DEEP WEB FAIR WARNING, AZCOM NETWORK INTELLIGENCE
A Dark Web, Silk Road FAIR WARNING!
AZCOM NETWORK INTELLIGENCE
Network Security
Network Security
“THIS IS THE ART OF APPLIED LOGIC”
BY: Mark F Porporino (Electric Angel US)
RE: What is the Deep/Dark Web and what was the Internet “Silk Road”?
RE: How is it accessed?
RE: Is it safe to use?
Introduction
The Dark Web, or Deep Web, and Silk Road (as it’s sometimes mistakenly referred to as) is an area of the Internet that is used for many things. It was originally designed to give a voice to the oppressed in third-world countries by concealing network & user identities, thus providing ‘connection-protection’ (ie., anonymity). Like everything else it evolves, and while doing that, it has become a hotbed for criminal traffic. If I were to write a book on Dark Web exploits and design or construction it would be lengthy, and so the books that already exist are lengthy too. There is information that’s easy to find through Google, but you would be wise to take almost everything that’s available (esp. software) “with a grain of salt”. If you are curious all you have to do is “Google: what is the Tor Dark Web network”.. Here’s are some definitions, for your information:
As always & for this - just the basic facts...
What was the Internet Silk Road?
“Silk Road was an online black market and the first modern darknet market, best known as a platform for selling illegal drugs. As part of the dark web, it was operated as a Tor hidden service, such that online users were able to browse it anonymously and securely without potential traffic monitoring. “
What is the “DarkNet” and “Dark Web”?
“Definition: Darknet websites are accessible only through networks such as Tor ("The Onion Routing" project) and I2P ("Invisible Internet Project"). Tor browser and Tor-accessible sites are widely used among the darknet users and can be identified by the domain ".onion".”
-Google
Is there a difference between Darknet and Darkweb? Yes. But, not for this paper. Here’s the difference though:
“The term 'darknet' has been mistakenly conflated [combined] with the dark web which is an overlay network that can be accessed only with specific software, configurations, or authorization, often using non-standard communication protocols and ports. Dark webs are friend-to-friend networks (usually used for file sharing with a peer-to-peer connection) and privacy networks such as Tor.[2][3]“
-Wikipedia
What is Onion Routing?
“Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes.[1] There are methods to break the anonymity of this technique, e.g. timing analysis.[2] “
-Wikipedia
What does the Tor network do?
“Tor network protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. “
-TorProject.org
What is a Tor browser/app?
“Tor browser is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. “
-TorProject.org
For simplicity, I am using words “darknet” and “darkweb” interchangeably.
My motivation for writing this came from meeting many people curious about the Dark Web; re what it is, what it means, why it is, and how it’s used. I will never explain how to exploit darkweb for profit because that’s just too irresponsible. I considered including a little inside information on how-to manipulate BitCoin just to show that there’s plenty of organized offensive software available to manipulate the dark area of the Internet - that'd be irresponsible of me - just know it exists. There is plenty of stuff out there about how to exploit darkweb but it’s all ridiculously bad advice – JUST CONSIDER THE SOURCE! So, this is just a casual overview of Dark Web implications regarding digital personal security; however, you can take everything I say here to the bank – this is the REALITY of the “Silk Road”, or whatever some idiot wants to refer to it as. Again, consider the source. A “hacker” today might mean any fool with a smartphone that has installed a few apps and learned how to use them, and that’s just stupid. Beware of social media hacker groups for this reason. Most (NOT ALL) of the people on them have no idea what they’re talking about (too much “The Matrix”, maybe).
