Really? These are the reasons why you used tor?
I mainly use tor to browse and access clearnet sites. Living in UK and knowing that all your connections and data are recorded, stored and mined by first UK government and then followed by US government and probably some other ones too, is really creepy!
I use tor to have some privacy and anonymity, without having these creepy, lurking government officials prying through my stuff. - unwarranted!
I'm also building/coding/developing a free public wifi access point as I have some spare bandwidth on my Internet connection and I live on a busy street with many cafes nearby. All that Internet traffic will go through tor and I'm sure some people will appreciate free Internet access, despite it being a bit slow. Tor also helps me for not having to be liable for others' browsing habits either.
The more random traffic we get going through tor, the better privacy and anonymity it provides for everyone.
I agree that tor is slow, or at least slower than not using it. It will always be slower than not using it, because it adds overhead to your connection. Its latency will always be slower too, because it travels all over the world until it reaches your destination, and this is by design. But so far tor bandwidth is often really good: I can even stream videos. And generally web pages open without any effort!
I'm really waiting for this to become mainstream:
It is going to be awesome with tor! Not sure how it will work in the end with tor, but it will be awesome.
Edit: Oh, and I always use the onion address rather than the clearnet one, if it is available!
You are most likely safe enough just using Tor. Unless you are specifically Targeted by the FBI. (And they use some kind of exploit that hasn't been fixed yet to see through the Tor Network, which would be extremely rare chances) Hotspot Shield is a basic VPN/Proxy that encrypts your connection and acts as a tunnel for your Tor connection to run through. If you don't use HotSpot Shield, your ISP will know you are accessing Tor Network, but they won't know what links or content you are visiting because Tor Encrypts the connection. If you do use Hotspot Shield Your ISP will only know that you are connecting to Hotspot Shield and not be able to see the Tor tunnel. However, something to think about. (And again, the chances are incredibly slim) If you were targeted and there was a bug in the tor browser, they would see your HotSpot Shield IP Address and then they would be able to contact hotspot shield and ask them for the log of who connected to that IP. There would be a list of about 100 IP's one of them being yours and they could potentially narrow it down to you. This is because HotSpot Shield "logs" or keeps logs of what IP's connect to which of their servers. It all depends on how secure you want to feel. Levels of security
I made a network Map yesterday of how a VPN + Tor works, it may help you understand more about the security. Here.
Probably doesn't do much for anonymity since they likely keep logs of who had which IP address at any given time. A VPN would be better for anonymity, specifically a paid one that doesn't keep logs. The only free one that I can actually recommend is ProtonVPN, if you're really not willing to (or can't) pay for one.
Your best bet is a VPN that does not - log and reside in 14 eyes country. I personally would recommend Nordvpn (been with them for a while, based in Panama, strict no logs), also ExpressVPN (based in BVI, no logs too though expensive), a few others are good too like Azire,VPNBaron, you can read more about popular VPNs on torrentfreak, it's pretty informative with what they log, where are they based and so on. But either use Tor or only VPN, not both.
If you haven't provided personal payment details that could lead to you, I think it's ok to ship it to your house. It's important that the payment does not show that it was you, otherwise, anyone can send you anything via post, right?
Maybe there are reviews about certain websites or comments that you can read before ordering? I haven't ordered anything so I have no clue about that but I heard that you can check 'dream market'
NordVPN, it even had a VPN to Onion so you can access it through chrome, wouldnt recommend it though. It also has a Double VPN function, to mazimize the security. With that + Tor I think you are really safe.
Like sharkman kinda said, its not good to overexert because it's almost always unnecessary. But a good amount of safety is always good, i recommend just using a GnuPG program like GPG4Win for private messaging with people over subjects on the darkweb.
Heres the link to download: https://www.gpg4win.org/
If you are distributing illegal substances or material, just use tailsOS
Nothing will happen unless you do something stupid. (buying drugs, cp, etc) Government only monitors the serious parts of the deep web, they dont care about the minor things. You will need a vpn to go to most dw sites. Many are hosted on tors onion links, and tor acts as a vpn make sure to get ublock origin and block ALL 1st and 3rd party scripts and items. Only allow scripts if it is required to run the site and you trust the site! If you do this, you wont need another vpn other than tor...However there is obviously dw that exists outside of tor, use NordVPN, BolehVPN, IVPN, ExpressVPN, or VPN Gate to access those sites safely, and use ublock method. DO NOT USE WIND SCRIBE, CYBERGHOST, OR TUNNEL BEAR! Also, scan program DLs with virustotal! If a file has more than 5 defections, dont trust it!!! Sorry for a large ass essay lol, DM Qs.
The only comment so far is correct and also incorrect depending on what you want to define as your security.
A VPN does not add extra security and Tor itself is not 100% secure.
When you connect to the Tor browser you are essentially connected to the Tor network which mask your IP. While your data can leak and still be tracked if you are not careful you are still somewhat hiding your true IP. The Tor network reroutes any request like a webpage to it and then it essentially routes to your actual IP. So your original IP can still be found if someone knows what they are doing and you do not.
A VPN doesn't necessarily add extra security but it does add an extra layer to your anonymity by giving you another IP on another network. Then connecting to Tor you are rerouted through the Tor network with another IP. So now you have your IP, the VPN IP, and the Tor IP which is randomly given and can be changed. This is called tunneling.
Not having a VPN isn't necessarily negative, but it's not necessary either. However, having it as an extra layer of privacy is more beneficial than harmful.
I would recommend getting or paying for a VPN if you want that layer and plan on doing something really illegal (don't do anything illegal .onion sites are littered with federal agents). If you are just using Tor to browse Facebook or YouTube. Stop while you are ahead and just use a normal browser to do that. Tor is designed to give you privacy and anonymity. You would want to mainly use Tor as a means to browse the web without having a ton of cookies and data given to a third party company to sell you ads. If you are curious about .onion sites then you are bored and not going to be that impressed.
