Plausible Deniability and OPSEC

Hey darknetters, it was suggested that I xpost this from /r/darknetmarketsnoobs, as some here may have some additional input.

I've removed some questions thanks to some helpful input from /u/galaxyandspace.

1) I've established that using a private network is much more secure than using public or open wifi in terms of traffic interception and monitoring. It's also been suggested that an ethernet connection would be less succeptible to snooping. That being said, what are the additional risks/consequences of using your private home network for darknet activities? I know some people here do, but I've also heard some say, "omg NEVER use your own network bro, time to burn your house down and move!"

Obviously, your ISP would be aware that you're viewing encrypted data through the TOR network, but can they specifially see that packets/connections are comming from .onion sites, for example? If so, it seems like this would greatly decrease one's plausibile deniability? If not, there are many legitimate uses for TOR and I imagine plausbile deniability is still tangible.

2) If someone chooses to go the route of Coinbase > dark blockchain 1 > dark tumbler > dark blockchain 2 > market, this would seem to be minimally sufficient to cut traceability to those Coinbase btc. In terms of being 'forced' to account for the fate of these coins, would a simple "nunya fuckin biz get a warrent" suffice (but more politely)? Or is it a good idea to also make clearnet purchases/donations w/ btc?

3) Obviously using unique credentials and PGP keys for each market is good OPSEC. Is there a significant increase in security in never reusing credentials or PGP keys per purchase? I know that this would destroy any relationship with a vendor, but would this offer additional security?

Lastly, 4) Just curious about an approval or criticism of the general procedure: get btc through method listed in #2, add a disposable laptop w/ no paper trail to owner, TAILS live usb, hard drive and battery pulled, wired into personal private network, unique market credentials and strong PGP key. Is this adequate? Overkill? Dead on middle road?

Sorry for the long winded post, I really appreciate your patience if you read up until this point. Any input is greatly appreciated. You guys are awesome and I'm quite grateful for this resource.

TL;DR

1) How bad is it to use your own home network for dnm? Is it better than open, unsecured wifi? How does this affect plausible deniability?

2) Does one need a backstory for where your Coinbase coins ended up? Plausible deniability on this?

3) Does one gain a good deal of security through using unique credentials and pgp keys per transaction, or is this unecessary paranoia?

4) Tumbled btc + burner laptop(no hd) + TAILS + wired network + strong credentials/pgp = good security?

Thanks so much and I'm really looking forward to seeing everyone's input and responses.

e: links & formatting & stuff


Comments


[5 Points] al_eberia:

1) Traffic to hidden services is completely indistinguishable from any other Tor traffic. There are even many legitimate uses for hidden services, I'm using one right now to connect to a VPS because I am too lazy to point a domain at it/secure the services on it enough to face the open internet. Also, your ISP will only know you are using Tor if it specifically monitors for traffic to known Tor servers. Tor traffic is specifically designed to blend in with normal SSL traffic. Your home network will be fine to use.

2) First, replace the second blackchain account with a electrum wallet. You don't want to keep coins sitting in a wallet hosted by anyone else. Even if you are transferring coins on from it immediately, an electrum wallet will let you transfer any change back from the market (don't leave a cent on any market). Making a few other transfers from the Coinbase account would be a good if unnecessary idea, I would stick to donations so as to not link your address to any clearnet transactions if a merchant leaks/gets hacked.

3) The only increase in security would be if a market gets completely compromised and you are making numerous bulk transactions, as the market stats would show you are likely a dealer/reseller, and thus make the authorities give you more attention. Unless you are spending tens of thousands of dollars, don't bother.

4) The disposable laptop is overkill, as TAILS is specifically designed not to leave any traces of its use on the hardware it runs on. Having a specific setup like that would raise questions during any raid/search. Just stick with a normal laptop.


[1 Points] iLoveDNM:

Use tor at home for random web viewing, not just dark net markets.

You sold your bitcoins to someone for cash via Craigslist.

Reusing the pgp key isn't the biggest deal, but in the event of multiple sites being compromised they could tie your accounts together.

That sounds great.


[1 Points] None:

You can never have enough security, ask my friends in jail how much security they used. haha


[0 Points] NotLuke7:

That'll do pig