Your OPSEC needs to match your actual threat. A casual reader needs less than a repeat vendor operating at volume.
For most buyers using Torzon as occasional users, the eight steps above are sufficient. But if your threat model includes targeted monitoring — meaning someone with motivation and resources is specifically looking for you — additional measures are worth the friction they add.
Operating system
Tails OS is the simplest upgrade. It boots from a USB drive, routes all traffic through Tor by default, and leaves no trace on the host computer after shutdown. Nothing written to disk, everything in RAM, wiped on every restart. The Electronic Frontier Foundation recommends Tails as a baseline for journalists and at-risk individuals globally.
Whonix is a two-virtual-machine architecture: the "Workstation" VM has no direct network access — all traffic routes through the "Gateway" VM, which connects only to Tor. Running Whonix inside Qubes OS provides the strongest currently available configuration for high-risk use cases.
Messaging and side channels
Use Signal for any side-channel communication that must cross the clearnet. For messaging that requires no phone number at all, Briar routes messages through Tor with no central server. Encrypted email through Proton Mail handles correspondence that can't avoid email.
Correlation prevention
Never browse clearnet and privacy network simultaneously in the same browser session. Log out of all clearnet accounts — especially Google and Facebook — before opening Tor Browser. These platforms are designed to track session activity across tabs. A single logged-in Google tab is enough to correlate timing patterns with your Tor traffic.
Check for DNS leaks after connecting: run a DNS leak test from a reputable checker within the Tor session. If results show your ISP's servers, your configuration has a gap. For a Mullvad VPN subscription — which accepts Monero — this adds one more layer between your ISP and your Tor entry node.
Mobile devices
Mobile OPSEC is structurally weaker than desktop. Phones have sensors, always-on network connections, and operating systems that weren't designed with adversarial threat models in mind. If mobile is unavoidable, use Tor Browser for Android from F-Droid only. Don't use Chrome-based or Safari-based alternatives. And never mix privacy network browsing sessions with regular mobile use on the same device. For more detailed guidance, see the Platform Info page covering Torzon's security architecture.