Guide to the dark web 2022

D

Deleted member 11126

Kraken
Joined
Dec 4, 2020
Posts
11,736
Reputation
14,363
(Warning anything illegal you access is on you and your security depends on how high profile you are if you are a famous criminal or activist these tips might not work) I do not condone any illegal activity
Feel free to skip the first part if you aren't curious about how the tech works (but this will help you understand it more)

How does Tor actually work? It's similar to a VPN... VPNs send your IP address to a VPN provider then the VPN provider spits out their own VPN IP and sends it to the website you are accessing. Think of your IP like an address it basically identifies you online and a lot of details about you every website you go to knows your IP address and keeps logs of this. So you can sort of imagine it like sending mail if you were to do it with a VPN it would be like sending your mail to a company that acts as an intermediary so that the person who receives the mail does not know your real address only the intermediary (VPN).

Why Tor is superior to a VPN... VPN's are companies at the end of the day with real locations. They also likely keep logs of your IP its still better then just using your naked IP but you trust your IP with a company that would sell you out for advertisers or if the government put pressure on them. Tor on the other hand does not work like this. The mailing example I used earlier imagine the same scenario but your mail gets sent to 5 or 10 different people before reaching the target. Also every time you send new mail you can randomize it so you send it to more people each time. Your IP bounces around to 10 different locations in different countries and you can change the locations every minute if you want. There are tens of thousands of computers that bounce tor signals every minute in a hundred countries.
1666890586800

This is not impossible to break but it has been shown that it costs the government millions to catch a lot people. You most likely are not worth millions to catch. If you don't make stupid mistakes its likely this will be an effective way of securely browsing the web. Most of the people who are caught fail because of human error.

tldr: Tor works by bouncing your signal across multiple randomly generated IPs

There are many ways you can access Tor you can literally look up on google.com tor download and download it on windows but this will not always be secure. It depends what you are doing but here are the 3 main ways to do it from least safe to most safe.

#1 Download the tor browser from the internet on your main operating system. This way is generally unsafe because operating systems like windows have been known to spy on people. Also most people have some sort of malware of keylogger which renders tor pointless. It doesn't matter if the website cannot track you if but windows can record your screen and pull up the data of what you are typing.

#2 Whonix on a virtual machine... A virtual machine can be thought of as a simulated computer inside your computer. Whonix is a software that only allows Tor to be run inside it that means any application used via the internet must run through tor. It also protects you against some malwares. But this is also limited since viruses have been known to still be able to get information for a virtual machine OS. Also virtual machine itself does store information and data on you.

#3 Tails. This software is the best hands down. https://tails.boum.org/ This is the link to install it this will take you sometime to do it so I will not give step by step instructions all you need is a flash drive with 4GB or higher and any computer that isn't 10 years old. The only thing I recommend is to make sure you do it right but if you follow the instructions it shouldn't be tampered with in the first place.

Why is Tails the best? It works only from a flashdrive meaning your the software does not stay on your computer. Tails is what is known as "bootable drive" basically it can work on any computer once its in the start up mode you can plug in a flashdrive and it will automatically make the computer run an OS similar to Whonix that only runs things through TOR. The best part is you do not even need your own computer you could borrow a friends computer and connect to tails as soon as the flash drive is removed all memory of the interaction is wiped forever. Its extremely portable and leaves no trace the minute it is pulled out. It bypasses malware too since the computer can only run what is on the flash drive as long as you download the proper tails software on the drive there is virtually no way a virus on a computer could effect it.

tldr: Tails is basically Whonix but better and can be done on any computer.

