No announcement yet.

Sam Bent - Tor: Darknet Opsec By a Veteran Darknet Vendor

  • Filter
  • Time
  • Show
Clear All
new posts

  • Sam Bent - Tor: Darknet Opsec By a Veteran Darknet Vendor

    Sam Bent - Tor: Darknet Opsec By a Veteran Darknet Vendor & the Hackers Mentality
    Sam Bent aka DoingFedTime, aka 12189-082 aka 2happytimes2 aka killab, He/Him
    Presentation Title: Tor: Darknet Opsec By a Veteran Darknet Vendor & the Hackers Mentality
    Length of presentation: 45 minutes

    War Story

    The hacking subculture's closest relative is that of the Darknet. Both have knowledgeable people, many of whom are highly proficient with technology and wish to remain somewhat anonymous. They are both composed of a vast amount of introverts and abide by the same first rule: “Don’t get caught." Both tend to love Sun Tzu quotes as well. What happens when the hacker mentality discussed in the Hackers Manifesto is applied to things such as OpSec on the Darknet?

    Over the past decade, there have been many DEF CON talks that have discussed Tor and the Darknet. None have ever come from a Darknet vendor. The approach was more academic, as opposed to economical. Having a background in IT, Infosec, and hacking, the goal is to present a unique perspective from a hacker’s point of view, as we look at how the hacker mentality applied functions in various hostile environments such as a Darknet Vendor, staff member of multiple Darknet Markets, and co-found of Dread, who then later would be a federal prisoner. Shortly after, he talks about how he was able to get himself out of federal prison 3 years early.

    All of which was possible through the reconnaissance of various systems and methodologies. From the anticipated linguistical analysis that the feds were making of posts on Darknet forums to how to write a motion to a federal judge from a prison cell in order to make him understand what it was like there, we will take a journey through a variety of interesting places and times from a tour guide with unparalleled experience and access.

    By focusing less on the basics of Tor and more on how insiders operate within it, we will uncover what it takes to navigate this ever-evolving landscape with clever OpSec. In addition to seeing what happens if you get caught. All through the perspective of the hacker spirit that refuses to submit.

    Speaker Bio:

    Former admin and co-founder on Dread Forum (Darknet), staff on multiple Darknet sites, Darknet vendor: 2happytimes2, lockpicker, hacker, hak5 enthusiast, admin (Clearnet), Sam Bent spends his days writing technical manuals and doing graphics (using all Adobe Products) for the company he works for, while also doing federal prison consulting on the side. He is a certificated paralegal. Runs his blog where he does federal prison consulting, is currently about to publish a book on compassionate release for federal prisoners, and runs multiple youtube channels. He is a student in college,

    He has been in the scene for almost 20 years. He has written multiple guides and published numerous whitepapers and how-to’s on hacking, including one article written in combination with r4tdance (of #suidrewt) published on packetstomsecurity called A Newbies Guide To The Underground Volume 2. Sam Bent’s former handles include killab, 2happytimes, 2happytimes2, and most recently, DoingFedTime.

    Reddit (my subreddit):
    Sites: , ,
    All Hacking Cons: ,
    Doing FedTime: ,


    DNM (Darknet Market Bible) A great starting point for research into the Darknet, how it really operates, and how others operate securely:
    Current Darknet Market News site, great for research to see OpSec mistakes of those who have been busted by the feds:
    Decentralized peer-to-peer network open-source BTC trading network with no KYC and tor by default
    Current major Darknet markets/forums and online status
    Department of Justice press release - Dark Web Drug Dealer Sentenced to Five Year Prison Term:

    Last edited by number6; July 12, 2022, 16:15.

  • #2
    I am amped. Very excited about this.