<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Dark Web &#8211; That Freaky NewGuy</title>
	<atom:link href="https://freakynewguy.net/tag/dark-web/feed/" rel="self" type="application/rss+xml" />
	<link>https://freakynewguy.net</link>
	<description>Just Another Noob</description>
	<lastBuildDate>Mon, 01 Apr 2024 03:41:11 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://freakynewguy.net/wp-content/uploads/2022/08/cropped-Noobicon-1-32x32.png</url>
	<title>Dark Web &#8211; That Freaky NewGuy</title>
	<link>https://freakynewguy.net</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">209481562</site>	<item>
		<title>AI&#8217;s Disturbing Role in Social Media Scams and Propaganda</title>
		<link>https://freakynewguy.net/ais-disturbing-role-in-social-media-scams-and-propaganda/</link>
					<comments>https://freakynewguy.net/ais-disturbing-role-in-social-media-scams-and-propaganda/#respond</comments>
		
		<dc:creator><![CDATA[Freaky Newguy]]></dc:creator>
		<pubDate>Mon, 01 Apr 2024 03:35:33 +0000</pubDate>
				<category><![CDATA[ITSec]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[IT Sec]]></category>
		<guid isPermaLink="false">https://freakynewguy.net/?p=655</guid>

					<description><![CDATA[<p>In the digital age, artificial intelligence (AI) is rapidly revolutionizing various aspects of our lives. From AI-driven personal assistants to autonomous driving systems, the benefits are undeniable. However, like any technology, AI is a double-edged sword. It&#8217;s not just making our lives easier, but it&#8217;s also becoming an accomplice in nefarious activities like social media… <span class="read-more"><a href="https://freakynewguy.net/ais-disturbing-role-in-social-media-scams-and-propaganda/">Read More &#187;</a></span></p>
<p>The post <a rel="nofollow" href="https://freakynewguy.net/ais-disturbing-role-in-social-media-scams-and-propaganda/">AI&#8217;s Disturbing Role in Social Media Scams and Propaganda</a> appeared first on <a rel="nofollow" href="https://freakynewguy.net">That Freaky NewGuy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the digital age, artificial intelligence (AI) is rapidly revolutionizing various aspects of our lives. From AI-driven personal assistants to autonomous driving systems, the benefits are undeniable. However, like any technology, AI is a double-edged sword. It&#8217;s not just making our lives easier, but it&#8217;s also becoming an accomplice in nefarious activities like social media scams and online propaganda. Let&#8217;s dive into how AI is pulling strings behind these dark activities.</p>
<h2>How AI&#8217;s Turning into the Puppet Master of Social Media Scams</h2>
<p>When you think of a scam, you probably imagine a shady individual trying to convince you to part with your money. But with AI, the game has changed. Today’s scammers are not just individuals sitting behind a computer screen but AI machines that are programmed to deceive. They utilize AI technologies to create realistic-looking fake profiles on social media platforms. These bots are then used to impersonate real individuals or organizations, tricking unsuspecting users into fraudulent activities.</p>
<p>These AI-controlled bots are incredibly intelligent, capable of mimicking human interaction to a tee. They can engage in believable conversations, making it difficult for users to distinguish them from real humans. They&#8217;re also relentless; while a human scammer needs rest, these AI bots can operate 24/7, casting a wide net to lure as many victims as possible. This automation of deceit makes AI a potent tool in the hands of cybercriminals, making social media scams more sophisticated, effective, and widespread.</p>
<h2>The Undercover Role of AI in Spreading Online Propaganda</h2>
<p>AI is not just facilitating scams, but it&#8217;s also playing a crucial role in the spread of online propaganda. AI technologies like deepfake capabilities, which create highly realistic but entirely false videos, are used to spread misinformation and propaganda. These technologies can fabricate speeches or actions of public figures, creating credible looking falsified content, which then gets shared and propagated on social media platforms.</p>
<p>Further, AI is also used in targeted propaganda campaigns. Machine learning algorithms are used to analyze user data and behavior, predicting what kind of content a user is most likely to engage with. This data is then used to show users propaganda content that is tailored to their interests and biases, thereby increasing the likelihood of its acceptance. This kind of targeted misinformation is not only divisive but also undermines the democratic process, making AI a powerful weapon in the hands of those seeking to manipulate public opinion.</p>
<p>So while AI brings numerous benefits, we must also acknowledge and address its darker applications. The clandestine role of AI in social media scams and online propaganda is a stark reminder that any technology, in the wrong hands, can be weaponized for destructive purposes. Therefore, it is critical to develop robust regulatory frameworks and ethical guidelines that govern the use of AI, ensuring it remains a tool for progress, not destruction. As we continue to explore and harness the power of AI, we must tread the fine line with caution, ensuring that we leverage its benefits without succumbing to its dark potentials.</p>
<p>The post <a rel="nofollow" href="https://freakynewguy.net/ais-disturbing-role-in-social-media-scams-and-propaganda/">AI&#8217;s Disturbing Role in Social Media Scams and Propaganda</a> appeared first on <a rel="nofollow" href="https://freakynewguy.net">That Freaky NewGuy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://freakynewguy.net/ais-disturbing-role-in-social-media-scams-and-propaganda/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">655</post-id>	</item>
		<item>
		<title>What Are Dedicated Encrypted Criminal Communication Devices?</title>
		<link>https://freakynewguy.net/dedicated-encrypted-criminal-communication-device/</link>
					<comments>https://freakynewguy.net/dedicated-encrypted-criminal-communication-device/#respond</comments>
		
