Ultimate TOR + Tails Security Discussion - /g/ (#106158348) [Archived: 265 hours ago]

Anonymous
8/6/2025, 5:03:56 AM No.106158348
pepe-matrix
pepe-matrix
md5: 526d9dd45b1b66b53ffc0ff9e7e75b02🔍
For those suffering from censorship and tyranny or who fear censorship and tyranny in the future, this thread is for you.

This is a thread where we can discuss the dark web and the various methods of accessing it, while also maintaining security.

Here's what I know about the basics of dark web security:
>Install Tails OS on a USB stick
>Turn off your computer of choice and plug the USB stick in
>Turn on computer but before it botts to Windows/MAC, press your BIOS key repeatedly to open the BIOS menu (for mne its F10 but it might be different for you)
>Find the boot order section of your BIOS menu and place the USB stick/flash drive boot sequence above your OS so that it boots into Tails instead of your base OS
>Launch Tails with default settings
>Connect to your wifi, do whatever to set up your internet access, then when launching the TOR browser (this should be switched to something not based on Firefox later on), select the "Safer" or "Safest" setting in the top right by clicking on the shield
And that's as far as I've gotten.

I've heard talk that contraty to popular belief, using certain VPN's is actually GOOD since it can obfuscate your location if you're the only person in a 50 mile radius using it. However, I am not sure if it is something that is necessarily always ghood to use. Furthermore, I have been told that using a WPA3 router is a must for maximum security on the dark web, but I'm not sure why. Anyone able to illucidate me on these questions or correct me if I'm wrong? Any help is appreciated, thanks in advance.

Feel free to discuss.
Replies: >>106158373 >>106158440 >>106158464 >>106158473 >>106160152 >>106160547 >>106160629 >>106161072
Anonymous
8/6/2025, 5:06:53 AM No.106158373
>>106158348 (OP)
Also sorry for typos, I'm not used to this new keyboard lol
Anonymous
8/6/2025, 5:15:14 AM No.106158440
>>106158348 (OP)
Bump
Anonymous
8/6/2025, 5:19:07 AM No.106158464
>>106158348 (OP)
BUUUMP
Anonymous
8/6/2025, 5:20:17 AM No.106158473
>>106158348 (OP)
I don't see what the difference between this and making an encrypted luks container on an existing computer really is in practice.
Replies: >>106159926 >>106160152
Anonymous
8/6/2025, 5:36:42 AM No.106158575
youre brown and retarded and nobody gives a fuck what you do online
Replies: >>106158751
Anonymous
8/6/2025, 6:08:58 AM No.106158751
>>106158575
>nobody gives a fuck what you do online
The most retarded take I've ever witness on this board. You're a winner sir.
Anonymous
8/6/2025, 9:48:11 AM No.106159926
>>106158473
Tails guarantees not to touch your existing disks. Also everything is routed through tor. You don't have to worry about metadata like browsing history and cached images being stored outside the encrypted partition.
Replies: >>106160681
Anonymous
8/6/2025, 10:27:00 AM No.106160152
>>106158348 (OP)
Use tor bridges if you wanna obfuscate the fact you're connecting to tor.
But tor won't help you use websites that actively ban tor traffic, since website can tell which of their users are using tor.

>>106158473
Tails OS has a particular usecase in mind, they're targetting journalists and people always moving. You can use something like whonix in a VM if you wanted a tor based OS.
Replies: >>106160681
Anonymous
8/6/2025, 11:36:02 AM No.106160547
>>106158348 (OP)
> use different language than the country you're from.
>either use different resolution than your monitor's or never fullscreen the browser.
Replies: >>106160681 >>106160681 >>106160790
Anonymous
8/6/2025, 11:51:24 AM No.106160629
>>106158348 (OP)
what kind of porn do you like, anon? and why is it 'p?
Replies: >>106160681
Anonymous
8/6/2025, 12:01:15 PM No.106160681
>>106159926
Noted, thank you. I was wondering what impact it might have on the disk compared to Qubes, if any at all

>>106160152
I considered using a bridge, but through some research determined that it's not really needed if you're not the only person in some very large area using it (so if you're in NYC you're probably good without it). Also, as far as I know bridges are much more needed by countries that have made using Tor illegal (like Iran), so if possible I wanna save that bridge spot for someone who needs it far more. Please let me know if any of this is wrong or if there is any other benefit to using bridges other than hiding Tor use from my ISP.

