Search engine tor. Journey through the darknet. We go around the worst places.onion. Continuation is available only to members

Google, Yandex, Mail - there are many search engines that make web surfing much easier for users. But they only work with the so-called upper Internet. But for the Darknet, which can be accessed using , none of them are suitable. After all, onion resources are not displayed in the conditional Google results (or rather, they are not even indexed). For this reason, it is necessary to use special search engines for Tor browser.

In fact, there are a huge number of such search engines, and they are only multiplying every day. But it is worth understanding that most of them are either extremely inconvenient, or not suitable for our purposes, or simply do not work correctly. For this reason, we have prepared a selection of three projects that have proven themselves well:

  • Ahmia
  • not Evil
  • TORCH

We invite you to familiarize yourself with each of them in more detail.

First there is a brief description of the project, and then a link to access it. You need to copy it, then paste it into the Thor address bar and click Enter.

Ahmia

This search engine is best suited for working with foreign resources. But you can still search for Russian-language sites on the Tor network on it, albeit with certain nuances.

And its main advantage is the ability to embed in the browser. This is done as follows:


Now try entering any search query in the address bar and click Enter. Issue will be made through this service.

not Evil

not Evil is an extremely convenient and minimalistic service for finding hidden onion sites. Ranking can be limited, for example, only by links, titles, etc.

Many people, wandering around the Internet, have the desire to view sites that are classified as unauthorized. But this desire cannot be realized using a regular application for viewing web resources. You can only surf the dark web using Tor software. It is suitable for working with resources that are familiar to everyone and prohibited systems. To make such a stay on the Internet safe for yourself, it is worth learning all the features of such a process.

Prohibited sites - how to open illegal Internet resources in the Tor browser, is it easy to find them

Everyone has a desire to try something that has not been allowed for so long. This also applies to users of the World Wide Web, and almost every person visits its space every day. Some people work there, others have fun, others are looking for something that is inaccessible to others. The dark side of the Internet and all forbidden sites can now become accessible to every user. To stay safe on such websites, you should download the Tor browser. After installation, its use will allow you to find almost everything on the Internet, but for this you should learn how to correctly access forbidden sites.

Open a site closed to everyone - algorithm of actions

The first visit to this application is accompanied by the fact that while you are online, you can open sites whose use is permitted by a standard search engine. Such actions can be practiced with any other browser, and when downloading this extension, people are interested in anonymous and illegal access to the dark side of the World Wide Web.

Not everyone has yet understood what the deep Internet, prohibited by standard applications, is like, but in fact, the following opportunities are hidden in its depths:

  • access to closed government sites, resources of secret developers, special secrecy systems;
  • the ability to view resources that have voluntarily gone into the shadows in order to remain unnoticed by a wide range of users;
  • viewing all adult sites that do not pass through the filters of standard systems;
  • undetected presence on sites where they sell fake documents, weapons, drugs, and other illegal goods;
  • gaining access to all types of prohibited content.

Users should search for resources of such content using the Hidden Wiki library. It is this library that hides a list of all Internet pages that are out of reach when working with other search engines.

To open prohibited pages, just select the content of interest from the list, move the desired address to the search bar and follow the link. Once the source of the desired content, the desired chats, is discovered, you can carry out your activities completely anonymously.

For the presence of a person on a prohibited site, he may face criminal liability, because those who use simple browsers make it possible to read all the information about their place of stay. Since the Tor application guarantees complete anonymity when accessing the network, you need to use it to visit closed sites. But it’s worth remembering that user carelessness or adjusting some settings can remove the protective mechanism, which will then not end very positively.

Including this information, for complete anonymity, when installing such an extension, the user must know the following facts:

  • after downloading and launching the program, you must accept its standard settings;
  • You should not add various plugins and extensions yourself;
  • Without knowledge of the specifics of the system’s operation, making independent adjustments to the settings is prohibited;
  • when you want to change or add something, you should seek advice from an experienced programmer so as not to cause harm.

Before finding a closed site in tor and following the link, a person should make sure that the system is working correctly and all settings are working correctly. If a person does not know how to configure search parameters, he should simply restore the factory settings.

After visiting a site with a dubious reputation and after viewing content of dubious quality, a person should additionally clear the cache memory. These extra precautions will definitely help you stay undetected. It is worth additionally checking the settings of the multimedia device itself, because visualization of your location may be enabled.

Switching to dark internet sites - what to do if the task is impossible

Even when using the required extension, it is not always possible to open forbidden pages on the World Wide Web in tor. This can be caused by various problems, the most common of which are:

  • failure to update the browser on your PC or mobile device in a timely manner;
  • making incorrect settings or installing a damaged program file on a working device;
  • questionable performance of the PC being used due to the presence of viruses, technical malfunctions, or other problems;
  • incorrect settings for access to the World Wide Web.

Only a highly qualified specialist can help deal with these problematic situations and find a high-quality solution. If you have such a problem, you should contact a computer or mobile equipment service center.

The repair center employees must configure the functionality of the application and provide reliable information to the consumer within a few days. Following the advice of experts, a person will be able to fully use access to prohibited sites in tor, but despite the positive aspects of such surfing, one should approach this issue with extreme caution. The application itself, used for such purposes, is completely legal, but the activities that are carried out with the help of it are not entirely legal.

Unless absolutely necessary, you should not get carried away by visiting sites that have a dubious reputation. Privacy settings in this system are automatically set as soon as it is downloaded to a multimedia device. There is no need to make any additional adjustments so as not to deprive yourself of the possibility of anonymous access. You should not enable location detection on your device, because for such systems this is an extremely undesirable process.

26-year-old programmer Juha Nurmi from Finland has been working on the problems of indexing sites in Tor for a long time. He is a researcher at one of the Finnish universities. This summer, Nurmi attended Google Summer of Code, where he worked on improving the service. Ahmia.fi. This site allows you to search many Tor directories and is accessible from both the deep web and the regular web.

Juha Nurmi There is a trend to make the Tor network more accessible and user-friendly. My motivation for writing search engine software is to support human rights such as privacy and freedom of speech.

Project Ahmia is an initiative of the non-profit organization Hermes Center for Transparency and Digital Human Rights, which supports Tor and develops the anonymous communication services Globaleaks and Tor2web.

Nurmi explains that there are three important features that make deep web searches different from regular search engines.

Secondly, it takes time to view all [site content] because Tor is slow. Finally, onion sites change their addresses all the time.

Project Ahmia has already indexed 1229 sites in Tor. This number does not include IRC channels and other instant messaging services. It also does not include sites that do not advertise their existence, since Ahmia is not able to detect them. Ahmia also filters out child pornography sites, many of which are found on the deep web.

A study of user requests in a search engine gives the most unsightly picture of Tor. The most popular site in terms of frequency of access by Ahmia users is Pinkmeth, a site for erotic photographs of people without their consent. Initially, Pinkmeth was located on the regular Internet, but went to Tor when law enforcement agencies noticed it. Previously, the Anonymous BBS, Hidden Wiki (a directory of hidden sites) and the IntelExchange forum did the same.

This is what Ahmia user requests look like, formatted as a word cloud.

Search engine Torsearch.se, developed by programmer Chris McNaghten, runs on the regular Internet and is one of the fastest search engines for Tor.

Chris McNaghten The way I make .onion indexing possible is by using Nutch, an Apache project originally developed at Yahoo to improve web crawling. When I determine that the user is not using Tor, I will change the links to onion.to, a system that uses the Tor2web proxy.

Tor2web allows users using a regular browser to browse deep web sites. The creators of the site remain anonymous, which cannot be said about those who visit these sites. Tor2web helps Tor sites reach a wider audience.

One of the oldest search engines for the deep web - Torch. It is only available inside Tor and, as the site itself claims, indexes 147,776 hidden sites. An advanced search form is available for it using several parameters. Similar to this is TorFind, which indexes I2P connections, a file-sharing network that operates on the torrent principle.

Relatively recently, a search engine appeared in Tor Grams. It is used primarily to establish connections to marketplaces for illicit goods, such as Silk Road 2, the successor site taken down by the FBI last year. With Grams you can search for products on Agora, Evolution and Pandora.

