24 526 017

unique deep web pages in the database
News
Cover
Some users believe that by using tor websites through a special browser they gain complete anonymity. However, this is a fallacy: onion users can be identified if they want to, but complete anonymity, even when using tor websites, is impossible. You can only confuse the traces as much as possible to make it difficult for you to de-anonymize. To understand what anonymity means, let's understand what anonymity means and what people mean when they talk about it.What is Anonymity?With regard to the Internet anonymity means the technical impossibility to link actions performed on Internet resources... read more
Cover
Welcome on board, stranger! Today we're going to break down how to use firefox for surfing Tor network.We're going to show you how to surf tor network even if the tor browser package isn't available for your distribution. Some operating systems like FreeBSD and older 32-bit GNU/Linux distributives have the tor package in their repositories but they don't have the tor browser bundle. So, let's install tor and torsocks proxy:sudo apt install tor torsocksIn this way the tor package is installed together with a proxy that we will use to make firefox connect to the... read more
Cover
Contrary to popular myth, using the tor webbrowser does not lead to anonymity, and many tools which are considered to be effective - can not only not help you increase your anonymity, but on the contrary help reveal your identity. In this article you will learn why tor webbrowser is not a panacea and what other popular misconceptions about anonymity exist.We've compiled for you a list of the most popular misconceptions that can be found anywhere on the Internet, from comments by ordinary users, to resources that position themselves as resources on information security and... read more
Cover
Users of anonymous networks and browsers probably use them to visit mostly blocked or secure sites. However, not all of them expect the fact of this visit to remain anonymous. If anonymity while surfing deepweb doesn't bother you, you probably won't be interested in the rest of this article.We will not go into the intricacies of the functioning of these networks and try to hack them. As you know, even the most perfect security feature has a human bottleneck. Therefore, we will talk about the methods that bypass distributed protocols, exploit common mistakes made by... read more
Cover
Today we're going to discuss how to work in Tor internet browser.There are a number of important points to keep in mind if you plan to use Tor Browser to protect your online privacy. Yes, this is one of the best ways to ensure your digital anonymity, but it is not ideal - and therefore you should be clear about what to expect.Firstly, if you are going to work in the Darkweb from region where it is prohibited anonymously at the most secure and private level, then you will need to access Tor through a... read more
Cover
The Tor network, which can be accessed through the Tor browser, is a system of servers that support "onion routing" - the technology of anonymous information exchange through the computer network. Tor allows the user to remain incognito on the Internet and protects its traffic from analysis.There are four types of nodes (servers, relays) on the Tor network: Input (Guard), Middle, Output (Exit) and Bridges.Input and output nodes, as their name implies, are the start and end points in the route of user traffic through the Tor network.Bridge nodes do this by "cross-posting" traffic to... read more
Cover
The search query "Torproject org download" becomes more and more popular every year. This is due to the fact that web users are increasingly concerned about their privacy. As authoritarian regimes ramp up their computing power to hack the privacy of the web, the Tor project team is responding to protect their users. Who uses the Tor Browser?Today, more and more users are favoring onion routing over the Internet. At the same time, contrary to the common myth, Tor is used not only by the cybercriminals but also by ordinary people who for some reasons... read more
Cover
The number of cyber attacks targeting both large organizations and individual users is growing every year. This makes privacy and data protection a trend of the 21st century. One of the most reliable tools for your data protection and secure web surfing was developed by torproject team: their product is downloaded by thousands of users daily and the number of Tor-browser users is counted in millions. In this article you will learn how to download software from torproject and what the principles of this network are. How to install Tor browser? To install this software,... read more
Cover
Tor has a daily audience of over 2 million users, and there are about 100,000 registered deepweb sites used by various services. It's pretty hard to imagine an array of 100,000 websites. Those who use Tor on a daily basis may think that this number of deepweb sites is inaccurate or exaggerated. On the other hand, it is important to understand that the Tor network does not consist solely of HTTP sites.There are tens of thousands of SSH, FTP, SMTP, Bitcoin, XMPP, Ricochet and IRC servers using .onion addresses for anonymity or convenience. Most of... read more
Cover
Deep internet search can be a problem for users who are just beginning their acquaintance with the darknet. The problem is that the work of Tor network differs from the principles of the open Internet, in this regard, the search for the necessary information on the deep Internet can be difficult not only for beginners, but also for experienced users. Peculiarities of deep internet search The structure of darknet today resembles the internet of 90s: it's much more difficult to find information here than in more usual search engines, and the network itself may be... read more
Cover
