89% found this document useful (9 votes)
5K views30 pages

Dark Web Links Bible

some nother links with info

Uploaded by

vishv1.kcbse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
89% found this document useful (9 votes)
5K views30 pages

Dark Web Links Bible

some nother links with info

Uploaded by

vishv1.kcbse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

COMPLETE DARKWEB BIBLE

THE COMPLETE GUIDE

INTRODUCTION

Dark web, deep web, clear web – just words or more? Well, in seeing just how
many of you are interested in hearing all about the dark wonders of the
internet, I’ve decided to make this small dark web guide. So, if you want to
learn all about Tor Onion, Silk Road, secret, hush-hush Governmental ops,
and how to get on the dark web, of course, this is the right book. Welcome to
the shadows, my friends! I will be your guide.

1
TABLE OF CONTENT
DARK WEB BIBLE......................................................................................................................... 3
The Dark Web is Not the Same as the Deep Web.......................................................................3
How to Access the Dark Web Safely............................................................................................. 3
Use These Steps as a Guide............................................................................................................4
The Dark Web Isn’t Just for Criminals........................................................................................ 6
Surfing the Dark Web Isn’t Illegal, but It Can be Dangerous................................................... 6
Is the Tor Browser Completely Anonymous?..............................................................................6
Criminal Cases Involving the Dark Web...................................................................................... 7
Bonus Security Steps For the Dark Web...................................................................................... 8
Dark Web Search Engines..............................................................................................................9
Darknet Markets....................................................................................................................................10
Dark OSINT Tools................................................................................................................................. 10
Huge Collection of Deep Web Onion Links.......................................................................................10
Preparing to set sail.......................................................................................................................14
So how do you get on the dark web?...........................................................................................21
More on how to stay safe on the dark web.................................................................................28

2
DARK WEB BIBLE
It is extremely easy to access the dark web and even easier to be detected on it if you
don’t take precautions. If you are new to the darknet, this guide will help you on your
way.

The Dark Web, or Darknet, is a general term for a collection of websites on an


encrypted network with hidden IP addresses – all of which gives users
strong anonymity protection . Because they are not indexed by traditional search
engines, you can only access them with special anonymity browsers, such as Free net
(https://freenetproject.org/), and the most common, onion (TOR).

The Dark Web is Not the Same as the Deep Web


The Deep Web is all the sites on the web that can’t be reached with a
search engine . Although this includes sites on the Dark Web, it also includes sites
that serve more mundane functions, such as business intranets, webmail platforms,
databases, online banking platforms, and services that usually require a password or
other means of authentication.

These are found and accessed directly with a URL or IP address, and are hidden
behind firewalls, paywalls and HTML forms. Because all these other pages are
included in the Deep Web, the Deep Web is actually far more vast than the
regular internet (also known as the Clear Web).

How to Access the Dark Web Safely


The main gateway to the Dark Web is the Tor Browser This is an encrypted network
of volunteer relays around the world through which users’ internet connections are
routed.

Although the relays are an integral part of what makes Tor anonymous, they can also
lead to slow connections . This is because rather than connecting directly to the
server of the website you want to get to, you first have to go through the relays, which
are often purposely scattered around the globe. Also, since the system is
decentralized, not all the relays have the same CPU, meaning that while some are fast
and powerful, others might operate at a snail’s pace.

The easiest way to browse web pages is to download and install the Tor browser
bundle. Tor URLs end in the suffix .onion . Unlike .com websites, the URLs are
usually complex and difficult to remember, and websites will often change their URLs
in order to evade detection and DDoS attacks.

When you’re on the Dark Web, ISPs and by extension, the government might not be
able to view your activity, but they will know you are on the Tor Network. This alone
is enough to raise eyebrows in some countries.

That’s why we recommend accessing Tor using a VPN. That way, your internet traffic
is routed through the VPN before going through the Tor Network and finally reaching
its destination. With this method, your ISP only sees the encrypted VPN traffic, and
won’t know you’re on the Tor network .

3
The major concern with using Tor over a VPN is that it requires you to trust your
VPN provider, as the provider may see that you are using Tor. To mitigate this
issue, use a VPN that does not log your activities, and connect to your VPN before
opening the Tor browser .

Use These Steps as a Guide

Step 1. Get yourself a good VPN service


That means one that doesn’t keep logs, has no DNS leaks, is fast, is compatible with
Tor, and which (preferably) accepts Bitcoin as payment.

We recommend Nordvpn or Express VPN as the best VPN available on the market
with its amazing features and military grade encryption.

Step 2: Download and install the Tor browser bundle


Before you do though, check that your VPN is running . Also be sure to
download Tor from the official official Tor website (www.torproject.org)

Once it’s installed, look for the Tor Browser folder and click on the “Start Tor
Browser” file inside it.

A new window will open asking you to either click on the “Connect” or “Configure”
button. Click on the “Connect” option to open the browser window.

