It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

The Secret Internet Uncovered

page: 3
171
<< 1  2    4  5  6 >>

log in

join
share:

posted on Feb, 19 2011 @ 08:31 AM
link   
Search the deep web:

www.deepwebtech.com...



posted on Feb, 19 2011 @ 08:38 AM
link   
searching for 9/11 in above link gave many interesting hits.
For example
www.archives.gov...

many memorandums from the 9/11 comission are made public, but most are still secret
www.archives.gov...

here is Norman Minetta's memorandum
media.nara.gov...
Wow, not one word from Minetta's testimony about Dick Cheney's stand down order.


The testimony is at the end of this clip, where WAC confronts Dick Cheney about the stand down order


edit on 19-2-2011 by conar because: (no reason given)



posted on Feb, 19 2011 @ 08:49 AM
link   

Originally posted by devildogUSMC
Is RATS a part of that? It doesn't come up in searches.


Nah that's probably just a simple case of preventing the Google crawlers to crawl that section of the site, no big deal.



posted on Feb, 19 2011 @ 08:57 AM
link   

Originally posted by reassor
by using networks like TOR your computer becomes one of the "bouncers" so if a child porn is on the reciving end of some perb who was actualy conected thru your machine it puts suspicion on YOU.

Other dangers are - sensitive information like bank logins and stuff since all your data is bouncing from machine to machine it can be intercepted - so never login to what you wana keep safe.


+1 TO this. However you have to turn your TOR client into a endpoint by selecting the option. They don't auto-magically turn you into a endpoint.

While TOR is fun for spoofing and flaming, it's still very insecure. Anyone on the TOR network can capture and view information going across their network. What does that mean? Any passwords or information passed in clear text (aka NON-SSL) can be captured. Your ATS login is non-ssl for example. Any IM conversations routed through the TOR network can be captured and viewed. If you use a VoIP soft phone on your computer (Not to be confused with Skype), your voice conversations can be captured and listened to.

People feel TOR is the Holy Grail of privacy.. However think twice before you use it. It may not be as private as you think.



posted on Feb, 19 2011 @ 09:30 AM
link   
Basically, don't do anything on the net you don't want to be responsible for.

You can be traced - doesn't matter if your behind 7 proxies....and yes, the deepweb has a lot of disgusting material, so be forewarned.



posted on Feb, 19 2011 @ 09:56 AM
link   

Originally posted by tigpoppa
DO NOT GO TO THE DEEP WEB!

DO NOT GO TO THE DEEP WEB!

the deep web is FILLED with child pornography!
if you so much as read one thing or open one page even by accident youre IP is logged and you face arrest and federal imprisonment.

In fact it would seem that 99% of the deep web is Child pornography.
The only reason they made the DEEP WEB was to have a place to post child pornography.



These are my thoughts exactly.
When I first learned about this stuff I looked into it out of curiosity and realized the majority of what's there is horrible child pornography. I don't think there's much on there that you can't find on the "normal" internet, and in my opinion, it's not worth the risk of coming across something highly illegal that you don't want to see.
So unless you have an interest in how the internet works or you're interested in very sick things that can get you arrested, I'd recommend staying away from that.



posted on Feb, 19 2011 @ 10:07 AM
link   
reply to post by carlitomoore
 


Encrypted VPN's, TOR, nnion routing, remailing servers, one use email addresses, computers unlisted in search engines, i'm pretty sure i've mentioned all of that on ATS before, as have others. It's good you are bringing it up but it's not news to anyone who knows about computers or has been interested in privacy online for a while.



posted on Feb, 19 2011 @ 10:10 AM
link   

Originally posted by trollz

Originally posted by tigpoppa
DO NOT GO TO THE DEEP WEB!

DO NOT GO TO THE DEEP WEB!

the deep web is FILLED with child pornography!
if you so much as read one thing or open one page even by accident youre IP is logged and you face arrest and federal imprisonment.

In fact it would seem that 99% of the deep web is Child pornography.
The only reason they made the DEEP WEB was to have a place to post child pornography.



These are my thoughts exactly.
When I first learned about this stuff I looked into it out of curiosity and realized the majority of what's there is horrible child pornography. I don't think there's much on there that you can't find on the "normal" internet, and in my opinion, it's not worth the risk of coming across something highly illegal that you don't want to see.
So unless you have an interest in how the internet works or you're interested in very sick things that can get you arrested, I'd recommend staying away from that.


