r/darknet_questions

Crypto/ Wallet Question

After reading the Noobs Guide and other online info, I’m fairly confident with my knowledge of PGP encryption, OPSEC, and general use of Tails. What I don’t understand is what the correct way to go about getting crypto in order to transfer to Feather. Do I just outright use my regular card to buy crypto and move it around a few wallets? I’ve never used crypto before. I hope this post is appropriate as far as the rules go for this sub.

reddit.com
u/Beginning_Bad5968 — 23 hours ago

Dark Web OSINT Tools Investigators Use to Find OPSEC Mistakes

Remember that

Dark web investigations usually do not involve “breaking Tor.” More often, investigators connect public clues: reused usernames, PGP keys, metadata, exposed server details, blockchain mistakes, clearnet mirrors, screenshots, writing style, and repeated behavior patterns.

This post is for education and defensive OPSEC awareness only. Do not use OSINT to dox, harass, threaten, stalk, or target anyone.

1. Onion Search Engines

Tools:

  • Ahmia
  • Torch
  • Haystak
  • OnionLand Search
  • DarkSearch
  • Fresh Onions / onion index mirrors when available

How investigators use them:

Investigators search onion indexes for usernames, site names, market names, PGP fingerprints, crypto addresses, contact info, repeated phrases, mirrors, scam clones, and old forum posts.

Hypothetical mistake:

A user posts on one onion forum as BlueCrow92, then uses the same username on another onion forum, a Reddit account, or a clearnet forum.

Why it matters / OPSEC lesson:

A search engine can index those public pages. Searching the username later may show multiple accounts connected by the same handle. Do not reuse usernames, site names, bios, PGP keys, contact info, or unique phrases across different platforms.

2. Evidence Capture and Case Documentation Tools

Tools:

  • Hunchly
  • Webrecorder
  • Browser screenshots
  • SingleFile browser extension
  • ArchiveBox
  • Obsidian / Joplin for note organization
  • Maltego case graphs

How investigators use them:

Tools like Hunchly are designed to collect, preserve, and organize online evidence, including URLs, timestamps, hashes, notes, screenshots, and page captures. These tools help investigators keep records of pages before they disappear or change.

Hypothetical mistake:

A vendor, forum user, or onion-site admin posts something risky, deletes it an hour later, and assumes it is gone.

Why it matters / OPSEC lesson:

Someone may have already captured the page with Hunchly, Webrecorder, screenshots, or an archive tool. Deleting a post later does not mean it was never saved. Public onion pages, forum posts, screenshots, and profiles may be captured permanently.

3. Onion Service Auditing Tools

Tools:

  • OnionScan
  • OnionScan rewrites / newer forks
  • OnionScout
  • OnionScanner
  • WhatWeb
  • Wappalyzer
  • Shodan / Censys for clearnet infrastructure correlation
  • Nmap, only when used on systems the investigator is
    legally authorized to assess.

How investigators use them:

These tools may be used to identify OPSEC mistakes, misconfigurations, exposed technologies, server banners, linked clearnet resources, reused infrastructure, or technical fingerprints that connect an onion service to another site.

Hypothetical mistake:

An onion service uses the same site title, favicon, server banner, error page, analytics code, or web-app configuration as a clearnet site run by the same person.

Why it matters / OPSEC lesson:

Auditing and fingerprinting tools may notice matching technical details between the onion service and clearnet infrastructure. Putting a website behind Tor is not enough. Server headers, banners, file paths, clearnet resources, reused configs, and exposed metadata can all create risk.

4. Metadata Analysis Tools

Tools:

  • ExifTool
  • Metadata2Go
  • FOCA
  • MAT2 / Metadata Anonymisation Toolkit
  • file
  • strings
  • PDFInfo
  • Local EXIF viewers

How investigators use them:

Metadata tools inspect images, PDFs, documents, archives, and media files for hidden information such as author names, software usernames, timestamps, GPS data, device names, file paths, editing software, and timezone clues.

Hypothetical mistake:

Someone uploads a PDF guide, image, or screenshot that still contains metadata showing an author name, software username, device name, timezone, or file path.

Why it matters / OPSEC lesson:

Metadata tools can reveal hidden information that is not visible when casually viewing the file. Images, PDFs, Office documents, screenshots, and uploads can leak more than what is visibly shown.

