The Secret Internet Uncovered

page: 7
169
<< 4  5  6    8  9 >>

log in

join

posted on Feb, 23 2011 @ 10:54 AM
link   
and if you want to see an example for Tor hidden services that is not just another web server with dubious or almost useless content then you should have a look at torchat.googlecode.com...

This is an instant messenger that has no central server, instead each user is reachable under his .onion address. You don't have to sign up with anybody or agree to some TOS or anything, you just start the program (which will upon first start generate a random ID for you) and you are immediately reachable to all other users under this ID.

Each user on your buddy list will connect each other "directly" through their hidden service ID, not through some provider's chat servers, and all messages and file transfers will travel through this DarkNet of Tor nodes while being encrypted all the time. Nobody sniffing the network traffic at any point would be able to tell what and with whom you are chatting or where they are located, You can easily contact somebody through his TorChat ID and talk to him but it would be incredibly complicated and expensive to reliably trace his location. TorChat is probably one of the closest to a real private (offline meeting in the woods) conversation you can get via the internet today.




posted on Feb, 23 2011 @ 12:31 PM
link   
reply to post by carlitomoore
 


Nicely done. Well researched, and with videos.


I've always suspected that there was a secret web, or something like that. Because the elite, and government don't let us use stuff unless what they are using is much, much better. It's the way of the world, so to speak. I do get tired of all the secrets sometimes, but i also understand it. Because a lot of people can't keep their mouths shut, and then other countries know our secrets, etc, etc.



posted on Feb, 25 2011 @ 09:33 AM
link   
Oh damn, I didnt even think of the fact that someone could be bouncing off of my IP address and visiting who knows what sites.
Ill have to think twice about using it now.



posted on Feb, 25 2011 @ 10:45 AM
link   

Originally posted by Animatrix
Oh damn, I didnt even think of the fact that someone could be bouncing off of my IP address and visiting who knows what sites.
Ill have to think twice about using it now.


You misunderstood it.

This feature must be explicitly enabled, it is OFF by default. If you just install it and use it for browsing the sites then nobody will be using your IP address for anything.



posted on Feb, 25 2011 @ 11:07 AM
link   
I tried it and deleted it because as soon as I signed on to TOR I had 20 hits a second on my IP address. even after exiting TOR. Maybe if they put a feature in like p2p where you can throttle the amount of traffic allowed to be bouncing off of your IP address it would be something that could go unnoticed by your ISP but with that much traffic I believe your ISP would take notice of the rise in traffic and investigate the source of it. They did that with people using p2p sharing and they got targeted for piracy from the movie and music industries. I hate to think of who would target you with large amounts of TOR traffic. And the bad thing is you are not even the source of all the traffic and I personally did'nt see anything worth going on TOR for. Seems they just want to draw as many people as they can in so they can have a larger pool of IPs to bounce off of.



posted on Feb, 25 2011 @ 12:16 PM
link   
This may be of topic, but really I think it can relate to all of this, after all it's all about freedom no matter which angle you look at from.




www.abovetopsecret.com...



posted on Feb, 25 2011 @ 06:30 PM
link   

Seems they just want to draw as many people as they can in so they can have a larger pool of IPs to bounce off of.


Sorry but your posting sounds like spreading FUD. You are making things up that are simply not true.

Bouncing is OFF by default, you won't have any traffic unless you explicitly enable it. By default it acts as a client only and won't route anyone's traffic through your IP.

And if you decide to enable the routing feature you can of course throttle the traffic as in any other p2p application too. You can furthermore control whether it should act as exit or as middleman only and if you want to be an exit you have very fine grained control over which ports and which IP addresses you want to allow from your exit and which ones to block.

This means you can forward traffic as a middleman WITHOUT allowing exiting at your IP. This mode is safe to use for anyone, neither providers nor law enforcement care about it because it is PERFECTLY LEGAL unless you are in China or Iran.

You should read the help files that come with it and also the documentation on the project home page and not judge it solely from this thread alone or from the things that somebody simply makes up because he did not read the manual about how it works and is supposed to be used.

Tor is actually a good thing, the developers are on OUR side and not on THEIRS and there is no reason for speculations what the Tor-project might want to achieve, they are open and honest about their goals and about how the system works and if you have doubts then all code is open for anybody to inspect and to see what it really does and how it works.

There are no secrets in the Tor-Project, its all open.



posted on Feb, 27 2011 @ 02:26 AM
link   
reply to At present, governments and ICANN have the ability to "kill" the internet, either totally or in segments, by interfering with DNS.
 


While it is true they can kill the Domain Name System, it is impossible to kill total internet communication. A simple internet can be created with text-based protocols and servers for worst case scenarios. It would be internet technology based off the 1980s but our professor demonstrated a way to make it during lecture.