So assuming you've installed one of these softwares that let you access tor I will go over the basics. There still are ways that information can be collected even without knowledge of your IP. The first thing you should always do is turn the tor security settings to the max mode. This looks like a shield always turn it on safest mode this will disable Java Script which is really important. Many websites will not work when you disable java script like youtube ect. It depends what your goals are with accessing Tor but if you are on sketchy sites never enable javascript.
1666893528400

You can always reset your identity if you feel it could be compromised so don't worry too much on clearweb sites. But if you are on onion sites (which are basically sites that can only be accessed with tor) its a bad idea. Javascript can tell a lot about you and if you visit a site consistently they will be able to easily trace it back to you. Another way they do this is through screen size. If your screen is full sized they can understand what computer type you have based on the size of the screen.

Tldr: Disable Javascript do not keep a full screen turn setting to safest always.

Most people get caught for stupid reasons. If you write info about yourself on a forum it can be used to eventually track you down. Even a word format can narrow you down so if you have a specific way you always write try not to use it. Don't write too much info about yourself when its tied to accounts. If you have an actual account somewhere try to say as little correlating information as possible. Modern AI can identify writing structures we use with only 3 paragraphs of your writing sampled. So try your best to write as efficiently as possible and if you can use a different format.

Using tor in a specific place. A famous case where someone got caught was a Harvard student who accessed tor to email a bomb threat in order to get out of an exam. The student was caught because there was only one tor connection in the hour he sent it out and it came from his dorm room and correlated down to the second with the bomb thread. The kid also failed because he admitted rather then getting a good lawyer (so he might have gotten out of it with plausible deniability they had no proof he did it until he admitted it) they could not prove he was the one that sent it but the internet providers do know tor is being used and the time frame so they know the exact time you used it. Everytime you use tor your internet provider knows tor is being used just not what for.

Here is the link the Harvard Tor case. Its interesting at the end of the day the kid played himself they only knew he accessed tor exactly at the same time the bomb threats occurred but there was no concrete proof he did it. But also in his case he should have used a bridge or went to a coffee shop.

Ways around this would be using a bridge(essentially a way to try and disguise your internet activity as clear web) or going to a public place with wifi. Like a coffee shop just make sure to wear a mask and pick a spot away from cameras. But most likely if you aren't doing something outright illegal (which I don't recommend whether or not you can do it you shouldn't) there is no reason to connect to a bridge or go to a coffee shop because you aren't Edward Snowden or running a Silk road site. But if you are using a Uni wifi and you do something that only someone at that location would know about it might narrow you down so either go to a cafe or don't do anything area specific or retarded like send a bomb threat.

Last note this also will all depend on what you are doing. If the government is actively spending money to get you then you will need to do a lot more and I can't help you. But if you just want to buy some weed this will work fine.

That's really it I probably missed some stuff so check out the channels "TheHatedOne" and "Mental Outlaw". Also know just reading this thread put you on a government list good luck :)
 

Attachments

  • 1666893486400.png
    1666893486400.png
    9 KB · Views: 0
Last edited:
  • +1
Reactions: MongolTurk, flippasav, Deleted member 24347 and 8 others
 
  • +1
  • JFL
Reactions: pentamogged9000 and MaxillaMaxing
high effort but this guide will only be used by pedophiles like @height to watch cp (cheese pizza)
 
  • JFL
  • +1
  • Woah
Reactions: Ranjeet Dipshit, pentamogged9000, Hentaiwatcher69 and 7 others
high effort but this guide will only be used by pedophiles like @height to watch cp (cheese pizza)
Would not recommend doing evil things like that. The weird thing is there is probably more cp floating around on discord then tor.

This guide is purely for security and privacy
 
  • +1
  • JFL
Reactions: Hentaiwatcher69, mogging, Deleted member 19036 and 2 others
Wait so is tor the dark web?
 
  • +1
Reactions: Sondern and Deleted member 11126
Would not recommend doing evil things like that. The weird thing is there is probably more cp floating around on discord then tor.

This guide is purely for security and privacy
can you make money on deepweb? Or is that a meme
 
Wait so is tor the dark web?
The darkweb is kinda a made up term. Its not some crazy shit its mostly boring stuff and a few fucked up things mostly scams and a few legit drug markets.

