Announcement

Collapse
No announcement yet.

the DEEP WEB: being anonymous to another level

Collapse
  • Filter
  • Time
  • Show
Clear All
new posts

  • #21
    Originally posted by 2ofEverything View Post
    Well Tor is used by a bunch of people who don't go on the dark web either, it's just a software that lets you browse the web anonymously, which for many people is something important. Ever since all those articles on google and other companies tracking your history all the tinfoil hats use Tor now. Even though it's a pretty shitty browser that slows your internet down tenfold.
    So if you don't want tracked you are now a tinfoil hat user!? VPN's and custom downloads are for tinfoil hat wearer's also, right? The U.S. military must be a bunch of tinfoil hat wearer's for wanting a lot of their stuff so that they can't be tracked either. Spying and tracking people for no logical reason... if you're against that you must wear a tinfoil hat lol!

    Comment


    • #22
      Originally posted by Fists_of_Fury View Post
      So if you don't want tracked you are now a tinfoil hat user!? VPN's and custom downloads are for tinfoil hat wearer's also, right? The U.S. military must be a bunch of tinfoil hat wearer's for wanting a lot of their stuff so that they can't be tracked either. Spying and tracking people for no logical reason... if you're against that you must wear a tinfoil hat lol!
      Yeah I think you got it.

      Comment


      • #23
        Originally posted by BKM-2010 View Post
        I am well aware of the sick **** that unfortunately goes on in this planet. This is simply a new-age device to broadcast it digitally.

        I don't know much about it. Can't they just shut down this Tor? Or is there a catch.
        Shut it down? THEY created it! One of the primary reasons TOR and the Onion net exist is for political dissidents to have a means to communicate that their governments cannot track. But like many great ideas that stem from the US government... arming various rebel groups, arming the Mujahedeen and then pulling out completely after the Russians left instead of offering aid to rebuild, putting drug dealers like Noriega in charge of their country, and on and on... it ended up backfiring on them by being used for purposes they did not foresee. Such as WikiLeaks and just about any illegal trade you could possibly imagine.

        People who traffic there and get caught, fail due to their own mistakes and carelessness, not due to any great skill on the part of any law enforcement agency.

        Comment


        • #24
          Originally posted by Barcham View Post
          Shut it down? THEY created it! One of the primary reasons TOR and the Onion net exist is for political dissidents to have a means to communicate that their governments cannot track. But like many great ideas that stem from the US government... arming various rebel groups, arming the Mujahedeen and then pulling out completely after the Russians left instead of offering aid to rebuild, putting drug dealers like Noriega in charge of their country, and on and on... it ended up backfiring on them by being used for purposes they did not foresee. Such as WikiLeaks and just about any illegal trade you could possibly imagine.

          People who traffic there and get caught, fail due to their own mistakes and carelessness, not due to any great skill on the part of any law enforcement agency.
          So I guess the only way to get rid of it is to shut down the entire internet.

          Comment


          • #25
            Originally posted by BKM-2010 View Post
            So I guess the only way to get rid of it is to shut down the entire internet.
            Basically, yes. The World Wide Web is only a small part of the Internet. The Internet existed long before the Web did. The original 'Internet' was created so that academic and military networks could have a way of communicating. What really enabled the breakthrough of the WWW as we know it today was the release of Windows 95 which made computing available and easy to use for the majority of people. Once Win 95 came out with it's relatively easy to configure dial up networking protocols, the first easy to install, configure and use Internet browsers soon followed. Along with a flood of low cost Internet Service Providers. And the rest is history, as they say.

            I still remember playing Doom head to head with friends, one at a time of course, via 'superfast' 9600 baud dial up modems. And downloading freeware and shareware programs and games from BBS servers that the local computer shop was running, good old Crazy Irving Computers.

            Comment


            • #26
              Originally posted by BrometheusBob View Post
              Yes information like that can be snooped on at the exit point, but as long as it is encrypted it shouldn't be viewable.* The main problem with sending credit card info isn't as much that it could be used to identify you if viewed, rather it is that a bank will perform the transaction, know who both parties are, and have a record of it. Giving shipping information doesn't come with any external catches like that.

              I'm not an expert on the more sophisticated ways that deepnet traffic can be snooped on, but in general if you avoid using peer to peer networks or one of several browser extensions (java for instance) that can compromise you, and you stick to encrypted connections, you should be able to maintain anonymity.

              *The way encryption works is that it involves forming 'keys' that encode and decode a message. You give the other end the key to encoding information (it is OK if anyone sees this one) that you receive from them. You keep a private key that decrypts the message, and you don't ever give anyone the private key. The reason that encryption is so reliable is that computing what the private key is would be computationally infeasible, but with the private key the decryption is very fast. For example, RSA is a popular encryption method. In short, it takes advantage of the fact that it is incredibly difficult to find the prime factorization of a big composite number.

