Dark Web Links of the Day Pt. 1

blackmarketammo.png

by Ciphas

I’ve been receiving comments on my profile asking if I could post some links, so I’m more than happy to oblige. One thing I should remind my readers about, though – Tor and its darknet brethren are rife with scams. So if anything sounds too good to be true (triple your bitcoin in 2 seconds!!), then it probably is.

TorBay (forum) https://2or24opd2hkebadv.onion

Digital Gangster https://2fwqhlzx5dxiyggr.onion

IDC – Italian Darknet Community https://2qrdpvonwwqnic7j.onion/

Walmart Stuff https://42bu3fd5gaxu3xbn.onion

TorRoulette https://4mxhmvyfba2ji7lb.onion

W38M411 https://23tjl3xpt5btiqms.onion

GRAVES DESIGN https://362jdnvs4w5itsql.onion

A Darknet Dictionary (Work in Progress, with Links!)

darr5

by Ciphas

So, given that there seems to be a lot of confusion about certain terms connected with the darknet and/or dark web, I thought it might be useful to have a “darknet dictionary” here. I must give some credit for this idea to Deepdotweb.com, who featured a similar article at DeepDotWeb’s DarkNet Dictionary Project! This isn’t a carbon copy of theirs, but they inspired me.

Their darknet dictionary is an ongoing project, so I think I’ll do the same with mine. If anyone wants to suggest new entries (or corrections) in the comments, feel free! I just may add them.

NOTE: Some links below may be down.

2FA – Abbreviation for “two-factor authentication.” 2FA is a type of multi-factor authentication (MFA), i.e. a user is only granted access to a site after presenting multiple pieces of authentication. Although used on the clearnet as well, 2FA is used on many darknet markets (and other sites) to verify users’ identities.

Example: a username and password, plus a separate PIN or a security question.

img21

Active at Dark Markets? – A Tor hidden service set up by Dutch law enforcement to warn darknet market users that they are being tracked.

activedark.png

Ahmia.fi – A search engine that finds Tor hidden services and I2P eepsites. Also available on Tor at http://msydqstlz2kzerdg.onion/.

ahmia

Alienet – A VPN-based hidden network that offers messaging, mail, IRC, and hidden services. Not as well known as some other darknets, but it is real. Their site is at http://darknetproject.info on the clearnet, or https://unionsoe3yw6fxaq.onion on Tor.

alienet

AlphaBay – Currently one of the top darknet markets on the Tor network. Uses both multisig transactions and a traditional escrow system (depending on the vendor). Access it at this link: http://pwoah7foa6au2pul.onion/register.php?aff=41211

AlphaBay-Home-e1440639625779

AYW – All You’re Wiki [sic]. The Hidden Wiki with all CP links removed.

allyourewiki

Besa Mafia – A fake hitman service that (surprise, surprise) turned out to be a scam. Though a number of people paid to use their “services,” no one was ever hurt or killed. The admin of the site did escape with a number of people’s bitcoins, however.

besa

Bitcoin– A digital currency created by the mysterious “Satoshi Nakamoto” in 2009. Bitcoin incorporates encryption techniques to regulate the creation of new units, and to verify the transfer of funds. The smallest units of bitcoin are called “satoshis.”

bitcoins182way

Bitcoin billionaire yet?

Bitcoin Mixer – A service used to disguise the trail of bitcoins back to their original owner. Often used when buying and selling illicit goods on darknet markets. A few examples of bitcoin mixers are: BitCloak, Grams Helix, and BitBlender.

bitcloak

Blackbook – A former social network on the Tor network, modeled after Facebook. Used to be located at https://blkbook3fxhcsn3u.onion.

Blackbook

Black Market Reloaded (BMR) – A former darknet market on Tor, and one of the oldest, which is currently offline. Plans have been announced for it to restart.

black-market-reloaded-screenshot

Blockchain – A public ledger of all bitcoin transactions that have ever been executed. This applies to other cryptocurrencies as well.

blockchaininfo

BotDW – Boss of the deep web.

botdw

Candydoll – A term referring to non-nude photos of children in suggestive poses or sexy clothing. Softcore child pornography, more or less. (Also may refer to makeup kits that are designed for this style of photography.)

NOTE: The screenshot below is from one of the sites selling the makeup kits.

candydoll_makeup.png

Carding – The trafficking of credit cards, bank accounts, website accounts, and other financial or personal information. May or may not take place within larger darknet markets. Some vendors on the dark web specialize in this type of crime.

darknet_forum

Cheese Pizza – Another slang term for child pornography.

Cipherspace – The “hidden internet,” built on top of anonymity networks like Tor, I2P, Freenet, and others.

Clearnet – The “normal internet” accessible without special software or configurations. (e.g. Google, Bing, Facebook, Wikipedia, Twitter, Reddit, etc.) Also sometimes referred to as the “surface web” (though this term is wildly inaccurate and confusing.)

surface-web-anz-tech-anztech-pc-fix-in-manukau-computer-repair-in-penrose

Enough with the icebergs, already!

Cold storage – Keeping a reserve of bitcoins offline (e.g. on a USB drive or encrypted media) to prevent tampering or theft.

coldstorage_bitcoin

CP – An acronym for “child porn” or “child pornography.”

Cryptography – The art of writing and solving codes. With regard to the dark web, it is a means of encrypting data (messages, etc.) that you send over the network.

