It looks like you're using an Ad Blocker.

Please white-list or disable in your ad-blocking tool.

Thank you.


Some features of ATS will be disabled while you continue to use an ad-blocker.


The Secret Internet Uncovered

page: 8
<< 5  6  7    9 >>

log in


posted on Jun, 6 2011 @ 11:11 AM
This brings me back.... I can't believe the bulletin boards are still up and running... That really suprises me I'd figure they'd find a better way to do things by now... Remember the Ascii pages? those were fun too...

My BBS was super fresh and ballin' lol

posted on Jun, 18 2011 @ 05:25 AM
i went on the "deep net" and didnt really think all that too it.... i went to this hidden wiki. there is no seach engine for the "deep net" so its diffrenet way on how to look for things on there.... tbh i was a bit on a loss of what to do and look for......

posted on Jun, 25 2011 @ 01:54 AM
Thank you for this thread. I pride myself on computer technology knowledge I possess. However, this has given me an entirely new ball game to wrap my head around. I have installed the client and am in the beginning phases of exploring and learning this hidden web. If anyone has questions or concerns, PM me and I will see what I can muster.

posted on Jun, 25 2011 @ 02:22 AM
Amount of time it takes for TPTB to track you: ~18:00 minutes.
Amount of time it takes for TPTB to track you if you have a TOR/Onion Security/Darknet: ~25:00 minutes.

Seriously, if its out on the surface web for you to download...then the government already knows about it and how to get thru it.

As for warding off hackers and other privacy issues, TOR is good if you dont mind the frequent slow downs and load-failures.

posted on Jun, 25 2011 @ 03:20 AM
Ok seriously, everyone posting here that has never heard of this needs to have their internet privileges suspended.

The ones that are taking it to a ridiculous extreme with questions alluding to snuff films, cheese pizza, sex trafficking and thoughts on how hidden knowledge must be there need to have privileges wholly revoked.

Just because it never popped up as a side story on CNN or FOX websites doesn't mean it's horribly nefarious. It just means you've never heard of it. Just because you've never encountered it doesn't mean it's horrible and all of your nightmares rolled into a single .onion (I know, hard to believe, right?!?!?! That's gotta be a conspiracy!)

Yeah, there's captain picard and places you can buy illegal drugs on "the secret internet". There are on the plain old boring internet, too. You just need to know where to look.

reply to post by Nventual

You hatin'?
edit on 6/25/11 by Magnivea because: Forgot a letter.

posted on Jun, 25 2011 @ 03:46 AM
A small riddle to add , may i

posted on Jun, 25 2011 @ 04:04 AM

Originally posted by Magnivea
Ok seriously, everyone posting here that has never heard of this needs to have their internet privileges suspended.

The ones that are taking it to a ridiculous extreme with questions alluding to snuff films, cheese pizza, sex trafficking and thoughts on how hidden knowledge must be there need to have privileges wholly revoked.

Just because it never popped up as a side story on CNN or FOX websites doesn't mean it's horribly nefarious. It just means you've never heard of it. Just because you've never encountered it doesn't mean it's horrible and all of your nightmares rolled into a single .onion (I know, hard to believe, right?!?!?! That's gotta be a conspiracy!)

Yeah, there's captain picard and places you can buy illegal drugs on "the secret internet". There are on the plain old boring internet, too. You just need to know where to look.

reply to post by Nventual

You hatin'?
edit on 6/25/11 by Magnivea because: Forgot a letter.

to ref to snuff films..... are snuff films real ? if they are they would never show up on the internet ever

posted on Jun, 25 2011 @ 08:16 AM
reply to post by rikgrimsby

It's debatable. It really depends on what the definition of "snuff film" you're looking for. The sexual form I'm sure exists somewhere, but I would put my money on it never seeing the light of day (or the internet). More than a few fakes floating around though. Entire movies are set up to look like snuff films (Murder-Set-Pieces, the Guinea Pig series).

Technically speaking though, a snuff could be as simple as a close up of a murder or suicide caught on tape. I think everyone will agree you can find that just about anywhere online. Budd Dwyer's suicide is technically a snuff. Bjork's psychotic fan suicide is a snuff. Beheadings are snuff. The videos those kids in Russia made of them killing random people are most definitely snuff.

