A Darknet Dictionary (Work in Progress)


by Ciphas

So, given that there seems to be a lot of confusion about certain terms connected with the darknet and/or dark web, I thought it might be useful to have a “darknet dictionary” here. I must give some credit for this idea to Deepdotweb.com, who featured a similar article at DeepDotWeb’s DarkNet Dictionary Project! This isn’t a carbon copy of theirs, but they inspired me.

Their darknet dictionary is an ongoing project, so I think I’ll do the same with mine. If anyone wants to suggest new entries (or corrections) in the comments, feel free! I just may add them.

2FA – Abbreviation for “two-factor authentication.” 2FA is a type of multi-factor authentication (MFA), i.e. a user is only granted access to a site after presenting multiple pieces of authentication. Although used on the clearnet as well, 2FA is used on many darknet markets (and other sites) to verify users’ identities.

Example: a username and password, plus a separate PIN or a security question.


AlphaBay – Currently one of the top darknet markets on the Tor network. Uses multisig transactions and a traditional escrow system.


Bitcoin– A digital currency created by the mysterious “Satoshi Nakamoto” in 2009. Bitcoin incorporates encryption techniques to regulate the creation of new units, and to verify the transfer of funds. The smallest units of bitcoin are called “satoshis.”


Bitcoin billionaire yet?


Blackbook – A former social network on the Tor network, modeled after Facebook.


Blockchain – A public ledger of all bitcoin transactions that have ever been executed. This applies to other cryptocurrencies as well.


Candydoll – A term referring to non-nude photos of children in suggestive poses or sexy clothing. Softcore child pornography, more or less. (Also may refer to makeup kits that are designed for this style of photography.)


Carding – The trafficking of credit cards, bank accounts, website accounts, and other financial or personal information. May or may not take place within larger darknet markets. Some vendors on the dark web specialize in this type of crime.


Cipherspace – The “hidden internet,” built on top of anonymity networks like Tor, I2P, Freenet, and others.

Clearnet – The “normal internet” accessible without special software or configurations. (e.g. Google, Bing, Facebook, Wikipedia, Twitter, Reddit, etc.) Also sometimes referred to as the “surface web” (though this term is wildly inaccurate and confusing.)


Enough with the icebergs, already!

Cold storage – Keeping a reserve of bitcoins offline (e.g. on a USB drive or encrypted media) to prevent tampering or theft.


CP – An acronym for “child porn” or “child pornography.”


If you thought I was sharing links, I hope you’re disappointed.

Creepypasta – Horror stories and urban legends that are passed around the internet. Some of them have been the source of a lot of misinformation about the deep web and dark web.


Dark Web – The part of the web that exists on darknets like Tor, I2P, Freenet, GNUnet, and other networks, and requires special software, configurations, or permission to access. The dark web is a small part of the deep web. The word “dark” does not refer to the content, but rather the fact that the networks are special access.


SIGAINT darknet email service

Darknet – An overlay network that requires specific software, configurations, or permission to access. Examples include: Tor, I2P, Freenet, GNUnet, Retroshare, Netsukuku, CCNx, and cjdns.


Darknet Market – A market hosted on an anonymity network (such as Tor) that often (but not always) deals in illicit goods. Popular purchases include drugs, firearms, hacked PayPal accounts, skimmed credit cards, counterfeit money, and fake official documents.


Dark0de (a.k.a. Darkode) – A notorious hacking and cybercrime forum, originally hosted on the clearnet, which transitioned to the Tor network.


Dark Registry – A Tor hidden service that appears to be a wedding registry site. Seems to be have been created as an academic project or is incomplete.


Deep Web – The part of the web not indexed by traditional search engines, like Google. This term is often confused with “dark web,” but the two are not synonymous.


DisconnectA search engine that prevents other search engines from tracking your searches. It used to be the standard search engine on the Tor browser.


DNStats.netA site that monitors the status of various darknet markets and a few other sites on the Tor network.


Dream Market – Another top darknet market hosted on the Tor network, which uses a traditional escrow system.


DuckDuckGo – Currently the standard search engine used on the Tor browser. Is popular with privacy-minded users.


Dump – The sharing of stolen data, such as usernames, passwords, credit card numbers, and bank account data. Also takes place on the clearnet, but is more infamous on networks like Tor.


Eepsite – The name for hidden services hosted on the I2P network. They end in the domain name .i2p.