Searching using Grams is not always successful. Many markets often experience accessibility issues, sometimes due to DDoS attacks, sometimes due to security issues. In addition, almost all of them require registration, which makes it difficult to navigate from a search engine to a specific site.

One of the best places to get your bearings in Tor remains Hidden Wiki, a directory of deep web sites. There are hundreds of links there that help the user find the site he needs. Hidden Wiki, unlike Ahmia, does not filter links in any way.

In addition, on the deep web there is DeepDotWeb- a periodical that talks about how the Tor network works and how it is changing. There, in Tor, there is a whole parallel world. You just need to be able to navigate it.

In the last 3-4 years, news with the headline: “The government wants to block Tor” regularly appears in the news feed. But this idea is somewhat utopian.

The darknet can be used all over the world except North Korea, where to access a computer with the Internet you need special permission from Kim Jong-un. Even China failed to ban it. Golden Shield automatically blocks all new Tor entry node addresses, but people who need to bypass this barrier using VPNs and proxy servers.

News about the “ban on the underground Internet” only fuels interest in it among the population. More and more Russians are joining the darknet, which is fraught with many dangers and temptations. You should be aware of the consequences of using Tor incorrectly.

This article will cover the main types of stores and forums on Tor that should be avoided and the possible liability for using/creating them.

Fragments of the article were removed at the request of Roskomnadzor. The material has been edited.

2. Sites with job advertisements

A huge number of advertisements for the sale of *** contain a note: “We are looking for ***. Activity, adequacy, and professionalism are required. The salary is high." For one ***, an employee receives on average 500-3000 rubles. They write on the forums that a smart worker can earn up to 80-120 thousand rubles a month with a free schedule. And this is in the provinces. In the capitals the ceiling is much higher.

But this work is far from being as simple as it seems at first glance. Making a good “***” and hiding it is a whole science and experienced people write entire textbooks. There are many non-obvious problems that are difficult for a beginner to guess about.

For example, how to protect yourself from “seagulls”? This is the name given to *** who search for and successfully find other people's *** in typical places (flower beds, holes in the asphalt, entrance canopies). Or how to disguise a Ziploc bag inside an acorn or nut so that rain and wind do not damage the product?

Criminals from Tor require not only ***, but also parcel acceptors, stencilers (making announcements on the asphalt), growers (growing plants at home), and people to withdraw illegally obtained money from bank cards. They rarely look for strong guys to intimidate enemies. And every profession has non-obvious subtleties that you need to learn in order to avoid getting into trouble with the law.

In the criminal sphere, there is a terrible turnover of personnel and new employees are constantly needed. A truly adequate and neat person can work for a couple of years, but a simple ***/carrier/dropper walks free for only a few months. Most people are caught by the police sooner or later. People rarely manage to raise money, stop and leave on time.

Possible problems: According to Article 228 of the Criminal Code of the Russian Federation, if a person is involved in the distribution or production of ***, then he can be imprisoned for a period of 8 years. We’ll talk about penalties for parcel receivers and money cashers below.

3. Stores of goods for committing crimes

Tor is used to trade weapons, fake documents, fake SIM cards, phones, ATM skimmers and a bunch of other interesting items. As with ***, Bitcoin is used for anonymous payment. Surprisingly, there are no particular problems with the delivery of goods.

Sometimes it is done via regular mail. To receive and send parcels, they hire “droppers” who go to receive/send parcels and show off their faces and passport details. Also, goods are sent with the help of taxi drivers or private transport companies. Here is a quote from the RuOnion forum:

I once sent an optical sight through a transport company, naturally not a branded one. They asked what was inside, he answered - a sniper scope, They: let’s write it down - an optical device :-)))) They don’t really care what to carry...

But sellers still take many precautions: they disassemble weapons into parts, which they distribute into several boxes, disguise them as other items, make parcels with double bottoms, etc. They have no less tricks than ***.

Possible problems: According to Article 222 of the Criminal Code of the Russian Federation, illegal acquisition or transfer of weapons may be punishable by a prison sentence of up to four years. About fake documents it is written in Article 327 of the Criminal Code of the Russian Federation, it says about a period of up to two years.