The number of bridges on the Tor anonymous network has been declining since the beginning of the year, and the Tor Project needs to attract new operators. The Tor Project has seen a recent decline in the number of relays and bridges on its Tor anonymous network and is offering a reward to project participants to bring it back. Those who help to ensure the continued existence of the anonymous network, as an incentive Tor Project will give hoodies, T-shirts and stickers with the project.More precisely, those who manage the so-called bridges - Tor nodes... read more
Cover
Today you will learn all the most important things about ProtonMail. How it differs from other email services and what security technologies it uses, how anonymous is it?Features ProtonMail differs from other email services in its ability to encrypt emails before they are sent to the server. The entire encryption/decryption process takes place directly in your web browser, and only the encrypted data is stored on the service server. According to the authors of the service, even in court they will not be able to decrypt user's messages.By default the service uses one password for... read more
Cover
The lack of proper data protection allows even lower-level Amazon employees to keep track of the user's purchase history.American e-commerce giant Amazon has repeatedly stated that customers come first, but it looks like the security of customer data is not a priority for the company. Lack of adequate data protection allows even low-level Amazon employees to track the purchase history of users, including celebrities, according to new research by Wired.According to Wired, purchase history information was available to Amazon's customer service team with little to no protection from espionage. According to the former Amazon employee,... read more
4 days ago
Cover
The Android Open Source Project is a free project. However, Google has penetrated it very deeply. Unfortunately, more and more Android APIs and libraries are now only available on smartphones with Google Apps pre-installed. In this way, Google effectively ties third-party apps to its closed ecosystem. As a result, a number of popular open-source applications can no longer run without Google libraries.In essence, Android is a special kind of "look but don't touch" type of opensource, based on the Shared Source model. Unsurprisingly, there is a proliferation of open-source projects that aim to completely remove... read more
Cover
North Korean cybercriminals have been linked to a large wave of credential theft campaigns targeting researchers, educational institutions, government, media and other organizations. Two campaigns also focused on distributing malware that could be used to gather intelligence.Security firm Proofpoint has linked the campaigns to a group they track called TA406 (also known as Kimsuky, Velvet Chollima, Thallium, Black Banshee, ITG16, and the Konni Group.Politicians, journalists and non-governmental organizations have been the victims of lengthy campaigns between January and June 2021. The attacks were carried out against targets in North America, Russia, China and South Korea.The... read more
Cover
The Tor Project is working on its own implementation of VPN-like technology, to guarantee increased privacy.At the moment, Tor VPN is planned to be developed for the Android operating system. The estimated release date is now set for 2023, after which the release to other platforms is also planned.It is reported that the development will be handled by specialists from Tor Project and Guardian Project. Guardian Project is known primarily for the development of Orbot, a proxy server that provides anonymity to users of Android devices.The development of the new technology was announced by developer... read more
Cover
The US Federal Bureau of Investigation, the US Cyber ​​and Infrastructure Security Agency (CISA), the Australian Cybersecurity Center (ACSC) and the UK National Cyber ​​Security Center (NCSC) jointly warned of an increasing number of attacks by Iranian groups using vulnerabilities in Fortinet FortiOS (CVE-2018 -13379, CVE-2020-12812 and CVE-2019-5591) and Microsoft Exchange. According to experts, attackers often run BitLocker malware on compromised Windows computers to encrypt data for ransom or disruption.Intelligence agencies issued a warning less than three weeks after the head of the Iranian Civil Defense Organization, Golamreza Jalili, who oversees the country's cyber security... read more
Cover
Twinme is one of the most convenient and secure solutions for anonymous communication, file exchange, audio and video calls. The application from the developers from Germany is free and does not require personal data during registration, while having a high level of protection of correspondence. Main features Twinme messenger provides users with a standard set of functions: messaging, file exchange, as well as the option of video and audio calls. However, the architecture of the messenger has some features that distinguish it from other popular platforms for confidential communication. Twinme uses technology that does not... read more
Cover
Hackers were able to gain access to FBI servers to send fake emails on behalf of the bureau warning of impending cyberattacks to tens of thousands of users. FBI officials acknowledged that their structure had vulnerabilities and was under attack. This is stated in the official message on the FBI website. According to investigative journalist Brian Krebs, who allegedly made contact with the hackers who carried out the attack, the attackers took advantage of a vulnerability in the FBI's own systems. The weakness that allowed the attack to take place was found by the crooks... read more
Cover
Cybersecurity experts have discovered a new type of attack that tracks the digital fingerprint of encrypted Tor traffic. The attacker can identify the site visited by the user, but only if the attacker uses a specific sample of sites."While the accuracy of an attack when monitoring a small group of five popular web-sites can exceed 95%, the accuracy of indiscriminate (non-targeted) attacks on groups of 25 and 100 web-sites does not reach 80% and 60% respectively," the experts explained.Tor browser offers its users the ability to route Internet traffic through an overlay network of more... read more