There Is No Marianas Web, But . . .

isolation-threat-dark-web-100697135-large

by Ciphas

I’ve noticed that a popular question regarding the deep/dark web lately is about “Marianas Web,” which is supposedly the “deepest” level of the deep web. Well, I hate to tell you this, folks, but there is no such thing. There never was.

I believe I’ve referenced RationalWiki’s Deep web entry before, but it really is a great reference if you want to know the honest truth about it. I love the idea of there being “levels” to the web, but it’s the stuff of sci-fi.

Nonetheless, as I’ve mentioned on some previous entries, there are many anonymity networks other than Tor in existence – this might be the kind of thing that people are searching for…what else is out there?

So far, I believe I’ve discussed I2P, Freenet, and ZeroNet to a degree. If you have yet to explore these, take a look. There’s some interesting stuff to be found.

Oh? What’s that you say? You’ve already used these and found nothing? Well, as they said on All Onion Services:

The truth of the matter is there isn’t very many online onion services. Of those that are online, most aren’t worth visiting. They’re scams, phishing attempts, or low-traffic forums that are going to stop existing after a week. You should very quickly realize this after using a “real” index or search engine. No, your inability to find awesome secrets or spooky media is not because you haven’t found the right index/search engine. It’s because that stuff isn’t there. At least not on the “deep web.”

allonions_2

Yeah, that might be disappointing, but even I was surprised to find, upon my first day visiting Tor, that it was far from what the horror stories had made it out to be. Most of what I clicked on turned out to be dead links, in fact.

Still, I was interested in what other networks might be out there, which was how I ended up coming across the variety of wireless mesh networks and P2P networks that were (or are) actively being developed.

One that interested me a lot was Netsukuku (maybe just because of its name), because it was not only a mesh network, but also, as the developers stated, meant to be “autonomous.” (How’s that for your giant A.I. separate from the internet?)

Mother_Brain_Metroid_Zero_Mission

Unfortunately, it appears that Netsukuku is no longer being developed, though I think you can download some releases of it from repositories:

Netsukuku Dyne.org

Index of /netsukuku

It may be that you can compile and install it, but there aren’t a whole lot of peers to connect to. I’ve experienced this on some other P2P networks, like Osiris Serverless Portal System, which I mentioned on a much earlier post.

osiris_sps2

Osiris is a network that allows the anonymous creation of web portals without a central server – like Tor, its concept was to protect data and resist censorship. Unfortunately, it doesn’t seem to have been updated in a long time either. You can try it out if you like at the link above.

Anyhow, my concept of a “Marianas Web” would be this: a censorship-resistant, private network that is not connected to the internet, and could only be accessed by a select group of people.

It, like Tor, would disguise your IP address and encrypt messages, but might also allow things like P2P file sharing. It would be interesting if it had types of services that you couldn’t find on Tor, to differentiate the two.

Want to create one? I’ll join you on there in a minute.

P.S. You want liiiiiiiiiinks, don’t you? Here:

Evilweb Forum

Advertisements

Exposing A Scam: V3RDAD

For the record: I don’t like scammers (who does?), but I have encountered many of them, especially on Tor and other darknets. I suppose that’s all par for the course.

My most recent scam encounter has been with a fellow who calls himself (or herself?) V3RDAD.

He has a profile on ask.fm, which is a question and answer site along the lines of Quora or Yahoo! Answers. On this profile, he links to a Tor hidden service at http://dafynex6ytjnpeo4.onion/ Fine – there’s nothing wrong with that, except that I find all of his answers to be sketchy in nature.

Here’s one example:

ask_fm_scam

In the screenshot above, someone asks “Why does taur node open a listening connection? My antivirus blocked it.”

His answer:

“Taur Node creates a listener to handle up-to-date information coming from the network itself. The only purpose of it is to display pop-up information about the network, like network status, node availability, login information, etc. Just disable your antivirus software before starting the node. If you are too paranoid about it, you can simply just kill it’s process after you are done / disconnected from the network and re-enable your antivirus again. Killing the process of the node will disable any incoming activity and kill the listener.. you will basically not be able to receive any information about the network anymore.”