>>106160547
> use different language than the country you're from.
Actually good idea for if my device is ever compromised, but I'm a filthy Amerimutt who doesn't speak a second language fluently so

>>106160547
>either use different resolution than your monitor's or never fullscreen the browser.
I actually didn't think of this surprisingly, thank you for the info!

>>106160629
I haven't really used Tor or anything like Tails or Qubes other than when I was curious to try it when I was like 13, but now with the entire international community seemingly trying to clamp down on internet freedom and monitoring everyone all at once, I've gotten more serious about what I say and on what services. I hope to have a second machine that runs on Qubes indefinitely (I did some more research and realized that Qubes is better than Tails for security), so I'll be switching to that once I get a second device with more RAM and storage. Also, I'm not a 'p degenerate, but even if I was isn't it basically inevitable you get caught for doing dumb shit long enough? Correct me if I'm wrong.

Also, thank you guys for all the advice and help. Please let me know anything else you think might help given all the previous discussion, as well as the fact that I now plan to eventually move to Qubes once I get a second device with better specs.
Replies: >>106160702 >>106160702 >>106160782
Anonymous
8/6/2025, 12:05:16 PM No.106160702
>>106160681
>>106160681
>Please let me know if any of this is wrong or if there is any other benefit to using bridges other than hiding Tor use from my ISP.
This is how I understand it. I think you're right overall.
Replies: >>106160796
Anonymous
8/6/2025, 12:21:01 PM No.106160782
>>106160681
Hellp, OP again. I figured I'd drop some more info that could help out anyone else who's kind of a noob about this stuff like me that has not yet been discussed here:
>On Tor, every time you open a new site (whether in the same tab or a new one), start a new circuit (new set of entry node (guard node), middle node, and exit node). Each tab will operate on a different VPN circuit, making it far more difficult to track your activity and determine your identity that way. You can start a new curcuit on Tor by clicking the settings dots in the top right and clicking Start a New Circuit (it'll say something like that).
>Disable JavaScript whenever possible using the Safest option on Tor. Many of the vulnerabilities on the Dark Web tak advantage of injecting malware into your system using JavaScript, so unless you're on some normal site like Reddit or YouTube, be extremely careful with which sites you use JavaScript on. Many DW sites are functional without JS for this purpose, so stick to sites that function without JS as much as possible, as they are generally more trustworthy in this way.
>Use a WPA3 router. I'm not sure why exactly from a technical perspective, other than they're supposedly more secure, which is always a bonus.
>Use .onion versions of sires whenever possible (it'll automatically give you the option in the right side of the address bar if it's available)
>For any purchases you make on the dark web, to stay anonymous use both a mix of XMR (Monero, arguably the most secure cryptocurrency there is), and some other relatively harder to track crypto, like Bitcoin, etc. Note: again, always use a mix of 2+ cryptos with XRM being the main one whenever possible!!! I have no idea why on a technical level, but somehow this makes you harder to track.

Cont.
Replies: >>106160787
Anonymous
8/6/2025, 12:22:10 PM No.106160787
>>106160782
*Hello

>As I mentioned in a previous reply, I have realized that Qubes is best for maximum security. So instead of using Tails, use Qubes. This is what I will be switching to eventually.