Darkweb just means the side of the web that cannot be accessed through a traditional browser.
 
  • +1
Reactions: mogging and Erik-Jón
The darkweb is kinda a made up term. Its not some crazy shit its mostly boring stuff and a few fucked up things mostly scams and a few legit drug markets.

Darkweb just means the side of the web that cannot be accessed through a traditional browser.
What are fun things to do on the darkweb
 
Will a hitman show up at my house if I go there
 
Ahhh the dark web I remember the days I used to browse sites on there to buy Fullz
 
  • JFL
Reactions: Deleted member 19036
Feel free to skip the first part if you aren't curious about how the tech works (but this will help you understand it more)

How does Tor actually work? It's similar to a VPN... VPNs send your IP address to a VPN provider then the VPN provider spits out their own VPN IP and sends it to the website you are accessing. Think of your IP like an address it basically identifies you online and a lot of details about you every website you go to knows your IP address and keeps logs of this. So you can sort of imagine it like sending mail if you were to do it with a VPN it would be like sending your mail to a company that acts as an intermediary so that the person who receives the mail does not know your real address only the intermediary (VPN).

Why Tor is superior to a VPN... VPN's are companies at the end of the day with real locations. They also likely keep logs of your IP its still better then just using your naked IP but you trust your IP with a company that would sell you out for advertisers or if the government put pressure on them. Tor on the other hand does not work like this. The mailing example I used earlier imagine the same scenario but your mail gets sent to 5 or 10 different people before reaching the target. Also every time you send new mail you can randomize it so you send it to more people each time. Your IP bounces around to 10 different locations in different countries and you can change the locations every minute if you want. There are tens of thousands of computers that bounce tor signals every minute in a hundred countries.
View attachment 1924764
This is not impossible to break but it has been shown that it costs the government millions to catch a lot people. You most likely are not worth millions to catch. If you don't make stupid mistakes its likely this will be an effective way of securely browsing the web. Most of the people who are caught fail because of human error.

tldr: Tor works by bouncing your signal across multiple randomly generated IPs

There are many ways you can access Tor you can literally look up on google.com tor download and download it on windows but this will not always be secure. It depends what you are doing but here are the 3 main ways to do it from least safe to most safe.

#1 Download the tor browser from the internet on your main operating system. This way is generally unsafe because operating systems like windows have been known to spy on people. Also most people have some sort of malware of keylogger which renders tor pointless. It doesn't matter if the website cannot track you if but windows can record your screen and pull up the data of what you are typing.

#2 Whonix on a virtual machine... A virtual machine can be thought of as a simulated computer inside your computer. Whonix is a software that only allows Tor to be run inside it that means any application used via the internet must run through tor. It also protects you against some malwares. But this is also limited since viruses have been known to still be able to get information for a virtual machine OS. Also virtual machine itself does store information and data on you.

#3 Tails. This software is the best hands down. https://tails.boum.org/ This is the link to install it this will take you sometime to do it so I will not give step by step instructions all you need is a flash drive with 4GB or higher and any computer that isn't 10 years old. The only thing I recommend is to make sure you do it right but if you follow the instructions it shouldn't be tampered with in the first place.

Why is Tails the best? It works only from a flashdrive meaning your the software does not stay on your computer. Tails is what is known as "bootable drive" basically it can work on any computer once its in the start up mode you can plug in a flashdrive and it will automatically make the computer run an OS similar to Whonix that only runs things through TOR. The best part is you do not even need your own computer you could borrow a friends computer and connect to tails as soon as the flash drive is removed all memory of the interaction is wiped forever. Its extremely portable and leaves no trace the minute it is pulled out. It bypasses malware too since the computer can only run what is on the flash drive as long as you download the proper tails software on the drive there is virtually no way a virus on a computer could effect it.

tldr: Tails is basically Whonix but better and can be done on any computer.