5. Clearnet Search Engines and Search Operators

Tools:

  • Google
  • Bing
  • DuckDuckGo
  • Yandex
  • Brave Search
  • Search operators like site:, quotes, usernames, emails, PGP fingerprints, crypto addresses, and unique phrases

How investigators use them:

Investigators use clearnet search engines to look for mirrors, copied text, old posts, pastebin leaks, GitHub repos, reused usernames, PGP keys, contact addresses, social accounts, forum profiles, and branding that appears both on Tor and the clearnet.

Hypothetical mistake:

A person copies the same exact bio, rules page, product description, support text, or unique phrase from an onion profile to a clearnet profile.

Why it matters / OPSEC lesson:

Quoted searches can find unusual repeated wording across different sites. Never mix darknet identities with clearnet identities. One reused handle, phrase, email, or key can connect separate identities.

6. Archive and Historical Capture Tools

Tools:

  • Wayback Machine
  • archive.today / archive.ph
  • ArchiveBox
  • Webrecorder
  • Common Crawl
  • cached search results
  • Hunchly captures
  • screenshots saved by third parties

How investigators use them:

Archive tools can preserve older versions of pages. Investigators may compare old and new versions, recover deleted clues, and find earlier OPSEC mistakes that were later removed.

Hypothetical mistake:

An onion service or clearnet mirror accidentally exposed a contact email, username, crypto address, or server clue months ago, then removed it.

Why it matters / OPSEC lesson:

Old versions may still be saved in archives, screenshots, private captures, or search-engine caches. Fixing a mistake later does not guarantee the old mistake disappeared.

7. Username, Email, and Identity Correlation Tools

Tools:

  • OSINT Framework
  • Sherlock
  • Maigret
  • WhatsMyName
  • SpiderFoot
  • Recon-ng
  • Maltego
  • Holehe
  • GHunt
  • Have I Been Pwned
  • DeHashed / breach-data services, where legally permitted

How investigators use them:

These tools help check whether a username, email, domain, crypto address, PGP fingerprint, or phrase appears across forums, social media, breach data, GitHub, paste sites, public records, or other searchable sources.

Hypothetical mistake:

A user has the same handle across Reddit, GitHub, Telegram, forums, and onion services.

Why it matters / OPSEC lesson:

Correlation tools can quickly check where the same username appears. Even if one match is weak, several matches can create a stronger pattern. Identity reuse is one of the easiest ways to burn anonymity.

8. Blockchain and Crypto Analysis Tools

Tools:

  • Mempool.space
  • Blockchair
  • Blockchain.com explorer
  • BTC.com explorer
  • OXT.me
  • WalletExplorer
  • Blockstream Explorer
  • Chainalysis-style commercial platforms
  • TRM Labs-style commercial platforms
  • Elliptic-style commercial platforms
  • CipherTrace-style commercial platforms
  • Monero block explorers, with the important note that Monero does not expose the same public transaction graph as Bitcoin

How investigators use them:

Investigators may look for address reuse, direct exchange withdrawals, exchange deposits, donation addresses, public vendor addresses, seized wallet addresses, transaction timing, and clustering patterns. This is much easier with transparent chains like Bitcoin than with privacy-focused systems.

Hypothetical mistake:

Someone reuses the same Bitcoin address for donations, market payments, forum tips, and a clearnet profile.

Why it matters / OPSEC lesson:

Transparent-chain activity can be searched and compared. Reused addresses can link activity that was supposed to stay separate. Address reuse, direct exchange-to-market payments, and sloppy wallet behavior can create a permanent public trail.

9. Image and Screenshot Analysis Tools

Tools:

  • Google Lens
  • Yandex Images
  • TinEye
  • Bing Visual Search
  • OCR tools like Tesseract
  • ExifTool
  • FotoForensics
  • InVID / WeVerify
  • Screenshot comparison tools
  • Basic image editing tools for zooming/cropping analysis

How investigators use them:

Investigators inspect screenshots for usernames, browser tabs, bookmarks, local time, language settings, file names, window titles, browser extensions, notification icons, cropped-out content, reused avatars, and reused images.

Hypothetical mistake:

A user posts a screenshot and forgets that it shows browser tabs, bookmarks, a logged-in account name, local time, filenames, or extension icons.

Why it matters / OPSEC lesson:

Small screenshot details can reveal habits, tools, locations, accounts, and other identity clues. Screenshots are dangerous because they often leak background details the poster did not notice.

10. Writing Style, Timing, and Behavioral Pattern Analysis

Tools:

  • JStylo / Anonymouth
  • Writeprints-style stylometry research tools
  • Python NLP libraries like spaCy, NLTK, and scikit-learn
  • Maltego timeline graphs
  • Gephi
  • Obsidian / spreadsheets for timeline mapping
  • Forum post history analysis
  • Manual comparison of slang, spelling, grammar, punctuation, and posting hours

How investigators use them:

Investigators may compare writing style, spelling habits, slang, punctuation, repeated phrases, greetings, sign-offs, posting schedules, time zones, and behavior patterns. They may use these clues to see whether two accounts might be controlled by the same person.

Hypothetical mistake:

A person uses the same unusual spelling, slang, punctuation style, greeting, sign-off, or posting schedule across multiple accounts.

Why it matters / OPSEC lesson:

Writing habits and timing patterns can act like fingerprints, especially when combined with other clues. Your writing style, schedule, and habits can become part of your identity trail.

The Bottom Line is:

Tor protects network traffic, but it does not protect users from bad OPSEC. Most deanonymization comes from mistakes like reused identities, metadata leaks, clearnet overlap, bad server setup, blockchain trails, screenshots, and careless posting.

The point of studying these tools is not to target people. The point is to understand what investigators look for so users can avoid making the same mistakes.

One clue may mean very little by itself, but repeated clues across usernames, PGP keys, metadata, screenshots, crypto addresses, writing style, archives, and infrastructure can create a pattern over time.

#Sources:

https://info.publicintelligence.net/SilkRoadComplaint.pdf

https://www.torproject.org/

https://www.europol.europa.eu/media-press/newsroom/news/massive-blow-to-criminal-dark-web-activities-after-globally-coordinated-operation

https://www.fbi.gov/news/stories/alphabay-takedown

https://www.justice.gov/archives/opa/pr/south-korean-national-and-hundreds-others-charged-worldwide-takedown-largest-darknet-child

https://www.chainalysis.com/blog/investigate-crypto-crime-blockchain-intelligence/

https://www.bellingcat.com/resources/2024/09/24/bellingcat-online-investigations-toolkit

https://osintframework.com/

https://github.com/jivoi/awesome-osint

u/BTC-brother2018 — 2 days ago
▲ 14 r/darknet_questions+8 crossposts

I have been conducting my academic thesis on dark web. For a successful research I need as many as possible global response from people who have at least once visited the dark web. Anonymity and confidentiality of respondants will strictly be maintained and all data will solely be used for the research. Data will be collected till Mid-May. So if u r willing to participate, please share your valuable knowledge in this survey. Here is the link:

https://docs.google.com/forms/d/e/1FAIpQLSdL3i2wPDwF9xBhnjsxqDMUxlQWulmzVWma0BwUEzIutwDDBA/viewform?usp=sharing&ouid=117765215647328380606

Thank you.

u/Chocolate_cupcake07 — 6 days ago

Covd vax

Anyone know of anyone that offer the covd vax? I can’t get it for health reasons and know there has to be a couple drs out there that offer them for $

Edit: I don't really want the vax I just need the card with real lot numbers and for it to be reported so I can use it for work

reddit.com
u/Desnicoleee — 6 days ago

PGP encryption Q’s

i’m trying to setup pgp messaging and the tutorial wants to me set it up using an email address, assuming i want to encrypt emails. i do not want to attach an email address to my messaging as the messaging i will be doing does not take place over email. i purely want my pub/priv keys and a way to decrypt/encrypt messages. I am using PGPSuite as i am on macOS. is there a better software to use or a simpler method? thanks.

reddit.com
u/donttrustjack1 — 8 days ago

"New to the darknet — looking for guidance and tips"

Hi everyone,

I'm completely new to the darknet and just starting to explore. So far I've set up Tor Browser, a VPN, and a ProtonMail address. I've managed to visit a few sites — nothing crazy, just whatever was easy to find without much knowledge. My technical skills are pretty basic, but I'm genuinely curious and eager to learn.

I'm interested in hacking communities and cybersecurity, artificial intelligence, and potentially ways to earn money or crypto. I'm not here for drugs, weapons, or anything like that — purely curious about the technical and community side of things.

I have a few questions :

  • What are the essential tools or habits for a beginner who wants to stay safe ?
  • Where can I find serious and trustworthy communities to learn from ?
  • Are there good resources (forums, sites) to get started with cybersecurity on the darknet ?
  • Any advice on earning crypto legitimately through skills or services ?

I'm French-speaking, so if anyone wants to guide me in French, that's a bonus — but English is totally fine too.

Thanks in advance for your patience and advice !

reddit.com
u/SauriiK- — 10 days ago

Thoughts about tormart and awazon and other darknet marketplaces for buying electronics ?

So I've been browsing these marketplaces and I've found a good amount of places where to buy stuff like crypto miners, iphones... and im genuinely thinking about diging deep into that to find out if they're scams or not. Im posting this here to see if anyone has any experience with these places and have already bought from them.

reddit.com
u/endless-war — 10 days ago

Would you browse and or login to dread on an android device through tor browser?

I'm not talking about engaging in any I l l e g a l activity. I just love the freedom of Dread to talk about "whatever" openly. Reminds me to some degree of reddit when I first found it.

But I want to use it conveniently on my phone. Not sure this is a wise decision.

reddit.com
u/Historical_Tale3499 — 13 days ago

Mod Warning: Beware of DM Farming and “Easy Money” Offers

Mod Warning: Beware of DM Farming and “Easy Money” Offers

We’ve noticed posts offering money, including “$100” or similar payments, while directing members to DM the poster.

Please be careful with these. Scammers often use quick-cash offers, crypto/payment offers, “US only” requirements, vague jobs, surveys, account help, or “easy tasks” to move people into private messages. Once in DMs, they may try to collect personal information, login credentials, wallet details, seed phrases, ID photos, payment info, or other sensitive data.

Do not share:

Passwords, login codes, or 2FA codes

Seed phrases, private keys, or wallet screenshots

ID documents, selfies, address, phone number, SSN, birthday, or even your real name

Banking, PayPal, Cash App, Venmo, or crypto account details

Screenshots that expose emails, usernames, balances, wallets, or accounts

A legitimate opportunity should be transparent enough to explain the basics publicly. If someone offers easy money and immediately pushes members to DM them, treat it as a red flag.

If you already shared information:

Change passwords immediately on any affected accounts

Turn on 2FA using an authenticator app when possible

Do not send any more information, money, screenshots, or verification codes

Contact your bank/payment app if you shared financial details

Move crypto to a new wallet if you shared a seed phrase, private key, or wallet backup

Report the user to Reddit and let the mods know

Please report posts or comments that appear to be farming DMs, offering suspicious payments, or asking for sensitive information.

--Mod Team--

reddit.com
u/BTC-brother2018 — 12 days ago

incorrect transaction execution

let’s hypothetically say someone accidentally sent XMR directly from their personal kraken wallet straight to their TorZon balance. how screwed are they? and is there anything they can do about it?

reddit.com
u/donttrustjack1 — 11 days ago

Rant + Question

From what I’ve seen, I’ve generally preferred DarkMatter because the overall experience feels better than most markets. The UI, layout, and general usability are honestly pretty solid.

That said, I’ve also had autofinalize expire before because I straight up couldn’t access the site anymore. I tried public links, private links, refreshed forever, then eventually gave up, only to later realize AF had run out. So yeah, it definitely has its garbage moments too.

What confuses me is DrugHub.

UI-wise, I think it could use a major upgrade, but accessibility-wise it seems way more reliable. They basically have one public link that consistently works. I don’t have to sit there cycling through mirrors or opening 20 tabs hoping one loads.

So my question is: why can DrugHub apparently make this system work while DarkMatter (and a lot of other markets using multi-link mirrors) struggle so much?

Is there some technical/security reason for the multi-link system? Different DDoS protection/infrastructure? Or is DrugHub just handling things differently behind the scenes?

I know DrugHub has private links too, but honestly I never even bothered because the public one already works fine for me.

reddit.com
u/ToughZealousideal431 — 13 days ago