Freenet – A peer-to-peer network for censorship-resistant communication, touted as an alternative to other networks like Tor and I2P. It features anonymous messaging, email, social networking, and site hosting.


Freesite – The name used for Freenet’s hidden services.


Galaxy2 – A popular social network on Tor. It is a follow-up to the original Galaxy social network, created by “Lameth.”


GNUnet – A free software framework for decentralized peer-to-peer networking. It includes P2P applications, such as chat, filesharing, and VPN.

Grams – A Tor-based search engine for darknet markets, which helps compare goods, prices, and vendors.


Hard Candy – Slang term for an underage girl – roughly age 12-16, on both the dark web and clearnet. Also can refer to child pornography featuring girls of this age.

Harry71’s Onion Spider – A popular link repository on Tor. Is respectable because it’s updated daily, and the links are generally accurate and active.


Hell – Infamous hacking forum hosted on the Tor network, where users share hacking tips as well as stolen data.


Hidden Wiki – Name for one of several popular wikis on both the clearnet and Tor that link to and describe some basic Tor hidden services (for noobs). Often referred to as a single site.


Hitmen/Assassins – A service that’s supposedly easy to find on the dark web. Many of the sites offering these services have turned out to be elaborate scams.


Hurtcore – Most extreme form of child pornography, involving such things as physical injury and rape, which can be found on the dark web. Avoid at all costs.


Credit: allthingsvice.com

I2P – An overlay network and darknet that allows applications to send messages to each other anonymously and securely.


Litecoin – A peer-to-peer cryptocurrency that is based on bitcoin.


Lux – Username of Matthew David Graham, convicted (and imprisoned) owner of child pornography sites PedoEmpire, Hurt 2 The Core, and Love 2 The Core (among others).


Mesh routing network – Networks made up of radio nodes arranged in a mesh topology. Examples include Netsukuku, GNUnet, Hyperboria, and CCNx.


Multisig – An abbreviation for “multsignature.” The requirement for more than one key to authorize a bitcoin transaction.


Credit: deepdotweb.com

not Evil – The premier search engine on Tor. Was originally designed to look like a parody of Google.


Onionland – A nickname for the Tor network.


Operation Onymous – An international law enforcement operation targeting darknet markets and other Tor hidden services in 2014. Supposedly shut down over 400 sites (although many were clone sites).


Outlaw Market – Another of the top darknet markets on Tor. Sells drugs, digital goods, weapons, and other merchandise.


PGP An encryption standard created by Phil Zimmermann in 1991. The initials stand for “Pretty Good Privacy.” PGP is frequently used to encrypt and decrypt messages on the dark web.


Qubes – A security-focused operating system that aims to provide security by isolation. One of many distros that can help provide security for those who use the dark web.


/r/darknetmarkets – A subreddit dedicated to information and discussions about darknet markets.

/r/deepweb – A subreddit dedicated to factual information about the deep web and dark web (as opposed to urban legends).

Red Room – A series of supposed sites on the dark web that feature live torture and murder (similar to the “Shadow Web”). Entrance to these sites (in theory) requires bitcoin, as well as special credentials, such as a password given by an administrator. Most of the ones that have become public knowledge have turned out to be scams.


Scully, Peter – An infamous Australian pedophile and producer of child pornography, most notably the film Daisy’s Destruction, which has achieved internet notoriety. Scully had formed his own production company to make these films, called No Limits Fun.


Shadow Web – A fictitious part of the dark web perpetuated by creepypastas and YouTube videos. Supposedly features live torture and murder shows for those who pay the right price. A number of sites on Tor claim to offer access to the Shadow Web.


Silk Road – An online black market, considered to be the first modern darknet market. Launched by founder Ross Ulbricht in 2011, the site was shut down by feds in October 2013.


SSH – Stands for “secure shell.” SSH is a cryptographic network protocol for operating network services securely over an unsecured network. As with PGP, SSH uses public and private keys to authenticate users.


Suicide Apartment – Exclusive, members-only social network on Tor. The only way to become a member is to receive a voucher from an existing member.


Tails – A popular Debian-based live operating system that many dark web users install for extra protection. “Tails” is an acronym for “The amnesic incognito live system.”


Tor – An anonymity network on which many “dark web” sites are hosted. The name “Tor” stands for “the onion router.”