		<dc:creator><![CDATA[Freaky Newguy]]></dc:creator>
		<pubDate>Thu, 04 Jan 2024 03:32:03 +0000</pubDate>
				<category><![CDATA[Anything Else]]></category>
		<category><![CDATA[ITSec]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Mobile]]></category>
		<guid isPermaLink="false">https://freakynewguy.net/?p=587</guid>

					<description><![CDATA[<p>Understanding the Functionality of Dedicated Encrypted Criminal Communication Devices So, you&#8217;re sitting there, sipping your morning coffee, scrolling through the news, and you stumble upon a headline that reads, &#8220;Police Crack Down on Dedicated Encrypted Criminal Communication Devices.&#8221; You scratch your head, wondering, &#8220;What in the world are those?&#8221; Well, my friend, buckle up because… <span class="read-more"><a href="https://freakynewguy.net/dedicated-encrypted-criminal-communication-device/">Read More &#187;</a></span></p>
<p>The post <a rel="nofollow" href="https://freakynewguy.net/dedicated-encrypted-criminal-communication-device/">What Are Dedicated Encrypted Criminal Communication Devices?</a> appeared first on <a rel="nofollow" href="https://freakynewguy.net">That Freaky NewGuy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 id="understanding-the-functionality-of-dedicated-encrypted-criminal-communication-devices-wpaicgheading">Understanding the Functionality of Dedicated Encrypted Criminal Communication Devices</h1>
<p>So, you&#8217;re sitting there, sipping your morning coffee, scrolling through the news, and you stumble upon a headline that reads, &#8220;Police Crack Down on Dedicated Encrypted Criminal Communication Devices.&#8221; You scratch your head, wondering, &#8220;What in the world are those?&#8221; Well, my friend, buckle up because we&#8217;re about to dive into the murky waters of the underworld&#8217;s tech scene.</p>
<p>Imagine you&#8217;re a criminal mastermind, a real-life Professor from Money Heist, if you will. You&#8217;ve got a grand plan, a team of misfits, and a catchy codename. But you&#8217;ve got a problem: how do you communicate with your team without the cops listening in? Enter dedicated encrypted criminal communication devices. These aren&#8217;t your run-of-the-mill iPhones or Androids. Oh no, these are the James Bond of communication devices, designed to keep your secrets, well, secret.</p>
<p>These devices are like the black sheep of the smartphone family. They look like regular phones, but they&#8217;ve been modified to remove all the usual features. No camera, no internet browsing, no games. Sorry, Candy Crush addicts, this phone isn&#8217;t for you. Instead, these devices are stripped down to the bare essentials: encrypted messaging and voice calls.</p>
<p>Now, you might be thinking, &#8220;But my iPhone has encrypted messaging!&#8221; And you&#8217;d be right. But the encryption on these devices is like your iPhone&#8217;s encryption on steroids. It&#8217;s designed to be uncrackable, even by the most tech-savvy law enforcement agencies.</p>
<p>The messages sent through these devices are scrambled into a series of seemingly random characters. To anyone without the decryption key, it looks like gibberish. But to those in the know, it&#8217;s a clear, secure line of communication. It&#8217;s like passing notes in class, but instead of a simple fold and tuck, you&#8217;re using a complex code that only you and your buddy understand.</p>
<p>But here&#8217;s the kicker: these devices often have a &#8220;panic button&#8221; feature. If the user thinks they&#8217;re about to be caught, they can hit this button, and poof! All the data on the device is wiped clean. It&#8217;s like a self-destruct button for your secrets. Talk about dramatic!</p>
<p>Now, I know what you&#8217;re thinking: &#8220;These sound pretty cool. Where can I get one?&#8221; Well, hold your horses, cowboy. These devices are typically only available through the criminal underworld. And even if you could get your hands on one, using it could land you in some hot water. Law enforcement agencies around the world are cracking down on these devices, and being caught with one could lead to some serious jail time.</p>
<p>So, there you have it. Dedicated encrypted criminal communication devices: the secret weapon of the criminal underworld. They&#8217;re like the Batphone for bad guys, providing a secure line of communication for those up to no good. But remember, while they might sound cool, these devices are no laughing matter. They&#8217;re a serious tool for serious criminals, and getting caught with one is no joke. Keep in mind that it is not unknown for law enforcement to <a href="https://www.vice.com/en/article/n7b4gg/anom-phone-arcaneos-fbi-backdoor" target="_blank" rel="noopener">sell backdoored DECCDs to bad guys</a> in order to set up sting ops. So, stick to your regular smartphone, and leave the encrypted devices to the bad guys. After all, you wouldn&#8217;t want to end up like the villains in a Bond movie, would you?</p>
<p>The post <a rel="nofollow" href="https://freakynewguy.net/dedicated-encrypted-criminal-communication-device/">What Are Dedicated Encrypted Criminal Communication Devices?</a> appeared first on <a rel="nofollow" href="https://freakynewguy.net">That Freaky NewGuy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://freakynewguy.net/dedicated-encrypted-criminal-communication-device/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">587</post-id>	</item>
		<item>
		<title>5 Best Tools for OSINT Research</title>
		<link>https://freakynewguy.net/5-best-tools-for-osint-research/</link>
					<comments>https://freakynewguy.net/5-best-tools-for-osint-research/#respond</comments>
		
