Jimsac
Crypto Gaming Pro
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 2
900 XP
- Welcome to Dark Web Links (http://bznjtqphs2lp4xdd.onion/)
- Candle (http://gjobqjj7wyczbqie.onion/)
- not Evil (http://hss3uro2hsxfogfq.onion/)
RULES
- Always be careful of the links you click. (Rule of thumb, think twice before doing or clicking anything)
- Avoid sites with Disturbing / Illegal / Unethical content. (You know what unethical is meant in this case)
- Always run with a VPN
- Create a fake identity
- Use encrypted mail services & messaging apps
SURFING THE DARKWEB ISN'T ILLEGAL BUT CAN BE DANGEROUS You can’t be charged with a criminal offense for simply searching the Dark Web, but you can get in trouble for using it to carry out illegal activity ; headlines about police operations that involved the Dark Web and child pornography, drugs, or hackers dumping stolen data are not infrequent. Moreover, the anonymity of the Dark Web also makes it notoriously risky. Since there’s no oversight, it’s teeming with scammers. That said, one can maintain one’s safety by simply following the same basic security rules that apply to the normal web: Always be careful about the links you click because some can be misleading, and avoid sites or links that advertise illegal, disturbing, or dangerous content you don’t want to see.
IS THE TOR BROWSER COMPLETELY ANONYMOUS In 2014 the FBI – with assistance from researchers at Carnegie Mellon University – developed an exploit based on a Firefox JavaScript flaw that successfully de-anonymized some Tor users, including the operators of the popular Silk Road website. Although the vulnerability that allowed those attacks was fixed within days of its discovery, the incident nonetheless created fear among Tor users that it may not be 100% secure after all . Similarly, in October 2017 the security firm We Are Segment identified a vulnerability in Tor that was affecting some Mac and Linux users. This vulnerability, which became known as TorMoil, caused IP addresses to be leaked when users accessed URLs that began with file://, rather than http:// or https://. We Are Segment notified the Tor developers, who promptly fixed the error by updating to a new version of the web browser. In order to address these issues, the Tor Project has recently improved security and privacy by strengthening its encryption . It also gives web developers the tools to build fully anonymous Darknet sites (known as hidden services, or rendezvous points) that can only be discovered by those who know the site’s URL.
CRIMINAL CASES INVOLVING THE DARKWEB Although we believe the Dark Web should be used for promoting free speech and bypassing censorship, there’s no denying that the press tends to focus on the more shady activity that goes on there. Here are some of the most high profile stories that have come out in recent years:
- Silk Road: Perhaps more than any other website, the Dark Web brings to mind Silk Road. Silk Road began as the invention of a libertarian idealist who wanted to sell home-grown mushrooms for Bitcoin, and ended up hosting 1.2 billion dollars worth of deals involving drugs, firearms, hits, counterfeit cash, and hacker tools.Five of the hits were commissioned by the site’s creator, Ross Ulbricht, known on Silk Road as the Dread Pirate Roberts. Ulricht was ultimately caught because of an old post to a regular website in which he promoted Silk Road in its early days. His mistake: using his real email address.
- AlphaBay: Following the shuttering of Silk Road, AlphaBay became the most prominent Dark Web marketplace. When AlphaBay went down in 2017, it was because of security missteps even more basic than those of the Dread Pirate Roberts.Among other blunders, founder Alexandre Cazes used his legitimate email address for communications on the site ( protected]), kept several unencrypted cryptocurrency wallets constantly open, and re-used the same pseudonym on and off the Dark Web. And when the cops busted into his home in Thailand to arrest him, he was logged onto the AlphaBay server with the username “admin.”The computer was unlocked and unencrypted, and contained text files of passwords used on the site, as well as a document listing the type and location of all his financial holdings that was titled in bold “TOTAL NET WORTH.” Several days after his arrest, Alex Cazes was found dead in his prison cell, apparently having committed suicide.
- The Playpen Case: Although it only existed for seven months, the child pornography site Playpen managed to amass 215,000 users before the FBI gained access to its host server via information provided by a foreign law enforcement agency (which has not been publicly identified).Instead of just shutting the site down, the FBI continued to host it on its own servers for two weeks, during which it used a Flash app to capture 1,300 IP addresses belonging to site visitors. This led to the arrest of nearly 900 users around the globe, including Playpen’s creator, Steven Chase (may he burn in hell).
- The Ashley Madison Case: In 2015, the hacker group, the Impact Team, breached a dating site for extramarital affairs called Ashley Madison. The hackers threatened to release users’ personal information unless the website and its sister site, Established Men, were shut down. A month later, when their deadline wasn’t met, the Impact Team started publishing data on the Dark Web.Over the course of several dumps, information was revealed that included the email and IP addresses of 32 million members, the email correspondences of the CEO of Ashley Madison’s parent company, and the website’s source code.The hacker’s stated motivation was 1) an objection to the site’s primary purpose, and 2) the site’s practice of forcing users to pay to delete their accounts (which were even then not fully scrubbed from the servers).Because Ashley Madison didn’t require email verification to create a profile, it would have been easy to create accounts using someone else’s email address, and then use this to extort them. Although we still don’t know who was responsible for the attack, one can speculate that they were someone affected by these poor security practices.
