• 0 Posts
  • 54 Comments
Joined 16 days ago
cake
Cake day: May 7th, 2026

help-circle

  • Physical surveillance is barely even circumstantial evidence of the crimes we’re talking about, Hndl troves are incontrovertible. People get caught using monero to do crimes all the time.

    Of course if you dress up like the hamburgler you’re gonna stick out. Just look normal.

    I did not intend to fight you about this, the point of my reply was to provide some context about the often overlooked physical side of things.

    We very often overlook the physical because we think it’s too unknown and that we understand the digital much better but in many years I’ve never met a person who thought that way and could explain in detail how the web works or why certificates are scrubbed.

    Keep your nose clean out there, you never know whose gonna be looking in 20 years…







  • You are not following the point I’m making:

    The account you buy on the darknet works because the rest of the internet already associated it with an identity. That means law enforcement has cause to investigate the new user for impersonation or id theft. It doesn’t matter if they can’t get you for id theft or impersonation on a technicality, they’re already investigating you at that point! Law enforcement attention is what you don’t want!

    It’s like using your neighbors car with an expired tag because you don’t want to have your car show up on the highway cameras.


  • It varies by jurisdiction but if the reseller you bought from is selling you an account used by some other person for some personally identifiable thing (which is why the internet at large trusts that account and why you bought it!) then you’re at the very least toeing the line of Id theft or impersonation and while the cops might not be able to get you for that particular crime they will absolutely have enough suspicion to investigate you and discover other crimes or even just watchlist you.

    I don’t care if you break the law from a moral or ethical standpoint, but it can cause you problems from a practical one.








  • May I interest you in the “ln” command?

    Usually if you wanna access a file (or a directory, that’s a file too!) from some place other than where it is in the filesystem you make a link using ln like “ln /mnt/target link_name”. Which would give you a link type file (that shows up as a link when you give -l to ls) called “link_name” which references “/mnt/target” when you try to do something to it (Like ls!).