TorBay – A Tor-based social network and forum which more or less replaced Blackbook.


VPN – A private network which extends across a public network (internet). Many experts recommend using a VPN in addition to using Tor! (hint hint)


Welcome to Dark Web Links and More! – Link list for Tor hidden services. Notable because they do not accept submissions of CP links, and also feature links to Usenet groups.


Zocalo – A darknet market specializing in marijuana, hash, and various paraphernalia associated with it.


P.S. As I said above, this list is far from finished. So I’ll either add more entries in later, or do a part 2 to the post. Anyhow, hope you had fun, and feel free to add your suggestions!

Secure Passwords and Usernames for the Dark Web (or Anywhere)

by Ciphas


DISCLAIMER: I have not used any of the “passwords” in this post as real passwords. So go ahead and try them all you want!

An acquaintance contacted me recently, and was asking about how to use darknet markets. One of the things I had advised this person to do was to make sure that they used a secure passphrase and/or username.

This is just good internet advice in general, but I would say that it goes double for the dark web.

One of my earliest posts on this blog was entitled Dark Web: Fake Words and Secret Codes. In it, I had suggested the diceware method for generating strong passwords – and I still do, actually!


Just to review: the way this is accomplished is that you roll a die (or pair of dice), and each 5-number set represents a word, number, or group of letters taken from a long word list.

They might look like this:

52121 ron

43453 noel

11243 acidic

53223 sequel

36514 llll

You then combine those words or numbers together, and that’s your password. Some people add periods or dashes in between the words, too. So, the final result would be “ron.noel.acidic.sequel.llll.”

For full details on how the diceware method works, see Diceware Passphrase Home.

This method, however, can be time-consuming. And the longer your password (or “passphrase”) is, the greater the chances are that you’ll make a mistake when typing it.

Throw Away the Dice??

My friend Arne Babenhauserheide, who is a programmer, came up with an alternate method of generating secure passwords, which he shared on his blog, Zwillingssterns Weltenwald.

The post in question is entitled Create secure passwords, usable on US and German keyboards.

Arne goes into detail about what denotes a strong password –

“Use blocks of four letters, chosen at random from a set of safely recognizable characters which are in the same position on German and US keyboards. Delimit blocks by a delimiter chosen at random from another set of characters.”

There’s a Javascript version of the password generator on the post itself, as well as code for it in Javascript, Python, and Wisp. You can read the full post if you want to find out more, but I also thought I’d show you some of the passwords that the generator came up with.


For a 12-character password: m3M4+v0Tg+ENHS

15 characters: QXL3+GWbh!vUqP.6d3

20 characters: VMCt!u6sF+Mxc5/fSwe/g7Vm

50 characters: MMWW.ruR3+vejH-7s6a.BiQi,89R5-51oq-FsFT,RK1M,HWmG*wvuj,D1om.9g

Well OK, 50 is probably overkill. One thing to point out – though you can use the password generator online, it’s much safer to download the web page and do it offline. I tried it – it works just fine!

There are a number of other sites that have a similar feature, but with any of these, I would recommend the same thing – download the page and generate the password offline.

Even if you don’t want to use these for your passwords, they can be fun to try out:

Strong Random Password Generator


XKPasswd – Secure Memorable Passwords



GRC – Ultra High Security Password Generator


Create Safe & Secure Passwords


I confess that I don’t know which of these “generators” are the most or least secure, but if you come up with a passphrase that works for you, then more power to you.

That’s Utter Nonsense!!!!

Oh, I almost forgot – the username part! It’s up to you, but if you want a more pseudo-random username, I like to use nonsense word generators (which I also mentioned in the earlier blog post).

I used to use the one on http://www.soybomb.com/tricks/words/, but it seems to be having errors a lot lately.

There are quite a few more of these as well, some of which I’ll share:

Fake Word Generator For Great Made-Up Words!


Unique Word Generator



Nonsense Word Generator


Generate a list of random words


Obviously, you don’t have to do this, but it can be fun, and can also take the effort out of the whole, “What do I pick for a username?”

Here’s a random (or pseudo-random) result:

Username –

  • zo¥ᄀtomic


  • ET5h*XHd1*CUus.E6W

And there you go. Have fun, kids!

Oh, and you might want to use a VPN too.




How to Spot a Fake Red Room!


by Ciphas

In an effort to get more connected with you, my readers, I’ve decided to do a little how-to here. As the title says, I’m going to go through how to spot a fake red room on the dark web.