So assuming you've installed one of these softwares that let you access tor I will go over the basics. There still are ways that information can be collected even without knowledge of your IP. The first thing you should always do is turn the tor security settings to the max mode. This looks like a shield always turn it on safest mode this will disable Java Script which is really important. Many websites will not work when you disable java script like youtube ect. It depends what your goals are with accessing Tor but if you are on sketchy sites never enable javascript.
View attachment 1924813
You can always reset your identity if you feel it could be compromised so don't worry too much on clearweb sites. But if you are on onion sites (which are basically sites that can only be accessed with tor) its a bad idea. Javascript can tell a lot about you and if you visit a site consistently they will be able to easily trace it back to you. Another way they do this is through screen size. If your screen is full sized they can understand what computer type you have based on the size of the screen.

Tldr: Disable Javascript do not keep a full screen turn setting to safest always.

Most people get caught for stupid reasons. If you write info about yourself on a forum it can be used to eventually track you down. Even a word format can narrow you down so if you have a specific way you always write try not to use it. Don't write too much info about yourself when its tied to accounts. If you have an actual account somewhere try to say as little correlating information as possible. Modern AI can identify writing structures we use with only 3 paragraphs of your writing sampled. So try your best to write as efficiently as possible and if you can use a different format.

Using tor in a specific place. A famous case where someone got caught was a Harvard student who accessed tor to email a bomb threat in order to get out of an exam. The student was caught because there was only one tor connection in the hour he sent it out and it came from his dorm room and correlated down to the second with the bomb thread. The kid also failed because he admitted rather then getting a good lawyer (so he might have gotten out of it with plausible deniability they had no proof he did it until he admitted it) they could not prove he was the one that sent it but the internet providers do know tor is being used and the time frame so they know the exact time you used it. Everytime you use tor your internet provider knows tor is being used just not what for.

Here is the link the Harvard Tor case. Its interesting at the end of the day the kid played himself they only knew he accessed tor exactly at the same time the bomb threats occurred but there was no concrete proof he did it. But also in his case he should have used a bridge or went to a coffee shop.

Ways around this would be using a bridge(essentially a way to try and disguise your internet activity as clear web) or going to a public place with wifi. Like a coffee shop just make sure to wear a mask and pick a spot away from cameras. But most likely if you aren't doing something outright illegal (which I don't recommend whether or not you can do it you shouldn't) there is no reason to connect to a bridge or go to a coffee shop because you aren't Edward Snowden or running a Silk road site. But if you are using a Uni wifi and you do something that only someone at that location would know about it might narrow you down so either go to a cafe or don't do anything area specific or retarded like send a bomb threat.

Last note this also will all depend on what you are doing. If the government is actively spending money to get you then you will need to do a lot more and I can't help you. But if you just want to buy some weed this will work fine.

That's really it I probably missed some stuff so check out the channels "TheHatedOne" and "Mental Outlaw". Also know just reading this thread put you on a government list good luck :)
hook me up with the dnmbible
 
Will a hitman show up at my house if I go there
Nah that shit is all fake. I read an article about a guy who made 100K a year with a fake hitman site. I mean what are they going to do report you to the police after getting faked on a hitman lmao.
 
  • JFL
  • Woah
Reactions: HOLYFUARK, Trilogy and Deleted member 19036
Debit cards usually an old person who gave away their card details to some scammer they withhold the information and then I buy it off them
 
only Detroit guys and guys from scamming centers will get it.
I’m from the UK scamming used to be super popular here

So popular that I started doing it at 13 💀
 
  • JFL
Reactions: Deleted member 19036
I’m from the UK scamming used to be super popular here

So popular that I started doing it at 13 💀
uk is a diff place. every fuckin guy is using drugs there. there is nothing such as innocent. even duck at your national parks do pop press
 
I just use tor to avoid data collecting on google and so I can watch weird youtube videos I don't want on my history
 
  • +1
Reactions: Deleted member 11126
I just use tor to avoid data collecting on google and so I can watch weird youtube videos I don't want on my history
If you have javascript activated they know its you. I mean its better then nothing youtube won't function without Javascript.
 
