Originally posted by 2ofEverything
View Post
Announcement
Collapse
No announcement yet.
the DEEP WEB: being anonymous to another level
Collapse
-
-
Originally posted by Fists_of_Fury View PostSo if you don't want tracked you are now a tinfoil hat user!? VPN's and custom downloads are for tinfoil hat wearer's also, right? The U.S. military must be a bunch of tinfoil hat wearer's for wanting a lot of their stuff so that they can't be tracked either. Spying and tracking people for no logical reason... if you're against that you must wear a tinfoil hat lol!
Comment
-
Originally posted by BKM-2010 View PostI am well aware of the sick **** that unfortunately goes on in this planet. This is simply a new-age device to broadcast it digitally.
I don't know much about it. Can't they just shut down this Tor? Or is there a catch.
People who traffic there and get caught, fail due to their own mistakes and carelessness, not due to any great skill on the part of any law enforcement agency.
Comment
-
Originally posted by Barcham View PostShut it down? THEY created it! One of the primary reasons TOR and the Onion net exist is for political dissidents to have a means to communicate that their governments cannot track. But like many great ideas that stem from the US government... arming various rebel groups, arming the Mujahedeen and then pulling out completely after the Russians left instead of offering aid to rebuild, putting drug dealers like Noriega in charge of their country, and on and on... it ended up backfiring on them by being used for purposes they did not foresee. Such as WikiLeaks and just about any illegal trade you could possibly imagine.
People who traffic there and get caught, fail due to their own mistakes and carelessness, not due to any great skill on the part of any law enforcement agency.
Comment
-
Originally posted by BKM-2010 View PostSo I guess the only way to get rid of it is to shut down the entire internet.
I still remember playing Doom head to head with friends, one at a time of course, via 'superfast' 9600 baud dial up modems. And downloading freeware and shareware programs and games from BBS servers that the local computer shop was running, good old Crazy Irving Computers.
Comment
-
Originally posted by BrometheusBob View PostYes information like that can be snooped on at the exit point, but as long as it is encrypted it shouldn't be viewable.* The main problem with sending credit card info isn't as much that it could be used to identify you if viewed, rather it is that a bank will perform the transaction, know who both parties are, and have a record of it. Giving shipping information doesn't come with any external catches like that.
I'm not an expert on the more sophisticated ways that deepnet traffic can be snooped on, but in general if you avoid using peer to peer networks or one of several browser extensions (java for instance) that can compromise you, and you stick to encrypted connections, you should be able to maintain anonymity.
*The way encryption works is that it involves forming 'keys' that encode and decode a message. You give the other end the key to encoding information (it is OK if anyone sees this one) that you receive from them. You keep a private key that decrypts the message, and you don't ever give anyone the private key. The reason that encryption is so reliable is that computing what the private key is would be computationally infeasible, but with the private key the decryption is very fast. For example, RSA is a popular encryption method. In short, it takes advantage of the fact that it is incredibly difficult to find the prime factorization of a big composite number.
To give you an idea of how long it would take to compute one's private key, I looked up how big of keys people have cracked before. It took two years and hundreds of computers to crack an RSA encryption where the key that was 768 bytes long, and in practice people use keys that are 1024-4096 byes long. Chances are good that no one has the time and computational resources to decrypt your messages.
Comment
-
Originally posted by supRa View Posthas anyone taken participation on this? this is some crazy sick raw nasty stuff. just yesterday i spent hours doing research and watching youtube videos.
really intresting/intense crazy *****. for those that are not familiar with this take a look at this stuff. it is just some much information so here you go:
http://www.pcadvisor.co.uk/how-to/in...-deep-3593569/
here is a more detailed picture
thsi is a screenshot i found online of there forum
i used to think 4chan was cool but this "site"(tor) is on another level. being anonymous level 10000....however, be careful with what you order because it can haunt you. from buying drugs/guns and even hiring a hit-man. dead serious. the federal government has no trace on you nore the people involved in it. people say it is legal since you are literately anonymous.
anyone care to share any stories?
i seriously could watch 20 min videos on stories about this stuff without getting bored.
im to chicken to try it. the hell with that
Originally posted by 2ofEverything View PostThere was a thread about this not too long ago, which lead me to get a tor and do some more research. Most of the extremely messed up stuff has been shut down, and what's left is a network of creeps trading CP, hackers discussing stuff, and just psychopaths writing rape fantasies.Originally posted by 2ofEverything View PostWell it's not untraceable or untouchable, it's just there's no use for large organisations to track individual IP's of every pedophile out there. The way it works is it uses a series of IP addresses from different countries, so if you track 1 or 2 or even 3 you're not at the source. However, when there are websites for people who pay to see abducted women tortured it's a different story. There's also a group of hackers on the deep web known as "Anonymous" who shut down websites if you report them, so there are good guys too.
Here's the original thread TS
http://www.boxingscene.com/forums/sh...d.php?t=683732
well if you are planning on doing something nefarious you have to do it right. buy a separate computer, always do it away from your house, connect to the internet try to use IP blocker. never use your own internet connection.
just know that every cctv camera and any device that can connect to the internet can be hacked by the government.
always wear a hat, glasses, and some kind of facial disguise. that's the only flaw in the system right now for the new anti terror facial recognition spy program that the american intelligence service uses.
Comment
-
Originally posted by Sterling Archer View Postwhat's the name of that site with the highly interesting forum topics???
well if you are planning on doing something nefarious you have to do it right. buy a separate computer, always do it away from your house, connect to the internet try to use IP blocker. never use your own internet connection.
just know that every cctv camera and any device that can connect to the internet can be hacked by the government.
always wear a hat, glasses, and some kind of facial disguise. that's the only flaw in the system right now for the new anti terror facial recognition spy program that the american intelligence service uses.
Comment
-
Originally posted by 2501 View PostA lot of the "stories" of first hand accounts are BS. You have your rare instances such as the Peter Scully incident in which he broadcasted himself raping and killing a young thai girl on webcam for bitcoins/money, but it's not common place. You can get buy fake id's, passports, new iden******, weapons, credit cards, drugs........if you dont get ripped off.
In 2011, Scully fled from Melbourne, Australia to the Philippines after being accused of multiple fraud offenses. From the southern Philippines island of Mindanao, he is alleged to have ran an international pedophile ring and offered live pay-per-view video streams of children being tortured and sexually abused on the dark web (often confused with the deep web).
In February 2015, Scully was arrested in his rented house in Malaybalay City after investigators discovered the remains of a teenage girl buried under an apartment he previously rented. He allegedly strangled her to death according to police who were led to the apartment by Scully's partner, a 17-year-old Filipino girl, who was also a prior victim of his abuse.
Philippine authorities described the case as horrific and the worst they had ever seen.
https://en.wikipedia.org/wiki/Peter_Scully
wttttfffffffffffffffffffffffffffff????????
Comment
-
Originally posted by El-blanco View Postthat actually exists? What's their point of reference, mug shots, drivers license, passport photoshop? How do they line it up?
the only flaw so far is if the person is wearing anything on his face/head.
and yes, it exists and is currently being used.
Comment
Comment