4
Step 3. Start browsing .onion websites
When you open Tor on your computer, you’ll automatically be directed to the search
engine DuckDuckGo. While DuckDuckGo is designed to provide extra privacy and
encryption while searching the web, you shouldn’t think of it as the dark web version
of Google.

That’s because even in Tor, DuckDuckGo searches the clear web . That means
if you do a keyword search, you’re results are going to be basically the same as what
you would find on the regular internet.

Fortunately, there are Dark Web search engines (mentioned in the end)
that will bring you to .onion sites . These include:

. Welcome to Dark Web Links http://bznjtqphs2lp4xdd.onion

. Candle http://gjobqjj7wyczbqie.onion

. not Evil http://hss3uro2hsxfogfq.onion

Just make sure to always turn on your VPN before opening Tor and
starting a web surfing session.

5
The Dark Web Isn’t Just for Criminals
The anonymity provided by the Dark Web is certainly attractive to those looking to
buy or sell illegal goods such as drugs, weapons, or stolen data.

But there are also legitimate reasons for using the Dark Web. In past years it has
gained popularity as a safe haven for whistle blowers, activists, journalists , and
others who need to share sensitive information, but can’t do so out in the open for
fear of political persecution or retribution by their government or other powerful
actors.

Police and intelligence agencies also use it to monitor terror groups and keep tabs on
cyber criminals . Additionally, corporate IT departments frequently crawl the Dark
Web in search of stolen data and compromised accounts, and individuals may use it
to look for signs of identity theft.

In many circles, the Dark Web has become synonymous with internet freedom ,
especially as nation states continue to clamp down on it. It now plays host to a
number of media organizations involved in investigative journalism, such
as ProPublica (www.propublica.org) and the Intercept. Most notably, WikiLeaks
the website that publishes classified official materials also has a home on the Dark
Web. Even Facebook maintains a presence there in order to make itself accessible in
countries where it is censored by the government.

Surfing the Dark Web Isn’t Illegal, but It Can be Dangerous


You can’t be charged with a criminal offense for simply searching the Dark Web, but
you can get in trouble for using it to carry out illegal activity ; headlines about police
operations that involved the Dark Web and child pornography, drugs, or hackers
dumping stolen data are not infrequent.

Moreover, the anonymity of the Dark Web also makes it notoriously risky. Since
there’s no oversight, it’s teeming with scammers. That said, one can maintain one’s
safety by simply following the same basic security rules that apply to the normal
web: Always be careful about the links you click because some can be misleading, and
avoid sites or links that advertise illegal, disturbing, or dangerous content you don’t
want to see.

Is the Tor Browser Completely Anonymous?


In 2014 the FBI – with assistance from researchers at Carnegie Mellon University –
developed an exploit based on a Firefox JavaScript flaw that successfully
de-anonymized some Tor users, including the operators of the popular Silk Road
website. Although the vulnerability that allowed those attacks was fixed within days
of its discovery, the incident nonetheless created fear among Tor users that it may not
be 100% secure after all .

Similarly, in October 2017 the security firm We Are Segment identified a vulnerability
in Tor that was affecting some Mac and Linux users. This vulnerability, which became
known as TorMoil, caused IP addresses to be leaked when users accessed URLs that
began with file://, rather than http:// or https://. We Are Segment notified the Tor
developers, who promptly fixed the error by updating to a new version of the web
browser.

6
In order to address these issues, the Tor Project has recently improved security and
privacy by strengthening its encryption . It also gives web developers the tools to
build fully anonymous Darknet sites (known as hidden services, or rendezvous points)
that can only be discovered by those who know the site’s URL.

Criminal Cases Involving the Dark Web


Although we believe the Dark Web should be used for promoting free speech and
bypassing censorship, there’s no denying that the press tends to focus on the
more shady activity that goes on there. Here are some of the most high profile
stories that have come out in recent years:

1. Silk Road: Perhaps more than any other website, the Dark Web brings to
mind Silk Road. Silk Road began as the invention of a libertarian idealist who
wanted to sell home-grown mushrooms for Bitcoin, and ended up hosting 1.2
billion dollars worth of deals involving drugs, firearms, hits, counterfeit cash,
and hacker tools.Five of the hits were commissioned by the site’s creator, Ross
Ulbricht, known on Silk Road as the Dread Pirate Roberts. Ulricht was
ultimately caught because of an old post to a regular website in which he
promoted Silk Road in its early days. His mistake: using his real email
address.

2. AlphaBay: Following the shuttering of Silk Road, AlphaBay became the most
prominent Dark Web marketplace. When AlphaBay went down in 2017, it was
because of security missteps even more basic than those of the Dread Pirate
Roberts.Among other blunders, founder Alexandre Cazes used his legitimate
email address for communications on the site (pimp_alex_91@hotmail.com),
kept several unencrypted cryptocurrency wallets constantly open, and re-used
the same pseudonym on and off the Dark Web. And when the cops busted
into his home in Thailand to arrest him, he was logged onto the AlphaBay
server with the username “admin.”The computer was unlocked and
unencrypted, and contained text files of passwords used on the site, as well as
a document listing the type and location of all his financial holdings that was
titled in bold “TOTAL NET WORTH.” Several days after his arrest, Alex Cazes
was found dead in his prison cell, apparently having committed suicide.