The following does not detail DNS (Domain Name System) and definitely doesn’t explain internet design. This is just a simple way to look at Internet domains:
Where is the Dark Web? Answer: Part of it may be on the psychopath’s computer right next door. [See Wikipedia info above]
The Internet is divided into logical fields according to “top-level domains” which are akin to subnet categories and detailing this is beyond the scope of this document. The most common top-level domains in the United States are .COM, .NET, .EDU, .ORG .GOV, .MIL and so on. If you were to look at these domains from a global perspective, country codes are added. For example: .uk (United Kingdom), .jp (Japan), .ru (Russia) and, so on. These top-level country codes loosely indicate which country is responsible for the management and security of them. When you see “*.onion” it refers to domain traffic on the darkweb and almost all of the traffic content there is illegal in most countries. Onion domains can be anywhere on the planet, they are not encapsulated inside any country.
You DO NOT! – REPEAT! – DO NOT want any of the traffic produced by your laptop or smartphone routed through -- or inside of -- ANY packets routed through dot onion domains & IP service ports, so DO NOT use a Tor browser (unless you are very skilled). There are legitimate uses for darknet & Tor involving anonymity protection, so I am not talking about that traffic here.
Remember: even moral traffic content is analyzed. Do you know what “web analytics” refers to? If you don’t, maybe you should look into it. ‘Analytics’ means many things depending on from where it’s referenced. So too, just as the Internet is divided in categories & domains, so is darkweb - according to subject relevance, and the content is analytically INDEXED (as you and I are). If you are thinking about using Tor – again - this is FAIR WARNING. [READ ON…]…
The software used to access darkweb is called The Tor (“The Onion Router”) browser (& others). The concept here is that all of your traffic is encrypted ~ X 3 ~ through this network of systems & servers, so it’s possible to communicate anonymously through it (WARNING! See “timing analysis” below). This idea is true and false at the same time. There are also publicly accessible network proxy servers (VPNs) that communicate on behalf of others and claim to keep no traffic logs. This [ostensibly] adds yet another level of encryption/defense to suspicious traffic. THIS IS BULLSHIT BECAUSE THE TRAFFIC IS CONSTANTLY ANALYZED. To expand further: NCIC (National Crime Information Computer), and friends, has information regarding “known associates” of people in its network of databases; therefore, if you route your traffic through a proxy that is "in-process" of being analyzed, it is likely you will be added to a "known associates" watch-list database somewhere – this is simple…just think about it for a minute: Big brother really is watching you. That is absolutely true. You are not just paranoid.
What is “timing analysis”?
This is another paper in itself (coming soon), but here is Google search output regarding this – the encryption can be broken, so there is no privacy via Dark Web:
“Nov 19, 2014 - How the NSA (Or Anyone Else) Can Crack Tor's Anonymity ... of people using the service with a honeypot scheme and some statistical analysis. ... With recent deep web raids from the FBI and Europol, the dark net appears to ... allowed him to identify Tor users 100 percent of the time in a lab experiment, ... “
This is related to “honeypot” techniques, as mentioned, and my expansion on this would be lengthy, so once again, here’s just the basic facts… By the way, if you want to explore this further, you may want to understand “What is a DNS sinkhole?” too. Sinkholes are sometimes BI-DIRECTIONAL. What I mean is: intelligence can be recorded from the front and from the back, simultaneously. These things might better be described as 'intelligence security BLACKHOLES'...
The "honeypot":
“A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems. “
-Google
I cannot share what I know, or what I do not know about this. I promise you, however, that these things are designed well.
I do not know much about the complexity of the intelligence authorities, like The NSA or Interpol/Europol (for example), but I do have some understanding of how they probably work in a digital- networking sort of way. Remember: Tor was created by the US Department of Naval Intelligence (I-N-T-E-L-L-I-G-E-N-C-E). I mean, really… I do not mean to be flippant here, but if you use an onion browser, what do you think the NSA will be doing? The NSA is involved in global security and it will do all it can to ensure our globe is protected, every second of the day & packet-by-packet (“chatter”) too if necessary. The problem these intelligence agencies face is that there is too much illegal activity and some illegal activity must be allowed in order to "police" relevant signals/chatter - AND - sort them! It is better that ten guilty persons escape than that one innocent suffer.[1]
What is “Chatter”? This is just a basic definition:
“Chatter is a signals intelligence term, referring to the volume (quantity) of intercepted communications. ... They [“I” too] refer to the electronic communication as "chatter".
