Shadow network. Darknet or dark side of the Internet

23.11.2013

Only part of the information contained on the Internet can be found on Google and other search engines. Data stored on the so-called “deep” and “dark web” is closed to them. This vast parallel universe serves both legal and illegal purposes.

Search engines such as Google and Yandex are the only gateways to the online world for most Internet users: anyone who needs to find something on the World Wide Web usually enters their query into search form one of these services and selects exactly the information that appears in the search results - and, as a rule, only sites located on the first pages of search results. But even if a traveler across the expanses World Wide Web If he had the patience to open all the thousands of links shown to him, he would only see a fraction of what is available on the Internet, because Google and other search engines are not omniscient. If someone needs to hide something on the Internet from search engines, they can easily do so.

Secret societies on the Internet?

The ability to hide data from search engines is used by both the owners of regular websites and the organizers of anonymous networks that partly make up the so-called “dark web” - segments of the global global network not connected to the Internet. The idea behind anonymous user networks is similar to secret societies and Masonic lodges of the real world. By the way, in itself it has nothing to do with illegal activity. The principle is simple: anyone who is personally acquainted with at least one member of the lodge can be invited to general meetings of all members. They pass in public accessible places, but only the initiated know what exactly is happening, when and where. On the Internet it looks like this: Anonymous networks use the same technologies as other online services: web pages, email, file sharing. In principle, they could be available to everyone - but only if that "everyone" uses certain software and knows what and who they need to find.

Anonymous networks originated as a response from the computer community to the excessive zeal of copyright holders and authorities to limit the distribution of digital content and information back in the late 90s of the last century and have been constantly improved since then. After law enforcement agencies all over the world turned their attention to file-sharing services and began to persecute them most active participants, the owners of such resources began to look for ways to continue their activities without hindrance and developed a hidden analogue of decentralized peer-to-peer networks (Peer-to-Peer, P2P), such as Napster, EDonkey or BitTorrent.

In P2P file-sharing networks, there are usually central servers called trackers that allow all users to find each other and share MP3 files, videos, programs, images and any other information in digital form, - naturally, without worrying about copyrights and other legality-related details. There are no such servers in anonymous networks - all information is stored distributedly on user computers.

Anonymous networks and the dark web

In most cases, information located on the “dark web” cannot be accessed via the Internet, since such segments of the global Network may not have a connection to it at all. To get into anonymous networks, you will need to install special software, which is included on the CHIP DVD.

ANts P2P written in language Java programming and allows everyone to anonymously share files. Traffic is exchanged not directly, but through several intermediary nodes. Each Ants P2P participant knows only the address of the neighboring computer, so it is impossible to find out who is transferring the file and where. Transmitted data is encrypted using AES algorithm for greater safety.


Purpose: anonymous file sharing. Website: antsp2p.sourceforge.net

Bitmessage is designed for exchanging securely encrypted messages and was conceived as an alternative to email and other instant messengers, the data from which can end up in the hands of intelligence services at any time. The architecture of Bitmessage is similar to the architecture of the Bitcoin network intended for exchange in cash, but optimized for messaging. Exchange is possible not only between by individual users, but also in groups. After Edward Snowden revealed information about mass surveillance of Internet users by intelligence agencies, Bitmessage became truly popular.

Purpose: anonymous exchange of funds. Website: www.bitcoin.org

Friendly exchange

Unlike the Internet, some anonymous networks are not accessible to everyone. Their creators had one goal: to avoid surveillance by the authorities, who themselves often break the law by monitoring their citizens. The anonymity system developed for this purpose attracted not only fighters for freedom of information and exchange of opinions, but also lovers of various illegal content and pirated copies.

Created inside the Internet hidden networks By analogy with P2P, they began to call it F2F (Friend-to-Friend, “to each other”). This term was first coined in 2000 by programmer Daniel Bricklin, who became famous as the developer of the first spreadsheet for the PC. Unlike some P2P networks, they do not have central servers and users cannot share files with anyone.

To get in touch with your friends, each network member must know their addresses and have their digital business cards (certificates). For the uninitiated, there is no way to track file sharing. If your friends do not have the information you are interested in, they will come to your aid anonymous mode functioning, which is supported by most existing F2F networks. IN in this case connection between unfamiliar users is allowed. Computer addresses and all personal data of their owners remain secret.

