OPSEC Plan Review - Comments Appreciated

Been lurking and prepping for a while would like some feedback on my plan:

 

1.) Running TAILS USB (w/ persistence), likely connecting outside my home network

 

2.) Transfer BTC from Coinbase/Blockchain/paper wallets to Electrum on TAILS (created via TOR, strong seed memorized)

 

3.) Electrum >> DNM wallet

 

4.) Order with all relevant PGP comms

 

5.) Any leftover DNM BTC transferred back to Electrum

 

6.) Storage of TAILS USB in a secure location

 

Thoughts and comments appreciated - was considering "3.5) Tumble" but from what I've gathered sending to an anonymous Electrum wallet provides enough plausible deniability assuming the USB is seized.


Comments


[3 Points] boredraw:

Yeah, that looks pretty good.

Tumbling is a bit of a bone of contention here (I don't do it, but my btc are bought in cash) but the rest looks fine to me.


[2 Points] jadedsynk:

Youll get better feedback from /r/darknetmarketsnoobs


[1 Points] None:

You might be better off with local bitcoins.


[1 Points] thenine9:

OPSEC is a result of threat analysis, so what you implement in terms of OPSEC depends on what you are doing, who your adversary is and what you are defending against.

Going through what you outline is either good or bad depending on if you're buying or vending, running a DNM, buying local or buying international.

No need to tumble if you're just buying - otherwise its pretty straight forward - use either Tails or a virtual machines based environment. TrueCrypt the entire system, separate encrypted container for your password manager, use unique passwords, don't save passwords in the browser, disable flash and javascript, etc. etc.