Just becareful and do some more research.
EDIT: as for VPN's try Nordic for a three day trial, IPVanish is another good one.
From a relative in InfoSec that works high up for several large banks and the CIA...
Any US based VPN service is selling/keeping your info. The Feds own it all now. HideMyAss, TunnelBear, Vypr, etc. And ffs, do NOT use Google as a DNS on your homebrew VPN.
I assume you're referring to the "dark web," but I won't get into those terms right now. You just need the Tor Browser, technically, if you want to visit .onion sites (or the mobile version, which would be Orbot and Orfox - https://play.google.com/store/apps/details?id=org.torproject.android&hl=en).
You can access them without the browser, but I don't recommend it, because you won't be anonymous in that case.
So, my curiosity got the best of me. The site has a YouTube link on it underneath a couple of pictures of mutilated people. Upon visit, the video has the the same background image as the site with a MediaFire link in the description. The link contains a .txt file. That .txt contains some binary code that translates to: a bloody Roblox game. I'm not joking. Here's the link to it: https://www.roblox.com/games/1439881473/the-end EDIT: The game is no longer functional. Go at your own risk.
Tor Browser is perfectly safe for most people.
That being said, Tails can be considered safer because
By no reason should you take this comment to be an endorsement of everyone everywhere using Tails. The usability cost is too high and it is way overkill for most people.
Consider reading and learning about these tools and what they do. https://tails.boum.org/about/index.en.html for instance.
Wow. All this shit and still no real answers.
>I was wondering of the possible risks of using the deep web (tor).
There are some, but they've been exaggerated.
>Could I be cyber attacked by another user?
Not so commonly by another user (although that happens) but usually by a deepsite owner or an exit node owner. Anyone who's giving you something to look at can give you something poisonous. Shouldn't happen, but it does, because web browsers are not perfectly tight.
>Is Tor illegal?
This claims just using it is legal everywhere in the world. I would like to think EFF's lawyers looked at that before it went up, but I suspect that isn't entirely clear in lots of places in the world. And I would bet the laws change all the time. If you mean running a tor relay node then look here for stuff that EFF's lawyers wrote themselves. No one has gotten in trouble yet but it may happen in the future, and in illiberal countries you could easily get in trouble.
>whats the most shocking thing you've seen in tor.
Kiddyfucker sites for talking about it and moral supporting each other. (I know, I know, it's normal to not understand cultures outside my own.) Nonetheless - being a non- child molester - I don't think of child molesters as having any (true or false) moral theory around their actions.
The Dark Web exists. The Shadow Web does not.
The Dark Web can be accessed via the Dark Net with applications like Tor (https://www.torproject.org) or I2P (https://geti2p.net).
The Shadow Web is just something people have made up in Creepy Pastas, then made some fake .onion sites to try and perpetuate the myth. It seems to mostly revolve around the myth of Red Rooms, that you can pay Bitcoin to get access to the Shadow Web so you can watch Red Rooms.
The Shadow Web does not exist in the context you're asking.
If you want more information about Tor the protocol, or the Tor Browser Bundle, you can ask in /r/TOR.
I hope that helps.
As more details come out, it sounds more and more like you're running together a bunch of different issues.
> tor on mobile is instant failure
I kind of doubt that and suspect your mixing up different issues, assuming you're using the real Tor Browser for Android.
> duckduckgo on mobile is instant failure
If you're talking about DuckDuckGo Privacy Browser, why do you believe it is able to access onion services? Reading it's page on the play store I don't find anything that suggests that it can. Obviously it will fail.
> Tor Browser on a computer takes some time and then it fails
I suspect the error message is different, I suspect it wouldn't appear for facebook's onion service, and I suspect it only happens on onion services that are down right now (meaning there's nothing you can do), which very common for onion services that aren't run by big names like Facebook.
You must get 2 things. VPN and Tor Onion. Private Internet Access is the best deal out there and has been around for a lot of years. This will hide you true location. I am currently in Atlanta GA, and with a Click I am in the Netherlands. They are proven to have Zero Logs of your activity. They have been taken to court a couple times, and the proof is no logs were ever obtainable because they were truly unable to produce them. Second, Tor Onion adds a definite level of anonymity to your browsing. read up on it, or watch YouTube videos to understand what is going on. After that, search on reddit for markets or sites that frame your interest. Please don't kill anyone or become involved in kiddie porn. And do be careful as there are some seriously dangerous things that can go down, depending what you are doing.
And if you're sure NordVPN doesn't log, are you sure the owners of the datacenter in which they are located also do not log?
What about the IXP to which they connect? Do those log? How do you know?
You will get hundreds of answers. :) Everyone is satisfied with their VPN, because most of them works fine.
What you should care is do they keep logs. And so far, I know that 3 VPN providers partially proved that they don't keep logs: Private Internet Access, Perfect Privacy and ExpressVPN.
​
You can Google it. PIA was subpoenaed and it appears in some court document - they couldn't provide logs because they don't have them.
Perfect Privacy and ExpressVPN got some of their servers seized (in Netherlands and Turkey I think) and it resulted in nothing.
​
PureVPN keeps logs and is happy to share them with Three Letter Agencies. HideMyAss and a few others too.
NordVPN, ProtonVPN, ExpressVPN are the ones who at least for me looks the bets with security and speeds. I bought NordVPN recently and for now, it works quite good, I hope it will stay the same way. What deals with price, express is one of the expensive ones, pia and NordVPN are cheaper. I even found a coupon code for NordVPN (BESTDEAL66) so if you decide to try Nord, use this code it will make it cheaper.
Get rid of the fucking VPN. Running Tor through a VPN completely defeats the purpose, even if you're using a trusted VPN provider, which TunnelBear is certainly NOT because it's free. Using a mobile device is already a bad idea. You need to spend a lot more time reading the guides and FAQs.