OK – does that sound suspicious to anyone? He’s asking some random person to disable their antivirus program after the program blocked this so-called “taur” software. I realize that on occasion, antivirus programs will block software that isn’t malicious, but why should I trust you, V3RDAD?

The Tor hidden service that he links to is entitled “whoami,” and looks like this:

dafy_node_scam

The links with the purple text have various downloads, all of which (as I said before) look very sketchy. The operator of this site claims that you need the downloads to connect to a so-called “taur node” (in other words, nodes on his “private network”).

Again, this sounds like a scam to me. If you really want to try it (which I don’t recommend), use a virtual machine (e.g. Qubes or Tails) so that the file can’t potentially harm your computer.

If you look at some of his other answers, they also sound like bullshit:

Q. What is vbs0rkxc.dafy?

A. The answer to Level 7.

Um…OK, if you say so. If you’ve read any of my earlier posts (or RationalWiki, for that matter), you should know that there are no “deep web levels,” as intriguing as that might sound.

It’s possible that the same person may also have written this blog post, although I’m not sure: Darkfantasy Network. Why do I say this? It has a list of so-called “dafy links” (where have I heard that before?)

dafy_links

In addition, it has a list of “Nept Links,” “Life Links,” “Taur Links,” and “Elen Links,” accompanied by mysterious descriptions. Here are a few examples:

http://girogahary5arofeideidegivoly.nept/ – Dark Babylon City (hidden marketplace)

G94dkElc.dafy – Conspiration Forum

http://ekkhgiskagfrawahulatriaottyx.nept/ – How the Universe was Created

You get the idea. And to try to lend credence to his links, he throws in a few real ones, including ChaosVPN and Freenet. This isn’t the first time I’ve seen something like this. Remember The Shadow Web? (*cough cough*)

Anyhow, I don’t suggest downloading anything from these sites, as it may potentially harm your computer. And of course, don’t give this person any money. Want some real darknet links, though? Here:

http://rrbm3jiflz3euxhp.onion/wordpress/

http://zfq7tgxed245jpdz.onion/ – The Darknet Project 0ffSecurity

bdtq4shqkbb3yy7b.onion – DARKWEB LEGION (yes, that’s how they wrote it)

ZeroNet Links:

http://127.0.0.1:43110/kaffiene.bit/

127.0.0.1:43110/138R53t3ZW7KDfSfxVpWUsMXgwUnsDNXLP/

http://127.0.0.1:43110/zerochatrooms.bit/

Freenet Links:

http://localhost:8888/freenet:USK@tiYrPDh~fDeH5V7NZjpp~QuubaHwgks88iwlRXXLLWA,yboLMwX1dChz8fWKjmbdtl38HR5uiCOdIUT86ohUyRg,AQACAAE/nerdageddon/247/ – Nerdageddon

http://localhost:8888/USK@XJZAi25dd5y7lrxE3cHMmM-xZ-c-hlPpKLYeLC0YG5I,8XTbR1bd9RBXlX6j-OZNednsJ8Cl6EAeBBebC3jtMFU,AQACAAE/index/711/ – Enzo’s Index

http://localhost:8888/freenet:USK@2u8eFaTHrvLzeHeq9vXFV8wzivgTG1ExY6v1cM8Zblo,eDLofzubExKX5A8TK0SqdQb3jrI0fDlgw-iaxXUEHVQ,AQACAAE/ttipdocs/5/ – Greenpeace TTIP Leaks

http://localhost:8888/USK@1ORdIvjL2H1bZblJcP8hu2LjjKtVB-rVzp8mLty~5N4,8hL85otZBbq0geDsSKkBK4sKESL2SrNVecFZz9NxGVQ,AQACAAE/bluishcoder/21/ – Bluish Coder

I also recently found a site that maps the Hyperboria Network, which uses the cjdns protocol: fc00 – these I really haven’t checked out yet, so maybe you can fill me in!

