Help ATS with a contribution via PayPal:
learn more

Tor (anonymity network)

page: 5
49
<< 2  3  4    6  7  8 >>

log in

join

posted on Jan, 22 2012 @ 07:35 AM
link   
Ok can someone please tell me what Level 5 deep Web - Marianas Web is please.

After reading this thread and searching myself for more information on Marianas Web and coming up with nothing I am really curious.




posted on Jan, 22 2012 @ 07:45 AM
link   
I'm also interested in knowing what Marianas Web is.

Any information would be greatly appreciated.



posted on Jan, 22 2012 @ 08:09 AM
link   

Originally posted by RandalFlagg
Ok can someone please tell me what Level 5 deep Web - Marianas Web is please.

After reading this thread and searching myself for more information on Marianas Web and coming up with nothing I am really curious.


forget level 5 and below that
first off its not worth it
secondly its not somewhere you want to be poking your nose in
you prob will never see it and dont want to
have a read of this
http:///rrf3xHZB

is it fiction?
is it fact?
its not for me to tell you is it

and im sure i`ll have members jumpin on this post saying "you dunno jack gtfo no0bie"

deepweb aint a game and aint to be dismissed as nothing
hidden wiki is a playground for Chumps
once your used to navigating your way safely down there you might stumble upon things that will open doors for you
then again you might not

[snipped]

edit on 22-1-2012 by UkRandom because: (no reason given)
edit on Mon Jan 23 2012 by DontTreadOnMe because: removed foreign symbols



posted on Jan, 22 2012 @ 08:31 AM
link   
reply to post by UkRandom
 


Yes, I will be that person to say that pastebin article reads like some terrible cyberpunk fiction. I can safely say as somebody who remembers the ancient days of dialup BBS systems that there are obviously less-than-user-friendly networks out there, but none of this multi-tier jargon soup thats been spouted off about so far. I know its fun to make up all kinds of fancy concepts but lets just say that those who have a clue how networks function are getting a good chuckle out of this whole thread.



posted on Jan, 22 2012 @ 08:36 AM
link   
as i said earlier Hidden wiki is a chumps playground
its good for lolz i suppose but serves no real usefull purpose
there are better things in life to spend time on that what the deepweb contains as its the same old same old
as for the recent curiosity here about deepweb well instead of askin whats out there why not take a look and draw your own conclusions

98% of it is pure B.S but as with anything there is a very small percentage thats well you make your own mind up on it

same as pastebin yes 98% is pure garbage BUT the 2% well you draw your own conclusion

it is what it is...make of it what you will as far as "security prefessionals having lols a this post"
i really dont care as im not here to gratify anybody im here to read and hopefully learn on subjects that interest me

edit on 22-1-2012 by UkRandom because: (no reason given)



posted on Jan, 22 2012 @ 08:36 AM
link   
Thought I'd mention -

Whenever I'm online I use tor for *everything*. I would also suggest all of you to run your browser through tor, but before, delete all browsing history, then go to hushmail.com and set up an email from tor - that way when you register to sites etc - they won't be able to get *any* info on you.

On the other hand - if you use tor, but log into previously set up emails - you can be traced back to that location. So I will stress again, always set up accounts to begin with through tor too. And also, pick a junk username too, like, "we98jhwe". Make it as impersonal as you possibly can.

we98jhwe



posted on Jan, 22 2012 @ 08:38 AM
link   

Originally posted by we98jhwe
Thought I'd mention -

Whenever I'm online I use tor for *everything*. I would also suggest all of you to run your browser through tor, but before, delete all browsing history, then go to hushmail.com and set up an email from tor - that way when you register to sites etc - they won't be able to get *any* info on you.

On the other hand - if you use tor, but log into previously set up emails - you can be traced back to that location. So I will stress again, always set up accounts to begin with through tor too. And also, pick a junk username too, like, "we98jhwe". Make it as impersonal as you possibly can.

we98jhwe


or while in tor go here jhiwjjlqpyawmpjx.onion...
for a TOR mail address



posted on Jan, 22 2012 @ 08:49 AM
link   

Originally posted by UkRandom

Originally posted by we98jhwe
Thought I'd mention -

Whenever I'm online I use tor for *everything*. I would also suggest all of you to run your browser through tor, but before, delete all browsing history, then go to hushmail.com and set up an email from tor - that way when you register to sites etc - they won't be able to get *any* info on you.

On the other hand - if you use tor, but log into previously set up emails - you can be traced back to that location. So I will stress again, always set up accounts to begin with through tor too. And also, pick a junk username too, like, "we98jhwe". Make it as impersonal as you possibly can.

we98jhwe


or while in tor go here jhiwjjlqpyawmpjx.onion...
for a TOR mail address


Great advice - forgot to mention tor mail.

Nice one.



posted on Jan, 22 2012 @ 08:54 AM
link   
 


off-topic post removed to prevent thread-drift


 



posted on Jan, 22 2012 @ 09:15 AM
link   
Primary TOR the US government is head over heel in the creation of TOR so its encryption algorithm isn't safe at all...

