It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


Help ATS via PayPal:
learn more

The Secret Internet Uncovered

page: 4
<< 1  2  3    5  6  7 >>

log in


posted on Feb, 19 2011 @ 02:13 PM

While TOR is fun for spoofing and flaming, it's still very insecure. Anyone on the TOR network can capture and view information going across their network. What does that mean? Any passwords or information passed in clear text (aka NON-SSL) can be captured. Your ATS login is non-ssl for example. Any IM conversations routed through the TOR network can be captured and viewed. If you use a VoIP soft phone on your computer (Not to be confused with Skype), your voice conversations can be captured and listened to.

People feel TOR is the Holy Grail of privacy.. However think twice before you use it. It may not be as private as you think.

Tor does not work that way. Everything is encrypted and each subsequent hop adds another layer, hence The "Onion" Router.

posted on Feb, 19 2011 @ 02:26 PM
I see no difference than a p2p search engine. Or p2p sharing of download upload of files. You don't have to have the whole file on your computer for some one else to start downloading from you so you get multiple download locations even though only a few might have the complete file.
edit on 19-2-2011 by JBA2848 because: (no reason given)

posted on Feb, 19 2011 @ 02:39 PM

Thanks for this, very informative. This is the procedure I am going to follow. You seem to have some experience, if possible can you post a few examples of what kind of things you can find?

Well, on the Hidden Wiki, there are categories of links. There are things like blogs, forums (from normal to revolutionary to blatantly illegal), Tor-enabled instant messaging and chat, anonymous file hosting, anonymous financing, information on computer security/anonymity, info on warez/cracks/hacking, books and information exchanges, music, links to more info about supporting the Tor movement... Basically, stuff that anonymity enthusiasts may be interested in. I personally wouldn't trust many of the files on there, though.

Then there's the VERY illegal stuff. From memory, there are links to international drug markets, prostitution rings, assassin markets, black market products, and illegal pornography. This stuff is real, and should not under any circumstance be visited unless you enjoy prison love. There is a darkside to the Darknet, and this is only skimming the surface of it.

I cannot access any sites, when my TorButton is "green". why? I can't even answer here on ATS.

Is your http proxy set up correctly? Are you waiting long enough (Tor is normally slooooow)? What operating system do you use? I'm on Ubuntu, so I had to install Polipo (an http proxy), and get the configuration file from the Tor site. If you're on Windows or Mac then the Tor bundle should have everything you need (minus TorButton). I recommend reading through the installation instructions in my previous post thoroughly, and consult the FAQ. When TorButton is enabled, it disables many third-party plugins that could be exploited and reveal your identity (_javascript, flash, etc.), unless you fiddle with settings, so this will probably cause problems on certain webpages. Check out the TorButton FAQ for some more info. Again, this is all fairly unpractical to use all of the time, since Tor is very slow and the visible onion-land isn't very populated, but still it's cool to look into if you're interested in the anonymity movement.

posted on Feb, 19 2011 @ 02:57 PM
reply to post by carlitomoore

That's cool but i have tor and it slows down my internet alot makes me not want to use it cuz it goes through so many proxies

posted on Feb, 19 2011 @ 03:04 PM

Originally posted by JBA2848
I see no difference than a p2p search engine. Or p2p sharing of download upload of files. You don't have to have the whole file on your computer for some one else to start downloading from you so you get multiple download locations even though only a few might have the complete file.
edit on 19-2-2011 by JBA2848 because: (no reason given)

There're big differences between public p2p networks and the underground scene.
Only a very small part of all so called "scene releases" finds its way to public p2p, where they often get infected with viruses and all kind of malware by some idiots. Most of the scene releases stay underground where they get shared ("FXP'ed") between fast, encrypted and secured FTP servers, accessible only to groups of "l337" and trusted scene people.


posted on Feb, 19 2011 @ 04:31 PM
The problem with this is some form of public redirection is necessary, and so those who wish to monitor have a convenient list of ip's to watch. On the internet the best way to hide is in plain sight. I'd say anyone who visits these sites will probably have a complete log of their activity being made by their ISP in collaboration with local law enforcement. From a security standpoint, everything about it seems so lame that I can't help but think that it might just be flypaper.

posted on Feb, 19 2011 @ 04:35 PM
reply to post by carlitomoore

Ah, the Dark Web.