I guarantee that these are all real links (although I can’t guarantee that the information on them is accurate). Check those out, and let me know if you find anything of interest. If you don’t, keep searching!

 

 

 

 

 

 

There Will Be No Order, Only ChaosVPN

by Ciphas

tinc_vpn_command

I’m always flattered when I get the chance to correspond with my readers and subscribers. One reader asked me recently, regarding my earlier post ChaosVPN: Making Friends with Hackers!, how to connect to it – or at least about one of the steps in doing so.

I must confess that I’m only minimally experienced with it myself, but it seems that using it is somewhat similar to using other private networks. Specifically, the part that he seemed stuck on was this: ChaosVPN:Howto – Mail us your infos [sic].

The wiki has very specific instructions as to what to do next, but the specifics they ask for are:

a. A sponsor – in other words, someone who’s already on ChaosVPN who can vouch for you. If you don’t know someone, I’m sure you can find one with a little digging.

b. gatewayhost=<clienthost> – the external hostname or IP address of the client host. This should not be an address from within the VPN; it’s the name of your machine. So if your machine were named “Ciphas,” for example, then that would be your hostname.

c. network=<ipv4 subnet in the vpn>
network=<ipv6 subnet in the vpn>

What they mean is that they need to know an IP address for a subnet in their VPN which you would like to use. On the wiki, they have a list of IP ranges to choose from: ChaosVPN:IPRanges. Pick an IP from the list and insert it here.

d. owner=

Here you would put the name of the admin of the VPN gateway which you would like to use – it’s so that there’s someone to contact in case of possible issues.

e. port=4712

The port you will use for your connection. According to the wiki, it’s better to use a random port for this, but 4712 is one possible option. TCP/UDP port 655 works as well.

f. hidden=0

Use this only if you cannot accept inbound tunnel connections.

silent=0

Use this only if you cannot connect out.

g. Ed25519PublicKey=<something>

When you first start using tinc, you have to generate a public key via its command line, using the command “init [name],” with [name] being your node name.

For a full list of tinc commands, go here: tinc commands.

So, that being said, you do all that stuff, and then send a contact email with this info to chaosvpn-join@hamburg.ccc.de. The tricky part may be finding a contact person within the network, but you may be able to find that on the wiki too.

You don’t have to use tinc to connect to ChaosVPN, by the way – it’s also accessible via dn42, which is a VPN designed for experimental purposes. Click the link there to find out more about it.

Just remember – these guys won’t help you find The Shadow Web or anything like that – so don’t ask.

Is Your Password on the Dark Web? Maybe.

doxbin

For the record – the site above isn’t the current Doxbin address, but I wanted to give people a general idea of what it looked like. Nonetheless, there’s still a Doxbin Twitter account, @_DoxBin_, which is affiliated with Gray Hat Forums, apparently.doxbin_twitter

I’m sharing this because my broader topic is data leaks and password managers. First of all, no password appears to be 100% safe, but you’re better off if you use a good one. If you look at one of the lists of “most common passwords,” according to this article in The Telegraph, they tend to include ones like this:

12345

123456

qwerty

google

starwars

And so on. I hate to admit it, but when I first “joined” the interwebs back in 1994, I was guilty of having some passwords like these. I’ve since learned that you need to up your security.

One of the reasons that I wanted to tell you about this, my loyal readers, was that I was recently looking at the sites Has my email been hacked? and Have I been pwned?. In the process, I found a disturbing trend: just by looking at the types of sites that someone had login credentials for, you could really tell a lot about their personal life.

hacked_emails

 

haveibeenpwned.png

For example, I typed in a “made up” email address onto the first site (which turned out to be a real one), and some of the results included Badoo, neopets.com, lookbook.nu, and mate1.com.

Anyhow, I think that to avoid this, it would be best to use a good password manager, particularly one that can keep your passwords offline – and therefore not vulnerable. Also, I tend to randomly generate my passwords using the Diceware method, which fellow WordPress author W. Smith talks about in Unique usernames with diceware.