-Google
We may really have the right to be silent most of the time, but do we really have the right to
absolute privacy if it means ultimately risking our freedom, through war or internal conflict? If we do have that right, do we really want it, all things considered? These questions are philosophical, but VERY worthy of debate. I trust those involved in this are adept enough to handle the power associated with it. This makes me sleep better at night.
I am an American digital-Patriot and proud of it.
As you now plainly see, there is more to all of this than meets the eye. All I tried to do is make you think about what you may or may not be considering doing on the deep web. If you think you want to use the Dark Web, I REALLY think you should THINK AGAIN! If you still think you want to involve yourself in any of this, then think a little more and educate yourself (knowledge is power). Ultimately, if you proceed with any Dark Web plan, do so at your own peril. Now, you can never say you were not warned.
One more relevant thing worthy of mention...
Long ago, when the net was a little like the old west in the US, I saw a lot of information on a network that preceded the Internet. It was called 'X.25'. These global networks had many names, such as Tymnet, SprintNet, and RediAccess - simtel20.army.mil was part of this at one time. You could say these were the "original" deep webs: like, "Lutsifer" in Germany and "QSD" in France. This was when hackers were divided into 2 main groups: The Masters of Deception, US, and The Legion of Doom, Europe. 'Hackers' are like "spies in the wire" and 'they' are always around... And, persistent to the extreme.
If you are so smart you do not need Tor, and if you are wise, you will stay away from it altogether. That is, of course, if you need it because your life may depend on it.
This began as just my opinion & my advice to anyone exploring the Dark Web. Exploring the Dark Web is stupid. It evolved into more. At the very least, I hope I made you think. I seek to help people understand and show truth where there is none.
If you are experienced & persistent with Dark Web already: Good luck with that.
Peace, Love, and Little Donuts,
Azeroth (Undernet),
“Electric Angel US”.
A proud member of the American 99%. THERE IS STRENGTH IN NUMBERS!
Who is….
(C) 2018, 2019 Mark F Porporino, Azcom Network Intelligence (c) 2019
Is there a difference between Darknet and Darkweb? Yes. But, not for this paper. Here’s the difference though:
“The term 'darknet' has been mistakenly conflated [combined] with the dark web which is an overlay network that can be accessed only with specific software, configurations, or authorization, often using non-standard communication protocols and ports. Dark webs are friend-to-friend networks (usually used for file sharing with a peer-to-peer connection) and privacy networks such as Tor.[2][3]“
-Wikipedia
What is Onion Routing?
“Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes.[1] There are methods to break the anonymity of this technique, e.g. timing analysis.[2] “
-Wikipedia
What does the Tor network do?
“Tor network protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. “
-TorProject.org
What is a Tor browser/app?
“Tor browser is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. “
-TorProject.org
For simplicity, I am using words “darknet” and “darkweb” interchangeably.
My motivation for writing this came from meeting many people curious about the Dark Web; re what it is, what it means, why it is, and how it’s used. I will never explain how to exploit darkweb for profit because that’s just too irresponsible. I considered including a little inside information on how-to manipulate BitCoin just to show that there’s plenty of organized offensive software available to manipulate the dark area of the Internet - that'd be irresponsible of me - just know it exists. There is plenty of stuff out there about how to exploit darkweb but it’s all ridiculously bad advice – JUST CONSIDER THE SOURCE! So, this is just a casual overview of Dark Web implications regarding digital personal security; however, you can take everything I say here to the bank – this is the REALITY of the “Silk Road”, or whatever some idiot wants to refer to it as. Again, consider the source. A “hacker” today might mean any fool with a smartphone that has installed a few apps and learned how to use them, and that’s just stupid. Beware of social media hacker groups for this reason. Most (NOT ALL) of the people on them have no idea what they’re talking about (too much “The Matrix”, maybe).
