School wifi

I am trying to dip my feet into the world that is the dark market. Is it possible to do so when using a network that is owned by a college university? If so, are there any extra precautions i need to take to ensure my safety? Thanks.


Comments


[18 Points] TrippinDraper:

if your school uses any type of network authentication, then do not do this. I work for a university on the eastern side of the USA and at least at the institution i'm at they generally keep pretty tight control of the networks because of the frequency of copyright violations that noobish freshman get. Not worth the risk at all.

If it's a school that just has public WiFi that requires no meaningful login, just use TAILs and you'll be fine with a spoofed MAC address in a reasonably public place.


[9 Points] sapiophile:

Using WiFi that isn't tied to your name is a great way to (usually) improve your anonymity. You should be able to use Tor as you would on any network, although if the network you're on blocks Tor, you may have to use a Tor Bridge to access the network. There is good info available about using Tor Bridges online.

HOWEVER, it is then very important that you use a spoofed MAC Address for your wireless card when connecting. Not all wireless cards support this, either. If you're using Tails, which you should be anyway, one of the "More Options" available when you boot and opt to look at them is MAC Spoofing. Note that the system may not inform you whether or not the spoofing was successful, so proceed with caution. It may pay to invest in a wireless card that is fully supported with Free, Libre Software, like one made by Atheros. They're available on eBay (and elsewhere) for less than $10.


[6 Points] None:

Doing illicit shit on phones while using public WiFi or better yet government WiFi is better than sex imho


[3 Points] drimilr:

Sort of a report for visibility, but the grugq's .io and his tumblr are fantastic and now I have a link and the proper spelling of his name. He pops up on reddit sometimes.

His .io has an analysis of the opsec failures of the Harvard student who sent in a bomb threat to his school using Harvard's wifi and then tor. He does go on to explain how his near immediate bust could have been avoided by proper opsec (off campus wifi, loose clothing, hat, and on)

Linky: http://grugq.github.io/blog/2013/12/21/in-search-of-opsec-magic-sauce/


[2 Points] None:

Me, personally, I wouldn't do it directly from my dorm room, maybe in a populated area. /r/darknetmarketsnoobs can show you how to be a successful anonymous DNM browser/user and give you any tips you're looking for. Look into tails OS, it's an operating system that is linux-based that runs through the onion router for an extra layer of security, it's a great anonymity tool. It's easily downloaded on a flashdrive or CD and easily booted. There are tutorials for it on /r/darknetmarketsnoobs. Learn about PGP as well, so your messages can be encrypted. Good luck and I hope I was able to help a bit.


[2 Points] Axaq:

They can see Tor use and a lot of school networks have your screens monitored so they can watch exactly what you are doing, this is a really bad idea and there is an endless list of reasons why.


[1 Points] drimilr:

Thegroq or however you spell his name has an excellent write up on the Harvard student who sent in a bomb threat to the school. He used tor. He had to sign into the WiFi with his Harvard credentials. He got picked up the same day I think.

Anyways, thegroq's analysis is a great write up for opsec purposes and plus he writes well


[1 Points] SgtFaecesProcessor:

Honestly, as others have said, I'd be wary. If you have a laptop, go off campus and do it there. Simple enough. That being said when I was at uni in the UK on a wired connection I made up to 10 orders from DNMs from a uni location. Only one package didn't seem to come first time but that was domestic, was only diazepam and I wouldn't say it was the best vendor I've had the pleasure to do business with. Plus I got the "reship".

So I wouldn't necessarily avoid it altogether but I'd be cautious.

As for where you intend to get it delivered it honestly depends. When I lived on campus I got a very good idea of how mail was delivered quite quickly. I buy a shitton online so nothing that could get me in trouble. Plus there were staff there that had other jobs too. No security whatsoever where I lived. Then you could wait until you're home during breaks or get it sent off campus.


[1 Points] RepliesToDickPics:

I would definitely avoid using TOR on a uni network. Network traffic is easily and routinely monitored, just the fact that someone is using TOR is likely to make them a blip on IT's radar out of policy. Unless you're connecting to a vpn or some other proxy before connecting to TOR, IT observing network traffic can tell you're using TOR.

Fucking starbucks man.