Darknet OpSec Checklist 2025 – The Non-Negotiable Security Guide
A hardened, step-by-step operational security checklist for accessing the darknet safely in 2025.
This Darknet OpSec Checklist is written for a hostile environment. Assume phishing, scams, surveillance, and user error are constant threats. In 2025, most darknet compromises happen due to bad operational security—not software failures.
Use this checklist before, during, and after accessing Tor or onion services. Skip steps at your own risk.
Threat Model (Read This First)
Your primary risks on the darknet include:
- Phishing mirrors and fake onion links
- Deanonymization through reused identities
- Browser fingerprinting and metadata leaks
- Malicious downloads and document exploits
- Social engineering and vendor scams
Phase 1: Device & Operating System OpSec
- Use a dedicated device or OS profile for darknet activity
- Prefer Linux, Tails, or Whonix over Windows
- Fully update your OS before any Tor usage
- Disable unnecessary services, Bluetooth, and peripherals
- Never mix darknet activity with daily-use environments
Phase 2: Network & Connection OpSec
- Use Tor Browser only (no regular browsers)
- Do not use Tor over workplace, school, or monitored networks
- Use bridges if Tor usage is censored or monitored
- Never torrent, stream, or background-download while using Tor
Phase 3: Tor Browser Configuration Checklist
- Download Tor Browser only from torproject.org
- Set Security Level to Safer or Safest
- Never install browser extensions or add-ons
- Do not resize the browser window
- Disable JavaScript on unknown onion services
Phase 4: Identity & Account OpSec
- Create a unique darknet identity (username, password, writing style)
- Never reuse emails, usernames, or passwords
- Never log into personal accounts over Tor
- Do not discuss real-world details (location, habits, timezones)
- Use PGP for authentication and sensitive communication
Phase 5: Onion Links & Phishing Defense
- Bookmark verified onion links only
- Never trust links from DMs, ads, or random comments
- Check onion URLs character-by-character
- Expect constant phishing attempts—especially for markets
Phase 6: Files, Downloads & Metadata
- Avoid downloading files whenever possible
- Never open documents while online
- Assume PDFs, images, and ZIPs can be malicious
- If unavoidable, open files offline in a disposable VM
Phase 7: Financial & Transaction OpSec
- Prefer Monero (XMR) over transparent blockchains
- Never reuse wallets across identities
- Understand escrow vs finalize-early risks
- Do not rush transactions due to pressure tactics
Phase 8: Behavioral OpSec (Most People Fail Here)
- Never act emotionally or urgently
- Do not overshare or seek validation
- Assume all communication is logged forever
- Trust processes, not people
Final OpSec Checklist Summary
Tor and the darknet are neutral tools. Your safety depends entirely on discipline and consistency. Most compromises are slow, boring, and self-inflicted.
If you follow this checklist rigorously, you dramatically reduce your risk profile in 2025.