Depends on what you wanna do with TOR. If you wanna be anonymous in your regular internet browsing and torrents, go with a good quality paid for VPN with no logs, like mullvad or proton. You don’t need TOR at all. You’re not worth the hassle.
If you’re trying to commit chill crimes like ordering drugs online, then you should probably look up the DNM bible. Just TOR and maybe a bridge is enough probably, if people where you live in don’t use TOR. LEO can’t see your traffic but if you’re the only one using TOR in your neighborhood, it’s pretty easy to pin you.
If you’re a journalist and you’re about to piss off a powerful government, you probably need a bridge and TOR and a laptop with no hard drive. You will probably need some self hosted machines to obfuscate your traffic which you will need to recycle really often. You shouldn’t use a phone. You also need a lot of money and a lot of help, specially in countries that are against the country you’re pissing off. Opsec becomes a full time job, depending on how many friends you have.
If you’re trying to run a drug empire or distribute CSAM, getting caught is merely a question of when no matter what you use, because even politically divergent countries and organizations will unite to put you in jail, even if they’re normally on the crime side of things. Nobody likes CSAM distributors and drug empires usually don’t make a lot of friends and make way too much money to keep the ones they do.
A dude got caught making bomb threats at Harvard because he was the only one in his university that connected to TOR and they knew from the entry node it had to be from that area. They checked the logs and only one PC had directly connected to the TOR network from that area at that time. The guy wanted more time to study.
And a separate flash with your password database, PGP keyring and an encrypted files vault. If you need to go or to destroy/hide evidence, a flash drive is much easier, specially when the task force going after you is more worried about hard drives and laptops and usually gloss over flash drives at least initially.
I feel like anyone who has to do anything that “deep cover” is probably doing some hyper aggressive prevention techniques as well like creating a botnet and their own “private” Tor which they recycle machines frequently, or using stolen/compromised VPS and only connecting to it via proxy chains, or something similarly complex.
deleted by creator
Depends on what you wanna do with TOR. If you wanna be anonymous in your regular internet browsing and torrents, go with a good quality paid for VPN with no logs, like mullvad or proton. You don’t need TOR at all. You’re not worth the hassle.
If you’re trying to commit chill crimes like ordering drugs online, then you should probably look up the DNM bible. Just TOR and maybe a bridge is enough probably, if people where you live in don’t use TOR. LEO can’t see your traffic but if you’re the only one using TOR in your neighborhood, it’s pretty easy to pin you.
If you’re a journalist and you’re about to piss off a powerful government, you probably need a bridge and TOR and a laptop with no hard drive. You will probably need some self hosted machines to obfuscate your traffic which you will need to recycle really often. You shouldn’t use a phone. You also need a lot of money and a lot of help, specially in countries that are against the country you’re pissing off. Opsec becomes a full time job, depending on how many friends you have.
If you’re trying to run a drug empire or distribute CSAM, getting caught is merely a question of when no matter what you use, because even politically divergent countries and organizations will unite to put you in jail, even if they’re normally on the crime side of things. Nobody likes CSAM distributors and drug empires usually don’t make a lot of friends and make way too much money to keep the ones they do.
deleted by creator
A dude got caught making bomb threats at Harvard because he was the only one in his university that connected to TOR and they knew from the entry node it had to be from that area. They checked the logs and only one PC had directly connected to the TOR network from that area at that time. The guy wanted more time to study.
so tails os on a flash drive with olny floss programs and the duck mp3 player from the dankpods video
And a separate flash with your password database, PGP keyring and an encrypted files vault. If you need to go or to destroy/hide evidence, a flash drive is much easier, specially when the task force going after you is more worried about hard drives and laptops and usually gloss over flash drives at least initially.
I feel like anyone who has to do anything that “deep cover” is probably doing some hyper aggressive prevention techniques as well like creating a botnet and their own “private” Tor which they recycle machines frequently, or using stolen/compromised VPS and only connecting to it via proxy chains, or something similarly complex.