What prompted this? Well, on my previous post, I received this comment:


In case that’s hard to read, here it is in slightly larger text:

“there are many red rooms its [sic] just a matter of finding them although I wouldn’t suggest it, i posted a link below. http://222222222kjhiqzb.onion/”

I actually checked out that link, and it looked all too familiar. Why’s that? Well, Mutahar (a.k.a. SomeOrdinaryGamers) featured it on his “Deep Web Browsing” series: THE “REAL” RED ROOM!?!


I watch those videos purely for entertainment, but yes, Muta does visit some real sites on the Tor network. (And a few on the clearnet too.)

That does not mean, however, that any of these are real red rooms. In fact, he even says so in the same video!!

Some would say they’re all fake, but let’s just play devil’s advocate and say that there are a few real ones.


I have come across more than my fair share of sites on Tor (and elsewhere) that claim to be red rooms. Most of them have a few things in common:

  1. They claim to show video streams of live torture, murder, and other acts.
  2. They require you to pay – usually large amounts of bitcoin or other cryptocurrency.
  3. They often ask you to download “special software,” like an alternative browser.
  4. They sometimes will link you to an alternate site to do the transactions.
  5. They almost always use a Tor-based email service – a common one is SIGAINT.
  6. They sometimes have a graphic image on the main site, usually taken from a horror film, to symbolize the acts of violence that would take place in the red room.
  7. They sometimes have a login page, which you can supposedly access after you pay.
  8. They won’t show you any sort of sample content beforehand.

That’s all I can think of at the moment.

Anyhow, if any of you have really used Tor, you probably have some idea of how slow it is. If you don’t understand why it’s slow, then allow me to direct you to their FAQ: Why is Tor so slow?

Part of the answer is: “Before we answer, though, you should realize that Tor is never going to be blazing fast. Your traffic is bouncing through volunteers’ computers in various parts of the world, and some bottlenecks and network latency will always be present. You shouldn’t expect to see university-style bandwidth through Tor.”

OK…but the red room sites say that I have download a special browser to watch the show!

Why is this? Because, in all likelihood, if these sites are asking you to download and install special software, the software in question probably has some kind of malware embedded in it.

Do you know what a RAT (remote access trojan) is? Allow me to direct you to TechTarget: What is RAT (remote access trojan)? Essentially, it’s a type of malware program that includes a back door to allow remote access to the victim’s computer.

I don’t know this from personal experience, but it’s my best educated guess. And a lot of these sites started popping up on Tor after the creepypastas and YouTube videos about red rooms became more popular – are you really that surprised?

The Shadow Web – Re-Re-Visited!!


I’ve done several previous posts about the so-called Shadow Web, an urban legend which I believe became popular after the creepypasta “A Warning To Those Accessing The Shadow Web” passed around.

After this, a plethora of sites popped up on the Tor network (and other networks, like Freenet) claiming to offer access to the Shadow Web.

In a similar manner to the red room sites, the Shadow Web sites claim that this is a special portion of the dark web only accessible through “special software” that you need to pay to download.

Again, not to repeat myself too much – I’ve never gone so far as to actually download the software, but I suspect that it’s infected with some kind of malware – what, I couldn’t say. I’m glad that I haven’t fallen victim to this, to be honest.

I have actually corresponded with the admin in charge of some of these Shadow Web sites, and he basically told me what I said on the “fact list” above – it’s a live torture show, you need to pay, and you need download a special browser to view it.

And yes, I know that lots of the creepypastas on Reddit and YouTube talk about the “shadow web”; I assume that they’re all bullshit. I still find them entertaining anyway. But I also find The Texas Chainsaw Massacre entertaining!

If any of you want to take the risk of paying for this and viewing it, go right ahead. But don’t say I didn’t warn you.

I imagine there are other sites like this, too – but I have my doubts that any of them are genuine.

Questions? Comments? Please! Let me know!


Writing for Deepdotweb (Shameless Plug!)



by Ciphas

OK, if my readers haven’t figured this out already – I’ve been writing for Deepdotweb, who, even before I started this blog, were one of my favorite resources to go to regarding the deep web/dark web.