3. The Playpen Case: Although it only existed for seven months, the child
pornography site Playpen managed to amass 215,000 users before the FBI
gained access to its host server via information provided by a foreign law
enforcement agency (which has not been publicly identified).Instead of just
shutting the site down, the FBI continued to host it on its own servers for two
weeks, during which it used a Flash app to capture 1,300 IP addresses
belonging to site visitors. This led to the arrest of nearly 900 users around the
globe, including Playpen’s creator, Steven Chase (may he burn in hell).

4. The Ashley Madison Case: In 2015, the hacker group, the Impact Team,
breached a dating site for extramarital affairs called Ashley Madison. The

7
hackers threatened to release users’ personal information unless the website
and its sister site, Established Men, were shut down. A month later, when
their deadline wasn’t met, the Impact Team started publishing data on the
Dark Web.Over the course of several dumps, information was revealed that
included the email and IP addresses of 32 million members, the email
correspondences of the CEO of Ashley Madison’s parent company, and the
website’s source code.The hacker’s stated motivation was 1) an objection to
the site’s primary purpose, and 2) the site’s practice of forcing users to pay to
delete their accounts (which were even then not fully scrubbed from the
servers).Because Ashley Madison didn’t require email verification to create a
profile, it would have been easy to create accounts using someone else’s email
address, and then use this to extort them. Although we still don’t know who
was responsible for the attack, one can speculate that they were someone
affected by these poor security practices.

Bonus Security Steps For the Dark Web


DO NOT change the TOR browser window size unless you like living dangerously.
The FEDS have programs that can match identities on random things such and
matching time online and other things with the browser window size, I shit you not.
If you don’t change the size then it is the same as most other people.

You MUST use a VPN whenever you are connected to the TOR Network

Please remember that TOR isn’t necessarily 100% anonymous, you should turn off
JavaScript within the dark web browser settings to help. See our privacy and
information tools 8 for additional tricks.

Disconnect your webcam or block the camera with some black tape. Hackers and
governments have ways of getting into your computer and turning on the video and
cameras. You can have intimate images of you be used as blackmail or extortion, or
even worse, used by the feds.

Disconnect your microphone or cover it with tape to muffle it good. The same goes
for the microphone as the camera, the last thing you want is to be recorded saying
incriminating things at home. It doesn’t even have to be while on the dark net. Even
the Facebook creator Mark Zuckerberg does it as he knows the dangers.

NEVER use your real name, photos, email, or even password that you have used
before on the dark web. This is the fastest way to be tracked. Use an anonymous
email 7 account / secure messaging apps 3 and aliases that have nothing to do with
you that you have never used before.

If you are using TOR on the dark web for anything other than looking at cute pictures
of kittens, you should think seriously about your privacy and security.

On a final note, we encourage everyone who uses the Dark Web to do so responsibly.
Stay SAFE and make sure your VPN is connected!

8
Dark Web Search Engines

https://pipl.com

https://www.mylife.com

https://yippy.com

http://lookahead.surfwax.com

http://xmh57jrzrnw6insl.onion

https://scholar.google.com

https://duckduckgo.com

http://fazzle.com

https://hss3uro2hsxfogfq.onion.to

https://www.startpage.com

https://archive.org

http://gjobqjj7wyczbqie.onion

http://www.msydqstlz2kzerdg.onion

http://searchb5a7tmimez.onion

9
Darknet Markets
Agartha Market

Apollon Market

Berlusconi Market

Cryptonia Market

Empire Market

Genesis Market

Nightmare Market

Tochka Market

Yellow Brick Market

(Simply Google Them)

Dark OSINT Tools


 Dark Web Tools | Inspecting The Dark Web

Huge Collection of Deep Web Onion Links


 . Deep Web 7839 Awesome Links List [Uncensored Table]
 . Deep Web Onion Links Collections – Dark Net Sites

DarkWeb 101 - Anonymity


1. Cleanup Computer

You can use Windows or Linux to connect to the Dark Web.

Clear cache, trackers, cookies, viruses and adware that’s currently on your machine
with the following tools.

Cleanup Tools (Removes cache, history, cookies etc)

CCleaner (windows)

Bleachbit (linux)

10
Remove Malware, PUP’s and Adware

Malwarebytes & Adwcleaner (Windows)

ClamAV, Lynis & RKhunter (Linux)

Run windows/linux commands to verify and repair integrity of system files

sfc /scannow for Windows (Run command prompt as administrator)

debsums for Linux (To install “apt install debsums” and then execute program
“debsums -s”)

After all scans completed, reboot your system and continue with step 2
(#Install Tools)

2. Install Tools

Must Have Tools

Get a VPN

Download the latest TOR Browser

Install browser extensions and maximize browser security

Change your DNS manually using uncensored DNS IP

Additional/Optional Anonymity Tools for more security

 Redsocks Proxy
 Proxychains
 Kalitorify
 Exiftool
 Tails Operating System
 Whonix Operating System

3. Create Fake Identity

If you’ll be using any services on the dark web then you definately will need to create
a fake identity that has nothing in common with your real life.