4. Pedophile forums

There are also a lot of people on the Tor network who are sexually attracted to children. There is a lot of “interesting” for them here. Firstly, huge archives of porn videos featuring minors. Secondly, these are forums where people share their personal experiences of seducing children and hiding this process from others.

Some pedophiles consider sex with children absolutely unacceptable and sit on “conservative” sections of forums, where they simply post slightly erotic photos of little girls and boys with their genitals covered.

But there are people for whom just watching videos is not enough and they strive to make their fantasies come true. The main shock for me when preparing this article was familiarization with a book for pedophiles in Russian.

200 pages about where to find a potentially available child and how to recognize him, how to gain his trust, how not to leave traces and how to make sure that the child never tells anyone about what the pervert or pervert did to him.

And judging by the forums, many pedophiles actually manage to turn things around so that parents never find out what happened to their child. After all, most often children are seduced not by maniacs on the streets, but by neighbors, relatives or family friends who have been in the house for many years.

Never leave your child alone with anyone and never without video surveillance. There are many more pedophiles among us than one might think.

Possible punishment: It is prohibited to store porn videos involving minors on your computer. You can read more about this in the article:

5. Websites of extremist organizations

Terrorists, skinheads and radical oppositionists also create websites on the onion network, publish articles there and discuss plans for pogroms or the seizure of power on forums. Also, sect sites are gradually moving to Tor.

Since 2002, Russian authorities have maintained a list Federal extremist materials. It includes almost 4,000 books, articles, paintings and pieces of music. Rospotrebnadzor forces the removal of such materials from sites on the clearnet, but they are distributed freely in Tor libraries.

Possible punishment: According to Article 282.2 of the Criminal Code of the Russian Federation, participation in an extremist organization can lead to imprisonment for up to six years. Also, you cannot copy materials from such sites to Tor and post them on social networks and blogs. There is also a separate article on this topic:

6. “Hacker” trading platforms and forums

In international dark markets, next to *** and weapons, there is often a Digital Goods section. You can buy Trojans, Wi-Fi hacking tools, software cracking tools, DDOS attack tools, and many other types of “tools for illegal access to digital information.”

Along with the programs, you can also buy instructions for their use and educational books. They also sell digital goods that were stolen using the tools described above: upgraded characters in games, paid accounts for various services, hacked programs, access to infected computers.

There are also many hacker forums on the darknet. There people share their experiences with each other, look for perpetrators and accomplices for various cyber crimes.

Possible punishment: If it is proven that a person used any of the programs described above, then, according to Article 272 of the Criminal Code of the Russian Federation, he can be imprisoned for up to two years.

7. “Black” cryptocurrency exchanges

The sites and organizations described above make financial payments in bitcoins (less often in other cryptocurrencies). And of course, they don’t pay any taxes on it. Cryptocurrencies are used to cash out illegally obtained money.

Tor has exchanges for withdrawing bitcoins to regular electronic wallets or bank cards. It is also full of advertisements of people who withdraw money from cryptocurrency wallets to offshore accounts or transfer money to the account of a “shell company.” From the latter, money can be withdrawn using ordinary “cashers”.

There you can also order bank cards issued for dummies or “virtuals”. And hire drops who will go to the ATM, show their faces in front of the cameras, withdraw cash from the cards and deliver it to you.

Possible punishment: According to Article 159 of the Criminal Code of the Russian Federation, participation in group fraudulent schemes can entail up to 10 years in prison.

The State Duma is also talking about adopting a bill that would provide for punishment of up to four years in prison simply for using bitcoins or other cryptocurrency.

conclusions

The above does not describe all types of content that can be found on the Tor network. Not mentioned are sites with erotica for animal lovers, stores of stolen goods, sites for ordering killers and much more.

But what has been described is quite enough to understand why governments around the world are trying to control the Internet. Personal freedom and privacy are good. But how to fight criminals on the Internet without blocking sites and controlling traffic?

P.S. Is Tor anonymous?

There are a lot of tutorials on how to ensure online anonymity on the darknet. Some authors consider a virtual machine with Tails -> vpn -> vpn -> Tor to be a sufficient scheme. And someone recommends buying a computer from a flea market in a neighboring area and using a modem through the “left” SIM card. But one thing is for sure - if you just launch the Tor browser, then your level of anonymity is quite low.

Intelligence agencies around the world are actively working to identify criminals who use the “underground Internet.” For example, in the fall of 2016, as part of the international Operation Titan, Swedish police identified 3,000 buyers of *** on Tor. And there are more and more reports of such investigations every year.

Increasingly, Internet users are looking for information about the closed and anonymous Darknet network. As demand grows, so does the number of offers. The topic of this article will be Darknet search engines. This is where acquaintance with the network begins. Through search engines we can find what interests us. There are not as many of them in the anonymous network as in the global one. But you will get all the information you need here.

How does Darknet differ from the global network?

To continue talking about the Darknet, it is necessary to identify all its features and differences from the regular and familiar Internet. The most important difference is the organization of the network. When using the regular Internet, we open a browser, enter the site address or search query and get to the desired page. In this case, the request from your computer goes to the provider’s server. Its further path depends on the site or service you contact.

For example, if you search for something in the Google search engine, then such a request from the provider’s server goes to the Google server. Such servers are usually located in large cities. Their servers are located in almost every capital of the country. Therefore, we can conclude that your request will go to the Google server located in the capital. The server then processes the received information and sends the data back to your browser.

The outgoing signal route on the Darknet is completely different. There is no need for servers here. They are the users' computers. Such a network is called Peer-to-peer or peer-to-peer. Here all PCs are equal. When you click on a link in your browser, your signal travels not through servers, but through the computers of users just like you. This makes it much more difficult to track your online activities.

How to open a Darknet search engine

Another main difference between Darknet and the well-known Internet is the domain zones of sites (.ru, .com, etc.). In the Google Chrome or Mozilla Firefox browser, we can easily open these sites. But you cannot get to the Darknet using these links. This network uses its own domain zones.

Therefore, the shadow network is almost completely separated from the global one. To open one of these sites, you need to download the Tor browser to your computer (or other device). Its interface resembles the graphical shell of conventional browsers. Therefore, even an inexperienced user will not notice any difficulties in its use. It is free and available for download at https://www.torproject.org/.

Features of using Tor and the Darknet

Users may notice differences between any other browser and Tor. This program is universal, since from it you can visit both regular sites (http://example.com) and Darknet sites (http://www.7qzmtqy2itl7dwuu.onion/). As you can see, the sites of the shadow network have strange names and domains. Here you can often find links ending in .onion.

On the dark web, most sites and articles are in English. This makes it quite difficult to find any information here. You will not find beautifully designed sites, decorations, simple and pleasing motifs, and other beauty on the Darknet. All resources are designed in black, often with strongly contrasting colors. Some sites use a bloody eye as a logo. This is a very suitable symbol, because you cannot stay on one of them for more than 1 hour.

The dark web is not a place for a good time or a fun conversation. There are services where you can communicate with other users, as well as Darknet search engines. But these are mainly business and commercial negotiations. This is a meeting place for hackers, people with different political views, arms dealers, drug dealers and 18+ and even 21+ materials. You can often find pornographic videos with perversions here. Shocking videos that will terrify even the most morally stable people, which, unfortunately, is what attracts the Darknet.

Darknet search engines

There is also good news for those who care about their children and loved ones who can see all the content on the Darknet. Most of these sites are quite difficult to get to. Site names are constantly changing. Many special resources require a special access key or tickets. There are quite decent and normal sites on the closed network. For example, the Darknet has its own Wikipedia. It can be found at http://www.wikitjerrta4qgz4.onion/.

If you decide to visit a closed network, search engines and site directories can help you. Let's take a closer look at them.


Other Darknet Network Resources

Let's look at several other services that may be useful to you on the Darknet.

  • Sigaint http://www.sigaintevyh2rzvw.onion/ is one of the most popular email services on the Darknet, despite its pathetic interface;
  • Rutor http://www.rutorc6mqdinc4cz.onion/ - no submission required. This is a duplicate of the popular torrent tracker on the Darknet;
  • Flibusta http://www.flibustahezeousonion/ is one of the most popular book libraries on the shadow network.