1. Identity Isolation
Complete segregation between your real-life identity (clearnet) and your Tor identity is the foundation of operational security. Cross-contamination is the primary vector for deanonymization.
- Zero Reuse: Never reuse usernames, passwords, or PGP keys from clearnet sites, forums, or previous darknet accounts.
- Information Blackout: Absolutely strictly prohibit the sharing of personal contact info, real names, geographical hints, or social media handles.
- Dedicated Environment: Conduct all research and platform interaction strictly within the Tor Browser or a dedicated TailsOS environment. Never open downloaded files while connected to the internet.