It really depends on each person's definition.

posted on Jun, 25 2011 @ 08:30 AM
Yes i recomend Tor for sure.

The real problom with the internet is Google who are on 90% of all sites in one form or another and use some real sneeky scripts to capture information about you and that includes sending information to private IP address.

I would be logical for the CIA to have full access to Googles secrets and if the CIA has it then so does MOSSAD.

OpenDNS seem the right way to go so Obama could never get his kill switch for TLD ".Com" and that could be extended to include ".Onion" domains or ".PissOffObama" Domains.

We need to take steps now t presurve privacy on the internet so please PM me if you have any contacts working in this direction already.

p.s be very carefull with any free proxy servers, nothing comes free and many are ran by criminals trying to collect credit card data and log in's from you.

posted on Jun, 25 2011 @ 08:48 AM
reply to post by Magnivea

snuff is where someone is murder just for a video for purpose of distribution and entertainment. vids of suicides or beheadings ect are not snuff......

posted on Jun, 25 2011 @ 09:27 AM
I haven't read the entire thread yet, so this has almost certainly been brought up before. If you use the Deepweb, be very, very careful
I'll use a quote from another website (Hack Forums) to better explain it in a better way than I could.

Deepweb Discussion Deepweb is a phrase to describe hidden websites on the internet that are often, but not always, directly related to illegal activity such as child porn, carding, hitmen, and other very illicit material. As such we're not going to allow it here. Not even the slightest discussion of the deepweb will be allowed.

posted on Jun, 25 2011 @ 09:30 AM
reply to post by carlitomoore

thats just the tip of thye iceburg....

posted on Jun, 25 2011 @ 09:57 AM
A person's IP address can still be really isn't all that anonymous

posted on Jun, 25 2011 @ 01:14 PM
Interpol was run by the National Socialists of Germany, during the Hitler era.

So rest assured, there is a 1000 year Reich behind every mouse click you make.

FACT: Hitler had Mein Kampf Part Deux all ready to go. TARGET: USA
FACT: WW2 companies knew in 1941 the land war was over, hid their selves and cash and submarined. Said corporate persons DID NOT DIE.

But ho hum, the backers of Hitler Shickengruber had to settle for Israel, the State they engendered and empowered. They will have to wait a bit longer to inherit the Earth itself, it seems. Napoleon and Hitler both each in turn destroyed the greatest armies ever fielded. Both destroyed their armies against the cheese-grater of Karl Marx Inc, aka Gulags R' Us, aka youknowwho.

JFK dimona era, DARPANET era = same as JFK-martyrdom, and Internet Protocol nascence, and Nuklur Warz in Mid East gameplay, Dr. Strangelove, mineshaft gap, etc, etc, and so on. So today, ghost of Hitler lurks in freenet and shouts about lack of fecal-matter pr0n. It is so hard to please every fetish, even the highest echelons of the Air Force are so picky about their centerfolds! I am referring to the Stanley Kubrick film about the Russians and Us, and how we fills gaps in mineshafts and gaps in air defense. Look, what I want to know is this: Did building 7 contain any copies of Nude Nuns with Guns? Because I heard someone is using this whole courtroom meatgrinder to catch you up in front of a judge based on your IP address. That's some funny stuff cause I bet Nude Nuns with Guns is not as thought provoking as other memespace titles of videos I have read about in this thread. I mean hey, would Hitler like 2girls1cup and furthermore, would he tell Interpol to chill and let everyone's cup runneth over? God I hope not because if there's a tyrant, he better let everyone else have their fetish too. Except murder or torture or waterboarding cause that stuff just plain wrong.
edit on 25-6-2011 by smallpeeps because: splng

posted on Jun, 26 2011 @ 12:48 AM
reply to post by rikgrimsby

That's my point. Everyone's definition differs. I personally consider only the stuff with the sexual aspect snuff, but like I said if it's out there it's probably never going to be proven.

posted on Jun, 26 2011 @ 01:02 AM
post removed for serious violation of ATS Terms & Conditions

posted on Jun, 26 2011 @ 02:29 AM
Thanks for showing this, I knew there was something else. But this is hackers area and I don't have any experience yet.

posted on Jul, 5 2011 @ 02:27 AM
I posted this as a new thread but it was deleted within an hour by Mirthful Me. I assume it was deleted because threads on this topic already exist. However, I felt this outline need its own thread. But, since the almighty mods have decided against that, here it goes.