Freenet as salvation from censorship

One of the most popular networks type F2F is Freenet (not to be confused with the name of some Internet providers). Thanks to special software, it uses the already existing infrastructure of the World Wide Web and conventional network operators with their access to the Internet - but at the same time, it fences itself off from the traditional Network with all its might.


Freenet is not just for sharing information between by individuals. There are also classic websites within this anonymous network, but there are no URLs in the sense that Internet users are familiar with. In addition, there is an email system isolated from the Web, discussion forums (FMS and Frost) and an analogue of a social network (Sone). All information available on Freenet is stored distributed on hard drives users' computers in encrypted form; a complex routing system is used to access it. All this guarantees almost complete anonymity, but imposes a number of restrictions. Compared to the Internet, the Freenet network is much slower. Some are not yet available modern technologies- For example, dynamic generation content using databases and scripts, widely used on the Internet.

The goal of the founders of the Freenet project was to create a global network where all users could remain anonymous and no one would be allowed to decide what is acceptable and what is not. This network promotes the spirit of free exchange of information and freedom of speech; not even the creators of Freenet full control over the system. In countries such as China, people especially need the free exchange of information without fear of government reprisals. Complete anonymity on Freenet and similar networks is achieved only when users come into contact with each other in an absolutely purposeful manner. But even if you allow the connection to be established with strangers, identifying computers exchanging information will be incredibly difficult. Communication between the two partners is encrypted and is not direct. Data streams are transmitted through the computers of other users. To a stranger It is extremely difficult to trace connections between individual participants.

Sites within Freenet remain invisible to traditional search engines and have no direct connection with the Global Network. You can only access them if you install the free Freenet software on your computer and connect to the network. Also, the personal data of their creators and the addresses of the computers on which they are located remain completely anonymous.

Over the years, the Freenet network has evolved and grown rapidly. Currently, there is a directory of freely accessible websites called Linkageddon. There is no search function, and Freenet users have to scroll through the unsorted array, encountering the most unexpected things. In addition to prohibited content, the list includes pages that offer pirated copies. Here, next to the resources that publish reliable information, you can find the page of some madman who, with pseudoscientific thoroughness, repeats all sorts of false fabrications. It is possible that the lack of censorship is widely used by someone to investigate illegal activities.


The Frost program, running within the Freenet network, is designed for the anonymous exchange of opinions, structured like forums, and files. Graphic shell The application resembles the cover of an email client, and the interface is translated into several languages, including Russian. Frost has the same features as the Freenet network. Website: www.freenetproject.org/frost.html

Freenet Alternatives

Invisible Internet Project(abbreviated as I2P, Invisible Internet Project) is a clone of Freenet.

This network was created to provide anonymous access to various services, including blogs, sharing instant messages, email, websites, file transfer services, etc. As its authors assure, the ultimate goal of the I2P project is the ability to function in harsh conditions, even under pressure from organizations with significant financial or political resources. Data transmitted over the network is encrypted, and the network itself is decentralized. You can connect to I2P networks not only from a computer, but also from smartphones or tablets running the Android system.

Purpose: multifunctional anonymous network. Website: www.i2p2.de


Hyperboria represents an experimental decentralized network based on network protocol cjdns. Transferring data to physical level can be carried out both using the Internet infrastructure and directly between routers, which allows you to create a completely Internet-independent global network with mesh topology. Traffic transmitted via Hyperbolia is encrypted, but the network is not anonymous - it is possible to establish both the address of the sender and the recipient of the data.

Purpose: anonymous exchange of files and messages. Website: retroshare.sourceforge.net

The Dark Web without the Shady Shenanigans

Anonymous networks don't have to be a platform for illegal activity, say Billy Hoffman and Matt Wood. Both work in the research and development department of IT giant Hewlett-Packard. In 2009, they first introduced Veiled (English: “hidden”) - new software for organizing user anonymous networks.

“We believe that anonymous networks could become much more widespread if there were no barriers for users to download, install and configure software,” says Billy Hoffman. And if anonymous networks became available to a wider audience, there would immediately be many opportunities to use them for legal purposes, experts believe.