Tails is as safe as you're gonna get when it comes to bootable operating systems . There aren't any alternatives that I know of that are meant to browse the deep web. Although you could just get one of the Linux distributions and get some type of vpn and tor although I don't think that would be any more safer than tails. Or you could run tails in a virtual machine like you said, I don't have very much experience with that so I couldn't tell you if its safe or not. I'd say you should stick with tails, or try and run tails in a virtual machine. If you have any more questions, just pm me. Also, just to warn you, if you use tails on a vm, you won't be able to upgrade it or anything. Although if you look it up on some forums I'm sure you'll find a way lol.
Here's the link to the official tails instructions on how to set up tails in vitualbox:
https://tails.boum.org/doc/advanced_topics/virtualization/virtualbox/index.en.html
also here's a link on an unofficial tutorial on YouTube on how to do it:
.
HiddenServiceDir /path/to/my_service HiddenServicePort 80 127.0.0.1:80
99% of the work is making the website. Tor is the easiest part.
edit: For the last 1%, the Tor Project has a guide here
https://www.reddit.com/r/deepweb/wiki/index
>How illegal is the thing you're planning to do on Tor?
>Not at all or not very
>The tor browser bundle is fine, avoid scams, don't give out personal info
You don't need a VPN. You can download Tor from https://www.torproject.org/. Once installed, search in the search bar for ".onion links" or a similar search term to find .onion sites. You'll see a bunch of clearnet sites that contain links to .onion sites. Once you found a site that has a bunch of links, you copy a link to a .onion site and paste it in the url bar.
>Is Tor safe?
It depends on what you are doing and what your definition of "safe" is.
>I should download Tor because you cant access the deep web with conventional browsers. Is this true
Basically, yes. You can't access Tor hidden onion sites without using the Tor Browser. (There are some normal websites that act as a proxy allowing you to access hidden onion sites from a regular browser, but it is highly recommended to not use those. They act as a man in the middle and can read all of the data you send or receive from the normally securely encrypted onion site.
> was Tor the best choice?
The Tor Browser Bundle is the best choice because the Tor Project does all it can do to make sure that your browsing sessions are private and anonymous. Sometimes the system fails, though, so be careful.
https://www.torproject.org/download/download-easy.html.en
You might want to consider using a VPN in front of the Tor network to protect yourself from being de-anonymized through the Tor network.
You > VPN > Tor Network (multiple Tor relays) > Hidden onion site
from as far as i know you can't. but it is possible to make a bridge connection to access tor. that pretty much means you are masking your connection as if you are just browsing google or reddit or basically whatever. you can setup a bridge connection during the first launch wizard, just select the option which says that your isp is blocking tor and go through the steps.
for more info you can look in the tor documentation https://www.torproject.org/docs/bridges.html.en
all you really need is tor:
https://www.torproject.org/docs/tor-doc-osx.html.en
And some kind of VPN to sit behind. I use Cyber Ghost
Also if your macbook has a built in webcam disable that.
I think that you would be better off trying to boot the Tails OS.
Download the Tails ISO and burn it to a DVD. Boot from the DVD.
If you would rather boot from a USB flash drive, you can use Rufus:
Use the default values, except:
Change the drop down for "bootable disk using" from FreeDOS to ISO Image.
Click on the button to the right of the ISO image and select the Tails ISO from the file manager.
READY should be displayed near the bottom of the Rufus window.
Hit Start.
NordVPN is not only a virtual private network but an omnipotent anonymity tool. The NSA released a statement just 3 hours ago stating that “NordVPN is a threat to eavesdropping missions carried out by the NSA to monitor high risk individuals” it is also widely believed that NordVPN disables intels IME system also known as the “backroom”.
NordVPN was created by Julian Assange before his Estonian citizenship was denounced after throwing shit over the Estonian embassies. Even since Assanges extradition to the United States it is thought that Assange is making billions off of NordVPN’s affordable prices while being in a federal prison.
Did you try anything? It sounds like you haven't. Start here: https://tails.boum.org/doc/anonymous_internet/networkmanager/index.en.html
If you didn't try reading the documentation first, please do that in the future. That would help prevent you from cluttering a subreddit with 4 posts over the period of 10 hours.
1) Learned about it from TOR project, literally directly from their website and their goal to achieve online anonymity which I thought was an amazing mission, and I've decided to back it up.
2) Of course and I don't regret it a single bit.
3) This question is fairly vague, I mean, it's the same as asking "what do you know about Earth/Space/Physics etc", would you mind elaborating which specific component/topic interests you?
4) Yes, lots of people [if you mean directly on the .onions]. There are lots of good forums on topics like programming, books, media, hoaxes/myths [and other worse ones which I don't really want to include here]
5) DO IT! The hidden services are scary at first to most newbies, but once they get comfortable, it's an awesome journey through the "jungles" of the deep web [with an element of surprise which may or may not be pleasant]. Also I think it's great for overall expansion of computer/internet knowledge and for anyone who is interested in these fields, so I'd definitely recommend giving it a visit.
Yes, you can, but if you're going to start looking for more... illegal content, then perhaps it's time to start thinking about moving on to something like a live Linux distro. Tails is built from the ground up to help you out with security/Tor - https://tails.boum.org/
After that, start using wifi hotspots, instead of your own internet.
Maybe invest in a VPN?
Others may have other ideas.
Look Its gonna be in your best interest To just visit Via Tor here are the links if you need em
~Hidden Wiki http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page ~ Uncensored Hidden wiki seems to be down atm ~Tor Download page https://www.torproject.org/download/download.html.en
( If you Want to use tails Be My Guest i personally just have a disposable Machine with Multiple Vm's and Boots At my disposal)
Don't use onion.cab. Download and install the Tor Browser bundle:
https://www.torproject.org/download/download-easy.html.en
onion.cab is not anonymous. The onion.cab site has your IP address and knows which onion site you connected to and what you accessed on it. You should throw that account away and create a new one using Tor.
