Without leaving traces behind. What options are there exactly? Do I have any options on the normal web or do I have to start considering the deep web? It’s super important for me that the domain doesn’t lead back to me, so I need an option that doesn't leave breadcrumbs.
On top of your Tor you can never use your normal stuff.
I spent a few days down a YouTube rabbit hole on how they caught various criminals. One guy was using Tor inside a virtual machine and logged into his normal Gmail account, once, and that was enough. Another sent a bomb threat using his schools WiFi. They couldn't use the WiFi to get any information on what he sent because it was forwarded and encrypted. But they could prove that he sent something at the exact same time and packet size as when they received the email, and that was good enough for a conviction.
I am not a computer security guy but my main take away was it's more about how bad and how many resources "they" want to find you.
In case anyone else comes along and sees this, I just want to clarify that in the cases mentioned, it’s correct these mistakes were “enough” to arouse police suspicion, but they were not enough “for a conviction” as the commenter states. For instance, the person who sent the bomb threat literally confessed when asked about it by police. If he’d kept his mouth shut, they probably could not have gotten a conviction.
Reminder to not talk to the police. If there asking something from you it’s because they need it.
*they're
Hi, what YouTube video did they discuss catching cyber crims? Sounds really interesting. You'd think Tor + VM would be secure, but the human element always allows for vulnerability.
I was just randomly jumping between links. I watched 4-6 hrs worth of videos in total... Most of which I didn't understand, but it was a fun dive.
But in that case they must have used a compromised end node, right?
i remember the second example, actually.
that guy wanted to get out of a final exam. (i.e. dipshit)
he got caught because he used tor on the school's network, was the only person on the network using tor at the time, and was a student in the class with the bomb threat.
they didn't do anything to break tor, but used the metadata, basically.
likewise, if you're using tor and log into Gmail on the same circuit at the same time, they can connect your exit IP address.
Tor is great but you need opsec as well.
p.s. the grugq has a lot of good stuff on that topic.