When creating Veiled, the researchers thought about how to protect sites like WikiLeaks, which publish confidential government documents, from government pressure. Until now, the owners of the WikiLeaks project use ordinary web servers, which, due to legal or political pressure, may one day disappear from the Internet. If all their materials were distributed decentralized through an anonymous network, WikiLeaks' opponents would become windmill wrestlers, since documents circulated on anonymous networks are not stored on servers, but distributed in small parts among different users. For example, the Freenet network mentioned above works on this principle.

Researchers from HP want to simplify anonymous networks and use regular browser technology in their program to do this. Veiled works without downloading or installing on devices like iPhones, as well as computers running operating systems Windows, Mac and Linux. At first glance, Veiled does not seem as powerful as mature and specialized software for anonymous networks, but it has everything essential functions, necessary for an anonymous network, including encryption of all data transmitted by participants and the ability to chat. Hoffman and Wood have prepared detailed documentation for Veiled so that other programmers can recreate their design. Veiled is good, but the two HP researchers will never publish it. The reason is a possible legal conflict with the company they work for. Nevertheless, the authors put up such a detailed presentation online that, according to Hoffman, other programmers will be able to easily develop an analogue of Veiled.

"Deep Web": more than WWW

The Dark Web is also invisible to search engines and their users, but is organized completely differently from anonymous networks. It is formed huge bases data with various information and pages of the regular Internet, for a number of reasons inaccessible to popular search engines. Users can access them only if they send a special request to the database or go to pages whose addresses are known to them in advance.

Now the owner of each website can determine for himself what part of his content should be included in the index of Google and other search engines, and whether it should be there at all. If the owner closes access to his resource to search robots, prohibits unregistered users from viewing pages, or does not bother to properly optimize his service, then his information will not appear in the lists of search results, even if there are links to it from tens of thousands of sites, indexed by search engines. Under normal circumstances, this would guarantee a top ranking in the SERPs. Search engines are, as it were, blind in one eye - and show their users only part of what is on the Internet.

A good example of the deep web is library directories. Although these lists of books and magazines are stored primarily on traditional web servers, access to them is only permitted after registration, which search engines cannot do. All they can do is, in a way, “look outside at the locked door” and move on. The same applies to databases with information about flights, special medical materials, various production documentation, social networks etc. True, Google, having purchased ITA Software (a division developing software for the transport industry, previously an independent company), solved at least the problem with air travel: American Google users can already enter search queries like “the cheapest flight from New York to Las Vegas” and get the result.

Sometimes owners of resources whose information should not be on the Internet allow technical errors, as a result of which confidential information appears in search results (all this data also refers to the “deep web”). A similar incident occurred on July 18, 2011, when Yandex indexed part of the SMS messages sent from the Megafon website to subscribers of the mobile operator. As Yandex specialists subsequently explained, in the section sending SMS on the Megafon page at the time of indexing by the search engine there was no robots.txt file, which contains commands for the search robot. In particular, it should indicate a ban on indexing confidential sections of the site. Now this information has already been removed from the search results, but attentive users managed to save it and post it on file-sharing networks, where it is available to this day. However, this is not yet a full immersion in the “deep web”.

Stalkers of the Deep Web

Search engines such as CompletePlanet and Scirus promise to open access to the depths of the Internet. They are structured differently than Google and Yandex, and allow you to find information in databases that traditional search engines give in to. For example, CompletePlanet, according to its creators, provides access to approximately 70,000 complexly indexed databases, and Scirus will help you find information in various scientific data archives.

Their work was made possible thanks to advanced search robots (the part of the search engine responsible for collecting information on websites). In particular, they are able to generate quite meaningful queries to databases and fill out forms for the user thanks to the support of specific languages.

Traditional search engines also strive to get to the information that is on the deep Internet, which is not surprising - according to experts, it contains a thousand times more than on the surface. Google Company, for example, has developed a special format for site maps, thanks to which it search robots They even visit pages that have no links from other resources. Of course, the site owner must first create such a map. Gradually, search engines will index more and more information found on the deep web, and the line between the “surface” and “deep web” will blur. But some of it will still remain inaccessible to search - for example, paid content provided only by subscription.

First step into the deep web

You can plunge into the “deep web” even without installing special software - using special portals and search engines.

Project OAIster(oaister.worldcat.org), initiated by the University of Michigan, searches the metadata servers of more than 400 institutions around the world for documents. These are libraries, scientific organizations, journal editorial offices, etc. OAIster is of interest primarily to scientists, because it provides access to approximately 18 million data groups.