Daisy’s Destruction – An infamous film made by child pornography producer Peter Scully (see entry), through his company No Limits Fun. The film shows the sexualized torture and abuse of several young girls, one of whom is referred to as “Daisy.” However, the film has reached mythological status on the web, with the details and facts about it being blown out of proportion.

daisy

Darknet – An overlay network that requires specific software, configurations, or permission to access. Examples include: Tor, I2P, Freenet, GNUnet. Some of these networks (like Freenet) have both “darknet” and “opennet” modes, where you can choose whether to connect only to peers that you trust, or connect to anyone.

ccnx_166975_full

Darknet Heroes League (DHL) – DHL is an escrow market comprised of old school vendors who were invited to sell there. Access it at http://darkheroesq46awl.onion.

dhlmarket

Darknet Market – A market hosted on an anonymity network (such as Tor) that often (but not always) deals in illicit goods. Popular purchases include drugs, drug paraphernalia (like pipes), firearms, hacked PayPal accounts, skimmed credit cards, counterfeit money, porn accounts, and fake official documents.

dream_market_drugs

Dark0de (a.k.a. Darkode) – A notorious hacking and cybercrime forum, originally hosted on the clearnet, which transitioned to the Tor network.

DarkodeKoS.png

Dark Mamba – A new “private military company” that claims to offer murder-for-hire services, run by the admin of the old Besa Mafia site. (i.e. another fake hitman site.) Located at https://darkmambawopntdk.onion.

dark-mamba

Dark Web – The part of the web that exists on darknets like Tor, I2P, Freenet, GNUnet, and other networks, and requires special software, configurations, or permission to access. The dark web is a small part of the deep web. The word “dark” does not refer to the content, but rather the fact that the networks are special access.

SIGAINT-attack

Dark Web News – A news site that reports on events that take place on the dark web. Also features bitcoin tutorials, links, and a comparison of darknet markets. Located at https://www.darkwebnews.com.

darkwebnews

DBAN – Darik’s Boot and Nuke – free erasure software that automatically deletes the contents of any hard drive it can detect, developed by Darik Horn.

dban11

Deep Web – The part of the web not indexed by traditional search engines, like Google. This term is often confused with “dark web,” but the two are not synonymous.

91d6d0cc4ed117a62f37c70d97e1a077_original

Deepdotweb – A site that releases news, articles, and occasionally tutorials about the dark web (primarily Tor). They also keep an accurate, updated list of darknet markets that’s very reliable. Can be found at Deepdotweb.com or https://deepdot35wvmeyd5.onion.

deepdotweb3.png

DisconnectA clearnet search engine that prevents other search engines from tracking your searches. It used to be the standard search engine on the Tor browser. Located at https://search.disconnect.me/.

disconnect_search

DNStats.netA site that monitors the status of various darknet markets and a few other sites on the Tor network. Located at https://dnstats.net/ on the clearnet, and https://dnstatstzgfcalax.onion/ on Tor.

dnstats

Doxing – The act of researching and posting someone’s personal information (e.g. phone number, address, full name) on the internet. Takes place on both the dark web and clearnet.

doxbin

Doxxters, The – A group who offers a doxing service for pay. Located at https://doxxtereufvckkiz.onion.

doxxters

Dream Market – Another top darknet market hosted on the Tor network, which uses a traditional escrow system. Access it at http://lchudifyeqm4ldjj.onion/?ai=1675.

dreammarket-drugs3

DuckDuckGo – Currently the standard search engine used on the Tor browser. Is popular with privacy-minded users. Located at https://duckduckgo.com/ on the clearnet, and https://3g2upl4pq6kufc4m.onion on Tor.

duckduckgo

Dump – The sharing of stolen data, such as usernames, passwords, credit card numbers, and bank account data. Also takes place on the clearnet, but is more infamous on networks like Tor.

dumpsad

Eepsite – The name for hidden services hosted on the I2P network. They end in the domain name .i2p.

eepsite

Freedom Hosting – A former Tor specialist web hosting service which, at its height in 2013, was the largest hosting service of its kind. Was the target of an attack by Anonymous, as well as a large law enforcement operation headed by the FBI. Has since been succeeded by another service dubbed “Freedom Hosting II.”

freedom_hosting

Freenet – A peer-to-peer network for censorship-resistant communication, touted as an alternative to other networks like Tor and I2P. It features anonymous messaging, email, social networking, and site hosting. A typical Freenet URI looks like this:

USK@MYLAnId-ZEyXhDGGbYOa1gOtkZZrFNTXjFl1dibLj9E,Xpu27DoAKKc8b0718E-ZteFrGqCYROe7
XBBJI57pB4M,AQACAAE/pyFreenetHg/31/

Download it at https://freenetproject.org/.

freenet_mainpage

Freesite – The name used for Freenet’s hidden services.

freenet_fms_setup

FullzIn carding terms, “fullz” refer to full database records of personally identifiable information. Such things might include names, addresses, phone numbers, bank account information, social security numbers, passwords, etc.

SPAM_smtp-rdp-cc-fullz-plus-bitcoin-carding-methods_6115250321125192472-a347a8c0d08d4002b40415e8063cdb64.jpg

Galaxy2 – A popular social network on Tor. It is a follow-up to the original Galaxy social network, created by “Lameth.” Located at https://w363zoq3ylux5rf5.onion.