You MUST use a VPN whenever you are connected to the TOR Network
Please remember that TOR isn’t necessarily 100% anonymous, you should turn off JavaScript within the dark web browser settings to help. See our https://cybarrior.com/online-privacy-tools-and-information/ for additional tricks.
Disconnect your webcam or block the camera with some black tape. Hackers and governments have ways of getting into your computer and turning on the video and cameras. You can have intimate images of you be used as blackmail or extortion, or even worse, used by the feds.
Disconnect your microphone or cover it with tape to muffle it good. The same goes for the microphone as the camera, the last thing you want is to be recorded saying incriminating things at home. It doesn’t even have to be while on the dark net. Even the Facebook creator Mark Zuckerberg does it as he knows the dangers.
NEVER use your real name, photos, email, or even password that you have used before on the dark web. This is the fastest way to be tracked. https://cybarrior.com/online-privacy-tools-and-information/#email account / https://cybarrior.com/online-privacy-tools-and-information/#messagingand aliases that have nothing to do with you that you have never used before.
If you are using TOR on the dark web for anything other than looking at cute pictures of kittens, you should think seriously about your privacy and security.
On a final note, we encourage everyone who uses the Dark Web to do so responsibly. Stay SAFE and make sure your VPN is connected!
DARKWEB SEARCH ENGINES
- https://pipl.com/
- https://www.mylife.com/
- https://yippy.com/
- http://lookahead.surfwax.com/
- http://xmh57jrzrnw6insl.onion/
- https://scholar.google.com/
- https://duckduckgo.com/
- http://fazzle.com/
- https://hss3uro2hsxfogfq.onion.to/
- https://www.startpage.com/
- http://archive.org/
- http://gjobqjj7wyczbqie.onion/
- http://www.msydqstlz2kzerdg.onion/
- http://searchb5a7tmimez.onion/
- Agartha Market
- Apollon Market
- Berlusconi Market
- Cryptonia Market
- Empire Market
- Genesis Market
- Nightmare Market
- Tochka Market
- Yellow Brick Market
DARK OSINT TOOLS
WEB TOOLS | INSPECTING THE DARK WEB
DARKWEB 101- ANONYMITY
1. Cleanup Computer
You can use Windows or Linux to connect to the Dark Web.
Clear cache, trackers, cookies, viruses and adware that’s currently on your machine with the following tools.
Cleanup Tools (Removes cache, history, cookies etc)
- https://www.ccleaner.com/ (windows)
- https://www.bleachbit.org/ (linux)
- https://www.malwarebytes.com/ & https://www.malwarebytes.com/adwcleaner/ (Windows)
- https://www.clamav.net/, Lynis & RKhunter (Linux)
- https://support.microsoft.com/help/...er-tool-to-repair-missing-or-corrupted-system for Windows (Run command prompt as administrator)
- https://packages.ubuntu.com/search?keywords=debsums for Linux (To install “apt install debsums” and then execute program “debsums -s”)
2. Install Tools
Must Have Tools
- Get a VPN
- Download the latest https://www.torproject.org/download/
- Install browser extensions and maximize browser security
- Change your DNS manually using https://dns.watch/why
You must reply in the thread to view hidden content. Upgrade your account to always see hidden content.
You must reply in the thread to view hidden content. Upgrade your account to always see hidden content.
You must reply in the thread to view hidden content. Upgrade your account to always see hidden content.- https://www.sno.phy.queensu.ca/~phil/exiftool/
- https://tails.boum.org/
- https://www.whonix.org/
If you’ll be using any services on the dark web then you definately will need to create a fake identity that has nothing in common with your real life.
The below services are for anyone that wants to protect their online identity.
Before Signing up with the below free services, make sure you are connected to your VPNand https://www.torproject.org/download/ already.
Keep in mind that every time you create an account on any website or login to a service, your public IP have already been logged. > Go back to step 1 to clean and clear your machine. Then connect to your VPN and TOR to create your fake online identity with the below services.
Name Profile Generator
- https://www.fakenamegenerator.com/
- https://www.fakepersongenerator.com/
- https://www.bestrandoms.com/random-username-generator
- https://smartninja-pgp.appspot.com/ – Online PGP Tool
- https://gchq.github.io/CyberChef/ – Web App Encryption Tool
- https://www.openpgp.org/software/kleopatra/ with https://www.gpg4win.org/download.html
- https://www.veracrypt.fr/en/Downloads.html
SOURCE ONEHACK )