CompletePlanet(www.completeplanet.com) looks for information where Google and Yandex are unable to find it. Visitors to this search engine's site have access to more than 70,000 deep web databases and a directory of resources.


Retrofitting the browser

To get into some of the deep web's nooks and crannies, you need to upgrade your browser. To do this, you need to install an add-on - the Tor anonymization service (www.torproject.org), which allows users to remain undetected on the Internet thanks to Onion Routing technology. Data is transmitted to the Internet via a whole series constantly changing proxy servers and are encrypted. Tor can be used to surf the Internet anonymously and work with both applications using TCP protocol, and with internal hidden services, forming the “dark web”. They can only be accessed from Tor networks. The principle may seem simple at first glance, but in reality everything is much more complicated. The dark web does not have URLs in the traditional sense. For example, addresses hidden pages on the Tor network are cryptographic combinations of letters and numbers with domain name".onion". They change often, so you have to look for them again every time.

I came across a very interesting article about the multi-level structure of the “Deep Internet”.

If anyone hasn’t heard what it is, I’ll explain: it’s a network consisting of a huge number of web pages that are not indexed by search engines. Access to these pages is possible only through a chain of encrypted connections, the nodes (entry points) of which are scattered throughout the world. There are web pages that are not linked to other hyperlinks - for example, pages that are dynamically created by database queries. The size of the deep web is unknown and generally difficult to estimate, primarily due to the vagueness of the concept itself.

The World Wide Web is a complex multi-level structure that contains secrets that the average user is not even aware of...

There are groups of passionate professionals who call themselves “Netstalkers.” They explore the Network, looking for hidden corners, classified information and other secrets in it. Netstalkers divide the Network into levels.

Social media
Blogs
News
Porn
Imageboards (for those who don’t know - something like chats/forums, with complete anonymity of participants)
Small boards (almost the same as image boards, but more thematic and with fewer participants)
ARG (Alternate Reality Games)
Closed communities
Hard porn
Collections of strange links

Tor (the same TOR... An anonymous proxy network inside the regular Internet)
Net art
Hacker communities
i2p (Another anonymous proxy network)
Dead forums (forums that have been taken down but are still online)
Freenet (Another anonymous network on the Internet, peer-to-peer)
Memetics Information
Future sites
Two Internet sects
Search results for words from the subconscious
Deep Web (Deep Network, the term originally meant pages that were not indexed by search engines)
The limits of bruteforce netstalking
Dark Internet
Number radio stations
Secret government radio stations

If two upper levels are still quite objective, then the paranormal, supernatural and folklore begin deeper...

The so-called "Pass"
Researcher forums
Blank Pages
Non-existent IPs
Void
Non-existent pages
The way up, back, for the last time
Non-existent protocols
Old browsers needed here
Really dangerous point
You Tube for Level B
Random numbers
Small imageboard
Tons of useless information
Tons of useful information
Valuable phrase
The limit of human capabilities
Level D Control
Holes
Death
Schumann resonance
Dead zone
The terrifying truth about mirrors
Level C management
Quiet house

And at the very depths - Level A
About which it is generally difficult to say anything, just like about the higher planes of human existence.

This diagram clearly shows the levels of which, according to the assumptions of "Netstalkers", the World Wide Web consists

Here's what he said about this topic in his interview: general manager one of the leading companies engaged in computer security in Russia:

The volume of illegal trade on the deep web is difficult to estimate, but some experts believe it could be in the hundreds of billions of dollars a year. You can buy absolutely everything there - from these holders plastic cards to passwords for email addresses, from animal skins listed in the Red Book to pornography. Moreover, the “deep Internet” is used not only by illegal traders and hackers, but also by representatives of large businesses - to transfer confidential information partners, journalists - for communication with “unnamed sources”, diplomats - for closed correspondence. “Hidden networks are used for anonymous, hidden exchange of information, and you can meet a wide variety of people there - from religious fanatics to child pornography dealers. For the most part, of course, hidden networks are criminal in nature, since they are not regulated by any legislation.

Here there is drug trafficking, and the sale of fake ID cards, and trading in access data to financial accounts of users of various banks, and child pornography, and much, much more that simply cannot legally exist on the public Internet." But, in addition to openly criminal sites , there are also those resources whose existence the owners would not like to advertise due to the secrecy of information or the presence in the data trade secret. “Closed bases, academic, government, military sources, closed bases of enterprises and organizations.

