Ideally, there is a dedicated process or at least a dedicated VM for your darknet pursuits. Keep the darknet PGP keys and various credentials limited to that method only, will not mix it with any actions that will expose your identification. The process fails to down load or install any on the applications. In some instances, it is actually not