Let us know what you find. I always wondered what criminals get up to down there. I imagine you'll get terabytes of kiddie porn, password crackers, malware, illegal movie downloads, hacking tools, etc., etc. Who knows, after a bit of a rummage around you might find something interesting. Then again, I'd have to wonder who put it there if you did...

Actually, a lot of this "underweb" is probably just stuff not indexed directly by Google (due to nofollow tags or whatever) but which is accessible from sites that are indexed. I'm sure that, like the phone book, it will make for riveting reading.

But again, if you do find anything interesting, make sure to share it with us. Enquiring minds want to know!

And Tor is used for (ostensibly) anonymous surfing on the ordinary web (assuming somebody doesn't subpoena the records of the exit router or website you were surfing).

posted on Feb, 19 2011 @ 05:18 PM
reply to post by carlitomoore

most of what you posted is just the underground IRC servers and channels around.
IRC has been on the backburner for years and really started this whole p2p warezing thats going on now.

ive used IRC as long as ive used the internets.

posted on Feb, 19 2011 @ 05:18 PM
reply to post by amodedoma

I had a friend who discovered that his email was being read by unauthorised persons (well maybe they were authorised, but he certainly wasn't happy about it). He discovered that his email headers would not be encrypted even if he encrypted the contents. So he got himself a nice 4096 bit encryption key issued by a signing authority "elsewhere". Well, you can imagine the fun he had with that!

In one particular country I read about, a group of hackers had figured out a way to prove their emails were being monitored. They used fourier analysis (some funky mathematics) to analyse the signals going in to certain buildings which probably didn't exist on most maps.

posted on Feb, 19 2011 @ 06:38 PM
This is some pretty neat stuff. My dad always would tell me about "a secret internet that only certain people can access" and I thought it was neat, but never looked into it (partially didn't believe him). Thanks for bringing this up with details to support your claim.

posted on Feb, 19 2011 @ 06:46 PM
This is a pretty good resource for helping to better understand the deep web.

What is the invisible web?

There is a lot more to the dark web than just child porn and illegal activities. There is a wealth of great info that can be found there on millions of different topics. It is just very time consuming searching and finding the right databases. Even when you find a type of wiki it might show categories in that database, but you still have to search and wade through a lot to find what your looking for since to date nothing is out there to properly index it.

If you are running tor you can go here to the wiki and it will be a good starting point.

The Hidden Wiki

If you are not running tor here is a scrolling screenshot of The Hidden Wiki page so you can see the wealth of info that is there.



edit on 19-2-2011 by stealthsurfer because: Scrolling screenshot didn't turn out as an image, had to link to it.

posted on Feb, 19 2011 @ 06:54 PM
reply to post by stealthsurfer

If you go to look at the screenshot make sure you "click" on it so it will enlarge to the original size.

posted on Feb, 19 2011 @ 07:16 PM
reply to post by stealthsurfer

Your link even says its websites that block spiders with robots.txt to prevent them from being put on google searches. Many websites only block part of there pages but allow most to be listed. Ever since the white house was hacked while George Bush Jr was in there they have slow gone away from listing robots.txt on there pages. How do you find robots.txt what is robots.txt? you smply add /robots.txt after the websites front page and you will see the robots.txt listed showing pages the website does not what bots or spiders scanning and posting on web searches.
Example: Heres the pages google don't want bots or spiders scanning.
Heres info from google about blocking google bots.
Heres a pic of the old

edit on 19-2-2011 by JBA2848 because: (no reason given)

posted on Feb, 19 2011 @ 07:34 PM
LOL @ behind 7 proxies they will find you.... Not true if you know what you are doing....

Tor is no longer safe as they have setup honeypots to capture everything that you do on exit nodes, depending on where you are... This has been stated on the web.

New underwebZ

i2p is "" , it is explained in greater detail on how to install here.