This text was created for informational purposes only, does not call for action and does not contain links to any sites. In addition, we remind you that the production, sale and transfer of narcotic and psychotropic substances is a criminal offense in accordance with Art. 228-231 of the Criminal Code of the Russian Federation.

What is the deep internet

The Internet that we use every day is called the “surface web” (from the English “surface web”). You don't need to access it special means- a working connection is enough. All pages of the “surface” Internet can be easily found using any search engine, and user actions on the Internet and data about them are available to Internet providers. Accordingly, they can also be tracked by law enforcement agencies in accordance with a court decision.

In addition to the surface network, there is also the deep Internet (from the English “deep web”). You cannot find pages from the deep web using a regular search engine.- they are not indexed by search engines. Therefore, it is impossible to accurately estimate the size of this segment of the Internet.

Links to pages on the deep web work in a special .onion format, so you can’t open them with a regular browser. To access the deep network, you need special programs that preserve user anonymity and encrypt traffic.

There are still darknet is a closed network within the deep internet. The concepts of “deep web” and “darknet” are often confused, but the darknet has fundamental difference from normal deep web.

Deep Internet - single network, hidden from search engines, and there can be several darknets, and each of them requires special access. So, to get into each of the popular darknets - Freenet, RetroShare or I2P - you need to install separate software.

Why do we need a “hidden” Internet?

There can be many reasons for creating pages on the deep web or one of the darknets. The main advantage of closed networks compared to superficial ones is, of course, anonymity. Therefore, the hidden Internet is often used for illegal activities.

On the darknet trading platforms they sell drugs, weapons, fake documents and even people. If desired, you can also find contacts of a contract killer on the darknet.

In addition, user data often leaks onto the dark Internet - hackers who break into databases periodically leak them into closed networks. The easiest way to pay on local markets is with cryptocurrency - again, due to the fact that it allows you to remain anonymous.

Another option for illegal activities on the darknet is distribution of pirated content. However, this won’t surprise anyone even on the “surface”. And in countries where authorities are actively pursuing piracy, the dark internet comes to the aid of lovers of free content.

The deep web and darknet have gained notoriety due to the fact that they are often used by criminals. Nevertheless, Illegal activity is not the only use of hidden networks.

There, for example, human rights activists and journalists from totalitarian and authoritarian states create their pages. On the darknet, they are not afraid of either censorship or authorities. The deep Internet is an excellent platform for the fight for freedom of speech and it can be used not only for illegal purposes.

What useful things can you find on the deep web?

The deep web isn't just about sites for criminals. We have collected several links that may be useful to ordinary law-abiding citizens.

Libraries After the Russian-language library “Flibust” was blocked on the surface Internet, it moved to the “depths”. There you can find thousands of books in Russian. Flibusta has its own pages on the deep web and the I2P darknet. Other well-known deep web book resources include The Verbal Hero and the Imperial Library of Trantor.
Rospravosudie Database of publicly available court decisions from all over Russia.
Image hosting Anonymous image hosting where you can upload for free jpg files, png or gif size up to 20 megabytes.
Scientific articles A deep “mirror” of the Sci-Hub portal, which allows you to download scientific articles for free.
Anti-censorship community The multilingual community We Fight Censorship publishes materials that, for one reason or another, have been considered prohibited in different countries.
Questions and answers service The English-language Hidden Answers service works on the same principle as Mail.ru Answers. Some users ask questions, while others answer them. The main difference from similar “superficial” platforms is the topic of the questions. They are mainly devoted to cybersecurity and deep web. Although there are also quite ordinary thematic sections, for example, about relationships or food.
Search engine If you want to search for something on the deep web yourself, you can use a system that allows you to search for working sites on the deep web.
Panda Security in Russia and CIS

" " (or " Invisible Internet") is on the rise. People are curious by nature, and therefore more and more Internet users are going to its “dark side”. Everyone knows that the Internet is an endless source of information, and search engines like Google, Yahoo and Bing can quench our thirst for information with just a few keywords, resulting in huge lists of information in seconds. But did you know that most of us only have access to 4% of the World Wide Web?

