• You are currently viewing our forum as a guest, which gives you limited access to view most discussions and access our other features. By joining our free community, you will have access to additional post topics, communicate privately with other members (PM), view blogs, respond to polls, upload content, and access many other special features. Registration is fast, simple and absolutely free, so please join our community today! Just click here to register. You should turn your Ad Blocker off for this site or certain features may not work properly. If you have any problems with the registration process or your account login, please contact us by clicking here.

Tor, DarkWeb, Hacking, Anonymity, Security & other resources

Coriolis

Si vis pacem, para bellum
Staff member
Joined
Apr 18, 2010
Messages
27,306
MBTI Type
INTJ
Enneagram
5w6
Instinctual Variant
sp/sx

Trash Panda

Retired
Joined
Jun 7, 2016
Messages
415
Everytime Ive downloaded a tor browser it's slow as fuck. I don't feel like I need it for anything so I delete the apps and re download them again later of I feel like it.
 

Trash Panda

Retired
Joined
Jun 7, 2016
Messages
415
Ive only ever visited a few dark net markets. It was mostly drugs, weapons, and passports/IDs.. I didn't see anything like human trafficking or whatever but I wasn't looking for it.
 

Coriolis

Si vis pacem, para bellum
Staff member
Joined
Apr 18, 2010
Messages
27,306
MBTI Type
INTJ
Enneagram
5w6
Instinctual Variant
sp/sx
Everytime Ive downloaded a tor browser it's slow as fuck. I don't feel like I need it for anything so I delete the apps and re download them again later of I feel like it.
I've been trying tor for the past week or so, and don't notice much of a difference in speed, but then my service isn't that fast to begin with. I would be interested in hearing of others' experiences.
 

Qlip

Post Human Post
Joined
Jul 30, 2010
Messages
8,464
MBTI Type
ENFP
Enneagram
4w5
Instinctual Variant
sp/sx
[MENTION=28147]Trash Panda[/MENTION] It really is going to be slow and kind of kludgy if you're browsing through Tor. Tor routes your connection through many relays to hide you, it has to add more time. It's the trade off you have to make for anonymity.
 

HisKittyKat

New member
Joined
Apr 25, 2017
Messages
156
MBTI Type
XNFP
Enneagram
4w5
I want to visit the dark Web, now ☻...Curiosity is killing me 😟. ..I'd be all in my glory snooping around, it would be a rush 😈
 

kotoshinohaisha

Permabanned
Joined
Jul 9, 2016
Messages
1,083
MBTI Type
STFU
Enneagram
7w8
Instinctual Variant
so
Not worth it. Full of shit out there. You'll just be hacked
 

kotoshinohaisha

Permabanned
Joined
Jul 9, 2016
Messages
1,083
MBTI Type
STFU
Enneagram
7w8
Instinctual Variant
so
I accessed tor before. Sent me bullshit message like:

You've been hacked for watching porn and pedophile videos, yadah yadah.. If you wanna recover your account click this:

Yeah click bait ffs. XD

It's stupid. I uninstall it. Anyways i can access stuffs with regular Internet connection. If i wanna access a blocked site, just simply use VPN/proxy. XD
 

Qlip

Post Human Post
Joined
Jul 30, 2010
Messages
8,464
MBTI Type
ENFP
Enneagram
4w5
Instinctual Variant
sp/sx
Why I Had to Buy My Wife's Inhaler on the Dark Web - Motherboard

I've always found the dark net markets to be fascinating and I spend more time than I should browsing the markets and the communities that have been built around them. Because of this fascination, I knew that there were vendors who offered prescription drugs that don't get you high. Drugs such as antibiotics, allergy pills, and most importantly, asthma inhalers.
 

Tater

New member
Joined
Jul 26, 2014
Messages
2,421
If you find a lot of utility in USB flash drives, but have concerns about vulnerabilities they might create, you may find that encrypted USB drives serve as a decent solution. For instance, Iron Keys: Encrypted Flash Drives | Windows To Go | IronKey have a good reputation for heavily enciphering data. I've heard that even the developers have difficulty decrypting the contents sometimes. Other products include Aegis and SecureKey. I don't own one of these yet, but I would love to get one and format a bootable Linux distribution on it.

As a caveat, they can be pretty pricey; sometimes sketchy manufactures of USB drives have been known to (intentionally or unintentionally) insert malicious backdoors in their products.

Even still, if I was handling data at high classification levels, I would use an encrypted drive after vetting it.
 

Tater

New member
Joined
Jul 26, 2014
Messages
2,421
I've been trying tor for the past week or so, and don't notice much of a difference in speed, but then my service isn't that fast to begin with. I would be interested in hearing of others' experiences.

TOR is definitely slower for me. It's best used in conjunction with a VPN, which will make your connection even slower than it was initially. Latency happens when you encrypt your traffic 3 times over 3 nodes before doing anything else.

Here are some general guidelines for using TOR:

11 Do’s and Don’ts of Tor Network - Hongkiat

You already have some of this taken care of by avoiding Windows, IIRC.
 

Numbly Aware

I wanna fcken feel right
Joined
May 4, 2016
Messages
408
MBTI Type
INTP
Enneagram
3w4
Instinctual Variant
so/sx

I appreciate this...

Tho, rlly I talk to myself about this like,
Worst case scenario: what are they gonna do? Steal bank information? How to withdraw money? Without my id? And they'll probably get caught anyways... Ok, now deeper, so they stole money? Yes. Can I get it back? Yes. If not, then am I gonna die over it? No. Can I make more money? Yes.
What next? Photos? That's a shitty move, but do I have any pics that I have to seriously worry about? Nah. In another's eyes even if they use pics you rather not others know about, it's honestly shitty coming from them, unless the receiver is an idiot. And do I care about an idiot's opinion? No.

#nvm °^° *still hooks up to public internet* idc ;^; at least I know I'm putting my phone at risk, which I already knew.
 

Tater

New member
Joined
Jul 26, 2014
Messages
2,421
I appreciate this...

Tho, rlly I talk to myself about this like,
Worst case scenario: what are they gonna do? Steal bank information? How to withdraw money? Without my id? And they'll probably get caught anyways... Ok, now deeper, so they stole money? Yes. Can I get it back? Yes. If not, then am I gonna die over it? No. Can I make more money? Yes.
What next? Photos? That's a shitty move, but do I have any pics that I have to seriously worry about? Nah. In another's eyes even if they use pics you rather not others know about, it's honestly shitty coming from them, unless the receiver is an idiot. And do I care about an idiot's opinion? No.

#nvm °^° *still hooks up to public internet* idc ;^; at least I know I'm putting my phone at risk, which I already knew.

There are countless reasons to be concerned about the integrity of your data on a public network, even if you don't have many valuable items on your device. Identity theft comes in a number of forms, some of which do not require a large quantity of centralized information to perform. For instance, the information security community calls it "jigsawing" when an attacker collects bits of seemingly insignificant information to form a complete picture of who you are and how your data can be exploited. It's the equivalent of what a dumpster diver would do when piecing together shredded paperwork. Furthermore, even if just your phone or laptop gets compromised on a public network, the implications stretch further than that single node. For example, if you take your compromised machine to home or work, it could serve as a foothold for an attacker to gain further entry into your personal network or your company's network. Do you want to be that person who was found to have let a worm loose in your business environment? In any case, it would be, at best, an inconvenience if your machine got bricked just because you accidentally logged into a spoofed network. Who likes inconveniences like that? :) Moreover, it is not a strong likelihood that such an attacker would be apprehended. Most breaches are only discovered too long after the fact to respond with effective legal action. It's therefore ideal to prevent them before they occur.
 
Top