If you want to browse the darknet, only use official software from the torproject: https://www.torproject.org/download/download-easy.html.en
Furthermore it's always better to use the TBB (Tor Browser Bundle) on your computer.
Tips?
Well don't believe everything you read/see and use your common sense.
The TBB also provides anonymity and privacy so it doesn't harm if you use it once in a while just for normal browsing.
Don't trust any apps unless they are approved by the Tor Project.
There was a fake onion app out there for awhile:
Using a VPN will not keep your browsing habits anonymous, nor will it add additional security to non-secure (HTTP) traffic.
If you are looking for anonymity, you should use the Tor Browser instead of a VPN.
If you're looking for added security, you should always ensure you're connecting to websites using encrypted DNS and HTTPS. A VPN is not a replacement for good security practices.
If you're looking for additional privacy from your ISP, on a public Wi-Fi network, or while torrenting files, a VPN may be the solution for you as long as you understand the risks involved.
Solely using Tor/Tor Browser in isolation will not protect one's identity; it is also necessary to modify online behavior. For example it is essential to use strong encryption, obfuscate writing style, not reveal personal interests, distrust strangers, limit online disclosures, and follow a host of other tips to stay anonymous. Ignoring these rules is a fast track to deanonymization
A VPN, in my opinion, serves little purpose except to obfuscate the fact that you're using Tor from your own ISP. It does little to add to your actual anonymity, but it's unlikely to hurt.
If you desire high security, then DO NOT run Tails from a VM. Where did you hear that you should do this? It is very important to learn the source of this misinformation, because it is extremely misguided. A VM is never more secure than the system hosting it - the host can arbitrarily read and write the VM's memory (including private encryption keys, keystrokes, etc.) and trivially monitor every single thing that the VM is doing. You need to boot Tails, not just run it in a VM. Again, this is extremely important if you require high security. Please, if you read on a website or anywhere visible that it is a good idea to run Tails in a VM, please share it here so that I can reach out to them or at least offer commentary to hopefully correct that mistake.
Setting Tor Browser's security slider to "High" is indeed the right idea. And really, in my opinion, anything less than "High" is really not very secure at all, because it allows scripts to run in the browser, which have been used by governments to de-anonymize Tor users in the past.
Furthermore, it is essential that you read the Tails "Warning" page completely to understand the ways that Tor and Tails can and cannot protect you, and the things that you must do in order to maintain your anonymity. Even if you are not using Tails, and just using Tor Browser on another OS (not recommended), that is still an incredibly important page to read.
Finally, every time you sign into Facebook, you're accessing the "deep web." What you're actually talking about is the dark web - try not to confuse the two, as the news media are so fond of doing (hence the whole existence of this subreddit).
You can always buy yourself a little bit of extra safety by running a VPN client on your system so that you connect through a VPN before you connect to the Tor network:
You > VPN > Tor Network
You might also want to look into booting the Tails OS to give yourself some additional protection:
Note: Tails does not support VPNs currently, so if you want to use a VPN with Tails, the easiest way to do it is to buy a dedicated VPN router and put the Tails machine behind it:
Yeah its fine to use your laptop. Preferably you should boot into tails for the most secure connection but if you just use the tor browser you are pretty secure. https://tails.boum.org/
That said this article explains how mobile tor browsers can leak your ip address which you don't want. http://xordern.net/ip-leakage-of-mobile-tor-browsers.html
If you're just browsing, you're fine - it's different if you're buying narcotics or something like that. I know a lot of people recommend using a VPN too, but I think that's quite possibly BS. Right /u/system33-?
I prefer a Linux system or Linux distro - this site has some good ones: https://alternativeto.net/software/tails/
https://tails.boum.org/doc/first_steps/installation/index.en.html There, that's fairly noob proof. Long as the stick doesn't get infected and you stick it back in your live comp while you're running Windows lol.
>What antivirus program should I use, and what should I be doing in order to make my computer safe? What security programs do you guys use?
1) Virtual Box VM - try Whonix 2) Properly configured firewall 3) Hardened system 4) VPN 5) DNSCrypt 6) EMET 4/5.1 7) Multiple AV/AM/AR/AD 8) Limited permission windows user account 9)LSP (Local Sec Pols) 10) Running ICACLS and limited permissions 11) Not to mention all of tweaks and individual hardware that every is using which basically throws a fat curveball into that equation
If I really answered this, you'd be lost as fuck. This was the simple answer.
Go to https://www.torproject.org/projects/torbrowser.html and download Tor Browser for your computer. Or if your mobile device is Android, setup Orbot to connect to the Tor network.
Then head over to /r/onions to find links to deep web sites.
Not necessarily. A lot of .onion sites are non-JavaScript, so they don't require them to be enabled. For instance, the Dread forum (which looks a lot like Reddit), can be used without JS. However, some other sites require it. There's a site that I moderate on called Psycho Social Network, and you can't log into it without enabling JavaScript. I don't think you really "miss out on much." This site explains the plugin a bit more: https://noscript.net/
you don't need Tor to learn how to bake with semen. you can just buy a book with recipes on amazon:
Natural Harvest: A collection of semen-based recipes https://www.amazon.com/dp/1481227041/ref=cm_sw_r_cp_api_oHYCBbWRHN52B
extra: make drinks with semen: Semenology - The Semen Bartender's Handbook https://www.amazon.com/dp/1482605228/ref=cm_sw_r_cp_api_QIYCBbFZP3J9F
Use tor browser for the deepweb and search up .onion links, Also use a VPN such as NordVPN in case of anything also have an external hard drive full of the stuff you think is important on your computer in case of anything.