We know only the tip of the iceberg: the structure of the “dark Internet”
As we said above, to better understand the “dark Internet”, it is necessary to imagine the entire Internet as an iceberg, which is divided into five parts, each of which is more immersed than the previous one.

Level 1. At the tip of the iceberg we will find all the pages that we can access using search engines. This part of the Internet is visible and accessible to “mere mortals”, and the information on it is completely traceable.

Level 2. Just below the surface of the water we will find those pages or sites that are not indexed (in other words, sites that are not visible in search engines) by traditional search engines (like Google or Yahoo). Thus, they are only accessible to those who are “in the know” about these sites.


Level 3
. If we dive even deeper into cold water, the iceberg surrounding us, then we can see information (mostly illegal) that is very difficult to find “openly”.

Level 4. As we get closer to the bottom of the iceberg, we will be able to find any type of illegal site. Most of them are monitored by the US government (eg child pornography websites).

Level 5. After going through the four levels of the “dark Internet”, we can reach the very bottom of our iceberg - the most hidden part of the Internet, known as “The Dark Net”. A haven for hackers, this part of the web is based on a set of private networks that can only be accessed by “trusted” users. This is the darkest side of the Internet: it does not follow standard protocols and it is insecure.

Tor: How to access the "dark Internet"

Each of us can access the "dark" parts of the World Wide Web, but to do this you must use alternative search engines. Tor (The Onion Router) is free program, which was developed at the US Naval Research Laboratory in the mid-90s to protect online communications of US intelligence agencies.

Tor has a multi-layer structure (hence its name) that allows the user to navigate the network from one layer to another, while the user is protected by a encryption that allows him to hide his IP address. One of the main distinctive features The “shadow Internet” is the anonymity of the user.



Is it really possible to surf the web anonymously?

Industry experts say connecting via Tor can be risky. Tor does not allow the user to control the proxy they connect to, which can result in them being exposed to man-in-the-middle attacks and JavaScript infections that violate the user's privacy.

What is the darknet? How to get on the dark web?

    This article is not a call to action. The article is written for informational purposes only. The author and Administration of the site do not bear any responsibility.

    I strongly recommend reading the Tor article and watching Dmitry Bogatov’s video of how it happened that he was arrested.

  1. The Darknet, or more simply put, the dark side of the Internet reality exists. They have their own search engine called TORCH. It looks for sites whose domain ends in onion; these are sites, resources, and the dark side of the Internet. I won’t describe what you can buy there; if you want, you can check it yourself by taking a walk on the darknet.
  2. The concept of Dark Web or Dark Net is a certain part of the hidden Deep Web.

  3. When you hear the term "Deep Web" or " Dark Web", you usually classify them into one, don't you? If yes, then you are wrong. What is the DARK WEB? The Dark Web is where you can surf without being tracked while maintaining overall anonymity. The Dark Web is much smaller than the Deep Web. and consists of all various types sites that sell drugs, weapons and even hire hired killers. This article will be about the Dark net, although there will be references to the Dark Web.
  4. How to get on the darknet?

  5. It is very easy to get into the darknet; you need to download the TOR browser, only from the official website. After downloading TOR, go to the address in the search engine. Search on the darknet works crookedly, but it works. You can find other sites in the directory, like a Wiki page. Actually, the links are clickable and you need to go through the torus to this page and click on the links provided on this page. Otherwise, you can only reinforce your knowledge in this topic, but you will not be able to complete the internship.
  6. If you have no idea what ToR is, in general I would highly recommend reading the article "" This article contains the most important thing to warn you from trouble, so to speak, advice on what you should not do with the Tor browser.
  7. Let's return to this article - the dark side of the Internet: But search engines won't help you much, all the most interesting things are on forums that require registration, and hacker forums require you to pass a test and donate a small part of a bitcoin. Actually, if you want, search and search. Of course, you need to understand that you are in the dark side of the Internet and some data on sites or other data is not transmitted, so the search is curved, but to find what you need, you need to go to the forum and not alone, read, educate yourself and go deeper. In fact, they will help you find what you want.
  8. For reference, a regular darknet forum where they sell everything from shit to diamonds.
  9. There may be blocking and unavailability of darknet resources due to the new law. Dark side internet addresses always end in onion, remember this as there are many fake sites posted on simple internet with the names of darknet address resources, but the latest domain designations are different and may be net, biz, these are phishing sites. All transactions and payments are made exclusively in Bitcoin in order to hide the data of the seller and buyer. Just like Tor hides your browsing data on the dark side of the Internet.
  10. Links on the dark web