Anything else I missed? Any info and advice is appreciated, thank you!
Replies: >>106160799
Anonymous
8/6/2025, 12:22:32 PM No.106160790
>>106160547
>>either use different resolution than your monitor's or never fullscreen the browser.
Not a concern anymore and if it was Tor would still have forced resolutions
Replies: >>106160817
Anonymous
8/6/2025, 12:23:12 PM No.106160796
>>106160702
Awesome, good to know. Thanks for confirming!
Anonymous
8/6/2025, 12:23:23 PM No.106160798
I wonder who has had the best opsec and still gotten caught? It seems like everyone who gets busted was doing something dumb like selling drugs from their actual email address. It would be nice to know just how capable glowies actually are.
Replies: >>106160815 >>106160817
Anonymous
8/6/2025, 12:23:32 PM No.106160799
>>106160787
>>As I mentioned in a previous reply, I have realized that Qubes is best for maximum security. So instead of using Tails, use Qubes. This is what I will be switching to eventually.
That really depends, for noobs it's better to stick with tails
Replies: >>106160836
Anonymous
8/6/2025, 12:25:49 PM No.106160815
>>106160798
Probably Buster Hernandez? Maybe there was a bigger flaw in his opsec which the feds didn't see or use. However, big cases don't get reported in much detail and would be more in regards to international politics or terrorism.
Anonymous
8/6/2025, 12:26:02 PM No.106160817
>>106160790
>Not a concern anymore
Not a concern anymore like this is an issue I don't have to worry about, or you resolved this on your own?
>and if it was Tor would still have forced resolutions
Like Tor as in just Tor without any Tails/Qubes system? Cause if I use Tor in Qubes then I can just change the Qubes window resolution right?

>>106160798
Yeah, this. I didn't wanna be the one to ask "How easy is it to get away with illegal shit" cause that's a dirty towel I don't have to wear, but if shit really hits the fan and I have to use Crypto it's worth knowing. But yeah every story I've heard has been something like accidentally using personal info, or letting their guard down and using JS on a trapped website, etc.
Replies: >>106160835 >>106160835
Anonymous
8/6/2025, 12:28:27 PM No.106160835
>>106160817
>Not a concern anymore like this is an issue I don't have to worry about, or you resolved this on your own?
I'm not OP. I just don't see it as a problem.
>>106160817
>Like Tor as in just Tor without any Tails/Qubes system?
Yes, if you open the Tor browser now you'll see that it doesn't spoof a resolution anymore.
>Cause if I use Tor in Qubes then I can just change the Qubes window resolution right?
Yeah
Replies: >>106160844
Anonymous
8/6/2025, 12:28:43 PM No.106160836
>>106160799
>That really depends, for noobs it's better to stick with tails
Then I shall work to not be a noob, cause if there's a more secure system I'm going for it
Anonymous
8/6/2025, 12:30:02 PM No.106160844
>>106160835
Hi, OP here. Yeah, I guess the resolution thing is really only an issue if you're so compromised that you might as well burn the whole OS anyways. Even then, though, I'll be switching to Qubes so I'll have it at less than fullscreen resolution anyhow.
Anonymous
8/6/2025, 12:33:48 PM No.106160873
tor is available for windows 10 too though
Replies: >>106160894 >>106160937
Anonymous
8/6/2025, 12:36:52 PM No.106160894
>>106160873
There's no way I'd use windows if I were handling data that makes the three letter folk upset.
Anonymous
8/6/2025, 12:44:01 PM No.106160937
>>106160873
Yeah, but that's like building a barricade for yourself in a larger trap. The point of TailsOS, Qubes, etc. is to make your entire internet presence anonymous and secure. Windows monitors what you do at all times and has deliberately programmed in zeroday vulnerabilities and backdoors that only the US Government can take advantage of (at your own expense, of course). Hence, TailsOS and Qubes, etc.
Anonymous
8/6/2025, 1:02:00 PM No.106161044
guys
stop telling normies about internet 2.0
they will ruin that too
Anonymous
8/6/2025, 1:08:05 PM No.106161072
>>106158348 (OP)
This will be blocked at the ISP level by next year. All of it.