The below services are for anyone that wants to protect their online identity.

Before Signing up with the below free services, make sure you are connected to your
VPNand TOR browser already.

Keep in mind that every time you create an account on any website or login to a
service, your public IP have already been logged.

11
k ONION LINKS
NAME LINK
recon http://reconponydonugup.onion
dark.fail http://darkfailllnkf4vf.onion/verses
Darknetlive http://darknetq7skv7hgo.onion/
Kilos http://dnmugu4755642434.onion/
ONION.live https://onion.live/
DeepOnionWeb https://deeponionweb.com/
spoofed emails https://www.spoofmytextmessage.com/
crecked soft https://pcwonderland.com/
hidden wiki http://torlinkbgs6aabns.onion
VERIFIED
DREAD http://dreadditevelidot.onion
http://dreadditevelidot.onion/d/DarkNetMarkets/wiki?id=3414404f
valid cards http://bestvalidxne7pq3.onion
darkfail links http://darkfailllnkf4vf.onion
versus market legit http://reconponydonugup.onion/markets/versus-market/?tc=1
caarding technics https://resources.infosecinstitute.com/all-about-carding-for-noobs-only
darkweb guide http://dreadditevelidot.onion/post/5807da1e16e269a4034b

CREDIT CARDS

http://pdf6uqyd4nxmghgw.onion.ly
http://elite6c3wh756biv7v2fyhnoitizvl2gmoisq7xgmp2b2c5ryicottyd.onion/offer.p
hp?id=1098
http://hiddenmark43cbxd.onion/
http://hidden24tha4plsx.onion/

BITCOIN CLEARNET
paxful.com
localbitcoins.com
coinbase.com
spectrocoin.com

Give aways methods https://www.aspkin.com/


https://www.aspkin.com/
dundle.com

Name Profile Generator

 Fake Name Generator

 Fake Person Generator


 Username Generator

12
Encrypted Email Services

 Protonmail
 Tutanova

Encrypted Messaging Apps

 Signal
 Keybase
 Briar – Darknet Messenger
 Onionshare

Encryption Tools

 Smartninja – Online PGP Tool


 CyberChef – Web App Encryption Tool
 Kleopatra with GPG4win
 Veracrypt

Ready for Action > After you completed all the steps you are now ready to wander
around the dark web.

13
MORE YOU NEED TO KNOW
Since everything’s decentralized on the dark web, there are no crawlers to
bring together the information. Even the URLs, if we can call them that, are
infinitely different from what we’re used to.

For instance, if you want to access a site like YouTube, all you need to do is to
write the URL in the address bar (i.e. https://youtube.com) or search for
the website using google.com. Now, on the dark web, you’ll have to know the
URL right to the last decimal and character to access it. All dark web
addresses contain seemingly random strings comprised of numbers and
letters, followed by a .onion extension.

Again, we shouldn’t lose sight of the fact that the dark web’s the place where
the bulk of criminal activities take place. Everything little sordid detail you
heard over the news about the dark web is painfully true.

This is the place where hackers come to purchase data stolen from users or
companies or offer their services in exchange for Bitcoins or other forms of
cryptocurrency. More than that, if you dare to dig deep enough, you can
uncover other hair-raising activities such as human trafficking, child
pornography, torture, or murder on demand.

Charming little spot, isn’t it? Well, that’s where we’re heading. Now, before
you can access the dark web, there a couple of things you must do,
security-wise. Ready? Set? Go!

Preparing to set sail

14
1. Install a VPN
VPN services are a must when you’re attempting to access the dark web.
Why? Because of the long arm of the law, of course. Technically, you are free
to surf on this Internet layer, provided that you don’t engage in any illegal
activities. However, a recent ruling by the US Supreme Court deemed
that even casually browsing the darknet can get you in a lot of hot water.

This means that if the authorities would intercept your darknet connection
request, they would have had enough reason to search your house and
confiscate the machine used for browsing. So, do yourself a favor and
download a VPN before messing about on the dark web. Need a hand picking
one? Check out this article written by one of my colleagues to narrow down
your search.

2. Install an adequate browser


The first rule of the dark web – never, ever use your default browser to search
for stuff on the darknet. Popular browsers like Chrome, Opera, or Firefox have
tracking technologies that make you very visible on the authorities’ radar. So,
if you’re still willing to do this, I would recommend you download Tor,
which is, by far, the safest and easy-to-use onion browser.

Of course, there are others who would argue that Tor being made by the
military for covert communication makes it unreliable, privacy-wise since it’s
believed to be watched. I wouldn’t take that one for granted, but, then again,
there’s no smoke without fire. It’s all up to you.

