Should we consider our addresses burnt as optimal OPSEC?

Back on Friday when a lawyer did an AMA, he talked about the concept of there needing to be a plausability of the item being at the location it was shipped to in order to grant a warrant. If they had a record of 1g being shipped 7/1, how likely is it to be there on 7/30, for example. That legal concept leads me to believe it might be in LE's better interest to simply flag you for CD on a next delivery. I read an article not long ago that tallied all of the "legal issues" experienced by people from the markets, but those numbers honestly seemed low. I know it's just anecdotal evidence, but people seem to be posting about knowing someone directly getting a CD pretty often on here? Yeah, they usually don't know what they're talking about and are fairly new accounts, but that's a sign it's occurring. Do we have a way of searching the major metropolitan area db's to see how many cd's / warrants occurring for controlled substances, and skimming how many of then mention dnm's? Can any anon good-opsec USPS comment on the frequency you've seen CD's conducted?

Would Le getting just your name/address be enough for a warrant for them to view all of your incoming mail and open it (is that a thing)? If they can't open it, can drug dogs smell through a few layers of seals, or does vendor OPSEC prevent that? If not, would LE then be guessing at your mail simply based on visuals? It would seem ordering off ebay/etsy would help "test" an address, would it not, essentially try and trigger false alarms?

Even for personal amounts, I can't help but feel uncomfortable of LE seeing pack after pack of a personal amount coming through, even a 1% chance. It almost makes me want to buy on the street, but again that's part of the psychological warfare. But for real, about the topic, what percentage of us at some point are going to use our real names and real addreses again? Even if we had optimal OPSEC, or near-perfect (I used hansa-provided public pgp key, but it was a lesser target item).

They can only look at 10,000 addresses for so long,right?And I guess the 10,000 number is likely inflated, and global. So that tells us a great number of orders werent compromised. I imagine if more public pgp keys had been swapped, it would be higher. Or was I the only one that used a hansa public pgp key in July?


Comments


[2 Points] NoFreedomWoAnonymity:

Better to be safe than sorry. Consider it burnt and move on. Reconsider using it again in maybe 6 months from now. A 1% chance is pretty damn high, good OPSEC should put your confidence at 0% chance of shit hitting the fan.


[1 Points] None:

If you were making rather large fuck me in the ass orders then yes play it safe you moron.