  • So Sad
Reactions: Fxdzcki
Debit cards usually an old person who gave away their card details to some scammer they withhold the information and then I buy it off them
In the USA we have skimmers basically some asshole will add a chip to a card reader that collects the data in like one day if its not noticed they can get thousands of debit/credit card numbers. They basically just sit in the parking lot with bluetooth and collect the data I think I go my card money stolen for like 40 bucks doing that once.

This is why I prefer cash
 
Last edited:
If you have javascript activated they know its you. I mean its better then nothing youtube won't function without Javascript.
Just don't use the internet theory
 
  • +1
Reactions: Deleted member 11126
Nah that shit is all fake. I read an article about a guy who made 100K a year with a fake hitman site. I mean what are they going to do report you to the police after getting faked on a hitman lmao.
What dangers can a human from a 3rd world country face?
 
  • +1
Reactions: Deleted member 11126
What dangers can a human from a 3rd world country face?
Probably less since 3rd world countries are not tech savvy. Depends what you want to do but I wouldn't recommend doing evil or illegal things.
 
  • +1
Reactions: Nick.Harte
gigacope, the dark web has been dead ever since their users realized it'd be much easier to sell drugs on telegram
 
Feel free to skip the first part if you aren't curious about how the tech works (but this will help you understand it more)

How does Tor actually work? It's similar to a VPN... VPNs send your IP address to a VPN provider then the VPN provider spits out their own VPN IP and sends it to the website you are accessing. Think of your IP like an address it basically identifies you online and a lot of details about you every website you go to knows your IP address and keeps logs of this. So you can sort of imagine it like sending mail if you were to do it with a VPN it would be like sending your mail to a company that acts as an intermediary so that the person who receives the mail does not know your real address only the intermediary (VPN).

Why Tor is superior to a VPN... VPN's are companies at the end of the day with real locations. They also likely keep logs of your IP its still better then just using your naked IP but you trust your IP with a company that would sell you out for advertisers or if the government put pressure on them. Tor on the other hand does not work like this. The mailing example I used earlier imagine the same scenario but your mail gets sent to 5 or 10 different people before reaching the target. Also every time you send new mail you can randomize it so you send it to more people each time. Your IP bounces around to 10 different locations in different countries and you can change the locations every minute if you want. There are tens of thousands of computers that bounce tor signals every minute in a hundred countries.
View attachment 1924764
This is not impossible to break but it has been shown that it costs the government millions to catch a lot people. You most likely are not worth millions to catch. If you don't make stupid mistakes its likely this will be an effective way of securely browsing the web. Most of the people who are caught fail because of human error.

tldr: Tor works by bouncing your signal across multiple randomly generated IPs

There are many ways you can access Tor you can literally look up on google.com tor download and download it on windows but this will not always be secure. It depends what you are doing but here are the 3 main ways to do it from least safe to most safe.

#1 Download the tor browser from the internet on your main operating system. This way is generally unsafe because operating systems like windows have been known to spy on people. Also most people have some sort of malware of keylogger which renders tor pointless. It doesn't matter if the website cannot track you if but windows can record your screen and pull up the data of what you are typing.

#2 Whonix on a virtual machine... A virtual machine can be thought of as a simulated computer inside your computer. Whonix is a software that only allows Tor to be run inside it that means any application used via the internet must run through tor. It also protects you against some malwares. But this is also limited since viruses have been known to still be able to get information for a virtual machine OS. Also virtual machine itself does store information and data on you.

#3 Tails. This software is the best hands down. https://tails.boum.org/ This is the link to install it this will take you sometime to do it so I will not give step by step instructions all you need is a flash drive with 4GB or higher and any computer that isn't 10 years old. The only thing I recommend is to make sure you do it right but if you follow the instructions it shouldn't be tampered with in the first place.