OF TOR, VPNS AND OTHER DEMONS

Anyway, going back to Tor – why use this particular browser over a regular
one? Well, that’s a rather long story, but worth telling nonetheless. As you
know, a regular browser mediates between the user’s search request and the
site about to be accessed. Normally, your query will go through the ISP’s DNS,
which in turn consults other resources to help you get the answer you were
looking for.

Now, with Tor, the search request kind of bounces around multiple Tor relays
before completing your search request. You’re probably wondering about what
the heck are Tor relays. Well, what we call the clear web is, in fact, a

15
conglomerate of servers, which are managed either by companies or on
volunteer-basis.

The same principle applies more or less to what we call the dark web. Since it’s
the dark side of the Internet we’re dealing with here, secrecy and
untraceability become inherent. Thus, the info’s stored on Tor relays which
are managed by volunteers.

So, what happens when you want to access a dark web onion? First of all, if
you followed my advice and installed a VPN, the tunneling signal will be
encrypted. This means that your ISP won’t have a clue about what you’re
about to search for. Sure, it can still see that you want to access a Tor node,
but other than it’s blinder than a mole.

From there, it will be redirected to another node and then another one. Why
does it do that? For anonymity reasons, of course; ‘no breadcrumbs’ means
that there’s no way for someone to trace the signal back to you.

VPN ONLY? UNLIKELY.

Congrats! You just took the first steps of your dark web journey. Still, there are
a couple of more precautions you must take before you can pop open
Pandora’s box of dark Internet wonders. Getting back to Tor and
VPN. There’s no broad consensus on dark web safety.

However, everyone tends to agree that using only Tor is not enough. The two
of them (Tor and VPN) work in tandem and, as it happens, there are several
ways of tunneling your way all the way through the dark web using this
dynamic duo. Here’s what you need to know.

METHOD I – TOR OVER VPN

Sounds very techie, doesn’t it? Well, it’s really not that complicated – using
the Tor over VPN method means connecting to a VPN service before using the
Tor browser. Have to say that this is the most popular and safest method to
access onion links, and, on my part, a marriage made in Heaven: Tor’s an
excellent ‘anonymizer’, while VPN safeguards your privacy.

When using this method, Tor will encrypt your request, which will pass
through your ISP unhindered. From there, it will go through a VPN server that

16
conceals your IP and wipes geo-locations tags and other elements your
Government or ISP might use to track the request.

Next step – your request will be transferred to Tor entry nod which in turn
transfers to one or more Tor relays. From there, it gets slingshot to several Tor
exit nodes. Afterwards, your request will be matched with the appropriate
website. Tricky, but effective; that’s why it’s, by far, the best method to access
dark web content.

PROS OF USING TOR OVER VPN:

 Session logs are not stored (metadata, IP address).


 Traffic’s completely encrypted.

CON(S):

 It doesn’t offer protection against malicious Tor exit nodes.

METHOD II – VPN OVER TOR

Not very safe, but it’s still useable. Recall how Tor oven VPN works? Well,
VPN over Tor is basically its opposite – instead of going through the VPN first,
the signal passes through the Tor network, before going through the VPN.
Why is this method so unpopular? Because it’s not as safe as Tor over VPN.

If the signal goes through the Tor network first, your ISP will be able to see
that you are attempting to connect to a Tor node. Though no one should bat

17
an eye just because you’re attempting to access the dark web, keep in mind
that in some countries, like the United States, even a simple foray can get you
in trouble.

PRO(S) OF USING VPN OVER TOR:

 Great if you trust your ISP, but not the VPN provider.
 Can bypass blocked Tor nodes.

CON(S):

 ISP can see you trying to access onion content.


 Susceptible to end-to-end timing attacks.

Now, if you want to see what lurks in the dark corners of the Internet but don’t
really trust Tor, there are alternatives. Here is a couple of them:

 I2P – great privacy protection and can access hidden onion links.
 Matrix.org – an open-source project just like Tor. Great for IoT data
transfers, chats, and WebRTC signaling.
 Orbot – basically a Tor for Android.
 Globus Secure Browser – paid Tor alternative. VPN-powered. It
allows the users to select preferred geolocation. If you want to take it for a
spin, Globus features a five-day trial period.
 Comodo Ice Dragon – Firefox offspin. Employs multiple malware
safeguards. Open-source project.
 FreeNet – open-source project. Sports the Darknet and OpenNet
anonymous browsing technologies.

3. Install a VM or disposable OS
I strongly recommend surfing on the dark web using virtual machine software
instead of your locally installed Windows. Why? Because it’s easier to contain
malware in a virtual environment, which can be fully controlled.

It’s like in those movies where the doctors are experimenting on deadly viral
strains from behind the safety of a glass enclosure. And, as it happens, there
are plenty of VMs to choose from: Oracle VM Virtualbox, VMware
Fusion and Workstations, QEMU, Red Hat Virtualization, Microsoft
Hyper-V, Citrix XenServer, and Xen Project, just to name a few.
18
Now, if you really want to take the physical storage devices out of the equation,
you can use what I like to call a disposable operating system – easy to deploy
and to get rid of if you by chance you run into any trouble. All you’ll need is an
8GB thumb drive, an installation package, and a couple of minutes to get
things up and running.