In all honesty, if you want to use a laptop for deep web surfing on a vpn. You might as well just be giving away your location. A free vpn works to a degree, but of course they won't completly mask your IP address. Also they may keep logs on where you have been to, and what you have done. It all comes down to how much your willing to trust the VPN provider. As for me, I use Private Internet Access VPN. It's only about $6 a month and provides a fast service. Another one I heard was good was proton VPN. And as an added bonus, they both work on linux. As for which OS is better for deep web browsing, I always say linux. And even with a linux I install a Virtual Machine just as a extra all depends on how "safe" you want to be while browsing the deep web.
ProtonVPN has a free version with unlimited data allowance. They only keep logs of the time you start your session and the time you end. They are the same people who made Protonmail so you know you can trust them.
VPNs aren't needed to browse TOR, but they are quite useful. I actually use the VPN IPVanish, and it works just fine. If you don't want to use a Live USB/CD, you should definitely download a VPN before downloading TOR, to prevent your service provider "reporting" you for downloading it. Here me out, using TOR isn't illegal, but it can be used for such purposes, which is why if you just straight-up download it, people are gonna be suspicious. Now using a Live USB/CD is very useful with the OS's Tails and Qubes, and can be subsequently used anonymously and quite easily, although I find them to be a bit slow. I guess that's the cost for anonymity is internet speed. Or it's just my service!
Guys how is ExpressVPN for using with tor and stuff. i did some research and it seems that Expressvpn is pretty good for torrents since they have a no log policy and that is what i connect to to go to the deep web n shit plus torrenting. but i want to see what you guys also suggest. i still have some time before refunding my service so i would appreciate it if you guys throw some suggestions. thanks.
Check out this post from /u/ThatOnePrivacyGuy over in /r/tails comparing a lot of different VPNs on various different measures.
TotalVPN apparently is based in the US and logs IP addresses. Aside from that, they seem to be a middle of the road VPN, nothing special but nothing awful.
That said, if you are using Tor for anything that's unlikely to get you in trouble then there is little need for a VPN, if you're doing something that can cause you problems then you really don't want a VPN based in the US (or any 'Five Eyes' country)
I believe someone posted quite a good answer to this long ago. In short, you don't really get that much more protection, rather you experience even slower speeds since everything needs to be sent and encrypted twice through two different networks. At that point, it wouldn't even be worth it to use a VPN and the TOR network, you'd be basically crawling around. More hops, more pings, more lag, more time. For example, NordVPN already has VPN over TOR, and Double-VPN services if you really want it. If i were you, I'd use a VPN, route to another computer, and then use the TOR network from that computer.
Tl;Dr You'd be safer using a properly configured network, with a VPN, TOR, or a Proxy Daisy chain. I'd go with multiple VPNs personally.
Virtual machines and VPN's are not the same thing. A virtual machine is basically a "fake system" in which you can experiment with things that might normally damage your system, but in a safer environment.
For example, you could set up a "virtual Linux system" that has all the features of a real one, but is just for experimental (and fun) purposes.
A VPN (virtual private network), on the other hand, creates an encrypted connection over an unsecured network.
Some good links: https://www.bestvpn.com/blog/38176/vpns-beginners-need-know/
http://www.makeuseof.com/tag/virtual-machine-makeuseof-explains/
1.- Maybe something about Illuminatis?
2.- Tor needs no sandbox to run.
3.- No, and don't expect to get CP here, and we WILL bust you if you watch it, you'll get a long sentence for that crime, but you won't get experimented on (but we'll hope so)
4.- smokeweedeveryday.com
6.- see 5
7.- No
Be very, VERY glad I'm being nice to you.
PD: Which country do you live? because that "english"...
I meant to use it to like download a torrent from a tor onion site.
I don't follow your context and it's a bad choice to download torrent from an onion website or whatever you meant. It would reveal your original ip, When you download any torrent from Tor. The TBB link - https://www.torproject.org/download/download-easy.html.en the official website itself says ''Don't torrent over tor''
>can hackers get your IP and personal details if you visit their website?
Not normally. When using the Tor browser to access Tor hidden onion sites (or really any sites), you should first right click on the green onion to the left of the URL bar and select "Privacy and Security Settings". Move the "Security Level" slider all the way to High. Hit OK. That will disable JavaScript which should protect you from most malware.
>can you get a virus from downloading TOR browser?
No, just as long as you download it from the official web site:
https://www.torproject.org/download/download-easy.html.en
>are their any things i should know about? when i was reading a youtube comment it said not to visit the twitter, because its different, so is there anything else I shoiuld worry about?
Don't log into your normal accounts when using Tor. For your stated purposes, you should probably just use the Tor Browser when accessing darknet markets.
Don't use any market links from any "hidden wiki". Most are scams.
Check out the darknet market superlist instead:
>Theoretically, if someone managed to link entry and exit node traffic (realising it was the same user) would this mean the user's identity could be revealed?
Yes. If the bad guys (FBI / CERT / etc.) control your entry (guard) node and your exit node, they can de-anonymize you through the Tor network.
Download and install the Tor Browser Bundle:
https://www.torproject.org/download/download-easy.html.en
Go to the following URL in the Tor Browser to make sure that your home IP address is not listed:
I wouldn't recommend this guide or follow it.
You might want to look into downloading and booting the Tails (Linux) operating system:
Also check these subreddits' sidebars and wikis for more info:
/r/DarkNetMarketsNoobs/
/r/DarkNetMarkets/
Use the "superlist" for legitimate marketplace links:
/r/DarkNetMarkets/wiki/superlist
Being safe/secure/anonymous online is not a perfect science. You will hopefully get some different accounts on how to do this. I'm just stating the obvious stuff which helped me when I was a newbie. And remember that its all about building layers to keep safe. Here's a rough outline of what most people ought to be doing IMO.
Get a USB and boot with this.
Run your TOR traffic through a VPN, this is will make it much harder for your ISP to actually identify that TOR is being used by you.
Change your habits when online. Don't use any of your day to day clearnet accounts (reddit/email etc). Make yourself a whole new deep web identity.