So while the general public would be without internet, the more resourceful ones would be able to figure a way to create a new connection.



posted on Feb, 27 2011 @ 12:28 PM
link   
reply to post by carlitomoore
 


S&F mate!
You should read Deep Black by Andy McNab, it's too close to the truth

Tor sounds like a good idea.
The hackers in the 80's used non-microsoft computers like Amiga's Ataris & Macs to become 'invisible' on the net, it's also one of the reasons the Amiga was banned in the U.S.!
Lucky i've still got mine



posted on Feb, 27 2011 @ 12:34 PM
link   
reply to post by DavinciThales
 


Sounds great.
Can you show us how it's done?
Should be possible with Basic, Amigados or C+ (which i am unfamiliar with)
I often use the Amiga to peek inside CAB files etc......



posted on Feb, 27 2011 @ 01:42 PM
link   
reply to post by Libertygal
 


Well said!
The porn part is sad but then the surface net can deliver pretty disgusting material if you make a typo

Yes, i think we will have to go back to a BBS type system. I for one, use browsers looking for very specific data or files, a typical G**gle search will invariably deliver 11,000 pages of crap, and maybe the one file i was looking for (if i'm lucky)

Now i have a huge list of specific domains (mostly P2P) where i can find specific data, but it's way too small.
The only deep portal i have at the moment is from CERN, and it's not easy for a non-software person like me...



posted on Feb, 27 2011 @ 05:37 PM
link   
I noticed this site that has a large list of ips using tore nodes and is updated every hour. Not sure what to think. I thought tor hid all this information.

www.dan.me.uk...

You can even use his ip information search with the ip address and get gps data that you can use on google maps to get a street view of the location of the ip.
edit on 27-2-2011 by JBA2848 because: (no reason given)



posted on Feb, 28 2011 @ 03:59 PM
link   
I'm pretty sure a lot of people have heard of this



posted on Mar, 1 2011 @ 03:50 AM
link   

Originally posted by JBA2848
I noticed this site that has a large list of ips using tore nodes and is updated every hour. Not sure what to think. I thought tor hid all this information.


These are the public relays. Volunteers run them intentionally and also publish their location intentionally.

The Tor network consists of a few thousand enthusiasts (like me) who run these public relays that route the traffic from node to node and millions of users all over the world can then use these relays to evade the censorship.

The users who use Tor don't publish anything and don't accept incoming connections and thus won't show up in any list. Even the ones who run hidden websites are connected as normal users, not as relays.
edit on 1-3-2011 by prof7 because: (no reason given)
edit on 1-3-2011 by prof7 because: (no reason given)



posted on Mar, 5 2011 @ 01:47 PM
link   
reply to post by Violater1
 


I remember seeing a documentary on the deep web, and yep, they said that perverts use it for not just that, but other deviant stuff.



posted on Mar, 21 2011 @ 06:03 PM
link   
So I've noticed that this thread is pretty dead now... I've been bumping around the .onion world and have yet to come across anything conspiracy related. Does anyone have at least one .onion site for conspiracy?



posted on Mar, 22 2011 @ 12:23 PM
link   

Originally posted by n0tsan3
So I've noticed that this thread is pretty dead now... I've been bumping around the .onion world and have yet to come across anything conspiracy related. Does anyone have at least one .onion site for conspiracy?


Most people and owners of conspiracy forums don't (yet) feel the need to hide their websites. But .onion (and similar technology) is being developed to be readily available once it is needed. It is always a good idea to know what tools exist and how they can be used, even if you don't yet have any pressing need for them at the moment.

BTW: There is more things you can do with .onion than only using it for web sites. There is for example an instant messenger (TorChat) that uses the same .onion hidden server technology to make it possible to chat (IM) and send files without needing any chat server provider at all: You don't need to sign up for an account anywhere, you simply start the appliation (which will generate a random ID the first time you start it) and from then on you can use it to communicate with others encrypted and both-sided anonymously, no AOL, no Yahoo and no Google or any other IM provider will even know about your existence because it has no central chat server.

This little tool is quite handy and it is the only IM app I currrently use. It is extremely easy to set up and use, even for computer-illiterate people, much simpler than Skype, Yahoo, MSN or the like and communication is much more private.

You can find it here: torchat.googlecode.com...



posted on Mar, 22 2011 @ 12:34 PM
link   
first time i heard of this



posted on Apr, 21 2011 @ 09:55 PM
link   
I haven't had a chance to read through to see if anyone has posted this, but just in case here is a link that provides a list of search engines for discovering the invisible web.

www.makeuseof.com... web/



posted on Jun, 5 2011 @ 04:56 PM
link   
Any evidence of things such as:

People / slave trade
Underground fights to the death
Seriously disturbing video sites for murder etc uploaded and made by the posters themselves?

This has kicked off on many forums now, seen some very disturbing screenshots, eg how to kidnap, top ten ways to murder a woman etc

Sick stuff indeed





new topics

top topics



 
169
<< 4  5  6    8  9 >>

log in

join