In a nutshell, you use the dice to come up with combinations of words and numbers, which then become your password (or “passphrase”). The password managers, on the other hand, do this for you.

One of the ones that I like is KeePass, which locks your passwords in a database and encrypts them with the algorithms AES and Twofish, which are considered to be some of the best at present.

sshot4dc4340510f7b

KeePass, unlike some other password managers, does not store your passwords in a cloud. Also, its complete database is encrypted (e.g. your usernames and other info). Oh, and did I mention that it’s open source? Open source = good.

To see more of its features, check out Features – KeePass. And no, I don’t work for them, so this isn’t an official endorsement.

Another password manager that I’ve been testing out is bitwarden, which, I am pleased to note, is 100% FOSS. bitwarden offers a web extension for all major browsers, including Tor, and a mobile app.

bitwarden_menu

The downside, compared to KeePass, is that bitwarden only supports storing passwords in a cloud (as opposed to offline), which has the potential to be a security threat. However, it does allow 2FA and encrypts passwords with your master password (just as KeePass does).

An IRC buddy of mine by the name of Sheogorath does a good comparison of four different password managers here: Password safes – LastPass vs. Bitwarden vs. Keepass vs. Pass. Compare them all for yourself and decide! (By the way, if he’s into anything criminal, I’m not responsible.)

All that said, though it may seem like a pain to have to go through all of these steps, I think it’s better than having your password end up on Doxbin (or somewhere worse). Right?

Tor Links of the Day!

tor-circuit-root-feature-hero

Good morning, readers! I realized that it had been quite some time since I had posted any new Tor links, so I thought I’d look up a few. By the way, I get asked this question constantly, so I just might share a few of my sources for links as well – interested? Sure??

2bgqw5szz2i34nek.onion  – CgAn TorMail (anonymous email service)

http://yulxt5toyxavkb7r.onion – Japanese “Anonymous” Group

jzxnsn6wgiwtzyr6.onion – DarkElf Hidden Chat

http://suirhii74snoby7q.onion – Suicidal

http://oeyaizjbn5qugev4.onion – torDrive – by The Darknet Project

http://tmxwwir2rbxakwmi.onion – Dark Italy

http://7uuxkgy744yrye46.onion Rent-A-Hacker-Warez21 (possible scam)

http://faktory2kcaduuvm.onion – Faktory (carding site)

http://wfgmimnd2ln5bcy7.onion – DARK

http://snuffnu56nh7tpvi.onion – SNUFF Cinema (also a possible scam)

Be careful about giving any personal information to these sites (especially the ones labeled “possible scam”). I’ve only listed them here for your curiosity, but feel free to explore!

Hopefully I’ll have some more to list soon.

 

 

NewPipe: A Decentralized YouTube and More

In truth, the purpose of the dark web is really anonymity (hence the word “dark”). Of course, with all of the sensational reporting about it, you wouldn’t think this is the case.

This is what has kept me interested in it, two years later. In the same vein, I’ve become fascinated with other decentralized apps as well.

Like many of you, I enjoy music and film, and of course I love watching YouTube. One of its downsides, of course, is that it has copious ads, and the number of ads seems to have increased as of late. This may be because YouTube is pushing for people to subscribe to their YouTube Red streaming service (and more recently, YouTube TV) – both of which are paid services.

youtube_tv_devil

 

If you can afford them, that’s great, but at the moment, that’s not an option for me, which is why I decided to check out NewPipe, a YouTube frontend that is intended to be used without the proprietary YouTube API or Google Play’s proprietary media services.

Essentially, it looks like a stripped-down version of YouTube, and can play the same videos, but without all the ads and tracking. Its interface looks like this:

newpipe-2

In case you’re wondering – no, that’s not my screenshot, although I don’t mind some Die Antwoord once in awhile. Like YouTube, NewPipe has a search function at the top, as well as autosuggest.