When you boot up Tails, it should show the NetworkManager Applet in the upper-right corner of the screen. You can use that to select or configure your network connection, whether wireless or wired. Note that some wireless cards are not supported by Linux (which is the kernel that Tails uses), and if yours is one of them, then you may have to use a wired connection for the time being. If that is so, I would recommend buying an Atheros brand wireless card from ebay for $5 or so (yep, they're literally $5) that will have full Linux support - just make sure that it's compatible with your computer first. If you are having this problem, please open the Terminal in Tails and type the following command:
lspci -nnvv | grep -i net
And tell us the output, here - that will let us know what wireless card the computer is using, and we can determine if that's the problem or not.
The mail client included with Tails is Claws-Mail, which can be configured much like any mail client. Tails has a page on how to set it up here: https://tails.boum.org/doc/anonymous_internet/claws_mail/index.en.html . Just make sure that if you're using OpenPGP messages with Claws, that you keep it configured to use POP3 and not IMAP - see https://tails.boum.org/security/claws_mail_leaks_plaintext_to_imap/index.en.html . Of course, if your email provider offers a Webmail solution, you can also just use the included Tor Browser to use your email in that way, as well, though some providers may require JavaScript to be enabled in the browser, which is generally not recommended for anyonmity.
/r/bitcoin is always answering newbie questions. /r/darknetmarkets and /r/TOR are also good resources. The real thing you need to do is educate yourself about everything involved in the process before ever starting the process. So Browsing safety, bitcoin, PGP, and tons more.
This is the "official" bitcoin starting guide. read everything, try to understand everything. That's how you protect yourself.
You should look into using the Tails OS:
You download it, burn it to a DVD or write it to a USB flash drive and boot from it.
Tails has the Electrum bitcoin client built into it.
You can run Electrum on Windows, but if you don't configure it to run through Tor, all of your bitcoin addresses will be linked to your home IP address:
To configure it to use Tor, start the Tor Browser Bundle, then:
Tools > Network
Make the following settings:
Auto-connect: check mark
Protocol: SSL
Proxy: SOCKS5 localhost 9150
You may need to shut down Electrum and start it back up to get it to connect with the new settings.
Don't use the "default_wallet". The addresses in it have probably already been linked to your home IP address. Create a new wallet after configuring it to use Tor.
Get a DigitialOcean droplet and setup OpenVPN on it.
That way you can be sure that there are no logs
See this guide for help
If you're going to do sex work online and livestream your work, it's going to be a little bit easier for skilled people to find you, if they so desire. But you can of course protect yourself. In the end it's always really hard to completely stay anonymous, when you show your face but you can definitely fend off the dumber stalkers who aren't recon pros.
1) VPN is always a good idea. You don't want your IP to leak. It would be easier to find you that way
2) Don't use your regular email address on any services you'd use for work. Create an anonymous email that you only use for work
3) Never use your real personal information (obviously) unless it's against the law
4) Do not use pictures of you on your sex-work social media, that you also used on your private social media. It would even be better if you don't use social media at all of course
5) Try to use anonymous payment methods when sending and receiving money, like cryptocurrencies or private credit cards (https://privacy.com)
6) Don't talk to strangers outside of the website you're doing your work on. If you livestream and there's a chat, that's OK but never give out any contact information or use your social media to chat with people (Instagram, Twitter, Telegram)
7) Do recon work on yourself from time to time: try to google stuff like your name, email address and so on, or reverse image search some of your photos and screenshots of your livestream and check if something comes up
8) Don't show anything on camera that could give out clues about your person or your whereabouts (also obviously)
I'm not sure why you'd need a PO box but sure it definitely helps.
If somebody really wants to find you and has the resources or the knowledge, then you won't be able to hide. But most people either aren't that smart or that determined. So if you use all of these methods then you'll be safe from 99.9% of the people out there.
Good luck
>How can I do this
Start a VPN client on your machine to route all packets through the VPN before you start the Tor Browser Bundle.
>what VPN is the safest
Check out this website for a list of good VPN services:
Hi guys, I want to highlight again the "The Philosophy behind Freenet" by Ian Clark.
"Democracy demands anonymity." I think this politic point of view very very interesting too. Anyone read and, please, can give me some comment about it?
I meant where it could be found. But yep, I just verified it can be purchased on Amazon (hopefully still ships to you)
https://www.amazon.com/gp/product/B01LXKF2VW/ref=ppx_yo_dt_b_asin_title_o00_s00?ie=UTF8&psc=1
Maybe try some keywords like "horse worm paste"
The added value is indeed hiding Tor usage from your ISP. And there are definitely many bad VPN providers out there, so you need one which has stood its ground. There are more and more independent audits being conducted by large consultancy and auditing firms, to check the security and logging policies of VPN providers, amongst other things. There are luckily certain VPN providers which have already proven in court not to hand over any user data, like Private Internet Access. Although you are definitely right that some VPN providers have failed in that regard in the past (HideMyAss, PureVPN, IPvanish and others were caught logging).
The problem with using a VPN provider with Tor is that you're putting all your trust in that VPN provider (like NordVPN, for instance). If you, in theory, get into trouble, then the VPN provider has logs of your activity, and they may or may not give it up to authorities. A few providers like this have had their "no-logging-policy" hold up in court (Private Internet Access, I believe?). With Tor by itself, you don't have this issue.
The virtual machine and NordVPN are mainly unnecessary steps, but they can help in some rare cases so since you have them use them. Tails comes with TOR browser, Electrum bitcoin wallet, a built in PGP encryption system, and a ton more. It’s very helpful. After installing Tails, set up a bitcoin wallet, and learn how to use PGP encryption. I can help with that if you need as well.
> If we hit the main source we can predict catastrophic events and shootings then report them.