0b034e7890a8d0073b501f05601a4071

GNUnet – A free software framework for decentralized peer-to-peer networking. It includes P2P applications, such as chat, file sharing, and VPN.

gnunet_screenshot

Grams – A Tor-based search engine for darknet markets, which helps compare goods, prices, and vendors. Tor link: http://grams7enufi7jmdl.onion/

grams-black-market-search-engine

HANSA Market – A darknet market with a multisig escrow system. Tor link: http://hansamkt2rr6nfg3.onion/affiliate/110

hansa_market

Hard Candy – Slang term for an underage girl – roughly age 12-16, on both the dark web and clearnet. Also can refer to child pornography featuring girls of this age.

Harry71’s Onion Spider – A popular link repository on Tor. Is respectable because it’s updated daily, and the links are generally accurate and active. Tor link: skunksworkedp2cg.onion

harry71_onion

Helix Light – A bitcoin cleaner available from the developers of Grams. Tor link: http://grams7enufi7jmdl.onion/helix/light

helix_light

Hell – Infamous hacking forum formerly hosted on the Tor network, where users share hacking tips as well as stolen data. There is another site currently going by the same name, but it is actually a clone site made with a stolen private key from the original site.

Hidden Wiki – Name for a popular wiki on Tor that links to and describes some basic Tor hidden services (for noobs). The main one is located at http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page. There are several other sites that use the name Hidden Wiki as well, but this one is usually the site in question.

hiddenwiki2

Hitmen/Assassins – A service that’s supposedly easy to find on the dark web. All of the sites offering these services have turned out to be elaborate scams, but the myth continues to be perpetuated by creepypastas and rumors.

hitman_network

Hurtcore – Most extreme form of child pornography, involving such things as physical injury and rape, which can be found on the dark web. Avoid at all costs.

screen-shot-2015-09-10-at-8-54-44-pm

Credit: allthingsvice.com

I2P – An overlay network and darknet that allows applications to send messages to each other anonymously and securely. Download it at https://geti2p.net/en/.

I2P_router_console_0.7.7

L33TER – A vendor shop started by L33Ter, vendor from most of the early darknet markets. Specializes in digital and physical products. Located at http://l33ter2w7q4bytfh.onion.

l33ter

LE – An abbreviation for “law enforcement.”

Litecoin – A peer-to-peer cryptocurrency that is based on bitcoin. Find out more at Litecoin – Open source P2P digital currency.

litecoin

Lux – Username of Matthew David Graham, convicted (and imprisoned) owner of child pornography sites PedoEmpire, Hurt 2 The Core, and Love 2 The Core (among others).

matthewdgraham

Mesh routing network – Networks made up of radio nodes arranged in a mesh topology. Examples include Netsukuku, GNUnet, Hyperboria, and CCNx. Many of these are still in beta mode and have not been officially released, but they have been advertised as alternatives to the traditional internet structure being used right now.

netsukuku

Multisig – An abbreviation for “multsignature.” The requirement for more than one key to authorize a bitcoin transaction.

multisig

Credit: deepdotweb.com

not Evil – The premier search engine on Tor. Was originally designed to look like a parody of Google. Located at https://hss3uro2hsxfogfq.onion.

notevil-chat

Onionland – A nickname for the Tor network.

2000px-Tor-logo-2011-flat.svg.png

OpenBazaar – A decentralized peer-to-peer marketplace that sells a variety of goods for bitcoin and currently runs on the Tor network. Not a “darknet market,” per se, but uses a similar concept.

openbazaar

Operation Onymous – An international law enforcement operation targeting darknet markets and other Tor hidden services in 2014. Supposedly shut down over 400 sites (although many were clone sites).

xzfzwwhgrbpgguhzhkiu

Outlaw Market – Another of the top darknet markets on Tor. Sells drugs, digital goods, weapons, and other merchandise. Access it at http://outfor6jwcztwbpd.onion/indxx1.php.

outlaw.png

Pedo – A slang term on the dark web for “pedophile.” Refers not only to the people themselves, but related sites and materials. (e.g. PedoEmpire)

PedoFunding – A now-defunct website on Tor run by convicted freelance photographer Richard Huckle. Huckle has since been imprisoned, and received 22 consecutive life sentences.

PGP An encryption standard created by Phil Zimmermann in 1991. The initials stand for “Pretty Good Privacy.” PGP is frequently used to encrypt and decrypt messages on the dark web.

public-key

PlayPen – A large child pornography site that, in 2015, was seized by the FBI and used to catch pedophiles who were accessing the site. This has been one of the more controversial cases, as some have questioned the legality of the FBI’s actions.

Qubes – A security-focused operating system that aims to provide security by isolation. One of many distros that can help provide security and anonymity. Official site: https://www.qubes-os.org/

r3rc1-nalu-desktop-1

/r/darknetmarkets – A subreddit dedicated to information and discussions about darknet markets.

/r/deepweb – A subreddit dedicated to factual information about the deep web and dark web (as opposed to urban legends).

Red Room – A series of mythological sites on the dark web that supposedly feature live torture and murder (see “Shadow Web”). Entrance to these sites (in theory) requires bitcoin, as well as special credentials, such as a password given by an administrator. They are, more or less, an extension of the urban legend of “snuff films.”