Let’s dig in.

HOW TO INSTALL TAILS OS

Step 1. Get yourself a thumb drive; 8GB will do, but you can buy one with
more space if you plan on using it for anything else. Nothing will happen to
the stick (probably).

Step 2. Hop on the web and download the installation package for Tails
OS.

Note:

Tails is a Linux-based live operating system which can be booted


from a USB stick or DVD. I recommend using a stick since DVDs
have a read-only function after you’re done burning well and
accessing the dark web required a bit of writing.

Chill, because nobody will ever find a record of you ever fiddling
around the darknet. Note that Tails’ installation package is
the .img format, which means that you’ll need software capable
of burning images on your thumb drive.

19
My recommendation is Universal USB Installer, which is very
intuitive. You can also go along with Rufus. The choice is yours.
For this tutorial, I’ve used Universal.
Step 3. Insert the stick and do a quick format. Be sure to use FAT32 to root
out any compatibility issues. It shouldn’t take longer than a few seconds.

Step 4. Download and install Universal USB Installer or Rufus.

Step 5. Fire up Universal USB or Rufus.

Step 6. Under “Step 1: Select a Linux Distribution from the dropdown to put
on your USB” select Tails.

Step 7. Under “Step 2: Select your ubuntu*desktop*.iso”, click on the browse


button and select the downloaded Tails .img file.

Step 8. Under “Step 3: Select your USB Flash Drive Letter Only”, use the
dropdown box to select your thumb drive’s letter. If it doesn’t show up, check
the “now showing all drives” option.

Step 9. Review the info and hit Create when you’re done.

Note that the process can take anywhere from 5 to 30 minutes depending on
your machine. Sit back, relax, and wait until the installation’s done. When
you’re ready, hit the Close button and you’re all set.

Now what? Well, now it’s time to fire up Tails and do a little bit of tinkering.

20
HOW TO BOOT FROM USB AND CONFIGURE TAILS

Bogged about your first boot? No worries. It always hurts the first time. Just
follow these steps.

. Keep the thumb drive in the USB.


. Restart your computer.
. After the splash screen appears, press the appropriate Boot Menu key.
If you’re tired of randomly pressing keys each time you perform this action,
check out this article on hotkeys for the boot menu.
. Use your keyboard to select the corresponding drive letter. When
you’re done, hit Enter.
. Wait for Tails OS to boot. Since this is the first time, it may take a while.
Just be patient.
. Configure Tails and deploy Tor + VPN. Yes, the latest version of The
Onion Router has an in-built VPN.
. Get ready to discover the dark and sometimes creepy wonders of the
dark web.

So how do you get on the dark web?

21
All done installing and configuring Tor? Great! Fire it up and let’s surf. At first
glance, Tor doesn’t look that different from your regular browser – it has a
search bar, lots of quick-launch icons, the peeled onion icon smack in the
middle of the screen. So, now what? Well, let’s start small.

Although content on the dark web is not as ‘indexed’ compared to the one on
the clear web, you can still use search engines to find stuff. The Hidden Wiki
and Grams are the heavyweights here.

Yay, now I found everything my heart longs for. Not quite: since the dark web
relies on privacy and anonymity, search engines like the Wiki and Grams
frequently return false results. No matter – good or not, the Hidden Wiki is a
great place to start exploring.

The Hidden Wiki & Co.


Think of the Hidden Wiki as Wikipedia’s evil twin – looks more or less the
same, but contains links to various dark web categories: editor’s picks,
volunteer, introduction points, financial services, commercial services,
email\messaging, drugs (yes, it’s the real deal), blogs & essays, hosting
providers, hacking services, darknet radio (nothing shady about that; just
some weird electronic tunes and, occasionally, a bit of jazz), literature (mostly
resources on hacking, both ethical and black hat).

You can also find quick links here to the stuff that makes the dark web
pitch-black dark: contract killers, rape, torture, or murder on demand, child
pornography.

Fortunately, in Hidden Wiki, every website is followed by a brief description


so that the user knows what to expect (or not). My advice to you would be to
stick with the editor’s pick. You can also take a look at the blogs & essays
section if you want to find some nifty coding resources.

If you’re feeling chatty, you can always access a chat room. Services like
Random Chat connects you with random people using the same service. What
happens after that, it’s all to you.

You should stay away from everything labeled “porn”, “card skimming
services”, “PayPal hacks”, “firearms”, “real fake IDs and passports”. Believe
me – there plenty to go around and each and every one of them are being kept

22
under surveillance, not to mention the fact that you’ll get exposed to some
stuff that will definitely make you take several cold showers.

Hidden Wiki’s not the only search engine online. Here are a couple of
alternatives in case you get bored with Wiki.