What do you even mean by this lol. Mass shooters wouldn't even go to the darknet. They'd just buy some firearms legally and they would mostly go to some racist clearnet site like stormfront or a chan site like 8chan as used by the New Zealand shooter.
​
> Requirements: Need a VPN (NordVPN), Tor Browser
Well at least you didn't recommend a free VPN lol.
Quote from someone else:
NordVPN sends your E-Mail and Google advertising ID to a tracking company (Iterable Inc.)
Plus the app uses 5 trackers:
All in all, this data (probably not limited to this) is sent:
Source (german):
I use a free one (I donate to get better servers) called SigaVPN, seems pretty good, uses the open VPN to run it. Has a subreddit and thousands of people seem to use it with no complaints with security or them stealing info. I get no IPV6 or IPV4 leaks when I test it.
Everyone seems to think you need a VPN, but I don't think that's always the case. u/system33-, I know this is an older post of yours, but I think it still generally rings true, no? .
Many people lately are recommending PrivateInternetAccess. But there is no need for a VPN in my opinion, just consider the fact that VPNs are centralized and with enough pressure from a government they can give all of the user's data and IP addresses. TOR is a decentralized VPN (kinda) and it should be enough to bounce your IP address from one computer to the other in the mighty WWW.
There are actually a couple of VPNs which accept Bitcoin or Monero, hence they will not have your name, date of birth, residence, financial info. You can use one of them just to be sure.
As for TunnelBear, it was a great service, but I'd seriously advice against it's use since it was acquired by McAfee (Intel) like a month ago. And you can rest assured that your private data will be compromised with such a big corporation controlling Tunnelbear..
Seeing as it connects to the tor relay, it is almost as secure as the regular tor browser, you might want to use a vpn or something along with it. I recommend VPN 365 or Betternet as they are both free
VPNs do just pay very nice affiliate fees. This is the reason why so many youtubers and also "best private VPN lists" are totally missleading. If you look closely the lists are often just sorted by the best payout.
PureVPN for example seriously pays up to 100% commission. So they even pay for the transaction fee for you. We are talking about seriously good money if you have the right traffic, this is why nobody is honest here.
We have the same issue with Domains for example because Godaddy just pays like 50% than anyone else, so newbies assume they must be great because they are linked literally everywhere.
you may want to use NordVPN because they have Tor over VPN servers. Which means that when you connect to those servers, you first connect to their VPN server and then to Tor network. They actually have a lot of nice security features. Read about them.
I always run TOR with at least a VPN. Do some research on good VPNs first. Make sure that the VPN doesn't keep logs (I use IPVanish and have heard good things about Norse VPN).
Anyone else, please feel free to correct me if I am wrong.
That's a very subjective list. For example, they list and blackVPN, the former has been caught utilizing spyware/wireshark on their own users while the latter is known to log connection stamps.
>Services based in the United States are not recommended because of the country’s surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.
This is quite misleading. NSLs/gag orders have been successfully challenged in court in recent years. Furthermore, there is no evidence that popular US vpns have been subject to key disclosure (PIA, or VikingVPN), who have both been on record as saying they would relocate if this were demanded upon them. So the fact that they use that old geography gimmick is reason enough for me to not take them seriously. Living under the assumption that because a VPN provider is in another country it's immune to your local laws or will defend you when pressured is a false sense of security.
>When it comes to gathering domestic intelligence, the NSA must follow a very clear set of rules and legal mandates. But internationally, it can and does operate with far fewer legal constraints and virtually no significant congressional or judicial oversight.
Why don't they factor that into their equation?
The reviews on it appear to be controversial, lots of complaints about ads. SuperVPN seems to have good reviews: https://play.google.com/store/apps/details?id=com.jrzheng.supervpnfree&hl=en_GB&referrer=utm_source%3Dgoogle%26utm_medium%3Dorganic%26utm_term%3Dsupervpn&pcampaignid=APPU_1_iJ0bWYWFHcqIgAbZ6IO4Cg
You can easily find a lifetime VPN for VPNs such as NordVPN or PIA on darknet markets for $10 approx.
Localbitcoins or go to meetup.com group/social events and then buy with cash in person. Just say you are new to the community and want to buy some for investments. Never disclose what you will do with the bitcoins. Also I would recommend to convert the bitcoins to monero so your privacy is maintained. BTC is not anonymous (even if you buy it with cash in person).
There are in fact multiple articles which researched into this.
For example ... 26 of the 115 most popular VPNs are secretly keeping tabs on you
> Here: https://obsproject.com/
I already use OBS. Outbound TCP port 1935. Correct. Now use it to stream over the Tor Protocol.
EDIT: OBS; WireShark and others I would not consider Consumer Grade. I would put them at professional or enthusiast grade.
It's impossible to debate with you at this stage, you seem to think that live means anything that's not travelling to you at lightspeed and you're now arguing semantics.
>live streaming video content requires UDP
This is all I argued, stand by your statement if you wish.
PS: the opening of that peer reviewed paper says the following >TCP is widely used in commercial multimedia streaming systems, with recent measurement studies indicating that a significant fraction of Internet streaming media is currently delivered over HTTP/TCP.
You may have not even glanced at it when you said
>there is no consumer grade software that supports live streaming over TCP
Here: https://obsproject.com/
Very much how the Brits respond to kids hacking. Darknet Diaries did an episode called "Cam" highlighting how they took a skid and got him trained up and working in infosec
Why would you need two?
EDIT: You don't have to, but there are certain circumstances where you might want to, such as if you're using features like encrypted persist storage. https://tails.boum.org/install/debian/usb/overview/index.en.html - a single USB may not have enough memory.
with the scarier side of the deep web ive delt with everything from child porn, snuff (animals and humans) the only reason why you would be caught is the following reasons reason c is what would get you in jail
A) your not using a vpn (then your a dumbass)
B) if you were using your original os id use tails best for deep web needs https://tails.boum.org/
C) if you were a producer of the content or paid money thats one common misconception with the deep web, downloading and viewing is wrong but will not result in direct imprisonment now say you do download something and but it online for everyone to see you thus would still be a distributor of said content.