The following does not detail DNS (Domain Name System) and definitely doesn’t explain internet design. This is just a simple way to look at Internet domains:
Where is the Dark Web? Answer: Part of it may be on the psychopath’s computer right next door. [See Wikipedia info above]
The Internet is divided into logical fields according to “top-level domains” which are akin to subnet categories and detailing this is beyond the scope of this document. The most common top-level domains in the United States are .COM, .NET, .EDU, .ORG .GOV, .MIL and so on. If you were to look at these domains from a global perspective, country codes are added. For example: .uk (United Kingdom), .jp (Japan), .ru (Russia) and, so on. These top-level country codes loosely indicate which country is responsible for the management and security of them. When you see “*.onion” it refers to domain traffic on the darkweb and almost all of the traffic content there is illegal in most countries. Onion domains can be anywhere on the planet, they are not encapsulated inside any country.
You DO NOT! – REPEAT! – DO NOT want any of the traffic produced by your laptop or smartphone routed through -- or inside of -- ANY packets routed through dot onion domains & IP service ports, so DO NOT use a Tor browser (unless you are very skilled). There are legitimate uses for darknet & Tor involving anonymity protection, so I am not talking about that traffic here.
Remember: even moral traffic content is analyzed. Do you know what “web analytics” refers to? If you don’t, maybe you should look into it. ‘Analytics’ means many things depending on from where it’s referenced. So too, just as the Internet is divided in categories & domains, so is darkweb - according to subject relevance, and the content is analytically INDEXED (as you and I are). If you are thinking about using Tor – again - this is FAIR WARNING. [READ ON…]…
The software used to access darkweb is called The Tor (“The Onion Router”) browser (& others). The concept here is that all of your traffic is encrypted ~ X 3 ~ through this network of systems & servers, so it’s possible to communicate anonymously through it (WARNING! See “timing analysis” below). This idea is true and false at the same time. There are also publicly accessible network proxy servers (VPNs) that communicate on behalf of others and claim to keep no traffic logs. This [ostensibly] adds yet another level of encryption/defense to suspicious traffic. THIS IS BULLSHIT BECAUSE THE TRAFFIC IS CONSTANTLY ANALYZED. To expand further: NCIC (National Crime Information Computer), and friends, has information regarding “known associates” of people in its network of databases; therefore, if you route your traffic through a proxy that is "in-process" of being analyzed, it is likely you will be added to a "known associates" watch-list database somewhere – this is simple…just think about it for a minute: Big brother really is watching you. That is absolutely true. You are not just paranoid.
What is “timing analysis”?
This is another paper in itself (coming soon), but here is Google search output regarding this – the encryption can be broken, so there is no privacy via Dark Web:
“Nov 19, 2014 - How the NSA (Or Anyone Else) Can Crack Tor's Anonymity ... of people using the service with a honeypot scheme and some statistical analysis. ... With recent deep web raids from the FBI and Europol, the dark net appears to ... allowed him to identify Tor users 100 percent of the time in a lab experiment, ... “
This is related to “honeypot” techniques, as mentioned, and my expansion on this would be lengthy, so once again, here’s just the basic facts… By the way, if you want to explore this further, you may want to understand “What is a DNS sinkhole?” too. Sinkholes are sometimes BI-DIRECTIONAL. What I mean is: intelligence can be recorded from the front and from the back, simultaneously. These things might better be described as 'intelligence security BLACKHOLES'...
The "honeypot":
“A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems. “
I cannot share what I know, or what I do not know about this. I promise you, however, that these things are designed well.