Secondary the data sent to/from TOR nodes is encrypted from the source address to the last TOR node, from/to the last TOR node data is plain text and can be sniffed by just anyone within 5 minutes.

Lastly its vulnerable to a couple attacks that force information that you would otherwise want hidden to be disclosed. And if I recall right there's an attack to can perform to force the browser of the user to bypass the proxy and connect directly hence beating its own purpose.

Also you aren't "THAT" hidden if your behind a proxy, all the proxy does is show a different incoming IP to the server/host you are connecting however it most case its not that hard at all to trace back to its source.

Most people using proxies don't even know how to properly secure them they only use them because it change their IP giving them false hope of being secure...

But trust me its a very deep rabbit hole... Proxies "will" help slow down anyone that wants to get you but in the end it all boils down to the simple notion that there's NOTHING safe on the internet whether you like it or not...



posted on Jan, 22 2012 @ 10:13 AM
link   
Lots of talk about "finding yourself somewhere you don't want to be", and making it all sound very nefarious, mysterious, and highly secretive.

So what kinds of "deep" subjects are you talking about?

Child Pornography? If so, who cares except to call the police which I would happily do.

Otherwise, what odious topics are you referring to?



posted on Jan, 22 2012 @ 10:18 AM
link   

Originally posted by Helig
reply to post by flyingdonkey
 


While this might seem accurate it unfortunately is not; your ISP hands out IP addresses using a DHCP server, this server can and often is configured to remember who had what address at any given time, so its just a matter of pulling the log files and searching out who had IP address 192.168.0.211 or whatever it happens to be.

I did not know that.
Thanks for the information.



posted on Jan, 22 2012 @ 10:21 AM
link   

Originally posted by we98jhwe
....., then go to hushmail.com and set up an email from tor - that way when you register to sites etc - they won't be able to get *any* info on you.
.........
we98jhwe


Encrypted E-Mail Company Hushmail Spills to Feds


Hushmail, a longtime provider of encrypted web-based email, markets itself by saying that "not even a Hushmail employee with access to our servers can read your encrypted e-mail, since each message is uniquely encoded before it leaves your computer."

But it turns out that statement seems not to apply to individuals targeted by government agencies that are able to convince a Canadian court to serve a court order on the company.

Continued: www.wired.com...



posted on Jan, 22 2012 @ 11:22 AM
link   
First, to everyone in this thread who mentioned facebook, what the heck are you thinking? To use facebook, you log into your facebook account which means you are identified. The whole purpose of Tor is to be anonymous so you CAN'T be identified. If you're talking about using facebook on Tor, you're missing something, unless you're talking about logging into a fake facebook account which probably violates the facebook T&C.

I have some friends who were critizing their employer, a fortune 500 company, and they didn't use Tor, so the company was able to trace the criticism back to them and they lost their job as a result. This is one way Tor could be useful...you can be a wistleblower and not have the information traced back to you if you know how to use it. Here is another use:


Originally posted by mainidh
Your fear is entirely unwarranted. I mean, do you go to google, and search for bad things? Then why would you using TOR?
I don't think they are bad things, but I don't want to take the chance that someone else will misunderstand. I've done a lot of searches on nuclear weapons. I don't want any, I don't intend to make any, etc, but I have a lot of interest in who does have them and what they are doing with them etc, so it just doesn't seem wise to let "big brother" Google have a profile on me with a lot of searches on nuclear weapons that might make me a person of interest, when really, I'm not a person of interest, I'm just curious. So Tor prevents these nuclear weapon searches from all getting logged to my IP address, when I don't have any bad intentions.


Originally posted by angeldoll
Lots of talk about "finding yourself somewhere you don't want to be", and making it all sound very nefarious, mysterious, and highly secretive.

So what kinds of "deep" subjects are you talking about?

Child Pornography? If so, who cares except to call the police which I would happily do.

Otherwise, what odious topics are you referring to?
Actually calling the police could backfire on you.

If you find illegal material, you probably clicked on a link that said it led to illegal material, and it's illegal to click on such a link. So you'd basically be reporting yourself as a criminal. Besides, law enforcement already knows the illegal content is there, and they have traps set everywhere, so one of those illegal links you clicked on could be set up by law enforcement. They have a bag of tricks they can use to expose your real IP address, so they may already know that you clicked on an illegal link before you even call them to report it, if you don't know what you're doing. So by the time you call they could just ask you to come down and turn yourself in because they already have an indictment against you for clicking that honeypot trap link they set up. And if law enforcement didn't set up the link and you admitted to them that you clicked it, you just admitted to being a criminal and you can be prosecuted for that.


Originally posted by Helig
There have been several documented attacks that can make it possible to discover the originating IP address.
Yes I've even seen a paper which gives instructions on how a tor exit node owner can learn the true IP of a Tor user. It's not 100% effective even if you know what you're doing, and if you don't know what you're doing, it's probably worse to use Tor than to not use it because if you don't use it at least you're not under the illusion that you're anonymous.



posted on Jan, 22 2012 @ 11:44 AM
link   
reply to post by Sozen94
 




I'm also interested in knowing what Marianas Web is.