All of the ones that have become public knowledge have turned out to be scams, yet many creepypastas and YouTube videos have continued to perpetuate the myth.

darkredroom

Scam/Scammer – In the context of the dark web, someone who purports to be selling certain goods or services, and doesn’t follow through, or misrepresents their intentions (e.g. a drug vendor who never delivers their goods, or a “financial service” designed for identity theft).

sheep-scam1

Credit: Deepdotweb.com 2013

Scream, Bitch! – A hurtcore forum on the Tor network. For those of you thinking of joining, registration is closed.

sb_darkweb

Scully, Peter – An infamous Australian pedophile and producer of child pornography, most notably the film Daisy’s Destruction, which has achieved internet notoriety. Scully had formed his own production company to make these films, called No Limits Fun.

peter_scully

Shadow Web – A fictitious part of the dark web perpetuated by creepypastas and YouTube videos. Supposedly features live torture and murder shows for those who pay the right price. A number of sites on Tor claim to offer access to the Shadow Web, but they are all scams. Here’s one example: Shadow Web Gateway 2.0

shadowweb_3

Silk Road – An online black market, considered to be the first modern darknet market. Launched by founder Ross Ulbricht in 2011, the site was shut down by feds in October 2013.

2013116192258674734_20

Silk Road 3 – An escrow market that used to go by another name, but adopted the Silk Road brand. There has been much speculation as to whether or not the market will exit scam or will be taken down, but it is still currently running. Located at reloadedudjtjvxr.onion.

silkroad30_login

SSH – Stands for “secure shell.” SSH is a cryptographic network protocol for operating network services securely over an unsecured network. As with PGP, SSH uses public and private keys to authenticate users.

puttytunnel_06

Suicide Apartment – Members-only social network on Tor (which used to exist on the clearnet). It’s meant to be a site for people who are suicidal and want to find someone else to “leave the world with.” The only way to become a member is to receive a voucher from an existing member.

suicideapartment

Tails – A popular Debian-based live operating system that many dark web users install for extra protection. “Tails” is an acronym for “The amnesic incognito live system.”

tails_screenshot

TLA – An abbreviation for “three-letter agency.” Includes federal agencies such as the CIA, FBI, NRO, NSA, DEA, DHS, and others, who are looked upon with suspicion in the dark web.

hidden_site_seized.png

Tor – An anonymity network on which many “dark web” sites are hosted. The name “Tor” stands for “the onion router.” Frequently, people who say they’re on the “deep web” are referring to Tor. Download it at https://torproject.org.

tbb-screenshot3

TorBay – A Tor-based social network and forum which more or less replaced Blackbook.

torbay

Torch – A simple Tor search engine. Located at https://xmh5752oemp2sztk.onion

torch_search

Traderoute – A traditional and multisig escrow marketplace on Tor.

traderoute

Valhalla (Silkkitie) – Originally a Finnish-only darknet market, now available in English. Valhalla is invite-only, and offers both traditional escrow and multisig transactions, 2FA, and PGP. Requires a referral link to register as either a buyer or a vendor.

silkki

Vendor Shop – Smaller shops started by some of the major darknet market vendors, usually specializing in certain types of items. Examples: Mollyworld and MegaPack.

VPN (Virtual Private Network) – A private network which extends across a public network (internet). Many experts recommend using a VPN in addition to using Tor! (hint hint)

vpn10

Welcome to Dark Web Links and More! – Link list for Tor hidden services. Notable because they do not accept submissions of CP links, and also feature links to Usenet groups. Access it at https://jdpskjmgy6kk4urv.onion/links.html.

welcometodarkweblinks

Zion Market – A newer multisig darknet market without user wallets. Buyers have the option of selecting 2-of-2 (the server and vendor have the keys), or 2-of-3 (the buyer also has a key). Uses 2FA, automated PGP, and Bitmessage alerts. Access it at http://zionshopusn6nopy.onion/_reg23.

zionmarket

Zocalo – A former darknet market specializing in marijuana, hash, and various paraphernalia associated with it. Recently closed due to lack of business.

zocalo_market_weed

Zork – A 1980’s text-based RPG that is now playable on the Tor network (via the not Evil search engine).

zork

P.S. As I said above, this list is far from finished. So I’ll either add more entries in later, or do a part 2 to the post. Anyhow, hope you had fun, and feel free to add your suggestion

How to Access the Dark Web with I2P!

use-i2p-host-and-share-your-secret-goods-dark-web-anonymously.w654

What?  You mean there’s another way to access the dark web?  YES!

I’ve said this before, but it bears repeating – Tor is not the only way to access the so-called “dark web,” but it seems to be the most popular at the moment.  In fact, there are many ways to do so.  Oddly enough, many of the trending articles that discuss the dark web act as if Tor is the only way to reach it.

“Dark web” is essentially a metaphor for all the sites built on top of encrypted networks that require special software, configurations or permissions to access.  I must clarify this, however – Tor, I2P, and Freenet are completely separate networks.

On previous posts I’ve mentioned Freenet, but there are other options too, and I2P is one of them.  The reason that it probably doesn’t have the same reputation as Tor, or even Freenet for that matter, is that it’s a bit more complex to learn and use.  (At least that’s my guess).

So, downloading I2P is the easy part; just go to Download – I2P and install it!  The site offers packages for the following OS’s:

  • Windows
  • Mac OS X
  • GNU/Linux/BSD/Solaris
  • Debian/Ubuntu
  • Android

The tricky part, as you may have guessed, is the post-install work!  Courtesy of their homepage, I’ll offer the steps:

I2P_post-install-work

After running the installer on Windows, simply click on the “Start I2P” button which will bring up the router console, which has further instructions.

On Unix-like systems, I2P can be started as a service using the “i2prouter” script, located in the directory you selected for I2P. Changing to that directory in a console and issuing “sh i2prouter status” should tell you the router’s status. The arguments “start”, “stop” and “restart” control the service. The router console can be accessed at its usual location. For users on OpenSolaris and other systems for which the wrapper (i2psvc) is not supported, start the router with “sh runplain.sh” instead.

