordinated-operation

https://www.fbi.gov/news/stories/alphabay-takedown

https://www.justice.gov/archives/opa/pr/south-korean-national-and-hundreds-others-charged-worldwide-takedown-largest-darknet-child

https://www.chainalysis.com/blog/investigate-crypto-crime-blockchain-intelligence/

https://www.bellingcat.com/resources/2024/09/24/bellingcat-online-investigations-toolkit

https://osintframework.com/

https://github.com/jivoi/awesome-osint

u/BTC-brother2018 — 3 days ago

Mod Warning: Beware of DM Farming and “Easy Money” Offers

Mod Warning: Beware of DM Farming and “Easy Money” Offers

We’ve noticed posts offering money, including “$100” or similar payments, while directing members to DM the poster.

Please be careful with these. Scammers often use quick-cash offers, crypto/payment offers, “US only” requirements, vague jobs, surveys, account help, or “easy tasks” to move people into private messages. Once in DMs, they may try to collect personal information, login credentials, wallet details, seed phrases, ID photos, payment info, or other sensitive data.

Do not share:

Passwords, login codes, or 2FA codes

Seed phrases, private keys, or wallet screenshots

ID documents, selfies, address, phone number, SSN, birthday, or even your real name

Banking, PayPal, Cash App, Venmo, or crypto account details

Screenshots that expose emails, usernames, balances, wallets, or accounts

A legitimate opportunity should be transparent enough to explain the basics publicly. If someone offers easy money and immediately pushes members to DM them, treat it as a red flag.

If you already shared information:

Change passwords immediately on any affected accounts

Turn on 2FA using an authenticator app when possible

Do not send any more information, money, screenshots, or verification codes

Contact your bank/payment app if you shared financial details

Move crypto to a new wallet if you shared a seed phrase, private key, or wallet backup

Report the user to Reddit and let the mods know

Please report posts or comments that appear to be farming DMs, offering suspicious payments, or asking for sensitive information.

--Mod Team--

reddit.com
u/BTC-brother2018 — 13 days ago