I do not know much about the complexity of the intelligence authorities, like The NSA or Interpol/Europol (for example), but I do have some understanding of how they probably work in a digital- networking sort of way. Remember: Tor was created by the US Department of Naval Intelligence (I-N-T-E-L-L-I-G-E-N-C-E). I mean, really… I do not mean to be flippant here, but if you use an onion browser, what do you think the NSA will be doing? The NSA is involved in global security and it will do all it can to ensure our globe is protected, every second of the day & packet-by-packet (“chatter”) too if necessary. The problem these intelligence agencies face is that there is too much illegal activity and some illegal activity must be allowed in order to "police" relevant signals/chatter - AND - sort them! It is better that ten guilty persons escape than that one innocent suffer.[1]
What is “Chatter”? This is just a basic definition:
“Chatter is a signals intelligence term, referring to the volume (quantity) of intercepted communications. ... They [“I” too] refer to the electronic communication as "chatter".
We may really have the right to be silent most of the time, but do we really have the right to
absolute privacy if it means ultimately risking our freedom, through war or internal conflict? If we do have that right, do we really want it, all things considered? These questions are philosophical, but VERY worthy of debate. I trust those involved in this are adept enough to handle the power associated with it. This makes me sleep better at night.
CONCLUSION
I am an American digital-Patriot and proud of it.
As you now plainly see, there is more to all of this than meets the eye. All I tried to do is make you think about what you may or may not be considering doing on the deep web. If you think you want to use the Dark Web, I REALLY think you should THINK AGAIN! If you still think you want to involve yourself in any of this, then think a little more and educate yourself (knowledge is power). Ultimately, if you proceed with any Dark Web plan, do so at your own peril. Now, you can never say you were not warned.
One more relevant thing worthy of mention...
Long ago, when the net was a little like the old west in the US, I saw a lot of information on a network that preceded the Internet. It was called 'X.25'. These global networks had many names, such as Tymnet, SprintNet, and RediAccess - simtel20.army.mil was part of this at one time. You could say these were the "original" deep webs: like, "Lutsifer" in Germany and "QSD" in France. This was when hackers were divided into 2 main groups: The Masters of Deception, US, and The Legion of Doom, Europe. 'Hackers' are like "spies in the wire" and 'they' are always around... And, persistent to the extreme.
If you are so smart you do not need Tor, and if you are wise, you will stay away from it altogether. That is, of course, if you need it because your life may depend on it.
This began as just my opinion & my advice to anyone exploring the Dark Web. Exploring the Dark Web is stupid. It evolved into more. At the very least, I hope I made you think. I seek to help people understand and show truth where there is none.
If you are experienced & persistent with Dark Web already: Good luck with that.
Peace, Love, and Little Donuts,
Azeroth (Undernet),
“Electric Angel US”.
A proud member of the American 99%. THERE IS STRENGTH IN NUMBERS!
Who is….
(C) 2018, 2019 Mark F Porporino, Azcom Network Intelligence (c) 2019
Recording success in Cryptocurrency, Bitcoin is not just buying and holding till when bitcoin sky-rocks, this has been longed abolished by intelligent traders ,mostly now that bitcoin bull is still controlling the market after successfully defended the $40,000 support level once again ad this is likely to trigger a possible move towards $50,000 resistance area However , it's is best advice you find a working strategy by hub/daily signals that works well in other to accumulate and grow a very strong portfolio ahead. I have been trading with Mr Carlos daily signals and strategy, on his platform, and his guidance makes trading less stressful and more profit despite the recent fluctuations. I was able to easily increase my portfolio in just 3weeks of trading with his daily signals, growing my 0.9 BTC to 2.9BTC. Mr Carlos daily signals are very accurate and yields a great positive return on investment. I really enjoy trading with him and I'm still trading with him, He is available to give assistance to anyone who love crypto trading and beginners in bitcoin investment , I would suggest you contact him on WhatsApp: +1(424)285-0682 and telegram : @IEBINARYFX for inquires and profitable trading platform systems. Bitcoin is taking over the world.
ReplyDelete