When installing for the first time, please remember to adjust your NAT/firewall if you can, bearing in mind the Internet-facing ports I2P uses, described here among other ports. If you have successfully opened your port to inbound TCP, also enable inbound TCP on the configuration page.

Also, please review and adjust the bandwidth settings on the configuration page, as the default settings of 96 KBps down / 40 KBps up are fairly slow.

If you want to reach eepsites via your browser, have a look on the browser proxy setup page for an easy howto.

Did that read like a foreign language to you?  Congratulations!  It did to me too, at first.  It may make more sense once you actually get into the process of setting it up…or not.

At first, I’ll admit I was somewhat intimidated by I2P, given that you couldn’t just install it and run it without a lot of configuration and forehand knowledge, but now that I’m more educated in that area, it’s kind of fun (believe it or not).  Or maybe it’s because I’m a nerd, I don’t know…

d4f20041254a0727ddce7cb81be9e68c

If you find the homepage’s instructions a bit too technical, there are a number of other sites that “translate” the setup tutorial into a simple guide. Deepdotweb featured one of these guides in this post: Full guide: How to access I2P Sites & Use TheMarketplace.i2p

The Tin Hat also offers a great tutorial here: How To Use I2P | I2P Tutorial & Setup Guide.  Plus, they explain how the network works in layman’s terms!

the_tin_hat_I2P

Screenshot credit: thetinhat.com

Once you have the network up and running and you open it in a browser (e.g. Firefox), you should see a page like this:

I2P_router_console_0.7.7

Credit: 2009 Wikimedia Commons

As it says, that’s the I2P Router Console, and from that page you can configure just about everything about your connection, how much bandwidth you’re using, and what IP address your “identity” appears to be (not unlike Tor, actually)!

Let the Right One In

hand-984170_960_720

I had to include at least one creepy image.

Now, I have to confess that the part where I got held up was when I tried to access actual I2P sites (known as “eepsites”).  I knew I was connected to the network, so that wasn’t the problem.

According to the official I2P FAQ, under the question explaining what eepsites are:

An eepsite is a website that is hosted anonymously – you can access it by setting your web browser’s HTTP proxy to use the web proxy (typically it listens on localhost port 4444), and browsing to the site.

I did this, but I was still unable to access a number of the eepsites (or at least the featured ones on the router console).  Therefore, my thought was that the sites themselves were down.

Either that, or my firewall settings were preventing me from accessing the sites – I plan on modifying those and giving this another try.  Of note: eepsites also tend to go down often (not unlike .onion sites), so that could also be the problem.

But Wait…There’s More!

I2PBote-inbox-0.4

Like its darknet cousin Freenet, I2P offers several main features:

Email/Messaging: I2P has a few different messaging services.  The main ones are a built-in email application and I2P-Bote, a secure messaging platform somewhat akin to Freenet’s FMS (Freenet Messaging System) application.

I2P-Bote is a P2P email service; there is no central server that stores your personal data. Email messages are stored in encrypted form on the computers of other I2P-Bote users, which is how it differs in its structure from standard email services.  No one with the ability to read your emails actually stores them on their servers.

If you check out the link above, it breaks down many of the security features of I2P-Bote, including its encryption method(s), and anonymity components.

I2P-Bote, as opposed to standard email services like Gmail or Outlook, uses cryptographic keys as destinations (i.e. randomly generated numbers and letters.)

sy10500b

This end-to-end encryption is the default with I2P-Bote.  Beyond that, I2P-Bote also sanitizes email headers, taking out any unimportant information, and encrypts what’s left (e.g. the subject line).

I don’t know about you folks, but I find that very reassuring!

IRC (Internet Relay Chat): Some of you are probably already familiar with IRC – it’s been around since the internet’s early days (1988, believe it or not)!  The difference with I2P is that it has an IRC service that allows users to chat anonymously.  Similar services exist on Tor, by the way.  I have yet to use the chat service, but I plan on doing so in the future (and perhaps writing a separate post about it).  According to The Tin Hat’s how-to guide:

“Often controversial topics are talked about in these channels, but nobody is afraid of offering what may be a very valid, but unpopular opinion, pushing you to explore new ideas from new perspectives.”

And I can’t help but be reminded of an episode of Numbers while reading that line where they said this:

numbers_irc

Uhh…no it isn’t.  But I digress.  If you do end up using I2P’s IRC, The Tin Hat recommends the chat rooms #salt and #i2p-chat, which you can connect to by setting your IRC client (such as X-Chat) to 127.0.0.1 on port 6668.  If you already have experience with this, feel free to give me some feedback on how it went!

Torrents: Oh my God, you can torrent over I2P?  Yes – in fact, some would say that gives it an advantage over Tor, which strongly advises against torrenting over their network.

I2P offers The Postman Tracker and I2PSnark.  The former is a lot like The Pirate Bay, and the latter is very similar to µTorrent.  Again, I have yet to try out this feature, but according to my research, the torrenting feature only provides more cover-traffic, which actually improves your anonymity (as opposed to Tor)!

I2P also gives the user an advantage in that they can use it as a proxy for clearnet torrents, like BitTorrent or µTorrent.  That way you’re less likely to get some ominous letter from the RIAA, or have others users spying on your torrents.  It’s not 100% foolproof, but I’d say it’s smarter.  

Beyond that, there is an I2P plugin for the Vuze torrent client called I2P Helper; if you intend to use I2P primarily for torrenting, then it works very well in this context.  I2P Helper allows you to download torrents from both the clearnet and the dark web simultaneously.  To boot, you can configure Vuze to use I2P by itself, or an already running external I2P router.