Recently, I finally got up the nerve to start submitting my work there, and – lo and behold – they like it! I write under the name “Ciphas” there, so I might as well make that my byline on here as well. If you’re interested, here are a few of the articles I’ve published recently:

6 More Linux Distros for the Truly Paranoid

A Noob’s Guide to Mesh Networking

6 SSH Clients for Dark Web Explorers

Cool, huh? I’ll have some more coming out very soon. In the meantime, I’m doing a lot of research, and spending just a bit more time on the dark web. I must say, I’ve been scarred for life.

I also recently wrote a guest post on Tools4hackers, entitled Secrets of the Dark – Resisting Censorship Freenet. I plan on writing a few more articles for them, too.

This is definitely a fun process, and I’m on the hunt for another article idea or two as I write this.

Does anyone have any suggestions? My official “darknet writing email” is ciphas@protonmail.com.

Feel free to email me about anything I should check out (whether scam, genuine, or otherwise). I just might turn your suggestion into an article!


Red Room Response!


by Ciphas

So, I received an interesting comment on one of my older posts today, specifically the one Red Rooms Finally Debunked Forever? The comment read as follows:

Are you crazy? Have you not even heard of the likes of people such as Peter Scully? People who have been put in jail for doing stuff EXACTLY like this?? What confuses you about these?? Just cuz it doesn’t fit under the perfect, stupid made-up “red room” criteria that a bunch of basement-dwelling, reddit and 4chan teen faggots created?? This stuff is very real.

Let me clarify something: in spite of the title of the post using the word “debunked,” I wasn’t necessarily saying that nothing like that exists. I was merely speculating about the possibility that it might or might not exist (which I’ve done a lot on this blog).

I am well aware of the case of Peter Scully and his torture/CP videos. I’m also aware of the case of Matthew David Graham (a.k.a. “Lux”), who ran the hurtcore sites “PedoEmpire,” “Hurt 2 The Core,” and “Love 2 the Core.” For more information about that case, read Deepdotweb: PedoEmpire’s “Lux”: Matthew David Graham Jailed for 15 Years.


Trust me – I know that there is sick shit on the dark web, and have even seen a few things that made me want to throw up or go hide underground. What I was trying to debunk was the idea of live murder in which the audience could participate.

As I’ve said in other posts, the Tor network, Freenet, and some other darknets tend to load pages so slowly that it would be near-impossible to live stream video over them.

If the definition of a red room is: “A web site on the dark web that shows the live torture and/or murder of a victim, and is one in which audience members can pay to participate,” then these networks would barely be able to support that because of latency.

On the other hand, one of the things which does exist on certain sites is that dedicated members have special access to hidden sections of the site. In the case of Mr. Graham, some of his sites allowed members with special privileges to direct and film their own CP videos, which they then would upload on the sites.

The notorious Peter Scully was one such member, and he eventually started his own production company called No Limits Fun, which would produce such videos. Apparently, he also offered pay-per-view streams of these videos. (In case you haven’t heard, people are now calling for the death penalty in his case; he hasn’t officially been sentenced yet.)

As horrific as this all may be, I don’t think the audience members could participate in the videos; they were previously recorded.

That being said, there might be something of this nature that still exists, but if there is, I haven’t found it.

I’m not denying that there are sick things or sick people on the internet, but I was merely trying to look at it from a rational point of view.

I have read stories from a few people who say that they’ve seen such things, but I don’t have enough evidence to confirm or deny these stories. One of the stories you can find here: My visits to the darkest sites on the deep web. (Make of that what you will; I don’t know if it’s true or not.)

I also talked to a writer on Quora who wrote about such an experience, but again, I can’t verify whether it’s true or not – it just seemed very genuine, so judge for yourself: What is the worst thing you’ve seen on the deep web? (And yes, I know they said “deep web” and not “dark web.” They meant “dark web.” Cut them a little slack.)

Finally – if you are someone who has personal experience viewing a red room, then I stand corrected. I was only speaking from my experience, and what I had read and learned about how most darknets work.

If you have seen this and have the guts to comment on it, feel free.

Alienet: a Different Sort of VPN


by Ciphas

DISCLAIMER: I do not know if this site is a scam or not. As far as I can tell, it isn’t, but I haven’t been using it for that long. If anyone knows otherwise, please inform me. Thanks!

Good morning, readers! I’m back after quite the hiatus. I confess this is because I’ve been writing for other publications! (That’s good, right?)

