[02] Comprehensive Operational Security (OpSec) Manual
INTRODUCTION: OpSec is not a product you buy; it is a mindset you adopt. In the context of Torzon Market, OpSec refers to the rigorous process of separating your digital footprint from your physical identity. A single mistake—such as logging in from a smartphone or reusing a username—can lead to de-anonymization. This manual is compiled from the "Darknet Bible" and updated for the threat landscape of 2026.
THE GOLDEN RULE: COMPARTMENTALIZATION
Your "Darknet Identity" and your "Real Life Identity" must be two parallel lines that never intersect. Do not use your darknet laptop for Spotify. Do not use your darknet password for Gmail. Do not tell your friends what you are doing.
PHASE 1: HARDWARE & ENVIRONMENT
1.1 The Operating System (Tails OS)
Using Windows, macOS, or standard Linux (Ubuntu) is strictly prohibited for safe trading. These OSs constantly phone home with telemetry data.
Solution: Use Tails (The Amnesic Incognito Live System). Tails forces all outgoing connections through Tor and blocks non-Tor traffic. Crucially, it leaves no trace on the computer's hard drive because it runs entirely from RAM. Once you shut down, the RAM is flushed, and the session is gone forever.
1.2 The Dedicated Device
Ideally, purchase a cheap, used laptop for cash. Remove the hard drive, the webcam, and the microphone. Tape over ports you don't use. Never connect this device to your home Wi-Fi without a bridge, or better yet, use public Wi-Fi (far from your home) with a high-gain antenna.
PHASE 2: NETWORK HYGIENE
2.1 Tor Over VPN? (The Controversy)
Many "VPN review" sites suggest using a VPN with Tor. This is marketing, not security. If you use a VPN, the VPN provider can see you are connecting to Tor. If the VPN is subpoenaed, they can hand over connection logs.
Recommendation: Use Tor Bridges (obfs4). Bridges are private Tor entry nodes that disguise Tor traffic as random encrypted noise. This hides the fact that you are using Tor from your ISP.
> Network Settings > Configure > "Tor is censored in my country"
> Select "Select a built-in bridge" > "obfs4"
PHASE 3: FINANCIAL SOVEREIGNTY (MONERO)
3.1 Why Bitcoin is Obsolete
Bitcoin's blockchain is public. Tools like Chainalysis Reactor can visualize the flow of funds. If you send BTC from Coinbase to Torzon, Coinbase knows you sent money to a darknet entity.
3.2 The Monero (XMR) Workflow
Monero uses Ring Signatures to mix your transaction with others on the protocol level.
- Step 1: Buy Litecoin (LTC) or Bitcoin (BTC) on an exchange.
- Step 2: Use a non-KYC swap service (like SwapSpace or MajesticBank) to convert BTC -> XMR.
- Step 3: Send XMR to your personal GUI Wallet (on Tails).
- Step 4 (Churning): Send the XMR to yourself (from your main address to a sub-address). This breaks any potential heuristic links.
- Step 5: Send to Torzon.
PHASE 4: LOGISTICS & THE DROP
4.1 The Address Format
Always encrypt your address using PGP (see Section 03). Use the following format:
NAME (Must match the mailbox)
STREET ADDRESS
CITY, STATE, ZIP
COUNTRY
4.2 Controlled Delivery (CD) Indicators
A CD is when law enforcement delivers the package to arrest you upon acceptance.
- Indicator A: The mail carrier is different than usual.
- Indicator B: Signature required for a package that shouldn't need one.
- Indicator C: The package looks opened and resealed ("Inspect" tape).
Protocol: If you suspect a CD, refuse the package. "I didn't order this, return to sender." If you accept it, do not open it. Write "Return to Sender" on it and leave it by the door. If raided, claim ignorance.