One of the positive things about using I2P for torrenting is that there is very little child pornography or other questionable material on the torrent trackers (despite claims to the contrary).  Rather, there are quite a few sci-fi books, programming books, leaked government documents, movies, and music.

Its downside, however, is speed, which on average is about 30KBps (compared to roughly 1-2 MB/s on most other torrenting sites).  The trade-off, of course, is the anonymity factor.  You’re much less likely to get discovered and sued by angry record labels and movie studios if you’re using I2P, as opposed to their “cousins” on the clearnet.  So the choice is yours.

Give Me Links!  Give Me Links!

09_Browse_to_Site

All right, you asked for it!  I haven’t vetted any of these links, so enter at your own risk. These links are courtesy of DCJTech.info: DarkWeb Link List.  I have to admit, they’re much easier to remember than most .onion addresses, aren’t they?

Directory (I2P)

File-Sharing and Torrents

Gaming

Messaging

Miscellaneous I2P Sites

OutProxies

Search Engines (I2P)

Shopping (I2P)

Social

Is that enough links to get you started?  Well, I hope you have fun checking them out.

As for me,  I do hope to explore I2P more in the near future; it seems perfectly suited to nerds like me!

With that…it’s off to the darknet again…

 

 

 

 

 

 

Exploring the Dark Web on Freenet (Part 3!)

linkageddon-censored

I’ve noticed on trend on various websites lately.  When people use the words “deep web” or “dark web,” they tend to be thinking of Tor – which is why I thought I should talk about Freenet more often!

I’ve mentioned it on several previous posts (for those of you who are new to the blog…welcome!).

Interview: Arne Babenhauserheide of pyFreenet and Infocalypse

Alternatives to Tor: Freenet

This time around, let’s explore some actual Freenet sites (or freesites, as they’re called). While the interface may not look that exciting, that seems to be a common factor across networks like Tor, I2P, and Freenet.

The above screenshot is of Linkageddon, the “uncensored” link list on Freenet.  It lists every freesite, legal or not.  So I figured I’d start with Nerdageddon, which is similar, but removes most of the “offensive” content (though I’m not one to be easily offended).

Nerds We Are…Cool As Us You Wish You Were

nerdageddon_updated

At the time of this writing, that’s the latest iteration of Nerdageddon.  Some of it, as you may or may not be able to see, consists of FMS Sites, which are generated via the Freenet Messaging System (FMS) and are merely chat logs. I skipped over those for the most part.

One of the first sites I checked out was called The Frugal Dungeon Master (remember, you need to be connected to Freenet to access it).  If the title hasn’t clued you in already, it’s meant for players of Dungeons and Dragons (a.k.a. D&D).

dungeons_and_dragons

The text (which I’m sure looks infinitesimally small on your monitor) reads: “Tired of paging through PDFs? Here is a convenient reference for Dungeons & Dragons 5th edition.  It supports searching, sorting, and filtering.  This version includes the monsters, spells and magic items from the basic rules, the player’s handbook, and the dungeon master’s guide. I’ll add content as time and scan quality permit.

The reference is a Ruby on Rails web application. You can install it on one computer and then access it from any device on your network.”

Ooh, Ruby on Rails!  Now you’ve sparked my interest!  As a burgeoning coder, I plan to eventually learn it, but I’m still working on several other languages at the moment.  As they say:

keep_calm_rubyonrails

This is probably less exciting to those of you who aren’t into RPGs, or don’t code – but there’s more to Freenet, I promise.

P.S. If you don’t code, you may want to get into it – you may like it, you never know!!

Scammers Getting Scammed?

bitcoin_doubler_freesite

I also came across a suspicious looking freesite called Bitcoin Doubler Scripts (pictured above), which made this claim:

“Hi all.  he [sic] last year I was trying to find a good bitcoin doubler but it is not easy because most of the available software is not working.

I found several different versions and remade them to operate [sic] , fully functional software that you can use at any time on Your webpages..

I will soon expand this page which forum board [sic] ,will be good to exchange information about the operation of scripts.

On this moment I have ready four versions.”

He (or she?) then features four download links to the scripts, which I won’t include, because I suspect this is either a scam, or something with malware embedded.  Why do I suspect this?

Well, I’ve seen hundreds of these types of sites on Tor, and I don’t have reason to believe this one’s any different.  Hell, it could be one of the same people who’s offering it on Tor, trying to branch out!

I’ll give you a few examples I’ve seen (I DO NOT SUGGEST USING THESE! YOU WILL GET SCAMMED!!):

100x Your Bitcoins in 24 Hours!

100X_bitcoin_scam

Profit with your coins – and get rich!

10%interest ponzi

20% profit, payed from newer transfers

20%profit ponzi

the hottest dark web ponzi

120%_ponzi

get 5% intrest with your money [sic] 5%interest ponzi

Just the fact that each site looks almost identical (as well as the BTC addresses looking similar) makes me think that it’s the same scammer running all of them.  Plus, the fact that they used the word “ponzi” to describe one of them is very telling.  So I repeat: do not give them your money!

As for the Freenet one, I haven’t tried it so I can’t guarantee anything, but it’s likely just as fake.  Interesting what we discover sometimes, huh?  I hope I was able to prevent a few people from losing their hard-earned bitcoins today.

If you did, then don’t say I didn’t warn you.