I’ve also been (as the title says) exploring quite a few more darknets beyond just Tor, I2P, and Freenet. Maybe this is obvious to some, but those three are only the tip of the proverbial iceberg.

Anyhow, those of you who watch SomeOrdinaryGamers on YouTube (specifically his “Deep Web Browsing” series), might recognize the site above, called Alienet. He covered it in his video AYYLMAO PARALLEL NET!?!.

According to the person (people?) who run Alienet, it’s a VPN-based hidden network, that emphasizes privacy, anonymity, and security.

In their words (misspellings left intact):

Alienet is the only hidden network that will totally hide your ass from the big brother: when you’re connected to Alienet, your machine will result OFFLINE for the entire internet wolrd! Is that safe enough? Enjoy my dears…..

Spelling and grammar errors aside, I do believe that Alienet is a legit network (in spite of Tor’s plethora of scams).

It uses OpenVPN, an open-source SSL VPN. OpenVPN allows remote access, site-to-site VPNs, and a number of other configurations.

In order to join Alienet, you have to install OpenVPN (of course), and then ask for an Alienet Client Key. The admin will ask you for some particular information, including your operating system, encryption keys, and a contact email.

OK, sounds pretty simple, right? I haven’t actually connected to the network yet, but I have tried one of their other services, specifically AnonyMail, which is a privacy-themed email service.


Of note: AnonyMail works on both the clearnet and on the Tor network, so you can receive emails from darknet email clients like SIGAINT and OnionMail, as well as most clearnet email providers.

I did a test email to one of my darknet friends through AnonyMail, and it worked with no issues, so I’m assuming that it’s perfectly OK.

The other day, I also finally connected to OpenVPN (I was having password issues initially), and it works just fine. So…once I finish the Alienet process, I’ll probably do a “Part 2” about that.

The site also explains that once you connect to Alienet, you can access “.anon sites,” which were probably created through a DNS hack – they certainly aren’t listed at IANA – Root Zone Database (i.e. the official list of approved domain names). I believe this is how the .onion domain name was originally created.

Some DNS names, after they’ve been submitted for approval, do become official names, but that takes a long time.

Anyhow, I thought this might interest some of you. Take a look at the network, and let me know if you find anything interesting!



Creeping Back to the Dark Web!

by Ciphas

So, after the brief setback I suffered in Looking for Linux!!, I’ve found a temporary solution.  I have an old computer I can use for the time being, so I can continue writing, coding, etc.  It looks a lot like this:


Author: Clusternote 2015 Wikimedia Commons

One of the things I have in mind to do for future posts are to try out some of the webmail services on Tor and other networks, so I can come up with a good recommendation.

Currently, I am using SIGAINT, which is one of the more popular (and controversial) services, but there are certainly others.  (It’s been attacked more than once by security agencies, which I’m well aware of, thank you!)


If you go by 1EarthUnited’s List of Secure Dark Web Email Providers in 2016, you may find some good recommendations, but it is partially a matter of personal preference.

I’ve hunted around the Tor network and found a number of other email services, but as to whether they’re the most secure, that remains to be seen.  Some of the ones I intend to try out are OnionMailSquirrelMail, Mail2Tor, and Roundcube, which have both clearnet and darknet URLs for their landing pages.  Those links go to the clearnet sites (just so you can find out more about them).

I’m also in the process of researching live CD and USB operating systems, which is something I’ve been meaning to write about for awhile, but I occasionally had some compatibility problems with my system. That’s one reason I’m researching a good Linux system (besides the fact that I just like them).

Beyond just Tails and Whonix, I’d also like to try out these, specifically:

Kali Linux kali-linux_605634_full.jpg





Arch Linux


Linux Mint


And a few others that I won’t list at the moment.  Ooh, each one could be a future post…how interesting!!  I could make up a cheesy Linux song to go with it (but I don’t want to torture you).

It looks like I’ve got my work cut out for me.

What, No More Dark Stuff?


Hey, I didn’t say that!  It’s just that the dark stuff takes time and effort to research.  Plus, to be honest, the more I investigate the dark web, the less scary it becomes.  There are still some terrifying things on it; don’t get me wrong.

I just would like to share both the good and the bad.  There’s nothing “wrong” with that, is there?

Besides, what I’ve realized is that if you actually want to be taken seriously when talking about the dark web, you can’t only tell horror stories.  Do you think I want to be another Takedownman?

Wait…forget I even said that.