We will be using a client called Tor. The client can be downloaded here

Without getting too technical, the Tor client essentially bounces your data packets to thousands of random "Nodes" within the Tor network. Each node only knows which node sent it the data and which node it is sending data to. No single node has knowledge of the full path of your data. On top of that, the data itself is encrypted over the network using a 1024 bit SSL encryption key. So even if someone managed to intercept your data, it would take years for the most powerful computers on the planet to crack the code. There has been talk of upgrading it to a 2048 encryption key, but it has yet to come to fruition.

For the Average user, simply turning the Tor client on will probably be enough to make you safe from the prying eyes of Corporate America. But, for anyone interested in power use, Tor is also used to give you access to the "dark web" by having the protocols to read .onion sites that aren't reachable or readable by even Google servers to this day.

Tor by default works only with Firefox, but I am going to give you the instructions here to make it work with any browser. Although the Tor/Vidalia client will close if you close firefox. So firefox must remain open for it to stay functional. But you have the option to open any other browser of your choice and use the Tor network.

For Google Chromse users:
Click the tool icon on the right of your address bar. Click on options. Click on under the hood to the left. Go down to Network and click change proxy settings. The first box that pops up has Lan settings. Click on lan settings. Enter this data: On proxy server, click the box to allow the proxy. name is Localhost on port 8118. Save changes and go here:

If there is a big Checkmark, then you are on the Tor network with Google Chrome now.

Here is how to setup Internet explorer 7

Open IE7, Click Tools and then Internet Options. Go into the “Connections” tab. At the bottom click the LAN Settings button. At the bottom of the new window it says Proxy Server. Tick the use a proxy server for LAN box. Below that set the address to and the port to 8118. Untick the “Bypass proxy server for local connections” box then click Ok and then ok again. All done.

Now, for the paranoid. Tor itself is not a proxy server, however by routing to so many random nodes, it ACTS as a proxy. You may choose to go through a proxy server if you wish, but it isn't necessary. Running tor doesn't hide you entirely. Each data packet you send over the network has a header on it that shows it's destination. So, if someone were to intercept your data stream at any point on the network, it can read where it is currently en route to (the next node it will hit) The user can then hijack the node and intercept your full data stream. Tor network hosts MANY end game hackers on the network. People who REALLY know what they are doing, so this possibility is VERY real. It is unwise to sign into personal accounts while Tor is active. (FB, email, bank, etc)

.onion is a tcp/ip protocol that I mentioned earlier. It is used for "dark web" web sites. There is currently not a working list of the different sites. Mostly, you have to know people to get the info. If there IS a working list and I am just blind, someone please tell me. There is supposedly a .onion search engine called Torgle that ONLY operates in the dark web, but I have yet to get it working.

posted on Jul, 5 2011 @ 04:42 AM
I am by no way an computer expert or even remotely able to understand networking and security on pc's.

However even from some of the seemingly very intelligent and knowledgeable replies on this thread, I am surprised at to be honest the complete confidence in some systems some show.

One thing from my limited understanding is clear, unless you are driving around using a laptop and a wireless card bought with cash, from a place with no CCTV, have a computer bought in the same way with NO access on that computer ever to any of you private email accounts im's etc and only used for surfing.

And only then using some of the systems described here could offer a relative amount of instant and certainly untraceable info about who the "user" is.

Unless done as above if any of the "Theys" or "Thems" wanted to find out who you were they would.

Otherwise even using these systems, usually a user is at home has an actual account with name address payments ect to there broadband, telephony provider, if u use Tor or any other system you have to initially go through your ISP.

This simple fact makes the stance and acceptance of working with any of the "they's" or "them's" by the ISP the only thing between any user and what info is gained or acted on by according to what or where you do things on the net.

I really am not interested in any long lengthened posts on internet protocols packets encryption etc being important, if the ISP is compromised or monitoring/sharing its all a moot point. Now this may seem like arrogance or unqualified confidence on my part saying this as already showing an very open and obvious lack of tech knowledge. You are wrong.

