First and foremost, this is MY talk at Defcon 30 – on Tor, and Darknet Opsec by a veteran Darknet Vendor & the Hackers Mentality War Story The hacking subculture’s closest relative is that of the Darknet.

Both have knowledgeable people, many of whom are highly proficient with technology and wish to remain somewhat anonymous. They are both composed of a vast amount of introverts and abide by the same first rule: “Don’t get caught.” Both tend to love Sun Tzu quotes as well. What happens when the hacker mentality discussed in the Hackers Manifesto is applied to things such as OpSec on the Darknet? Over the past decade, there have been many DEF CON talks that have discussed Tor and the Darknet. None have ever come from a Darknet vendor.

The approach was more academic, as opposed to economical. Having a background in IT, Infosec, and hacking, the goal is to present a unique perspective from a hacker’s point of view, as we look at how the hacker mentality applied functions in various hostile environments such as a Darknet Vendor, staff member of multiple Darknet Markets, and co-found of Dread, who then later would be a federal prisoner. Shortly after, he talks about how he was able to get himself out of federal prison 3 years early. All of which was possible through the reconnaissance of various systems and methodologies. From the anticipated linguistical analysis that the feds were making of posts on Darknet forums to how to write a motion to a federal judge from a prison cell in order to make him understand what it was like there, we will take a journey through a variety of interesting places and times from a tour guide with unparalleled experience and access.

By focusing less on the basics of Tor and more on how insiders operate within it, we will uncover what it takes to navigate this ever-evolving landscape with clever OpSec. In addition to seeing what happens if you get caught. All through the perspective of the hacker spirit that refuses to submit. Speaker Bio: Former admin and co-founder on Dread Forum (Darknet), staff on multiple Darknet sites, Darknet vendor: 2happytimes2
lockpicker
hacker
hak5 enthusiast
haxme.org admin (Clearnet)
social engineer
student

Sam Bent spends his days writing technical manuals and doing graphics (using all Adobe Products) for the company he works for, while also doing federal prison consulting on the side. He is a certificated paralegal. Runs his blog where he does federal prison consulting, is currently about to publish a book on compassionate release for federal prisoners, and runs multiple youtube channels. He is also a college student. He has been in the scene for almost 20 years.

He has written multiple guides and published numerous whitepapers and how-to’s on hacking, including one article written in combination with r4tdance (of #suidrewt) published on packetstomsecurity called A Newbies Guide To The Underground Volume 2. Sam Bent’s former handles include:

killab, 2happytimes, 2happytimes2, and most recently, DoingFedTime.

Facebook: https://www.facebook.com/doing.fedtime

Twitter: https://twitter.com/DoingFedTime

Reddit (my subreddit): https://www.reddit.com/r/theFeds/

Sites: https://www.doingfedtime.com , https://2happytimes2.com , https://haxme.org/

Youtube: All Hacking Cons: https://www.youtube.com/c/allhackingcons/

My website is: https://doingfedtime.com

Facebook: https://www.facebook.com/doing.fedtime/

Twitter: https://twitter.com/DoingFedTime Linkedin: https://doingfedtime.com/www.linkedin.com/in/doingfedtime Email for business inquiries is: ksllc27@gmail.com #darknet #defcon30 #defcon #opsec #federalprisonconsultant #tor #darknetvendor #hacker #hackers #hackerspirit

Big thanks goes out to cwade12c of Haxme.org for recording the live stream and sending it to me!