Portal Safety Tutorials Tools Updates

Privacy & Security Setup

Critical tools and configurations for anonymous online operations

Tor Browser Setup

About Tor Network

Tor Browser enables anonymous web browsing via onion routing protocol, concealing user identity and geographic location through multi-hop encrypted connections across distributed relay network. Required for .onion domain access and maintaining operational anonymity.

Linux Installation

# Retrieve Tor Browser package
wget https://www.torproject.org/dist/torbrowser/14.0/tor-browser-linux-x86_64-14.0_ALL.tar.xz

# Extract downloaded archive
tar -xf tor-browser-linux-*.tar.xz

# Change to browser directory
cd tor-browser

# Launch application
./start-tor-browser

macOS Installation

# Via Homebrew package manager
brew install --cask tor-browser

# Alternative: Manual download
# Visit torproject.org/download
# Mount .dmg and copy to Applications folder

Windows Installation

Obtain installation package from official Tor Project and execute .exe installer. Proceed through setup wizard with default settings.

Essential Configuration

Tools

VPN Implementation

VPN Purpose

Virtual Private Networks encrypt internet traffic and obscure network addresses. While Tor handles .onion routing, VPN integration provides additional privacy layer for standard internet activity and ISP traffic obfuscation.

Privacy-Focused Services

Mullvad Setup (Linux)

# Fetch Debian package
wget https://mullvad.net/download/app/deb/latest -O mullvad.deb

# Install package and dependencies
sudo dpkg -i mullvad.deb
sudo apt install -f

# Start application
mullvad-vpn

ProtonVPN Command Line (Linux)

# Install using pip
pip3 install protonvpn-cli

# Run initialization
protonvpn init

# Connect to optimal server
protonvpn connect --fastest

# Check status
protonvpn status

# Disconnect
protonvpn disconnect

VPN + Tor Setup

Recommended order: You → VPN → Tor → Internet

  1. Connect to VPN first
  2. Launch Tor Browser
  3. Access .onion sites through Tor

Note: This prevents your ISP from seeing Tor usage, but the VPN provider can see you're connecting to Tor (though not what you're doing).

Tools

PGP/GPG Encryption

Why PGP?

Pretty Good Privacy (PGP) and its open-source implementation GNU Privacy Guard (GPG) provide end-to-end encryption for messages. Essential for secure communication on darknet platforms.

Installation

# Debian/Ubuntu
sudo apt-get update
sudo apt-get install gnupg

# macOS (using Homebrew)
brew install gnupg

# Verify installation
gpg --version

Generate Key Pair

# Generate key (interactive)
gpg --full-generate-key

# Choose options:
# - Key type: RSA and RSA (default)
# - Key size: 4096 bits
# - Expiration: 1-2 years recommended
# - Enter your email and passphrase

Export Public Key

# List keys
gpg --list-keys

# Export public key (ASCII armored)
gpg --armor --export your@email.com > pubkey.asc

# Display public key
cat pubkey.asc

Encrypt & Decrypt

# Encrypt a message
echo "Secret message" | gpg --encrypt --armor -r recipient@email.com > message.asc

# Encrypt a file
gpg --encrypt --armor -r recipient@email.com file.txt

# Decrypt
gpg --decrypt message.asc

Sign & Verify

# Sign a message
echo "Message" | gpg --clearsign > signed.asc

# Verify signature
gpg --verify signed.asc

Best Practices

Tools

Tails OS (Advanced)

What is Tails?

Tails (The Amnesic Incognito Live System) is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. It runs from a USB drive and leaves no trace on the computer.

Key Features

Installation

  1. Download Tails ISO from tails.boum.org
  2. Verify the download using PGP signatures
  3. Create bootable USB using Etcher or dd command
  4. Boot from USB (may need to change BIOS settings)
# Create bootable USB (Linux/macOS)
# WARNING: This will erase all data on the USB drive
# Replace /dev/sdX with your USB device

sudo dd if=tails-amd64-5.8.img of=/dev/sdX bs=4M status=progress
sync

Tools

Additional Security Tools

Whonix

Operating system designed for anonymity. Runs in virtual machines with all traffic forced through Tor.

KeePassXC (Password Manager)

Open-source, offline password manager with strong encryption.

# Install KeePassXC
sudo apt-get install keepassxc  # Debian/Ubuntu
brew install keepassxc           # macOS

VeraCrypt (Disk Encryption)

Free, open-source disk encryption software for creating encrypted volumes.

OPSEC Best Practices

Operational Security Guidelines

Further Reading