    Darknet search engines, link directories:

  11. Tor Search Engine
  12. 650+ working 05.2017 deep web links
  13. Tor Project
  14. .Onion Urls
  15. Tor Wiki
  16. clone of the clean
  17. - search engine note Dark Web
  18. - links to Russian-language resources in DARK NET
  19. The Hidden Wiki - Large WiKi warehouse, DARK NET resources.
  20. - DARK NET search engine
  21. - DARK NET link directory
  22. - DARK NET search engine
  23. - DARK NET search engine
  24. - DARK NET search engine
  25. - DARK NET search engine
  26. Hidden WIKI:

  27. One of the oldest link lists on Tor
  28. Questions and answers services, anonymous:

  29. - service anonymous questions and answers
  30. Bitcoin, PayPal and others:

  31. - Bitcoin Laundry
  32. - Bitcoin Wallet with free Bitcoin Mixer
  33. - Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR,
  34. - bitcoin mixer
  35. - Blockchain mirror. info
  36. - bitcoinfog mirror. com
  37. - Bitcoin Forum mirror thebitcointalk. org
  38. – Anonymous Bitcoin Wallet and Bitcoin Laundry
  39. Union Exploit
  40. – High Quality Euro Replicas
  41. Forums and trackers:

  42. - book library
  43. - Mirror
  44. - Mirror
  45. - Mirror
  46. Hacking & cracking forum
  47. Blogs:

  48. – Exploring Virginia Tech's Steam Tunnels and Beyond
  49. – Blog about the onionland

    Software:

  50. Messaging program. But its essence is that all messages are encrypted, the exchange occurs only between network participants, and each participant can only open the message sent to him. I wrote an article about another similar program. RetroShare will help you get to know each other better.
  51. - messaging program. Which I mentioned a little higher and an article about it on my website.
  52. Commerce:

  53. – Anonymous Marketplace Forums
  54. – Legit hitman service
  55. Trade securities anonymously with bitcoin, currently supports
  56. - anonymous question and answer service
  57. - (I think it’s clear).
  58. Temporary mail:

  59. New Onionforum for general talk, now with marketplace
  60. One of the oldest chances on Tor
  61. I think many people know Reddit, so this resource will also be useful for searching on the darknet or deep web. Try searching in the topics /r/deepweb, /r/onions, /r/Tor and you will find a lot of information. Reddit, located at reddit.com, is an absolutely fantastic source of useless, but extremely fascinating things about everything in the world, and also quite sane comments from professionals on literally all issues of interest. It’s really funny to write like that but it’s true, it’s a pity of course most in English, but today it’s not scary.
  62. By following these links you will find what you came for or just out of interest there will be enough information. The most important thing is not to forget about safety.
  63. Safety rules on the darknet:

  64. Of course, you need to hide your real IP and access to the darknet network from simple browser not safe. Use TOR exclusively and only downloaded from the official website. Remember that you are on an illegal network and every student on it will want to deceive you. Of course, there are also moderately honest sellers, it depends on what you pay attention to. For the product they are selling or the transaction itself with you. Before you do anything, always think carefully about how you can check your or your friend’s actions to see how truthful they are. And even better, if you are not confident in your abilities and knowledge, do not visit such places, they are not for you! Read as much as you can about the darknet so that you are at least a few percent prepared for the unexpected things that may come your way. If you want to perform the action you need, find out what is allowed in your country, what happens. Evaluate your actions, because the seller may not be a seller at all, but a policeman, for example. This is something like fishing with live bait, it’s called a test purchase. You may not be identified online, but when you receive the goods you purchased, you may be asked to go with them, with these people who are taking you to for a long time a person from a life familiar to him. The situation is also the same with the publication of prohibited information on the Internet, calls for all kinds of disorder, and so on. Again, they may not find you right away, but after some time you will forget about what you did. So it doesn’t matter if someone asks you something or mentions it in a conversation on the forum, the slightest clue and you will be reminded at the meeting about what you did earlier. Many will say that this is all nonsense and no one needs to keep track of someone and so on, as an example here