I can't understand your logic here.

Firstly if you come across something illegal, no-one is going to kick your door know and lock you away. That is like saying if you witness a murder in the street than you are an accomplice to the crime, or same applies to the surface web.

I wouldn't be searching for child pornography, I would be searching for topics that are discussed here on ATS. If I happened to come across anything such as that you mentioned, I would immedetely back out of it and report it if that was possible.

When have you ever inadvertantly come across material you don't want to see on the internet?

The point I am trying to get to is please don't overload this thread with such statements like that. It is like telling people not to use the internet becasue someone might send them a link to a video clip of two girls one cup. Ridiculous, and irrespnsible.



posted on Feb, 19 2011 @ 10:14 AM
link   

Originally posted by ImaginaryReality1984
reply to post by carlitomoore
 


Encrypted VPN's, TOR, nnion routing, remailing servers, one use email addresses, computers unlisted in search engines, i'm pretty sure i've mentioned all of that on ATS before, as have others. It's good you are bringing it up but it's not news to anyone who knows about computers or has been interested in privacy online for a while.


I ran searches for 'Deep Web', 'Hidden Wiki', 'Tor' & 'Onion' and the only thread I found was Skyflaotings, and I have never come across any of these topics whilst I have been a member here.

Why are people getting hung up on this? I'm not claiming to have discovered an unchartered area of the internet that no-one in the world has ever heard about.

The idea is to share resources and bounce ideas around ane explore, not a contest of who knows what.



posted on Feb, 19 2011 @ 10:15 AM
link   

Originally posted by tigpoppa
DO NOT GO TO THE DEEP WEB!

DO NOT GO TO THE DEEP WEB!

the deep web is FILLED with child pornography!
if you so much as read one thing or open one page even by accident youre IP is logged and you face arrest and federal imprisonment.

In fact it would seem that 99% of the deep web is Child pornography.
The only reason they made the DEEP WEB was to have a place to post child pornography.




This is nonsense, the deep web has many purposes and it's not 99% child porn or even close to that, i would love to know where you got that statistic. For example the TOR project is used by journalists or peopel in china sitting behind government firewalls. Computers which don't appear in the google search results are often government computers, private research institutes and very often honey pots designed to catch viruses and malware so they can be analyzed.

Please don't post things like this when the deep web has many legitimate and useful purposes. As for the child porn it's very easily avoided you know. I've been using computers a long time and the only time i have encountered child porn was on a popular gaming forum, someone thought it would be funny to post it there. The police were contacted of course but the point is that i discovered it not on the deep web but on the kind of website people visit everyday.



posted on Feb, 19 2011 @ 10:17 AM
link   

Originally posted by carlitomoore
I ran searches for 'Deep Web', 'Hidden Wiki', 'Tor' & 'Onion' and the only thread I found was Skyflaotings, and I have never come across any of these topics whilst I have been a member here.

Why are people getting hung up on this? I'm not claiming to have discovered an unchartered area of the internet that no-one in the world has ever heard about.

The idea is to share resources and bounce ideas around ane explore, not a contest of who knows what.


And instead of jumping down my throat read what i posted again, especially the part where i said it was good you were bringing this up.



posted on Feb, 19 2011 @ 10:51 AM
link   
I've used TOR and it severely lags your computer. It also switches you IP with another's IP which can be useful in some instances, but EXTREMELY DETRIMENTAL in others.

May I suggest finding another, more safe route. And installing peerblock.

Peerblock uses the sourcecode from the outdated peerguardian, with better protection and compatability with any Windows OS (instead of stopping at XP lik PG).

Thought this was interesting, from TOR's website:





A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.


??!?!?!?!?!??!!!!!!! Want to be on the same internetspace as that?...


----

One other addon from their site again:



Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use web proxies such as Privoxy while web browsing to block cookies and withhold information about your browser type.

Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.


So be careful, like the OP said this doesn't solve all problems.
edit on 19-2-2011 by donatellanator because: asdf



posted on Feb, 19 2011 @ 11:18 AM
link   

Originally posted by reassor
by using networks like TOR your computer becomes one of the "bouncers" so if a child porn is on the reciving end of some perb who was actualy conected thru your machine it puts suspicion on YOU.

Other dangers are - sensitive information like bank logins and stuff since all your data is bouncing from machine to machine it can be intercepted - so never login to what you wana keep safe.

thats whayt i have learned over past few years

I have to differ with a few of your worries here.

