Operational security for darknet markets
The habits and technical measures that separate careful users from easy targets. This guide assumes you already have Tor Browser set up.

OPSEC is about consistent habits, not one-time setup
Most people who get caught on darknet markets don't get caught because of a Tor vulnerability. They get caught because they made a human error: they used a username they'd used somewhere else, they accessed a market from their home WiFi without Tor, or they logged into a personal email in the same browser session. One mistake, once, can be enough.
Operational security is not a software configuration. It is a set of habits you follow every time, even when it feels unnecessary. The moment you skip a step because "it's just this once" is the moment your pattern becomes linkable.
This guide covers the practices that matter most. Some are technical (browser fingerprinting, network isolation). Some are behavioral (credential hygiene, metadata awareness). All of them need to become automatic.
Browser fingerprinting and why Tor Browser fights it
Your browser broadcasts information about itself with every connection: screen resolution, installed fonts, timezone, language settings, WebGL renderer, canvas rendering behavior. Combined, these data points create a fingerprint that is often unique to a single user. Websites can use this fingerprint to track you even without cookies.
Tor Browser defends against this by making all users look identical. It uses a fixed window size, blocks WebGL by default, spoofs font lists, and normalizes JavaScript timing APIs. This only works if you don't modify the browser. Every extension you install, every setting you change, and every time you resize the window, you peel away from the crowd and become identifiable.
The practical rule: don't touch Tor Browser's configuration. Don't install extensions. Don't change the window size. Don't enable accessibility features. Use it exactly as it ships.
JavaScript: the biggest single risk
JavaScript is the language that makes web pages interactive, and it is also the primary tool for browser exploitation. In the "Safest" security level of Tor Browser, JavaScript is completely disabled. Use this setting for all darknet market access.
When JavaScript is enabled, a malicious site can: query your screen resolution and hardware details, measure rendering timing to fingerprint your GPU, attempt to connect to local network services, and — in the worst case — exploit a browser vulnerability to execute code on your machine. The 2013 Freedom Hosting case used a JavaScript exploit in Firefox to send users' real IP addresses to an FBI server. Tor Browser has been hardened significantly since then, but the safest approach is to eliminate the attack surface entirely.
If a market requires JavaScript to function, treat that as suspicious. The major markets (TorZon, Nexus, Black Ops) are designed to work without it.
Network isolation
Tor hides your IP from the destination, but your local network still sees that you connected to the Tor network. Your ISP knows you used Tor, your router logs the connection, and any monitoring on your local network can record the timing.
For most users, this level of exposure is acceptable — your ISP knows you used Tor but not what you did with it. If you need stronger protection, consider these approaches:
Credential hygiene
Every username, password, and recovery phrase you use on a darknet market should exist nowhere else. Not on clearnet sites, not in your email, not in a browser's saved passwords. Cross-site credential reuse is one of the most common ways identities get linked.
Use KeePassXC for password management. It stores passwords in an encrypted local database file — no cloud sync, no online account. Generate a random username and a random 20+ character password for each market. Store the database on an encrypted volume (VeraCrypt on Windows/Linux, or an encrypted APFS volume on macOS).
Your market PGP key should also be unique. Don't use the same PGP identity you use for anything else. Generate a dedicated keypair with no name or email address attached, or use a pseudonym that has no connection to your real identity.
Metadata in files
Every photo, document, and PDF contains metadata: creation date, editing software, sometimes GPS coordinates, sometimes your username from the operating system. If you upload an image taken with your phone, the EXIF data can contain the exact location where the photo was taken.
Before sharing any file, strip the metadata. On Linux, use mat2 (Metadata Anonymization Toolkit) or exiftool -all= filename. On Windows, right-click the file, go to Properties > Details, and click "Remove Properties and Personal Information." On macOS, use the Preview app to export a clean copy, or install ExifTool through Homebrew.
Better yet: avoid sharing files entirely when possible. Text-based communication leaves fewer traces than file attachments.
Session separation
Tor Browser isolates circuits per domain, which means traffic to different .onion addresses takes different paths through the network. But this isolation has limits. If you visit a market and then open DuckDuckGo in the same session, timing analysis could theoretically correlate the two activities.
The safest practice: use Tor Browser only for darknet activity. Use a completely separate browser (or a separate device) for clearnet browsing. Never log into a personal account — email, social media, anything — from the same Tor Browser instance you use for markets.
When you're finished with a session, close Tor Browser entirely. It clears all cookies, history, and cached data on exit. Don't use "New Identity" as a substitute for a full restart — it resets circuits but doesn't clean up all browser state.
Physical security considerations
Software protections mean nothing if someone can physically access your device. Full-disk encryption is the minimum. On Windows, enable BitLocker. On macOS, FileVault is enabled by default on modern systems. On Linux, use LUKS encryption during installation.
If your threat model is serious, keep your darknet activity on a separate device or USB drive running Tails. When not in use, the drive can be stored separately from your main device. A powered-off Tails USB contains no data — the operating system runs entirely in RAM.
Lock your screen when you step away. Set a short auto-lock timeout. These are basic habits but they matter more than any software configuration.
What actually gets people caught
Looking at public case records and court documents from darknet-related arrests, the patterns repeat: