Dark Internet Tor. Secrets of the Darknet. We are looking for useful things in Tor hidden services. How to use the black internet

I came across a very interesting article about the multi-level structure of the “Deep Internet”.

If anyone has not yet heard what it is, let me explain: it is a network consisting of huge amount web pages that are not indexed by search engines. Access to these pages is possible only through a chain of encrypted connections, the nodes (entry points) of which are scattered throughout the world. There are web pages that are not linked to other hyperlinks - for example, pages that are dynamically created by database queries. The size of the deep web is unknown and generally difficult to estimate, primarily due to the vagueness of the concept itself.

The World Wide Web is a complex multi-level structure that contains mysteries and secrets that the average user is not even aware of...

There are groups of passionate professionals who call themselves “Netstalkers.” They explore the Network, looking for hidden corners, classified information and other secrets in it. Netstalkers divide the Network into levels.

Social media
Blogs
News
Porn
Imageboards (for those who don’t know - something like chats/forums, with complete anonymity participants)
Small boards (almost the same as image boards, but more thematic and with fewer participants)
ARG (Alternate Reality Games)
Closed communities
Hard porn
Collections of strange links

Tor (the same TOR... An anonymous proxy network inside the regular Internet)
Net art
Hacker communities
i2p (Another anonymous proxy network)
Dead forums (forums that have been taken down but are still online)
Freenet (Another anonymous network on the Internet, peer-to-peer)
Memetics Information
Future sites
Two Internet sects
Search results for words from the subconscious
Deep Web(Deep Web, the term originally meant pages that were not indexed by search engines)
The limits of bruteforce netstalking
Dark Internet
Number radio stations
Secret government radio stations

If the two upper levels are still quite objective, then deeper the paranormal, supernatural and folklore begins...

The so-called "Pass"
Researcher forums
Blank Pages
Non-existent IPs
Void
Non-existent pages
The way up, back, for the last time
Non-existent protocols
Old browsers needed here
Really dangerous point
You Tube for Level B
Random numbers
Small imageboard
Tons of useless information
Tons of useful information
Valuable phrase
The limit of human capabilities
Level D Control
Holes
Death
Schumann resonance
Dead zone
The terrifying truth about mirrors
Level C management
Quiet house

And at the very depths - Level A
About which it is generally difficult to say anything, just like about the higher planes of human existence.

This diagram clearly shows the levels of which, according to the assumptions of "Netstalkers", the World Wide Web consists

And here is what the general director of one of the leading companies involved in computer security in Russia said in an interview on this topic:

The volume of illegal trade on the deep web is difficult to estimate, but some experts believe it could be in the hundreds of billions of dollars a year. You can buy absolutely everything there - from these holders plastic cards to passwords for email addresses, from animal skins listed in the Red Book to pornography. Moreover, the “deep Internet” is used not only by illegal traders and hackers, but also by representatives of large businesses to transfer confidential information to partners, journalists to communicate with “unnamed sources,” and diplomats for classified correspondence. “Hidden networks are used for anonymous, hidden exchange of information, and you can meet a wide variety of people there - from religious fanatics to child pornography dealers. For the most part, of course, hidden networks are criminal in nature, since they are not regulated by any legislation.

Here there is drug trafficking, and the sale of fake ID cards, and trading in access data to financial accounts of users of various banks, and child pornography, and much, much more that simply cannot legally exist on the public Internet." But, in addition to openly criminal sites , there are also those resources whose existence the owners would not like to advertise due to the secrecy of information or the presence of trade secrets in the data “Closed bases, academic, government, military sources, closed bases of enterprises and organizations.

Panda Security in Russia and CIS

" " (or " Invisible Internet") is on the rise. People are curious by nature, and therefore more and more Internet users are going to its “dark side”. Everyone knows that the Internet is an endless source of information, and search engines like Google, Yahoo and Bing can quench our thirst for information with just a few keywords, resulting in huge lists of information in seconds. But did you know that most of us only have access to 4% of the World Wide Web?

We know only the tip of the iceberg: the structure of the “shadow Internet”
As we said above, to better understand the “dark Internet”, it is necessary to imagine the entire Internet as an iceberg, which is divided into five parts, each of which is more immersed than the previous one.

Level 1. At the tip of the iceberg we will find all the pages that we can access using search engines. This part of the Internet is visible and accessible to “mere mortals”, and the information on it is completely traceable.

Level 2. Just below the surface of the water we will find those pages or sites that are not indexed (in other words, sites that are not visible in search engines) by traditional search engines (like Google or Yahoo). Thus, they are only accessible to those who are “in the know” about these sites.


Level 3
. If we dive even deeper into cold water, the iceberg surrounding us, then we can see information (mostly illegal) that is very difficult to find “openly”.

Level 4. As we get closer to the bottom of the iceberg, we will be able to find any type of illegal site. Most of them are monitored by the US government (eg child pornography websites).

Level 5. After going through the four levels of the “dark Internet”, we can reach the very bottom of our iceberg - the most hidden part of the Internet, known as “The Dark Net”. A haven for hackers, this part of the web is based on a set of private networks that can only be accessed by “trusted” users. This is the darkest side of the Internet: it doesn't obey standard protocols and she's not safe.

Tor: How to access the "dark Internet"

Each of us can access the "dark" parts of the World Wide Web, but to do this you must use alternative search engines. Tor (The Onion Router) is free program, which was developed at the US Naval Research Laboratory in the mid-90s to protect online communications of US intelligence agencies.

Tor has a multi-layer structure (hence its name) that allows the user to navigate the network from one layer to another, while the user is protected by a encryption that allows him to hide his IP address. One of the main distinctive features The “shadow Internet” is the anonymity of the user.



Is it really possible to surf the web anonymously?

Industry experts say connecting via Tor can be risky. Tor does not allow the user to control the proxy they connect to, which can result in them being exposed to man-in-the-middle attacks and JavaScript infections that violate the user's privacy.

The Hacker editors had at their disposal a database of more than eight thousand links to sites on the darknet. This is a nearly complete registry of working open resources available on Tor Hidden Services. We have selected the most interesting ones to tell our readers about them.

WARNING

The authors and editors are not responsible for what is on the other side of the links provided. Adult content, illegal goods and services, various types of fraud - all this can be found on the dark web all the time. Be careful, do not leave personal information anywhere and remember the laws.

Carders' forum, a collection of photographs of women crushing animals with their heels, a mirror of the Russian Counter-Strike forum, women with marijuana leaves and buds in their intimate places, someone's file dump with a bunch of books and a binder of old issues of "Hacker", a forum for gun lovers, photographs pissing women, an archive of books in Chinese, a forum for men interested in penis enlargement, and, of course, drugs in all types, forms and states of aggregation. All this can be seen in less than ten minutes of exploring the dark side of the web.

It's not so easy to dig something out of this pile of garbage. We are in automatic mode We followed all the links, and out of eight thousand pages, only 4,300 were opened. About a thousand sites immediately require authorization or show a login form without any explanation - you can’t get there on a crooked goat. There are also a lot of empty pages, pages with the default response from the web server, as well as various mirrors, clones and stubs. In general, even if we take into account that some potentially useful sites are not available 100% of the time and simply did not make it into our database, in general there are not so many live resources collected - maybe a couple of thousand.

Using Tor from Python

Requesting pages from your scripts via Tor is not much more difficult than from the regular Internet. All you need is a local Tor node (just open Tor Browser), Python and the library. Here is a script that downloads via Tor home page The Pirate Bay and displays its contents. You'll probably figure out how to download something else.

Import socks, socket, urllib url = "http://hss3uro2hsxfogfq.onion" def create_connection(address, timeout=None, source_address=None): sock = socks.socksocket() sock.connect(address) return sock socks.setdefaultproxy( socks.PROXY_TYPE_SOCKS5, "127.0.0.1", 9150, True) socket.socket = socks.socksocket socket.create_connection = create_connection contents = urllib.urlopen(url).read() print contents

What are these resources? After preliminary sorting, it turned out that the set of topics was extremely narrow. A significant part of the sites are shops and trading platforms, designed in the form of forums or auctions in the style of eBay. Drugs, weapons, fake documents, stolen goods, credit cards, exploits, botnets - all this can be found in abundance on virtual junkyards. We'll talk more about specific examples later.

This category also includes sites that offer various services - from bitcoin laundering to contract killings. And if the first sounds plausible, then the second is probably a hoax. Fraud, consider it, is adjacent to the store segment, making it even larger.

Another large segment is various kinds of pornography. From delights like those listed at the beginning of the article, to the usual variety, which is abundant in open internet.

Actually, a considerable share of resources raises the question: why was it hidden in .onion? Libertarian blogs, hacker manifestos, home pages... It often feels like someone just wanted to show off or practice hosting a site in a fashionable way. Such resources disappear one after another - their owners quickly realize that maintaining a server is expensive, and there is no point in it.

Search and directories

The first thing you want to provide yourself with when you find yourself in alternative version Internet is a search engine. There seem to be no problems here: there are Torch, Grams, not Evil, Fess, Candle, Ahima and maybe a couple of lesser-known attempts to repeat Google success on the dark web.

We will not undertake to compare search engines, objectively assessing the quality of the results: this requires cunning metrics and techniques that we do not have. Based on purely subjective feelings, Grams has seriously spammy results, while Evil and Torch poorly sort the results: completely random garbage may appear at the top instead of large sites. This is not always a drawback (garbage can be interesting too), but in the end we found Fess the most enjoyable.

Fess

But in the case of the dark web, searching a la Google is far from being as cool and universal solution, just like on the regular Internet. Firstly, the most interesting things are hidden on forums, which often require authorization, and search engines are overwhelmed. Secondly, there are so few resources in general that the search loses all meaning: for different requests you will come across the same sites plus a variety of garbage that is not relevant to the matter. Well, this is not to mention the fact that on the dark web search engines have little chance of tracking user behavior through analogues Google Analytics and AdWords to improve the quality of results.

The solution to the problem on the regular Internet was found even before the advent of modern search engines and looks like a catalog of useful links. In a sense, this article is just such a directory, we just selected the most interesting resources alive at the moment, and also, of course, we do not make money by posting links.

The situation with popular directories on the dark web is different: on the well-known Hidden Wiki, a significant part of the links do not open at all, and the prioritization and selection principle raises serious questions for the resource owners. There is also Onion URL Repository, OnionDir, Yet another Tor Directory, TorLinks, HD Wiki, the Russian “Godnotaba” (by the way, it’s really quite good, albeit small) and hundreds of other collections - large and small, curated and not very curated, posted both in the dark web, as well as on the regular, light Internet.

Mail

Completely anonymized Mailbox- a useful thing, and, of course, such services exist. But you understand that the demand here is very specific: not only hackers, spies, political dissidents and informants want to send letters and leave no traces, but also spammers, extortionists, bots and other lovers of automation of all stripes. This imposes a lot of restrictions.

The most popular mailer that works through Tor is called Sigaint. Its logo is an eye with menacing bloody drops underneath it. “Blood from the eyes” is a very accurate metaphor in this case. The interface is straight out of the nineties, an eye-catching palette, advertising stuffed here and there, an evil captcha (you need to enter it both when logging in and when sending a letter), a limit on the size of the mailbox - 50 MB, problems with Russian encoding when sending letters... In short, user experience approximately the level of medieval torture.


Alternatives to Sigaint seem to exist, but they are either paid (for example, Lenatos costs 0.016 BTC for six months, AnonInbox - 0.1 BTC per year), or send letters only to other addresses in Tor. The second group includes, for example, TorBox and Mail2Tor. In order for a message sent from one of them to be delivered to regular mail on the clearnet, you will have to use a relay, and this is a separate headache.

There is a whole class of servers based on open source OnionMail. If you master the setup, you can connect to one of them through a regular mailer (via POP3 and SMTP). For example, Thunderbird with the TorBirdy plugin is suitable. Find the current list of servers in the Servers section on the OnionMail website. If you use Linux (preferably Tails), then the onion.py script will help ease the setup.


Hosting

The early Internet was different in that those who wanted to open their own website had a lot of opportunities to do it for pennies or for free - in exchange for a banner or at least a link to the hoster. The situation in Onion is different: free hosting has not caught on, and paid hosting does not look very attractive.

The reason for this is simple: mainly drug dealers and other bandits are willing to pay for hosting, which can only be accessed via Tor. If you are not planning to join them, you can easily set up a server at home, or find a hosting provider who will not be outraged if you run Tor on their server. Even for criminal activity, they often resort to the services of so-called bulletproof hosters, which also work with clearnet.


But since we’re talking about hosting on the darknet, let’s give a couple of examples. Hidden Host promises 20 GB of space and unlimited traffic for 0.1 BTC per year; costs 0.25 BTC per year and gives only 256 MB of space and 1 TB of traffic; Kowloon Hosting Services has flexible pricing - from 0.04 BTC per month for 256 MB to 0.8 BTC for six months and 2 GB.


By the way, Kowloon (pronounced “Kowloon” or “Kowloon”. This, by the way, is a terribly overpopulated part of Hong Kong) has a free trial plan. If you write a letter with the subject TRIAL domain_name to a special mail, then in response you will receive the data necessary for access. That is why, apparently, during our impromptu indexing of the dark web, we found about six hundred links to empty default pages hosted by Kowloon.

Sharing

If free hosting in Onion is tight, then there are plenty of places where you can temporarily host a file, picture or piece of text. For files smaller than 500 KB there is PopFiles, you can upload the picture to a site with the simple name Image Hosting, text - to CrypTor, ZeroBin or Pasta.

Any of them allows you to set a timer by which information will be erased. Stronghold Paste has a section with archives - you can ask what kind of nonsense they post there. To prevent your data from being included in this list, do not forget to check the Private box. Please note that Pasta has a text size limit of as much as 10 MB. If you wish, you can easily post a file encoded in Base64 here.

Torrents

What usually hides in the dark corners of the Internet besides drugs and naked pussies? Of course, warez! Nowadays, however, there is no special fun here: there is a mirror The Pirate Bay, and it generally covers most of the pirate needs. From RuTracker separate service Onion does not (Tor already allows you to access RuTracker.org bypassing the blocking), but Rutor has one. You can also look at “Buried” - this site is an order of magnitude smaller (1.6 million hands versus 25 million for Rutor), but an extra chance to find something rare won’t hurt.

Books

For book lovers, the dark web also has everything you need - first of all, it’s “Flibusta” and an excellent search engine for the “Traum library” called “Verbal Hero”. You can look for English and German books in a place with the pretentious name Imperial Library of Trantor, but new arrivals are a bit slow there. There is also Caliber, although the database of 1600 books is somehow not very serious. You can delve into the ruins of computer and educational literature in English at this link. And of course, the mirror of the pirated scientific work aggregator Sci-Hub (we already talked about it once) is seriously vying for a place in bookmarks.


Communication

Going to hiddenservices just to chat is definitely an acquired taste. There are enough resources on the regular Internet where you can register anonymously (or not register at all) and chat about whatever your heart desires. On “onion” sites they talk mainly about business. You probably already understand which ones.

There are not many places for free communication, but they exist. Until recently, the Onion had a mirror 2ch.hk - we provide a link in case it still comes to life. There are other imageboards: the foreign 8chan, famous in narrow circles, the Russian-language Neboard and Haibane.

Galaxy2 can be considered the main social network of Onion - if you dig around, you can find interesting thematic groups in it or meet interesting people. Those who prefer to communicate in Russian will be interested in the onelon resource. This is a rather unusual blogging platform with a small but vibrant community. Please note that to register you will need to create a PGP key for yourself (this, by the way, is a common phenomenon on the dark web).


The Hidden Answers website may also be helpful. This is something like Yahoo Answers or “[email protected]”, but with a focus on the darknet and related things. The main topics are the reliability of trading platforms, setting up Tor and, of course, searching for thematic resources. The latter makes Hidden Answers an interesting place to start surfing.

At least for show, it’s worth mentioning that Onion has a Facebook mirror. For those living in Russia, it makes little sense, but, for example, Facebook is blocked in China, so accessing it through Tor is just fine.

Generally speaking, much of the correspondence on the dark side of the Internet occurs not on websites, but on Jabber and IRC. Selecting suitable clients, setting up an anonymous connection and searching for servers and groups is a topic for a separate article, so here we will limit ourselves to just a couple of links. TorXMPP, Cyruserv, securejabber.me - Jabber servers located in Onion; CgAn IRC and Volatile are IRC clients that can work directly in the Tor Browser; ChatTor is a primitive but convenient web chat with the ability to create your own rooms.

Well, if you suddenly become completely bored and have no one to talk to about the weather and the latest research on the darknet, then take a look at Chat with strangers - this is the local analogue of Chatroulette.

The shops

Stores and trading platforms seem to be the main use of Tor hidden services so far. Therefore, let’s look at them in a little more detail and (purely for research purposes) go through the main markets. In general, when you look through the lists of links, all these “acropolises”, “Alexandrias”, “oases”, “ghettos”, “shops”, “shops”, “shops”, “pharmacies” and other nooks and crannies make your head spin. The competition is enormous, and every shabby drug dealer is trying to get his way, playing out and figuring out how to stand out. What do you think of the name of the store “Shimmering Circus of Vengeance”? We liked it too - purely from a literary point of view.

AlphaBay

AlphaBay is one of the largest markets that divided the hidden market after the closure of the famous Silk Road. “Officially” it is believed that the site was “founded by a carder under the nickname alpha02, a well-known member of most carding forums and a well-known figure among advanced carders.” European researchers claim, however, that the market operates under the protection of the “Russian mafia,” since the servers are located in Russia and are administered from Russian IP addresses. (It would be nice, by the way, to come up with some catchier name for the “Russian mafia” like “Yakuza”!)

The mafia may be Russian, but the site is entirely English. Registration is free, but very complicated - with a couple of dozen fields. Trading, as in the vast majority of markets, is carried out in bitcoins. There is an escrow service. As buyers note, the site is promptly moderated, cleaning out spam and scam. However, judging by some sections filled with advertising and offers of intimate services, this is still not enough.

AlphaBay's biggest advantage is, of course, its range. The market contains 147 thousand offers in the Drugs & Chemicals section (offering, as expected, drugs and illegal drugs), 27 thousand in the Fraud section (database dumps and personal data are sold here) and 13 thousand in the Digital Products section (access to accounts, gaming keys and various software). The remaining sections also contain several thousand items: weapons, jewelry, carding, malware, hosting and other services. The Guides & Tutorials section is unexpectedly interesting, in which a wide variety of information is offered for sale: from harmless website directories or guides on “hacking Wi-Fi” to ready-made botnets, including lists of already existing bots, instructions for use and management software.

Dream Market

A market similar in functionality, quality and content to AlphaBay. Specializes in drugs and digital products. There are an order of magnitude fewer positions, but overall the range of products is the same. The market is unremarkable, except perhaps for an intriguing question: why does anyone use it if there are better markets?

We decided to show you this site for one reason: other English-language stores have an even more meager selection. In other words, if AlphaBay is “the best of the best,” then Dream Market is “the worst of the best,” a kind of “first step” in the quality of a typical hidden market.

Hydra

Hail Hydra! Oh, wait, that's not what we're talking about. Hydra calls itself an “anonymous marketplace,” but it’s essentially a social network for drug dealers. Specializes exclusively in drugs (amphetamine and its salts, cocaine and derivatives, exchange of bookmarks). The owners are not shy about advertising even on the open Internet: the hydra.ooo website is on the first pages Google results, which is strange. Children's typos and frivolous emoticons also do not add trust.

The site is Russian-language, and judging by the comments in the code and the applications used, it was originally Russian. Registration is minimalistic (login and password) without any confirmation. There is a chat. Spam is not cleared: admins do not consider those who paid money for posting to be spammers, as reported on the first page. In addition to sections on selling, hiring and discussing sellers in different regions and countries, has three interesting sections: “FAQULTET” (the topics of which reveal the details and secrets of the shadow drug business), “HYPERLAB” (recipes and methods of drug synthesis) and “WORK” (scorching the hidden relationship of some seemingly legal professions with the world of drug trafficking) .

T*chka

Another drug market, but unlike the others - with an ideology. “Tochka” (as the name suggests, the creator is Russian) was created a year and a half ago and positioned itself as the first drug market that controls the fairness and safety of the transaction: before “Tochka” in the English-language Onion the concept of “dead drop” (drop-off) was not widely used. The site administrator admitted that he is trying to put “honesty, security and tolerance in every way” into the market: this can be seen already during registration, in the warning about the ban on the distribution of low-quality and untested drugs, weapons, poisons, porn, extremist materials and discrimination based on race, politics or religion.

The interface can be selected in Russian, but the description of all offers is in English. As you can see in the screenshot, there are three orders of magnitude fewer offers than on AlphaBay, but the emphasis is on the “purity” and “quality” of the product. The product, by the way, is not always drugs - rare and expensive medicines are also sold on the market, which in a number of countries cannot be obtained in a legal way, documents and programs for falsification, some hacker services.

Forums

RAMP

Another Russian-language semi-forum-semi-market for drug dealers. There is no communication, discussion of hacking, security, cryptography, leaks, malware, carding, and so on is prohibited already during registration, during which you are required to pore over this list of prohibitions for two minutes. All activity on the site comes down to drug trafficking.

The Hub

A sad English-language forum about everything that is not allowed on the white fluffy Internet. The vast majority of comments are in the For Beginners, Darknet In General and Off Topic sections, which seems to hint at the quality of the audience and discussions. Doesn't work without JavaScript. The Vendors section contains dull attempts at self-promotion of a huge number of drug dealers and strained, monotonous reviews of various drug markets. God, how tiring this is.

Closed hacker forums and sites

Hacker threads can be found here and there, but specialized forums are mostly unfriendly, and even free registration is rare. For example, entry to Hell, one of the most famous forums, costs 0.1 BTC (about $60).


Hell

GroundZero, SiphON and BlackHat look open at first glance, but are suspiciously empty. There is no doubt that all the most interesting things are hidden in sections that are not visible to the average visitor.


When registering on most of these forums, they ask you to enter an invitation code, and even if you own it, it is not a fact that all threads will be immediately open to you. There are quite a few public sections on the 0day forum, but you can rest assured that the main movement here, too, happens in sections that you can’t get to from the street.


0day

IN open access There is very little left. The most popular topic is carding: bays, CVV, cashing out for various payment systems, ways to bypass antifraud, discussions about where to get dumps. In general, combat crobbers from Carder Planet will be a little bored here, but if you are simply interested in the topic, you will definitely learn something new: read the FAQ and click on the links for beginners that the community generously shares.

As for the other sections in the public, it’s a real disappointment: the chance of finding 0day is generally lower than on clearnet. But you can look at the Accounts and Database Dumps section, sometimes you see familiar words like VK or Rambler.

Of course, hacker groups also have personal sites on the dark web. As an example, you can look at CyberGuerrilla, The Hack Lair, Hacker4Hire and Hackmasters, but, to be honest, there is nothing special to catch there. The only thing that stands out is the Anonymous International exchange, where you can take part in auctions where the contents of the accounts of Russian officials are raffled off.

Weapons, espionage, special operations

Runion

Russian Onion Union is the most popular and educational Russian-language dark web forum, specializing in defense and self-defense. In the “Weapons” section you can find basic concepts and FAQs on weapons, instructions and books on making homemade protective equipment, calculations of the power of explosives, a discussion of military equipment, weapons and ammunition, lessons on self-defense and sabotage, as well as warnings knowledgeable people about gun web forums that trade information about their visitors.

The “Security precautions” section discusses methods of wiretapping, surveillance, detection and protection against them, typical mistakes of beginner anonymous users and high-profile mistakes of famous terrorists. There are FAQs, rules and advice on safe behavior in different countries of the world, as well as ways to circumvent official prohibitions, hide potential evidence and “cover your tracks”. An instruction called “ Sanitation Day”, listing ways to maintain personal information cleanliness, will be useful to any visitor, even if he came to the forum with the most innocent intentions.

The “Information Protection” section will tell you about methods of encrypting and hiding traffic, secure services and utilities, as well as ways to increase the bulletproofness of some popular programs, devices and web servers. A topic called “Tails: FAQ”, explaining what The Amnesic Incognito Live System is, will be an excellent start for an anonymous person taking his first steps.

Raegdan's Fukken Saved

A Russian-language archive containing full and partial dumps of some clearnet sites that were “cleaned” at one time. There is a lot of interesting stuff here for gun lovers.

  1. Dump of the steelrats.org weapons forum, storing content as of the end of 2012. The forum contains a certain amount of materials on the handicraft design of weapons, special equipment and reconnaissance equipment. You can compare it with Runion and appreciate how pathetic Anonymous looked at that time.
  2. Drawings, photo sets and video instructions for 3D printing homemade weapons, saved from the defunct website of the American James Patrick. The weapon, however, is only suitable for self-defense, because it is plastic.
  3. A young rebel's guide to forming his own armed gang: The ABCs of Domestic Terrorism, Guerrilla Warfare, and the Urban Guerrilla's Manual. Of course, after reading these books you won’t turn out to be any kind of “urban guerrilla” (partisans don’t really read books in general), but this can help you better understand the psychology of bandits and avoid contact with them if mass unrest occurs.

Cryptostorm

Tor version of the forum of the VPN provider of the same name, Cryptostorm, located in Iceland. Quite an informative English-language resource containing discussions on protecting and encrypting information about personal life and movements. Basically, of course, it contains sections devoted to the work of VPN Cryptostorm and the development of their utility for “absolute protection” Cryptostorm Widget. The Stormphone section contains a small but valuable information and discussions on the topic of data protection on mobile devices.

Black Market

A store positioning itself as “Number one in Tor networks” and behaving almost like a legal one. The owners claim that they provide a worldwide quality guarantee, the weapon is tested and can be replaced if it fails (within one week), shipping is already included in the prices, and ten free rounds are included with delivery. In a word, an epic and very beautiful scam, the impression of which is not spoiled even by the golden Desert Eagle listed in the list of goods. Indeed, suddenly someone wants to anonymously and secretly buy a pistol in order to show it off to their friends. Why not.

Black Market Guns

In contrast to the previous one, this is a real gun store located in the USA and legally selling US-approved weapons, parts, spare parts and ammunition. Contains 26 positions, among which there is even a pair of night vision devices. The owners silently bypass all issues of legalizing the purchase on the buyer’s side, offering only delivery via FedEx. Shot item and assembly instructions included. The official email on tutanota.com also makes us believe in the seriousness of the proposal. But, of course, we didn’t check.

No Background Check Gun Store

A store of unknown origin (we suspect the owners are from the USA, but there is no confirmation anywhere), positioning itself as “the largest catalog of weapons on the Deep Web.” The number of items is truly impressive: owners offer a choice of 570 pistols, 230 rifles and 30 pump-action shotguns. The choice is so great that there is a catalog search. Only three facts confuse us: the large number of positions in the sections, mail on gmail.com and the most famous manufacturers in each category. Too beautiful to be true.

Euro Guns and UK Guns

Two stores of the same owner, operating respectively from Europe (presumably the Netherlands) and the UK. The owner carefully offers customers registration (why?), a referral program with a 1% deduction (oh, that’s why), several ways to buy bitcoins for cash and free shipping. The assortment is small and absolutely identical, which suggests the presence of a common owner (and most likely, one person who is neither in the UK nor in Europe). If you successfully purchase something here (which is very unlikely), don’t forget to give us 1% for the tip!

MaskRabbit

A fun site that bills itself as “an anonymous agency for real world transactions.” Specializes in delivery, theft, espionage, sabotage, banditry and hacking. At the same time, it immediately amuses us with the fact that it declares to work “only with professional agents,” while simultaneously offering to send an application to join the ranks of these same “agents.” Relax, 47th, found for you worthy replacement- you see, a letter has arrived from Vasya from Voronezh!

C'thulhu

An even more fun site, the name of which already speaks of the high professional level of its creators. The intentions of the “organized crime group C’thulhu” are so serious that they have to explain why you should hire them and specifically through Tor. To the reasonable question “Where are the proofs, Billy? We need proofs!” the developers answer convincingly: we delete all proofs after completing the order (for your own safety), and our customers have absolutely no time to sit on forums and respond to any letters. Nuff said.

However, the degree of fun is somewhat reduced by the presence of a public PGP key, email on bitmessage.ch and a detailed price list. Perhaps behind the deliberately ridiculous, eye-catching façade there is still a serious business hidden.

Besa Mafia

The site of an active Albanian mafia group is not at all funny. Open only after making sure there are no children nearby.

Besa Mafia operates in the United States, Canada, Europe and many other countries, offering such brutal services as debt collection (with self-harm), murder for intimidation (however, covert elimination too), setting cars and houses on fire, as well as selling unregistered weapons. In sections of the site you can find instructions on maintaining anonymity when ordering, step by step description a secure order payment process, a price list, FAQ and even a disclaimer, which states that Besa Mafia services are provided solely for the purpose of protecting the client from the threat looming over him. To place an order, you need to indicate the contact of a person who is already a member of the group, otherwise you yourself may become the next target. The creators of the site also state that they are not performers: they are intermediaries and receive 20% of the amount for this. The performer receives 80%.

Well, did you believe it? Convincing enough? And now the truth: this site is a police scam. Besa Mafia administrators leak correspondence with “customers” and contacts of “performers” to law enforcement agencies in different countries. If you are paranoid, you might have suspected this even while viewing the “Video” section: the videos posted there are simple clips from American news, which are pulled from YouTube and do not work without JavaScript. However, after the Silk Road leak, most sites on Tor are similar scams.

Other useful things

Dead Drop- a service for transmitting encrypted messages. To register, you need a PGP key, which will also help you leave the message without an addressee. Those who wish to read it will be able to enter your public key, and the service will display the text.

Deep Web Radio. Considering that there are no particular problems with music on the “pure web”, the existence of an underground radio station is not easy to justify. But nevertheless it exists. You can listen to one of the five “broadcasts” and be pleased that you are doing it through Tor.

Bitcoin Block Explorer, a mirror of Blockchain.info - a site that helps track Bitcoin transactions.

Keybase- Keybase.io mirror. It allows you to associate your PGP public keys with user profile. It doesn't hurt to register, but remember that Keybase is notorious for having a long virtual queue that you have to wait in before you can send an invitation.

Cryptome- a mirror of the legendary website about privacy and cryptography Cryptome.org. The last time it was synchronized was in 2013, but while the main site has not gone away, the point of using a hidden service instead is questionable.

Total

Of course, it is impossible to take and survey the entire dark web. First of all, because two thousand links are still two thousand links and it’s not easy to go through them all (and it’s not necessary). General idea you probably caught on, and hopefully the questions “what to watch?” and “where to start?” we answered.

The second, even more important point is that the “dark” in the word “darknet” still implies that the sites are hidden from outsiders and it is impossible to get to them at a swoop. No amount of indexing will save you, and here you need an individual approach.

Generally open part The dark web is so reminiscent of the Internet of the nineties, with its characteristic anti-design and general carelessness, that nostalgia just hits. The main differences: there are much fewer sites in Onion and they are much more criminal. But here you can, as if in the good old days, surf the net and feel the wind of freedom blowing from all sides!

Post your links in the comments!

Surprised we missed some cool sites? Do you know interesting details that are not in this article? Leave your opinion using the form below, and the editors will take it into account in future materials.

What is the Dark Web or Darknet, how does it differ from the Deep Web, and why are these two terms always confused? We decided to help you figure it out and at the same time warn you - after all, the Darknet, for all its attractiveness, accessibility and alluring spirit of freedom and permissiveness, is a very dangerous place, wandering through which can cost you quite a lot (both literally and figuratively).

What is the Dark Web?

Dark Web is a term referring to a group of specific websites that exist in an encrypted network space. They cannot be found by traditional search engines and cannot be reached using traditional browsers. It is also often used by Dark Net, but do not confuse it with Dark Internet (discussed below)

Almost all Darknet or Dark Web sites hide personal data using Tor encryption tools. This network (did you know, by the way, that this is an abbreviation for The Onion Router?) may be familiar to you due to its ability to hide user identification data and network activities. You can use Tor to hide your location in a way that makes it seem like you're surfing the web from a different country than where you actually are. This is very similar to how VPN services do it.

If a website runs through Tor, it has much the same effect, and even magnifies it. Sites designated as the Tor Hidden Service are only accessible when connected to the Tor network. Simply put, if you don't connect to this network, you won't get anything.

Pseudo-suffix “Hidden Services. onion" doesn't work with DNS servers, A URLs Hidden Services are a 16-character alphanumeric set automatically generated using public key encryption at the time of website creation. You can copy the Tor link and try to open it in a regular browser, but this will lead you to a dead end.

To visit a Dark Web site using Tor encryption, the Internet user will have to use Tor themselves. Just like an IP address end user jumps like a ball through several layers of encryption to get to another IP address on the Tor network, the same thing happens with Internet sites. Each node knows only those nodes that are directly connected to it (it knows nothing about how your PC connects to the web server). Any transition from one node to another is carried out using its own set of encryption keys. This reduces performance and speed, but significantly improves the security of your anonymous movements.

There are several levels of privacy, even greater than the already secret fact that you are using Tor to visit a regular Internet site.

What follows from this? That Darknet sites can be visited by anyone, but it is extremely difficult to figure out which people are behind them. But this can become dangerous - in certain cases.

Silk Road to Oblivion and others

But not all Dark Web sites use Tor encryption. Some people use similar services, such as I2P or Silk Road Reloaded. The visitor will have to use the same decryption method that is used on the site being visited, and - what is critical - know exactly how to find this site, even to the point of manually entering a link just to visit this site.

Sadly famous examples Darknet sites include Silk Road and its derivatives. Silk Road was (and probably still is) a site for buying and selling drugs "for recreational purposes" - for those who want to relax in an illegal way from time to time. This is one example of the Dark Web being used for nefarious purposes.

The dark web made headlines in August 2015 after it was revealed that 10 GB of information had been stolen from Ashley Madison, a site designed to provide a convenient way for bored spouses to cheat on their partners, all of which was posted on the vastness of the Dark Web.

The hackers who stole the data threatened to spread it across the Internet unless the site shut down, and he has operated under that threat ever since. Now the spouses of Ashley Madison subscribers have begun to receive blackmail letters demanding the transfer of $2,500 in bitcoins - or all personal data will be made public.

In March 2015, the British government established a dedicated Dark Web Cybercrime Unit, specifically targeting organized crime and child pornography. The National Crime Agency (NCA) and the British intelligence unit GCHQ together created the Joint Operations Section (JOC) for this purpose.

But there are still completely acceptable reasons for using the Darknet. We are talking about freedom of information.

The population of closed countries with a totalitarian system can sometimes communicate only through the Dark Web. outside world. And recent revelations of surveillance by American and British government intelligence agencies of the Internet activities of their citizens and you may lead to the sensible idea of ​​​​transferring your network communication on the Darknet. (I’ll stay on Facebook, but I just like the attention.)

What is the Deep Web?

Although the terms Deep Web and Dark Web are often used interchangeably, they are by no means equivalent. There is some nuance here. The name Deep Web generally refers to all sites that cannot be found through search engines.

Thus, the deep web includes not only the Dark Web, but also all user databases, mail pages, abandoned sites and personal pages, online forums with mandatory registration and paid online content. There are a huge number of such pages, and most of them exist for the most common reasons.

For example, as an online publication, we have "mock" versions of all our web pages, blocked from being indexed by search engines, so that we can test the content and design of a publication before releasing it to the public. Therefore, every page publicly viewable on this internet site (and literally millions of similar pages and sites) has a duplicate on the deep web.

The content management system in which I am preparing this article is also located on the deep web. Here you have another hidden duplicate for each page of the public site. At the same time, our working corporate network also closed from search engines and protected by a password. And since all this has existed for about 20 years, our network has become quite overgrown with secret duplicates.

Do you use online access to your bank account? Your password-protected data is somewhere deep in the tenets of the Deep Web. And if you estimate how many pages one generates Account on Gmail - then the true size of the “deep web” will become at least approximately clear.

This is why newspapers and popular news outlets regularly return to horror stories about the “90% of the Internet” consisting of the “dark web.” They simply confuse the risky and generally evil Dark Web with the vastly larger but largely benign ocean of the Deep Web.

At the same time, they equate with each other such actions as deliberate concealment of activities from the law and normal protection from search engine access for the sake of maintaining confidentiality or simply for banal work purposes.

What is the Dark Web?

Adding to the confusion, the term Dark Internet is sometimes used to describe the following examples of networks, databases, or even websites that cannot be found on the open Internet. In this case, this happens either for technical reasons, or because they contain some kind of private information not for public use.

The main practical difference is that the phrases Dark Web or Deep Web are usually used by news people to refer to corners of the Internet full of dangers and someone's hidden agendas, while " dark internet" are just boring warehouses where scientists store raw data for their further research.

But, of course, you are interested in how to get on the Darknet

Technically it's not particularly difficult. You just need to install and run Tor. Download the Tor Browser Bundle from www.torproject.org - all the necessary tools are already contained there. Open the downloaded archive, select a location on your hard drive for the files after unpacking, then open the folder and run the Start Tor Browser file. That's all, actually.

The Vidalia control panel will automatically connect to a mysterious encrypted network, and when established connection, will open the browser. To disconnect from the Tor network, simply close the browser.

Depending on what you intend to do, some conspiracy theorists advise covering your laptop's webcam with duct tape to prevent the overly curious and tech-savvy from spying on you. big brother" In this case, we can recommend wearing a tin foil hat at the same time.

The hardest part is figuring out where, what, and how to look on the Dark Web. This is where we leave you, reader, and wish you good luck and safe searching. And one more warning before you go any further: by logging into the Dark Web, you have a real chance of getting to all those sites that the tabloids scare us with. This means that right now you could be just a couple of clicks away from places offering drugs, weapons and - frankly - even worse.

Aggregators like Reddit offer long lists of links, as do some Wiki pages, a list that offers access to some really dirty places. If you wish, you can briefly familiarize yourself with them, but we would not recommend that you do so.

Also keep in mind: Darknet sites go down from time to time - such is their dark nature. And if good customer support is important to you, stay away from the darkness and closer to the light!

Once again, please heed our warning: this article is not an attempt to either inspire or condone your further, possibly illegal or immoral behavior.

In general, I decided to answer anyway. Because people who believe in folklore and myths answer.

The black internet is a beautiful fairy tale. Tor does not give you the opportunity to go straight to resources selling drugs or weapons.

What is a torus? Thor is an onion, 100 clothes. Do you catch the analogy?

What Thor does is he changes the VPN server at a certain interval. That is, it connects to possible VPN servers around the world.

The chain becomes very confusing, in such a way that determining which site you are currently viewing remains a secret for your provider.

Your provider will see that you have connected to a server in Germany, the IP address of which, for example, is 56.56.56.56. When you navigate to the browser, the site will therefore receive an error, because this resource most likely has nothing on port 80.

The browser runs on port 80.

For example, this is a domain. And his physical address is, for example, 232.232.232.232. If you enter these 4 digits into the browser line, it will automatically add “232.232.232.232:80”.

And the connecting chain between numbers and understandable letters is DNS (domain name server).

But I got off topic. So much for general development.

I continue, Tor gives you anonymity. Complete or incomplete it depends on you and your caution. But with the help of the torus, no one will let you buy prohibited goods. Thor is not the key to a closed door, but just a tool for obtaining open door. Count the chisel. Thor helps you avoid mistakes when buying something forbidden. Since the provider will not log your actions. But, guided by the law, I strongly do not recommend trying any of the above. All my words are just illustrative examples.

I went very far off topic, but it was necessary to expose myths and folklore.

So what is the black internet?

This is trash, my friends. These are not indexed (unknown) pages to search engines. These are sites poorly configured by SEO specialists, or sites made this way on purpose (which, by the way, can sell something illegal)

Yes, illegal sites are also present there, but for this there are reverse specialists who will make sure that the search engine never finds this site.

And even if you ever come across a link to a prohibited site, when you click on it you will not see anything. Since most likely the server is configured to allow access using trusted IP addresses or some kind of hidden code (click on a certain small area of ​​pixels)

I hope I have clarified this concept for you.

Subject folklore and myths to a healthy skepticism, and don't be afraid of scary phrases.

you contradict yourself by first saying that the dark web is a myth and a fairy tale, and then that no, it exists, but it’s trash. correct me, but the tool to get the door open is the key? and it doesn’t matter what you call it if it still leads to an open door?
and again you are confusing the dark web and the deep web.
poorly indexed sites are ipweb, and have nothing to do with the torus