Any information would be greatly appreciated.


Its not real , its a made up concept.

Theres a lot and myth and general BS about the so called 'dark web'.

The dark web / deep web is mainly drugs , CP , gore , hacking and assassination. Theres some conspiracy stuff there to but nothing you cant find on the normal web.

Im sure there plenty of people who get a buzz out of thinking they are some kind of secret agent by surfing on TOR because its a dark and dangerous place
but the content is pretty shallow and somewhat childish at times. There is some ok hacking info on there but not all that much.

I guess the dark web would be a great place to get stuff that you couldnt get in real life because you dont know the right people. Its all a bit sad.

If you really want to know whats on there without getting involved just go to youtube and search for "exploring the dark web".

edit on 22-1-2012 by PhoenixOD because: (no reason given)



posted on Jan, 22 2012 @ 11:50 AM
link   

Originally posted by Arbitrageur
First, to everyone in this thread who mentioned facebook, what the heck are you thinking? To use facebook, you log into your facebook account which means you are identified. The whole purpose of Tor is to be anonymous so you CAN'T be identified. If you're talking about using facebook on Tor, you're missing something, unless you're talking about logging into a fake facebook account which probably violates the facebook T&C.


Touche, I missed the obvious flaw there, my bad.

I myself have an interest in things such as nuclear weapons etc, as well as other stuff that I want to learn about without being flagged as 'interesting' (such as home-made explosives.) Will I ever actually use such information? Hell no, I just like learning!

Kyle



posted on Jan, 22 2012 @ 11:59 AM
link   

Originally posted by DanaKatherineScully
what about using a new laptop & only using it for Tor ?

i have thought about Tor in the past, this is a interesting thread.


no need for that. just run your nefarious activities in a "sandbox"



posted on Jan, 22 2012 @ 12:59 PM
link   
Ok so I downloaded Tor yesterday, I'm not big in "hacking" and whatnot but i did come across cp, gore, drugs, etc. Easily accessible in the hidden wiki. I also believe that very, very experienced "Hackers" or people with a good understanding of how it works lurk in "mariana's web" for the purpose of stealing information for financial gain or plotting some other kind of actions. It wouldn't make sense to me not to believe that there are those kind of people out there if you're able to hire assassins through it.

I came across a very good library of resources for PDFs like martial arts, nutrition, making knives, etc. Everyday things which might contain decent information. I'm currently in the process of downloading it because it is slow as scheisse. Here's the link. No cp, gore, etc on here. Just PDF files of educational subjects and How To's.

am4wuhz3zifexz5u.onion...

I wouldn't explore the deeper webs if i were just starting with this. It's traceable from what I read and you don't need to be looking at the weird and sick side of humanity anyway.



posted on Jan, 22 2012 @ 01:24 PM
link   

Originally posted by Helig
reply to post by UkRandom
 


Yes, I will be that person to say that pastebin article reads like some terrible cyberpunk fiction. I can safely say as somebody who remembers the ancient days of dialup BBS systems that there are obviously less-than-user-friendly networks out there, but none of this multi-tier jargon soup thats been spouted off about so far. I know its fun to make up all kinds of fancy concepts but lets just say that those who have a clue how networks function are getting a good chuckle out of this whole thread.


i agree, that article seems to make it sound like something out of The Matrix, that level 7 with it's virus soup & level 8 that cannot be accessed at all, what i don't understand is that if you get into level 5 people will be 'after you' but yet there are people & corporation's in level 7 stopping people from getting into level 8, but to even access level 6 you need to have a quantum computer, yet there are only a couple of them in existence & only one company make them called D-Wave Systems, yet even if you got into level 8 there is no way it can be controlled nor could you make it do something, also if there is all this technical info available level 4, why is no available on the 'normal' internet on sites like this, because people would leak it about all over the web, you could easily put the 'stuff' online without anyone knowing who put it there, even uploading it from a free wifi hotspot like Starbucks.

however saying all that it is a pretty intriguing place, maybe in a few years when quantum computer's are available relatively cheaply we can all dip out toe's into 'the fog'



posted on Jan, 22 2012 @ 01:28 PM
link   
reply to post by Xoanon
 


Excellent video. Logical conclusion from this imo, is if you have an ego in check (common sense), web or program skills, TOR is nearly a slam-dunk must have tool.

I've used it for newb-level anonymity and have ditched it because I had a natural distrust for something purported to be secure. This video has really brought a new level of understanding to the battle for communication control.

I think of it like I would any potentially dangerous shop tool or working on the current coming into your home. If you don't know how to use the tool safely, you might get zapped. But that doesn't mean you don't ever use the tool or have someone qualified to do it for you.

For others the temptation is going to be to dig as far as possible. Probably good to understand the types of hornets nests you might be poking in before doing so, imo.

Peace





new topics

top topics



 
49
<< 2  3  4    6  7  8 >>

log in

join