As Eddard Stark Would Say…

eddard_stark_meme

For those of you who love Game of Thrones but don’t have HBO or HBO GO, there’s a freesite called TV.Game.of.Thrones that features all of the episodes.

game_of_thrones_site

I’m quite certain you can download them from torrent sites as well, but this was so easy to find, that I just had to throw it out there.  I must confess that I’m way behind in watching this show, but it was a cool find on here.

They also have I2P links in case the Freenet site goes down.

Come on, Where’s the Disturbing Stuff?

lolicon_animated

*Sigh* – I figured this question would come up eventually.  Well, trust me – there are plenty of disturbing and creepy things on Freenet as well.

If you browse through Linkageddon, you may see some sites with the text “Contains underage material.”  If you’re into CP or that sort of thing, that’s probably where you should go.

Now, if it’s something like lolicon, where it’s animated, I find that slightly less disturbing, but I still have to question the motives of someone who finds it sexually arousing.

Well, as you probably know if you visited any of the dark web for some time, there’s child pornography if you’re looking for it.  In my earlier post Dark Web: What Are Candydolls?, I described the phenomenon of “candydolls,” which are essentially underage girls dressed up in adult clothing in a sexual manner.

I have, unfortunately, come across a few sites like that on Freenet – but it’s to be expected if you’re using any kind of anonymity software, so I really wasn’t that surprised by it.

So again – if you really want to see the disturbing shit, just take a look through Linkageddon, and I’m sure you’ll come across it.

Is it For Me?

That being said, I really like Freenet overall, disturbing or not, and I think it has great potential to be a network for all kinds of purposes.  As I have the chance to explore it more, I’ll definitely write some more posts about it.

And yes, I still recommend that you go there – there’s no requirement that you visit the disturbing sites if you don’t want to.

If you see that shit…it’s because you were looking for it!

 

 

 

 

 

 

 

 

 

 

 

 

A Blog About So-Called Mariana’s Web?

400px-Bash_demo

 

Yeah – I’m probably contradicting myself by writing this, but on my earlier post TsalalNet: Another Urban Legend? Probably, I had basically said that there was no such thing as “Mariana’s Web.”  (And in my experience thus far, I haven’t found any evidence to the contrary.)

I was partially basing this opinion on some of the writings I’d read by people who seemed to actually know what they were talking about.

In the comments on that very same post, however, someone mentioned the blog Search for Mariana’s Web, in direct contrast to what I’d previously stated.  I figured I had to check it out, at least for amusement:

marianas_web2

After reading through some of it, I have to say that I’m actually intrigued.  The author, Ryan Avery, who goes by the name “BlueAdept,” allegedly came across this information in a similar manner to how I discovered the dark web – curiosity and research.

According to BlueAdept, he started the project of seeking out Mariana’s Web to honor the memory of his uncle, who was actually a (white hat) hacker.  Initially, he doesn’t find much, but as he starts investigating further, he seems to come across some interesting clues.

I haven’t read through all of the blog entries (or “Records,” as he calls them) yet, but from what I gather, “Mariana” is some kind of giant A.I., that spans the entire globe.  In the process of seeking it out, the A.I. starts communicating with him.  (Do you see why I have my doubts about this?)

What I don’t know is how much of the story is truth, and how much is pure fiction.  While I have to admit that the “story” is very interesting, some of it reads like a thriller, or spy novel.  (Maybe he’s planning to publish it in novel form, in the future?  I’d actually read it.)

Here’s an excerpt, for the curious, from “Record #16” (i.e. Entry #16):

“It’s like looking into space. The dark swathes of blackness, with pinpricks of light, but they are slowly fading. One by one, the lights are going out.

“I’m still here. Time has passed. Has time passed?

“Sitting in the pitch black darkness, there’s no sound, except for the faint scuttling of Mariana in the faraway distance. The only light is the glow from the laptop, but the light stops dead a few centimetres from the screen. Enough to see it, enough to type, but not enough to see anything else.”

Intriguing, isn’t it? Again, however, I have no idea if these writings are based in reality, or are pure fiction. Not that it matters much – it’s just that for the purpose of my blog, I’ve been making an effort to differentiate between fact and fiction as much as possible, because there’s so much mythology about the deep web and dark web out there.

Ultimately, it doesn’t truly matter whether or not the existence of Mariana’s Web is real. Mr. BlueAdept has created some good art here, and that makes it fascinating to read.

On the other hand, its mysterious nature makes me want to investigate further. Are there other parts of the dark web I have yet to explore? Certainly – but some are under such heavy security that I may not yet have the skills to access them.

Well, that may be for a future adventure…in the meantime, I’ll keep digging as well.

 

 

 

 

 

 

 

 

Beware: “Facebook” Phishing Sites on Tor!

fakebook1

I know, I know! I said I was leaving the dark web, but there was a subject I’d been meaning to talk about and never did.  Specifically, there are a ridiculous number of phishing sites on Tor (and on the web in general).

For those who are unfamiliar with the concept, they look almost exactly like a site you would normally use, but are designed to steal your login credentials and such.  Most dark web users seem to be aware of this, but newcomers often fall for the fake sites.

Since Facebook announced its Tor-friendly URL (https://facebookcorewwwi.onion) at the end of 2014, many users likely flocked to the Tor network to try and use it with some degree of anonymity.

During my research on the Tor network, I was using a search engine called VisiTOR, and came across this link: Facebook phishing link.

At least I’m 99.9% sure that’s what it is – please don’t enter any personal information into that page!!!  As I said before, it looks almost exactly like the real one (with some minor differences), but as far as I know, there are no other official Facebook .onion URLs, so I wouldn’t trust it!  (Heck, some people don’t even trust the real one!)  

