AlphaBay Market Tutorial
Get an AlphaBay Market URL link and learn how to register and browse one of the largest Darknet Marketplaces, The AlphaBay Market. This guide will show you step by step how to register for an account on the famous AlphaBay Market. Since Agora Marketplace recently went offline to relocate and upgrade the security of their servers, AlphaBay Market is now currently one of the largest darknet marketplaces in the Darknet.
http://www.AlphaBayMarket.net
™
Google Voice Finally Gets an Update - App Review
It's been a LONG time coming, but Google Voice users can finally breathe a sigh of relief. Not only is Voice not getting scrapped, but it's getting a major redesign with some long awaited new features. Here's a quick tour through the app which supports the only phone number you'll ever need!
Download the Tor Browser
https://www.torproject.org/projects/t...
Tutorial on Installing the Tor Browser by Mr. Squirrel
https://www.youtube.com/watch?v=V_mfm...
DARKNET MARKET REGISTRATION LINKS
---------------------------------------------------------------------
Direct Registration | AlphaBay Market URL
http://pwoah7foa6au2pul.onion/affilia...
Direct Registration | Abraxas Market URL, Another Great Marketplace!
http://abraxasdegupusel.onion/registe...
SpoofCard - Who's fooling your caller ID?
bitphone
PAYPAL TO BITCOINS
How Do I Tails?: A Beginner's Guide to Anonymous Computing
This talk serves as an introduction to The Amnesic Incognito Live System and anonymous computing. It covers why privacy is important, the various features of the operating system, and also touches on some basics of threat modeling and operational security. This talk was given at DEF CON 23 in the EFF's Crypto & Privacy Village.
Due to limited village space, there were actually two presentations operating at the same time, hence the background noise. The microphone that I was using was pretty poor quality, and as such the audio isn't the best. I have taken the time to transcribe the audio to try and compensate for these problems, so try giving the captions a run. When the audio cuts out, it is due to someone speaking off screen and I removed the audio to protect their privacy.
Since this presentation was given in August of 2015, there are portions that are now out of date or irrelevant. I will attempt to provide corrections and updates either in the description or annotations on the video itself. If you notice something that needs correction, send me a message and I'd be happy to tweak it.
Big thanks to my buddy Kyle Hinckley, a.k.a. The Weirdist for his help in getting this project edited and rendered. He runs a channel showcasing strange builds in Bethesda games, so if that's your kind of thing check out his channel here: https://www.youtube.com/user/Weirdist...
Relevant links:
Talk transcript: http://pastebin.com/4ZQXR7Vv
Current Tails Installation Instructions: https://tails.boum.org/install/index....
Crypto Village site for handouts - https://cryptovillage.org/archives/dc23/
Tails - https://tails.boum.org/
Whonix - https://www.whonix.org/
Qubes OS - https://www.qubes-os.org/
Tor Project - https://www.torproject.org/
Electronic Frontier Foundation - https://www.eff.org/
Freedom of the Press Foundation - https://freedom.press/
Errata:
2016/01/13 - I was mistaken about the method that Tails uses for time synchronization. See more information here: https://tails.boum.org/contribute/des...
2016/01/15 - Added annotation for the Whonix page regarding Tor/VPN combinations:https://www.whonix.org/wiki/Tunnels/I...
2016/07/07 - Since I've been getting a lot of spam comments on here about VPNs, here's a brief snippet about them from the Whonix Wiki: "Improper combination of Tor and another service may decrease your security and anonymity.... almost all users of Whonix, using Tor alone – without a VPN or proxy – is the right choice."
How to install TAILS and access The Hidden Wiki
How Tor Users Got Caught - Defcon 22
4 examples of people who have used Tor for illegal activities and how they were caught. Multiple de-anonymization attacks are shown at the end of the video. Part 2 can be found herehttps://www.youtube.com/watch?v=TQ2bk...
You can read more about the cases here: http://se.azinstall.net/2015/11/how-t...
Case 0: Harvard bomb threat Eldo Kim getting busted by being one of the only users at Harvard on the tor network, and admitting he emailed the bomb threat.
Case 1: Hector Xavier Monsegur (Sabu) and Jeremy Hammond LulzSec getting caught for logging on to IRC one time without tor and FBI using correlation.
Case 2: Freedom Hosting admin under attack from Anonymous group previously fighting CP might have helped the FBI, later they skip to when a box was compromised and made it host a javascript exploit. Nothing mentioned what happened between the Anonymous attacks and when the FBI smashed in his door.
Case 3: Silk Road creator Ross Ulbricht (Dread Pirate Roberts) making too many mistakes including using his own real name then changing it later to a username.
Avoid Getting Identified Online - How to Use Tor
Browser Anonymously
or is an online platform that is revolutionizing everything from the war on drugs to internet privacy. Now, people use tor to try and stay anonymous online – but people also make a lot of stupid mistakes, that even with TOR, they’re not going to be anonymous.
So today I’m going to share the top four ways to AVOID compromising your private information on Tor.
What is Tor?
Why would you want to browse the web anonymously?
Some people use it because they simply don’t want their personal information shared with companies, marketers and the government. Anonymous bloggers and citizen journalists in a dictatorships use it, and Journalists Without Borders recommend it. It’s also handy if you’re whistleblowing government corruption, which is why Amnesty International also recommends it.
Tor is also called The Onion Router, and sometimes THE DARK WEB - the Tor browser.
How does Tor work?
Tor routes your internet traffic through a network of randomly selected points that are scattered all over the world. So your information doesn’t go directly from you to the website you’re looking at. It first bounces around these points, which makes it difficult for people to follow you. They can’t see where you’re going, other than that you went into the tor network. It’s the same way you might turn corners at random or duck into stores if you thought someone was following you home.
All the traffic that passes through relays within Tor gets encrypted and re-encrypted multiple times until it reaches the last computer in the Tor network. This encryption is like erasing your footprints.
You can’t just access the tor network from anywhere - you need to download the Tor browser in order to access the network, which you can do at torproject.org
How is TOR different from a VPN (or a Virtual Private Network)
Tor has similarities and differences to a VPN. A VPN works like a middle man, similar to Tor - it sends encrypted data to a VPN server, which then connects to the website you’re looking for.
That website is only able to see the IP address of the VPN server, not your personal IP address, so if I’m in Australia and I want to watch American content that is normally blocked, I can use a US-based VPN to trick... CNN or whomever… into thinking I’m in the US. Even better, all your internet traffic is encrypted - so a VPN is perfect for when you’re using wifi hotspots and other public internet locations (so other people at Starbucks don’t see your Bank Of America account along with you).
They’re similar in that Tor and a VPN allow you to hide your original IP address and location so that no one can track your activities online, and Both services let you to bypass geo-restricted sites and access geo-blocked content.
But whilst Tor is free, a VPN generally costs money, and whilst outside observers can’t watch your internet traffic, the VPN holder can, which means it’s not a completely fool proof method of staying anonymous online.
A VPN won’t get you into the Tor world, so if you’re looking for the magical door to the deep web, you’ll still need Tor.
Tor isn’t perfect - the police still routinely bust child porn rings and drug marketplaces like The Silk Road.
Here it comes - the four easiest ways to reveal your identity while still using Tor.
Using the same User ID and/or password as you do on public sites. PICK SOMETHING TOTALLY RANDOM and for added deniability, never keep a copy of that information on your computer, on yourself, or on your property. Use your memory people!
Keeping digital evidence, like metadata in your photos. Don’t post unnecessary stuff on the dark web, and if you do post stuff, keep it to a minimum. Remove metadata from photos!