I2p Windows Installation

"I2P (originally standing for Invisible Internet Project) can be seen as a networking layer sitting on top of IP that uses cryptography to keep messages confidential, and multiple peer to peer network tunnels for anonymity and plausible deniability. While Tor is focused more for hiding your identity while surfing the public Internet, I2P is geared more toward networking multiple I2P users together. While you can surf to the public Internet using one of the I2P out proxies, it's meant more for hiding the identity of the providers of services (for example eepSites), sort of like Tor's concept of Hidden Services, but much faster. Another advantage I2P has is NetDB, a distributed way to let peers know about each other once initial seeding has occurred. Tor on the other hand uses it's own directory to identify servers, which in theory could be more easily blocked. Both networks have their advantages and trade offs. This video won't cover the details of I2P's peering or encryption systems, and may seem kind of rambling, but it should be enough to get you up and running on the darknet." -IG

This link is to the paper written to explain how you can track down these eePsites (possibly).

Identifying the true IP/network identity of I2P service hosts

Like to know how to host your own site on the Dark.Net?

Hosting Hidden Services in I2P: eepSites and SSH

Goodluck and be careful where you go...

posted on Feb, 19 2011 @ 08:20 PM
reply to post by JBA2848

It really doesn't matter how there blocked or why, the point is they ARE blocked and don't show up through a regular search engine and aren't even able to be accessed through a typical browser unless using tor. I am just trying to help people understand that there is a lot more than just child porn since I have seen a few people saying OMG stay

I actually hadn't been to any parts of the so called Dark Web in a while and had forgotten about it until this thread, so I think it's pretty cool the OP brought this up. If you are willing to take the time to use tor and not only wait for long a$$ page loads since going through a proxy, but to also sift through hundreds of databases on different boards there is a lot of interesting stuff to find there.

Thanks OP for the and flag.

posted on Feb, 19 2011 @ 10:15 PM
reply to post by carlitomoore

Wow... I had no idea. THANK YOU for sharing this information. I mean, now that I know about it, it only makes sense because it seems that **everything** has layers and darker levels to it, like our own psyches which are made up, according to Freud, of the id, ego and super ego. It seems that creations of man mimic our internal stratas of inherent composition. In other words, maybe *everything* we make is bound to contain some part of our own image, like the Creator making man in his image. Okay, that's all fanciful ponderings and all, but those were the thoughts that learning about this first evoked in me.

Next, is about size. The deeper net is so much larger in terrabyte size than the surface web, like the crust of the Earth compared to the mantle. How is it that it came to be that the "hidden" web is larger than the surface web? Was this intentional? Was this area of the web/net created along with the surface web? Is there a third, even deeper layer of the web?

From what I've heard, the government is said to have other internets as well. Is it just a matter of creating your own storage and fiberoptic network? Can anyone create a hidden web? For example, could the NFL create hardware storage centers and pay to have their own little web only accessible by people in the NFL (owners, managers, certain players, etc.)? This is all very fascinating to me.

posted on Feb, 19 2011 @ 11:49 PM
I shoude have never told my g/f about the DARK WED she won't even let me down load nothing I'm going to have to put the breaks on this venture until I get another pc any one got any recommendations
on Wat woude be the ideal computer for searching the deepweb if one existed lol?

Ohh one more thing can any one with deep web access do a search for free energy and let me know Wat pops up if it isn't all ready on here

posted on Feb, 20 2011 @ 02:03 AM
reply to post by stealthsurfer

What kind of interesting stuff? Aside from the illegal content that others have pointed out, I'm curious about what other information is available that may not be available on the normal web.

posted on Feb, 20 2011 @ 04:13 AM

Originally posted by earthairfirewater
Personally I happen to find these sites to be intriguing EXCLUDING the child porn. However I know these places as the Hacker Underground. My friends find them to be protected by these so called "security viruses". They check your IP address with a list of "approved addresses" and if you are not on the list, the site gives you a destructive virus when you attempt to access it.

Supposedly you have to know the right people (often black hats according to some people) to gain successful access to these sites.

Good reason to ensure installation of a virtual machine to protect ones 'puter when using Darknet.

2nd line.

posted on Feb, 20 2011 @ 04:35 AM
Hmmm... a secret internet. There is likely one here too. Those with tin foil hats, please close your eyes and cover your ears. Just some little known info... Every forum has hidden areas that you can't see. Unless you have elevated "top secret" privledges. There could be a whole underground here. Either that our they occupy themselves making fun of us. Oh oh... I just opened up a can of worms!

To the forum mods and admins, although I am certain that private areas do exsist here, I am jus teasin with folks about the "making fun" business.

edit on 20-2-2011 by elouina because: (no reason given)

top topics

<< 1  2  3    5  6  7 >>

log in