I dont run security tools in VMs so i really dont know. Usually i use the default configs with Virtual Box. But seriously why dont you run it from a USB stick?
Simply dd the image to a USB stick like this:
dd if=/path/to/tails.iso of=/dev/rdisk2 bs=16m && sync
As seen here: https://tails.boum.org/install/mac/usb/index.en.html
Tails is not ment to run in a VM, i doubt they even test this or care as it destroys the actual idea of Tails anyway.
How to get a Tails VM:
Download Tails iso https://tails.boum.org/install/download/index.en.html
Create VM (no virtual hard drive required)
Attach Tails iso to VM
Where does the flash drive come into play?
That's just a tor-to-clear proxy service. The actual servers that will store your data are NOT hosted on Tor.
Fact is, if your exchanging information you wish to not be read / intercepted / wish to remain anonymous, you should not be using Email anyway.
Also, and yes I know this kid was a r*tard for using improper OPSEC, but look at: https://protonmail.com/blog/apophis-squad-arrest/. Fact is, ProtonMail do not side with the 'illegitimate' and will help Law Enforcement however they can. If you truly wanted anonymity, you'd side with a DMCA-Ignored Email provider that is most likely being hosted on Tor.
​
"That’s why we will investigate to the fullest extent possible anyone who attacks ProtonMail or uses our platform for crime." ~ ProtonMail founder
Yes, as long as you are using ProtonMail as a legal service for sending legal mail, it is generally considered safe. Otherwise, nada.
​
" They left clues all over the internet which we were able to track. " could also imply that although they never violated their Privacy Policy, as that would be naughty naughty for the "swiss" company, they have in the past engaged in 'dox'-like behaviour potentially breaching swiss law.
Its not google that you need to worry about. You are talking email so unless you are using gmail google does not come in to play unless you are using Chrome to access your email. But if you log into Proton with Chrome your content is encrypted so google can't read it. That said email sent from Proton account to another Proton account is encrypted. So even if the FBI gets a hold of the email they can't read it. You can also send encrypted emails from Proton to other email systems if you choose to. Again if its intercepted no one can read it unless they have the key. Check out this link for protonmail encryption: https://protonmail.com/support/knowledge-base/what-is-encrypted/
No need to set one up: https://www.torproject.org/docs/bridges
Well do you really fully trust your VPN? As in completely trust because a VPN is not a trustless system as Tor is. Then if you makes you feel better you can keep it. It just ads no benefit.
>If I wanted to start a vigilante-for-hire business using bitcoin and the ~~deepweb~~ darkweb, how would I go about it?
Configure a hidden service (https://www.torproject.org/docs/tor-hidden-service.html.en), and somehow show proof so people know that you're legit.
>What would get me caught? (For fiction research)
If you have actual proof that you're legit and people start using your services and you accept requests from your customers such as killing people, the FBI might seize your site and employ a NIT to uncover IP addresses from people who log on to your site.
Goto https://www.torproject.org/projects/torbrowser.html.en Hit the big purple download button. Select the version you want/need. Wait till that downloads. Click on it. Install it, if it doesn't automatically open, go to your desktop and open it via there.
>If using a .onion market IS more secure, then why hasn't anyone tried to establish a strictly legal webstore?
the Tor network encrypts the traffic by default so setting https is not required. if you might notice the loading times for hidden services [especially well visited markets] are quite long because the data has to bounce through several different nodes all over the world before getting to the final destination. if you want details on how the Tor network works visit this https://www.torproject.org/about/overview.html.en#thesolution
also the visitors would have to download a new browser just to visit this one website, the content is not indexed by normal search engines, hidden services have a rather bad reputation thanks to superficial and wrong articles by 'journalists'.
>It seems like there would be a decent amount of people interested, what with all the paranoia in the media and whatnot about major retailers' credit card info on customers getting hacked.
using a hidden service does not reduce the chances of attacks like sql injections, if your code is not secure you will get in trouble no matter if you run a clearnet site or a hidden service. protecting customers of for example webshops is relatively easy if you put some effort into it [enforce https connection, hash and encrypt userdata properly, keep your software up to date, do and let do code audits, . . . ].
also read up the definitions of deep web, darknet and whatnot here https://www.deepdotweb.com/2015/06/08/the-dark-web-deep-web-and-dark-net-terminology-hell/
You're confusing DeepWeb and DarkWeb
ClearWeb is what you see already like MSN and Yahoo etc.
DarkWeb is a tiny network that bridges the DeepWeb (search term) and ClearWeb.
DeepWeb (search term) is not some nefarious place where bad things happen. It's data.
The DarkWeb is what you are looking for.
Go to the TOR Project; download the Tor Browser Bundle; install it, and you're there.
1) is the deep web illegal?
I don't know of any country that actually is following up in legal ways on VPN use (what a VPN is comes in the next part). However many services there are illegal - like cheaper computers (which are most likely stolen, hence illegal), hacking, murdering, new identities, ...
Most of that is just a scam anyway.
2)whats tor? iv heard people talk about it.
TOR is an abbreviation for 'The Onion Router' and is an open encrypted virtual private network - a VPN. A VPN connects multiple computers over the internet, securing the communication. The tor project explains it a lot better.
3)what are people like on it? my friend told me somebody taught him how to do some basic hacking?
Not a lot different than people on the clearnet. A lot more tinfoil hats though. And your friend is lying.
4) how do you get on it?
Download the tor browser, stay away from anything that involves drugs and political propaganda.
There is Tor for android. https://www.torproject.org/docs/android.html.en
I only recommended using a VPN if you're looking to both hide your Tor use from your ISP and use for general purposes e.g. torrenting, hiding from ISP again.
This doesn't apply to most people or use.