 DuckDuckGo – also available on the clear web. The best thing about
DuckDuckGo is that it doesn’t track your searches. One can say that it’s the
Google of the dark web.
 Torch – considered the first dark web search engine, Torch boasts a
database of several million onions links. Works just like Yelp. It even comes
with recommendations, although most of them append websites like the
infamous Silk Road.
 WWW Virtual Library – if Torch and Hidden Wiki are old, the
triple-W Virtual Library is Cthulhu-old; as in the elder god of search engines.
What’s even better is the fact the WWW Virtual Library contains info dating
back to the beginning of the Internet: logs, documents, pictures, and
everything in between.

Fun fact: The Virtual Library was founded and, for a very long
time, curated by none other than Tim Berners-Lee, the George
Washington of the Internet. So, if you’re looking for obscure
Internet facts, very old documents, Berners-Lee’s brainchild is
the way to go.

 Uncensored Hidden Wiki – think regular Hidden Wiki is bad? Wait


till you see the uncensored version. As the name suggests, it emphasizes very
illegal activities like human trafficking, drugs, pornography went wrong, and
other things that fester in the dark corners of the human mind.
 ParaZite – do you know the “want to get Lucky?” button in Google’s
search engine? The one that takes you on a random clear web site? Well,
ParaZite does the same thing. Sure, you can use it like any run-of-the-mill
search engine, but if you’re feeling curious, you can also try the “feeling
(un)lucky” feature. Proceed with caution and prepare to eject and torch the
thumb drive.

23
COMMERCIAL SERVICES

Believe it or not, the dark web even has online shops. And no, they don’t all
sell drugs or firearms. Some of them are, reportedly, legit and have great
bargains. For instance, if you want to buy a laptop or a smartphone, you can
try your luck in one of these shops. Of course, all transactions are anonymous
and Bitcoin-driven. Sure, you can use other cryptocurrencies if Bitcoin’s not
your cup of tea.

The major issue with these websites is that a whopping 50 percent are fake,
and there’s no way of telling for sure if they’ll deliver or not. By the way, most
have shipping services.

Of course, you can’t use your home address for dark web drop-offs, but
apparently, they can ship all over the world, minus some Middle Eastern
countries and North Korea. To tell you the truth, I was tempted into
purchasing a Samsung Galaxy S10 Plus; it was only 250 bucks. My advice:
look, but don’t touch (buy).

Here are a couple of commercial services you can check out while you’re
browsing the dark web:

 CStore – any kind of electronics. You can make purchases in


cryptocurrency or gift cards. They even accept full escrow.
 Apple Palace – everything Apple: laptops, desktops, phones, and
accessories. All at ludicrously low prices.
 EuroGuns – the name says it all: guns sold on the European market. The
website even boasts that it’s the number one European arms dealer.
 Kamagra for Bitcoins – if your boomstick ain’t working no more, you
can try Kamagra, which is the dark web and cheap version of Viagra.
 Gold & Diamonds – site offers ‘real’ diamonds and gold.
(Un)fortunately, it only ships to Germany and the United States.
 PirateSec – legit hackers, at your service!
 Fake Passports – I think it’s self-explanatory.
 SOL’s United States Citizenship – sells American citizenships; go
figure.
 Digital Gangster – the most gangsta way to hack someone’s computer.
Apparently, these are Ronin hackers who can be hired for exploits, web
hacking, password retrieval, and all-purpose espionage.

24
 Onion Identity Services – summer discounts for IDs and passports.
Bitcoins only.

EMAIL CLIENTS

Always remember that the dark web is a people-centric community. So, it’s
only natural to find ways to keep in touch with your darknet buddies and\or
customers. There are several email and IM services which you can use, and it’s
highly recommended to pick one if you want to step up your dark web game.

In terms of functionality, I don’t think there are too many differences between
regular IMAP, POP3, and SMT services and the stuff you can use to
communicate on the dark web. Let’s start with the email clients.

 secMail – full-fledged email service. Pretty simplistic in design: you can


compose, send, and receive emails. All the great things about an email
client, minus the tracking, eavesdropping, and other privacy issues.
 Lelantos- pay-to-use email service. Great security and privacy features,
but it has one of the most unreliable and sidetrackable registration forms.
Proceed at your own risk.
 Bitmail.la – another pay-to-use email client. Has many features like
IMAP, SMTP, and POP3 support, and a 500MB mailbox. Apparently, a
lifetime membership costs $0.60.
 Mail2Tor- a free email service which, reportedly, works on both dark and
clear web.
 Guerilla Mail – creates a disposable email address.
 AnonInbox – pay-to-use email client. Supports IMAP, SMTP, and POP3;
charges around 0.1 BTC per year.
 Protonmail – has both paid and free subscriptions. Boasts the
browser-encrypted email technology.

25
CHAT\SOCIAL MEDIA

Right. Let’s now talk about social media and instant messaging. Believe it or
not, Zuckerberg’s Facebook has a darknet version. It’s mostly used for covert
communication, anonymous tips submission, and stuff like that.

