Navigation

Torzon security checklist

Operational security for Torzon access: device separation, wallet hygiene, phishing detection and basic threat model.

Threat model
ISP + phishing
Focus
Basic → Advanced

Device separation (Tier 1)

Essential
  • Never use your main laptop/desktop
  • VM with snapshot rollback (VirtualBox/VMware)
  • Separate user account, no browser sync
  • Disable Windows Defender real-time scan during session

Live OS (Tier 2)

Recommended
  • Tails OS on USB (8GB+)
  • Amnesic: nothing saved after shutdown
  • Tor Browser pre-installed
  • Persistent volume only for offline mirrors list

Burner hardware (Tier 3)

Paranoid

Physical destruction after use. Only if you have concrete reason to expect targeted surveillance.

Wallet hygiene

  • Single-use Monero wallets per vendor
  • Never reuse deposit addresses
  • Generate offline via official wallets
  • Monero > Bitcoin (privacy)

Phishing red flags

  • Login page design changed
  • Unusual grammar or wording
  • Onion length ≠ 56 chars
  • No /pgp.txt available

Never do this

  • VPN before Tor (leaks to provider)
  • Mobile Tor Browser (fingerprinting)
  • Clicking Telegram/Discord links
  • Screenshots as mirror proof