Why so then?

Even though any thing on the "Surface" of internet security, experts, developments and knowledge some of which mentioned and showed in this thread may seem cutting edge and the "Known Known's", just like the most recent developments in civil aviation is very impressive, we ALL know there are bases in deserts in the world now flying stuff that wont be seen for at least 30 years in the "surface" world.

And will still then be seen as "cutting edge" and new exciting.

Why there is this seeming arrogance on the net by even very very intelligent people and experts, in this matter baffles me, sure TOR and such like may make it able to keep your illegal activities or sick pic looking from local and national law enforcement agencies, commercial spying etc etc..... but that is just the "surface" of monitoring.

The true "Deep Web" has not even been mentioned yet.

If anyone at all believes the following place, and also one in Australia and Canada/USA, does not actively and easily stick their tentacles right up your fibre optic or telephone line, or waft through the air and could even look at you through your web cam if it was on whilst "playing" online, no matter what security level you think you are at, well all I can say is grow up, and imagine what the net will be like in 30 years, because that's more than likely whats going on in these places right NOW.

I can garuntee all the posts and responses on this thread were filtered through it, and another bit of a social profile and info was linked to an id you will have there, if a friend also posted on this thread the line that connects you and everyone else you have contacted or met will show another link or get stronger, every email, every IM every phone call, every text tweet and exposure on webcam day by day 24/7 that profile is building.

Wake Up and I normally hate those who say this but really please do.

I wont post link after link, ive put much on this over the years on ATS especially when people come on to ATS and say my "phone is tapped" well wake up again everyone's is, when you know its tapped its done by local or federal it wakes you up to that, but from the day you first put it on you were by the true "deep web".

Do some searches Echelon is true, also as ive already posted on ATS do a search, the EU is rolling out an programme NOW OPENLY that intends to infect every PC in the world with a hidden cookie/virus whatever that will monitor and report all key strokes, sites visited etc.

This will be in place within the next few years.

However the guys whove been watching you since you bought your first cell:

Menwith Hill Menwith Hill, near Harrogate North Yorkshire, is run by the US National Security Agency (NSA), operates outside US law and is not accountable in British law. It is part of a global network of bases used to spy on all forms of international telecommunications - including private phone calls, emails and faxes - and is crucial for the intelligence-gathering necessary for any US-led military attack. In 2007, one day before Parliamentary Summer recess Prime Minister Gordon Brown announced that Menwith Hill would be included in the US Missile Defence system with no democratic debate, consultation or accountability. * It is the most secret US base in Britain * It is unaccountable, unlawful and undemocratic * It is integral to US plans to fight in and through space * It is the world's largest spy base and is still growing The Menwith Hill spy base, near Harrogate, North Yorkshire, is run by the National Security Agency (NSA) of the United States. Although in 1996 it became officially known as RAF Menwith Hill, most of the 1800 personnel on the base are American. The NSA was set up by a Presidential decree in 1952 without any debate in the US Congress. The American people know very little about the NSA and even less about Menwith Hill.
Menwith Hill Echelon

They could close down the entire worldwide child porn network in just a couple of days of 100% focused and intent to do so, makes you think eh.

There ARE NO MORE SECRETS in the world of internet data Telephony to these guys, none at all.


posted on Jul, 5 2011 @ 10:16 AM

Originally posted by carlitomoore

Deep Web Wiki

The Deep Web (also called Deepnet, the invisible Web, DarkNet, Undernet or the hidden Web) refers to World Wide Web content that is not part of the Surface Web, which is indexed by standard search engines.

In 2000, it was estimated that the deep Web contained approximately 7,500 terabytes of data and 550 billion individual documents.[2] Estimates based on extrapolations from a study done at University of California, Berkeley speculate that the deep Web consists of about 91,000 terabytes. By contrast, the surface Web (which is easily reached by search engines) is about 167 terabytes[dubious – discuss]; the Library of Congress, in 1997, was estimated to have 3,000 terabytes.

167 terabytes == 167 hard drives with capacity of 1TB

This is like what was the Internet during the stone age..

new topics

top topics

<< 5  6  7    9 >>

log in