Also, like YouTube, it allows you to subscribe to channels and make playlists. Plus, on NewPipe you can easily download videos, for which YouTube does not have a function. Previously, when I wanted to do that, I would install some external application (some of which turned out to be rather sketchy in retrospect).

I haven’t played around with it enough yet to see if it has any “secret” functions, but it doesn’t appear to.

On top of all that, NewPipe is open source, which YouTube isn’t. In terms of the whole privacy/safety debate, that gives NewPipe an edge over YouTube. Now, it’s still a fairly new app and I’m sure it has bugs, but as I always say, if you’re a developer, feel free to contribute your knowledge and expertise. Their GitHub repository is here: TemNewPipe/NewPipe.

This is not to say that I’ve quit YouTube altogether, but I have become aware that some of my apps are stalking me, and I wouldn’t having the option to look elsewhere.

Don’t believe me? See what happens next time you Google “sex toys” and then watch YouTube videos.

I guarantee you’ll see an ad for butt plugs – or something along those lines.

 

 

 

Tor Social Networks: Oct. 2017 Update

Who knew that socializing on the “dark web” would be such a popular topic? On my earlier post Fun with Dark Web Social Networking!!, someone mentioned that the beloved site Galaxy2 is no more, which I didn’t realize.

As some of my friends on IRC like to say, “rip” (all-lowercase intended.) Well, it’s Tor – what did you expect? Sites seem to go down and come back up again rather frequently.

In any case, you may be wondering about any alternatives that exist. I’m happy to report that one of the sites that I mentioned in the original post, Blackbook, is back up again. As before, you can find it at http://blkbook3fxhcsn3u.onion. It has a new, slightly more modern look, and seems to be functioning for the most part:

blackbook_homepage_censored

Like Facebook, it has a news feed, polls, forums, pages, etc. Because it’s Tor, though, you may find that the subject matter tends to differ a lot from that of Facebook. As has been my experience on some other Tor sites, a common question is, “How do I hack [insert social media site here]?” In fact, when I checked it today, someone was asking how to hack WhatsApp; maybe that will be the subject of a future post.

Also, as I remember from my previous membership, there are people advertising “hitman for hire” services and other sorts of financial offerings.

However, like before, it requires the use of JavaScript, and depending on whether you trust the site or not, this may be a good or bad thing. You can log into the site without enabling scripts, but some of its basic functions won’t work. For example, you won’t be able to leave comments, check your messages, etc.

I tend to be wary of Tor sites that require JavaScript, because of the potential for JavaScript exploits, such as Cross-Site Scripting (XSS), which I have encountered on other Tor hidden services in the past.

That aside, there’s another troubling aspect to this – Blackbook seems to be affiliated in some way with The Hidden Wiki, which many Tor users think of as their “introduction” to the dark web. The problem with this is that The Hidden Wiki is loaded with scam sites, and that makes sense, given that a lot of noobs visit it when they first venture onto the dark web.

Lo and behold – just like The Hidden Wiki, Blackbook has a number of ads for financial services of sorts on the dark web. While I haven’t tried them personally, they look sketchy to me, so I would avoid them if I were you. Anyhow, if all you really want to do is socialize, and maybe learn some things, you’re fine.

Meet Some Psychos

http://psycnets7z6tvqpa.onion

psycho_social

The other “social network” which I recently joined is called “Psycho Social Network,” and as its name implies, it seems to be geared toward people interested in dark things. Hopefully they’re not real psychos – well, it’s the dark web, so you never know.

It even features a shot of Patrick Bateman from the movie American Psycho, appropriately. (“Do you like Huey Lewis and the News?”) Given that it’s brand new, there don’t seem to be very many people active on it, although this could change.

Like Blackbook, it has at least one group dedicated to hacking and exploits. Some of the more unnerving groups, however, were called things like “Gore and Torture.” Don’t get me wrong – I love some gore as much as the next guy, but there’s LiveLeak for that.

So, if that’s what you’re into, you may want to check this one out. Heck, I’d be honored if I managed to attract a few people with this post!

In the meantime, I’m gonna leave – I have to return some videotapes.