Why is Tails the best? It works only from a flashdrive meaning your the software does not stay on your computer. Tails is what is known as "bootable drive" basically it can work on any computer once its in the start up mode you can plug in a flashdrive and it will automatically make the computer run an OS similar to Whonix that only runs things through TOR. The best part is you do not even need your own computer you could borrow a friends computer and connect to tails as soon as the flash drive is removed all memory of the interaction is wiped forever. Its extremely portable and leaves no trace the minute it is pulled out. It bypasses malware too since the computer can only run what is on the flash drive as long as you download the proper tails software on the drive there is virtually no way a virus on a computer could effect it.

tldr: Tails is basically Whonix but better and can be done on any computer.

So assuming you've installed one of these softwares that let you access tor I will go over the basics. There still are ways that information can be collected even without knowledge of your IP. The first thing you should always do is turn the tor security settings to the max mode. This looks like a shield always turn it on safest mode this will disable Java Script which is really important. Many websites will not work when you disable java script like youtube ect. It depends what your goals are with accessing Tor but if you are on sketchy sites never enable javascript.
View attachment 1924813
You can always reset your identity if you feel it could be compromised so don't worry too much on clearweb sites. But if you are on onion sites (which are basically sites that can only be accessed with tor) its a bad idea. Javascript can tell a lot about you and if you visit a site consistently they will be able to easily trace it back to you. Another way they do this is through screen size. If your screen is full sized they can understand what computer type you have based on the size of the screen.

Tldr: Disable Javascript do not keep a full screen turn setting to safest always.

Most people get caught for stupid reasons. If you write info about yourself on a forum it can be used to eventually track you down. Even a word format can narrow you down so if you have a specific way you always write try not to use it. Don't write too much info about yourself when its tied to accounts. If you have an actual account somewhere try to say as little correlating information as possible. Modern AI can identify writing structures we use with only 3 paragraphs of your writing sampled. So try your best to write as efficiently as possible and if you can use a different format.

Using tor in a specific place. A famous case where someone got caught was a Harvard student who accessed tor to email a bomb threat in order to get out of an exam. The student was caught because there was only one tor connection in the hour he sent it out and it came from his dorm room and correlated down to the second with the bomb thread. The kid also failed because he admitted rather then getting a good lawyer (so he might have gotten out of it with plausible deniability they had no proof he did it until he admitted it) they could not prove he was the one that sent it but the internet providers do know tor is being used and the time frame so they know the exact time you used it. Everytime you use tor your internet provider knows tor is being used just not what for.

Here is the link the Harvard Tor case. Its interesting at the end of the day the kid played himself they only knew he accessed tor exactly at the same time the bomb threats occurred but there was no concrete proof he did it. But also in his case he should have used a bridge or went to a coffee shop.

Ways around this would be using a bridge(essentially a way to try and disguise your internet activity as clear web) or going to a public place with wifi. Like a coffee shop just make sure to wear a mask and pick a spot away from cameras. But most likely if you aren't doing something outright illegal (which I don't recommend whether or not you can do it you shouldn't) there is no reason to connect to a bridge or go to a coffee shop because you aren't Edward Snowden or running a Silk road site. But if you are using a Uni wifi and you do something that only someone at that location would know about it might narrow you down so either go to a cafe or don't do anything area specific or retarded like send a bomb threat.

Last note this also will all depend on what you are doing. If the government is actively spending money to get you then you will need to do a lot more and I can't help you. But if you just want to buy some weed this will work fine.

That's really it I probably missed some stuff so check out the channels "TheHatedOne" and "Mental Outlaw". Also know just reading this thread put you on a government list good luck :)
Nice1
 

Similar threads

Falcon_Flam
Replies
105
Views
5K
puffer234234
P
Spidermanne2returns
Replies
20
Views
4K
Sphenoid
Sphenoid
Spidermanne2returns
Replies
22
Views
5K
6foot3Mediterranean
6foot3Mediterranean

Users who are viewing this thread

Back
Top