It’s not uncommon to come across clone sites of many other pages on Tor – the same thing happens with many of the marketplaces, social sites, forums, etc.  This is why so many of them have a message that says: “Make sure you’re using the real [insert site name here].”   Believe it or not, this is why I’ve attempted to memorize the URLs of some of the Tor sites (and succeeded, on occasion).  They sure don’t make it easy, though.  Could you memorize a URL like “mhpcpptjshjgdierfio.onion”?  I understand that this is because onion addresses are usually made of a base32 string of the first 80 bits of the SHA1 hash of the server’s private key, but it’s still tough on us humans. (Yes, that was English.)

I almost fell victim to something like this back in the good ol’ days of AOL (around 1993).  Someone had sent me a fake “AOL InstaKiss” email, which claimed that you had to enter your screen name and password:

INSTAKISS2.png

Being that this was the 90’s, I fell for it and actually did so (because I was a net n00b) but realized my mistake soon after, and immediately changed my login info – so nothing happened.

Anyhow, I basically just wanted to warn Tor users who weren’t aware of this problem.  On the plus side, the real Facebook onion URL is pretty easy to memorize, unlike many of the other Tor sites.  So, in theory, it would be less likely to fall for a phishing attack.

Be careful, and use common sense.  Always verify that a site you’re using is the real one (whether on the clearnet or the dark web), particularly if it’s one that requires login credentials.  And if anything looks suspicious, it probably is!!

 

 

Dark Web: What Are Candydolls?

candy-cane-photoshop

 

Urban Dictionary defines a “candydoll” thusly: “A variety of softcore porn featuring underaged girls.   The cameratography of said porn is often referred to as ‘polite’ or ‘respectful,’ although whatever these terms actually mean when used in reference to the graphic sexual display of young teen and preteen girls is in question.  This form of porn is often used by pedophiles who wish to pretend that what they’re fapping to isn’t in fact highly illegal or reprehensible.  Candydolls’ mothers may often be referred to as mowilf (Mom of what I’d like to fuck).”

Let me preface this by saying: I know that child pornography is a horrifying subject (for people that don’t enjoy it, that is), and some people may not even realize the extent to which it exists.  I don’t get off on it, but it is out there.  And in some parts of the world, it’s more acceptable than it is here in the U.S.

You may not know this, but candydoll images can be found not only on the dark web, but on the clearnet as well.  Why is this the case?  It may be because the girls are still wearing clothing, albeit in a provocative way.  Or it may be that the general public (in America, at least) is unfamiliar with the term (as opposed to terms like “child porn” or “child pornography”).

I hesitated to even talk about this topic, but I figured that if I were going to do a blog about the dark web, I’d end up writing about it eventually.  Ironically, I didn’t initially discover what a candydoll was through the dark web.  It was on YouTube.  There’s a Spanish-language channel I watch occasionally called Jota el Oscuro, and he covered this topic in the video Conoces la Historia de las Candydolls? | Las Candydolls en La Deep Web. (“Do you know the history of the Candydolls?  The Candydolls in the Deep Web.”)  

He also refers to it in a similar video entitled Las Minimodelos Pre-Teen Nonude|Un tema polémico para reflexionar (“The Pre-Teen Non-Nude Minimodels – A controversial topic for reflection.”)    

candydoll youtube

I’m not fluent in Spanish, but basically “Jota” goes into the history of how the candy doll phenomenon started, and what kind of sites sell this material today.  By the way, check out his channel if you’re interested in the dark web and/or horror – he has some excellent (and scary) content!!

Basically, the way Urban Dictionary defined it is exactly right.  They’re preteen girls who do non-nude modeling, but even though the girls are clothed, it’s still done in a sexualized way, and it’s still used for pedophiles’ sexual gratification.

model

What scares me about it, perhaps, is that it’s likely (or at least possible) that the girls are tricked or coerced into doing the modeling.  They’re probably told that it’s some kind of pageant, or “the start of their big modeling career,” or something like that.  They may even get paid, but what they don’t know is that their photos will end up on some dark web site and will be used for sexual exploitation.

It’s also possible that some are kidnapped (since human trafficking is such a major business) – on the other hand, however, in some parts of the world, this “candydoll” photography is in fact somewhat acceptable.  (I suppose because it doesn’t show actual sex??  I’m not sure.)

It’s a sad fact that things like this exist, but the more cynical among us would probably say, “I told you so.”  Granted, there are worse forms of child pornography (in my opinion), but I find the whole concept unnerving, to be honest.

And yes, unfortunately, it’s not a myth, unlike the debatable topic of red rooms (although I haven’t sufficiently proven that this is a myth, either).  I’ve heard people referring to it or asking for it on the dark web (which really shouldn’t surprise me).  If you Google the term “candy dolls,” this message shows up at the bottom of the screen: Suspected child abuse content has been removed from this page.  Report child abuse content.  

And if you’re ever on the dark web, and you see a link labeled “CP,” “hard candy,” or “cheese pizza,” it’s more than likely child pornography – do something about it!  (Side note: I have been a bit disturbed by the fact that some people have found this blog post by searching for child porn…I hope they were ultimately disappointed.)

So again – I’m not saying that I enjoy it, or that I support this sort of thing, but I know that it exists, and I wanted to make people aware of it.  If you ever happen to come across it, on the dark web or the clearnet, please report it to the CyberTipline at the National Center for Missing and Exploited Children.

You may even save someone’s life – who knows?