Sure, it’s not as secure as the clear web version, but it’s there and totally legal
to use. Hidden Facebook is hardly the only social media client on the dark web.
Check out the list below for the ‘hottest’ dark web clients.

 BlackBook – works pretty much the same way as Facebook: you can chat,
send pictures and friend requests, post status updates, and join groups.
Though competing head-to-head with Facebook Onion, BlackBook’s prone
to hacking. Reportedly, the client was disabled at least a couple of times in
2018.
 Torbook – very similar to BlackBook. Some claim that both of them rose
at around the same time, despite the creators not knowing each other.
 The Campfire – gather around the campfire, folks to hear the tale of
tales. The name’s rather suggestive – a big chatroom; everybody can join,
and the topics can be anything from the latest trends in the music industry
to how you can hide a human body.
 Lucky Eddie’s Home – scripted chat room that sports one of the most
efficient file-uploading system on the dark web. Just like any IM app, you
can send or receive messages, join or create groups, and send files.
 MadIRC Chat Server – if you’re over 30, you certainly remember the
mIRC era. Surprisingly enough, IRC off-spins are still being used today,
mostly for covert conversations or intranet communication. MadIRC Chat
works just like a regular IRC – no or subscription required. Just pick a
username and join in on the fun. I know sharing is caring, but in this case,
I would advise you not to share any personal details because you may
never know who’s on the other side of the line.
 Chat with strangers – think Omegle, but on the dark web. Just fire up
the client, connect to a chat room, and that’s it. You can’t send or receive
files. Still, if you’re lucky, perhaps you can partake in a scintillating
conversation.

26
JOURNALISM AND ADVOCACY GROUPS

As I’ve mentioned, the dark web isn’t just a place of eternal torment, teeming
with drug dealers, human traffickers, and a hitman. It’s also used by
journalists, advocacy group members, and political refugees in hiding. Reuters,
Fox, NBC, CNN – all of them keep open dark web channels to receive
anonymous tips from whistleblowers.

Advocacy groups are also reaping the advantages of the darknet because, here,
the term of censorship is as popular as HTTPS. And finally, we have political
outcasts, refugees, and people who want to get in touch with the outside world,
being from a totalitarian country that suppresses all means of communication
and information.

Of course, there are your run-of-the-mill congregations, which will worship


anything from Lucifer to the flying spaghetti monster.

If you’re interested in subversive journalist, here are a couple of sites you can
try visiting:

 Soylent News – a trans spectrum darknet news aggregator. Features


webmaster-moderated forums on which you can submit comments. You
can also get involved by either submitting tips or writing news.
 ProPublica – historically, ProPublica’s the first major news outlet to
feature well, a darknet outlet. With an activity spanning almost four years,
ProPublica managed to expose power abuses and blow the lid on covert
activities conducted by governmental institutions. Although quite young
compared to other darknet news outlets, ProPublica’s work was rewarded
with five Pulitzer Prizes for Feature Writing, the last one being awarded
to Hannah Dreier, the investigative journalist who covered the gangs of
Los Angeles.

27
More on how to stay safe on the dark web
We already went through VPNs, anonymizing web browsers, and disposable
operating systems, so I won’t bother reminding you about those. Here some
other things you can try to bolster your security.

1. Minimize or rescale your Tor browsing window


Sounds rather off, doesn’t it? Well, there’s a reason why it’s recommended to
browse with a minimized or rescaled window – you can be tracked based on
your active window’s dimensions (yeah, they really can do that). So, do
yourself a favor and rescale that Tor window as much as you can before
proceeding.

2. Tweak the security settings


Tor has an in-build slider which lets you adjust the level of security. Just click
on the onion icon and choose Security Settings. Adjust the slider until the
cursor points to the safest. This means that the JavaScript will be disabled by
default on every website and some symbols and images will not be displayed.

3. Never use your credit and debit card for


purchases
I’ll go farther than that and say stay away from darknet shops. Maybe some of
them are legit, but are you really willing to take that chance? Still, if you’re
really itching to purchase a new phone or God knows whatever, I would advise
you to stick with Bitcoins or your favorite crypto coin. Using credit or debit
cards for this sort of thing is like painting a big bullseye on your bank account
while yelling: “come here and take my money.”

4. Close Tails after finishing your session


When you’re done surfing or shopping on the dark web, don’t forget to shut
down Tails. The major advantage of using a live OS such as Tails is that, on
shut down, the OS wipes itself from the thumb drive you’ve installed it. That’s
why it’s never a good idea to burn Tails on DVD.

28
5. Don’t stick your nose where it doesn’t belong
Great life advice, but it’s even more valuable where the darknet is concerned.
Keep in mind that many criminal organizations are using the dark web to
communicate or sell merchandise. Some of these channels are under watch.
You may very well end up in the middle of a stakeout that could turn ugly. So,
if the website looks fishy, close the tab, and forget about it.

Happy browsing and stay safe n the internet. Please leave a review to give
courage do other books, know where to improve.

29

You might also like