              To give you an idea of how long it would take to compute one's private key, I looked up how big of keys people have cracked before. It took two years and hundreds of computers to crack an RSA encryption where the key that was 768 bytes long, and in practice people use keys that are 1024-4096 byes long. Chances are good that no one has the time and computational resources to decrypt your messages.
              Wow, that is ****in nuts. It's pretty much pointless unless it's a major worldwide threat, it would take forever.

              Comment


              • #27
                Originally posted by supRa View Post
                has anyone taken participation on this? this is some crazy sick raw nasty stuff. just yesterday i spent hours doing research and watching youtube videos.
                really intresting/intense crazy *****. for those that are not familiar with this take a look at this stuff. it is just some much information so here you go:

                http://www.pcadvisor.co.uk/how-to/in...-deep-3593569/




                here is a more detailed picture


                thsi is a screenshot i found online of there forum

                i used to think 4chan was cool but this "site"(tor) is on another level. being anonymous level 10000....however, be careful with what you order because it can haunt you. from buying drugs/guns and even hiring a hit-man. dead serious. the federal government has no trace on you nore the people involved in it. people say it is legal since you are literately anonymous.


                anyone care to share any stories?

                i seriously could watch 20 min videos on stories about this stuff without getting bored.
                im to chicken to try it. the hell with that
                what's the name of that site with the highly interesting forum topics???

                Originally posted by 2ofEverything View Post
                There was a thread about this not too long ago, which lead me to get a tor and do some more research. Most of the extremely messed up stuff has been shut down, and what's left is a network of creeps trading CP, hackers discussing stuff, and just psychopaths writing rape fantasies.
                Originally posted by 2ofEverything View Post
                Well it's not untraceable or untouchable, it's just there's no use for large organisations to track individual IP's of every pedophile out there. The way it works is it uses a series of IP addresses from different countries, so if you track 1 or 2 or even 3 you're not at the source. However, when there are websites for people who pay to see abducted women tortured it's a different story. There's also a group of hackers on the deep web known as "Anonymous" who shut down websites if you report them, so there are good guys too.

                Here's the original thread TS

                http://www.boxingscene.com/forums/sh...d.php?t=683732

                well if you are planning on doing something nefarious you have to do it right. buy a separate computer, always do it away from your house, connect to the internet try to use IP blocker. never use your own internet connection.

                just know that every cctv camera and any device that can connect to the internet can be hacked by the government.

                always wear a hat, glasses, and some kind of facial disguise. that's the only flaw in the system right now for the new anti terror facial recognition spy program that the american intelligence service uses.

                Comment


                • #28
                  Originally posted by Sterling Archer View Post
                  what's the name of that site with the highly interesting forum topics???






                  well if you are planning on doing something nefarious you have to do it right. buy a separate computer, always do it away from your house, connect to the internet try to use IP blocker. never use your own internet connection.

                  just know that every cctv camera and any device that can connect to the internet can be hacked by the government.

                  always wear a hat, glasses, and some kind of facial disguise. that's the only flaw in the system right now for the new anti terror facial recognition spy program that the american intelligence service uses.
                  that actually exists? What's their point of reference, mug shots, drivers license, passport photoshop? How do they line it up?

                  Comment


                  • #29
                    Originally posted by 2501 View Post
                    A lot of the "stories" of first hand accounts are BS. You have your rare instances such as the Peter Scully incident in which he broadcasted himself raping and killing a young thai girl on webcam for bitcoins/money, but it's not common place. You can get buy fake id's, passports, new iden******, weapons, credit cards, drugs........if you dont get ripped off.
                    Peter Gerard Scully (born 13 January 1963) is an Australian child molester and pedophile accused of the murder of a 12-year-old girl, and of the torture and sexual abuse of at least eight girls, including an 18-month-old infant.

                    In 2011, Scully fled from Melbourne, Australia to the Philippines after being accused of multiple fraud offenses. From the southern Philippines island of Mindanao, he is alleged to have ran an international pedophile ring and offered live pay-per-view video streams of children being tortured and sexually abused on the dark web (often confused with the deep web).

                    In February 2015, Scully was arrested in his rented house in Malaybalay City after investigators discovered the remains of a teenage girl buried under an apartment he previously rented. He allegedly strangled her to death according to police who were led to the apartment by Scully's partner, a 17-year-old Filipino girl, who was also a prior victim of his abuse.

                    Philippine authorities described the case as horrific and the worst they had ever seen.

                    https://en.wikipedia.org/wiki/Peter_Scully

                    wttttfffffffffffffffffffffffffffff????????

                    Comment


                    • #30
                      Originally posted by El-blanco View Post
                      that actually exists? What's their point of reference, mug shots, drivers license, passport photoshop? How do they line it up?
                      ANY CC CAMERA AND INTERNET DEVICE CAN BE USED by their facial recognition program.

                      the only flaw so far is if the person is wearing anything on his face/head.

                      and yes, it exists and is currently being used.

                      Comment

                      Working...
                      X
                      TOP