1.) When using Tor, the default is to NOT use your computer as a relay, or as an exit point, so in this case the only suspicion put on you is from what you are looking up.
2.) In the event that you become a relay/exit point, it becomes a given that other Tor users data is going through your computer, giving you plausible deniablity(in this regard; other things might be giveaways) about what information is traced to your IP.
3.) Tor 'pads' data so that it takes up a uniform amount of space, hiding the size of the actual data being sent and recieved, making it harder to differentiate important data from uninteresting.
4.) The data is encrypted, and while it may not be the greatest encryption it is quite decent, making it more difficult to intercept data.

The one really major flaw to Tor, which shouldn't be an issue for any legit users, is that anyone with the proper access to both your computer and the related exit node could trace and work out what data is being sent from your computer.

Two other ideas closely related to this are MeshNet and Diaspora

en.wikipedia.org...

joindiaspora.com...



posted on Feb, 19 2011 @ 11:28 AM
link   
reply to post by ImaginaryReality1984
 


My apologies ImagineReality1984, it was rather directed at you when it should have been to less expoerienced members, as Iw as anticipating where the thread was going.

Thanks for bringing a balanced viewpoint to the thread.

It is good if not a little suprising that a lot of posters here know quite a lot about this. I thought this would have been big news here, its obviously not to some of you more experienced users.



posted on Feb, 19 2011 @ 11:36 AM
link   
This is very informative and intriguing at the same time. I have been searching more information on this subject and It's providing me more information that I can absorb. Do you think some fo the "deep web" search engines are legitamate or do they penetrate the "Deep Web" as they claim to be. Here are the list of the search engines that I found. It would be appriciated if you can give me your personal input on some of these. Thanks

Informine
Virtual library
Intute
Complete Planet
Infoplease
DeepPeep
IncyWincy
DeepWebTech
Scirus
Techxtra

www.makeuseof.com...



posted on Feb, 19 2011 @ 11:37 AM
link   
The more I see about this deepweb the more I see it as a search engine that bypasses robot.txt and scans pages that are supposed to be blocked from being scanned. It does not seem to be some secret place. Just avoid your government filtered google search and you wil notice theres more on the net then you ever imagined. Most search engines were takin over by advertising then governments began filtering and your normal search engines became crap in my opion.

Try some different search engines for a change.

www.searchenginecolossus.com...
edit on 19-2-2011 by JBA2848 because: (no reason given)


When the search engine is in a foriegn language just past the browser text in google translate for a translated version of the search. Google translate will do whole web pages or websites when you type the link into the area where it says text to translate.

translate.google.com...#
edit on 19-2-2011 by JBA2848 because: (no reason given)



posted on Feb, 19 2011 @ 11:41 AM
link   
reply to post by awakenone
 


Hey, thanks for that! First time I have ever really seen a new member post something useful! Thats a good list to start us all off.

Wonder if one one of those will help me with some work I'm doing right now... typing 'Venturi' now...



posted on Feb, 19 2011 @ 12:59 PM
link   
A little bit off-topic, but I wonder why someone hasn't gone vigilante on these child porn people? If they are that easy to get to, it seems it would be an easy step to trap one and..."dispose of properly"? I may see if I can get one to meet me at my parents house while they are on vacation... ;-)

As a dad of 2, I have a hard time casually talking about child pornographers. I think they deserve nothing less than my pocket knife up the urethra.



posted on Feb, 19 2011 @ 01:47 PM
link   
On this site you can get an idea about how many new files get released daily on the 'dark net':

doopes.com
Have a little browse through it, you'll be stunned

And imagine, thats only the part of the dark net that deals with warez, which is a large part though.

Now, where and how to get hold of these files?
I guess you'd have to be an inhabitant of the inner part of hollow earth


Ko3



posted on Feb, 19 2011 @ 01:52 PM
link   
Personally I happen to find these sites to be intriguing EXCLUDING the child porn. However I know these places as the Hacker Underground. My friends find them to be protected by these so called "security viruses". They check your IP address with a list of "approved addresses" and if you are not on the list, the site gives you a destructive virus when you attempt to access it.

Supposedly you have to know the right people (often black hats according to some people) to gain successful access to these sites.



new topics

top topics



 
171
<< 1  2    4  5  6 >>

log in

join