		<dc:creator><![CDATA[Freaky Newguy]]></dc:creator>
		<pubDate>Mon, 10 Apr 2023 05:27:14 +0000</pubDate>
				<category><![CDATA[ITSec]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[IT Sec]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[tor]]></category>
		<guid isPermaLink="false">https://freakynewguy.net/?p=220</guid>

					<description><![CDATA[<p>Introduction to OSINT Research: What is OSINT and How Can It Help You? OSINT, or Open Source Intelligence, is a type of intelligence gathering that relies on publicly available information. It is used by governments, businesses, and individuals to gain insight into a variety of topics, from political and economic trends to security threats. OSINT… <span class="read-more"><a href="https://freakynewguy.net/5-best-tools-for-osint-research/">Read More &#187;</a></span></p>
<p>The post <a rel="nofollow" href="https://freakynewguy.net/5-best-tools-for-osint-research/">5 Best Tools for OSINT Research</a> appeared first on <a rel="nofollow" href="https://freakynewguy.net">That Freaky NewGuy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img fetchpriority="high" decoding="async" data-attachment-id="291" data-permalink="https://freakynewguy.net/5-best-tools-for-osint-research/open-source-intelligence-tools/" data-orig-file="https://freakynewguy.net/wp-content/uploads/2023/04/Open-source-intelligence-tools.png" data-orig-size="850,431" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="Open-source-intelligence-tools" data-image-description="" data-image-caption="" data-medium-file="https://freakynewguy.net/wp-content/uploads/2023/04/Open-source-intelligence-tools-300x152.png" data-large-file="https://freakynewguy.net/wp-content/uploads/2023/04/Open-source-intelligence-tools.png" src="https://freakynewguy.net/wp-content/uploads/2023/04/Open-source-intelligence-tools.png" alt="Open source Intelligence tools" class="wp-image-291" width="566" height="286" srcset="https://freakynewguy.net/wp-content/uploads/2023/04/Open-source-intelligence-tools.png 850w, https://freakynewguy.net/wp-content/uploads/2023/04/Open-source-intelligence-tools-300x152.png 300w, https://freakynewguy.net/wp-content/uploads/2023/04/Open-source-intelligence-tools-768x389.png 768w, https://freakynewguy.net/wp-content/uploads/2023/04/Open-source-intelligence-tools-660x335.png 660w" sizes="(max-width: 566px) 100vw, 566px" /></figure>
</div>

<h2 id="wpaicg-introduction-to-osint-research-what-is-osint-and-how-can-it-help-you">Introduction to OSINT Research: What is OSINT and How Can It Help You?</h2>
<p>OSINT, or Open Source Intelligence, is a type of intelligence gathering that relies on publicly available information. It is used by governments, businesses, and individuals to gain insight into a variety of topics, from political and economic trends to security threats. OSINT is a powerful tool that can be used to help make informed decisions.</p>
<p>At its core, OSINT is the practice of collecting and analyzing publicly available information. This includes data from websites, social media, news outlets, and other sources. It can also include information from public records, such as court documents and government reports. By combining this data, OSINT practitioners can gain a better understanding of a particular topic or situation.</p>
<p>OSINT can be used in a number of ways. For example, it can be used to monitor political and economic trends, identify security threats, and uncover hidden information. It can also be used to investigate people and organizations, uncover fraud and corruption, and track down criminals.</p>
<p>In short by combining publicly available data, OSINT practitioners can gain a better understanding of a particular topic or situation. It can be a valuable tool for businesses, governments, and individuals, helping them make better decisions and uncover hidden opportunities.</p>
<h2 id="wpaicg-5-best-tools-for-osint-research-what-they-are-and-how-to-use-them">5 Best Tools for OSINT Research: What They Are and How to Use Them</h2>
<p>Open-source intelligence (OSINT) research is a powerful tool for gathering information. In this article, we will discuss the five best tools for OSINT research and how to use them.</p>
<h3>1. Maltego</h3>
<p><a href="https://www.maltego.com/maltego-community/" target="_blank" rel="noopener">Maltego </a>is a powerful OSINT tool that allows users to gather and visualize data from a variety of sources. It can be used to map out relationships between people, organizations, and events. It also allows users to search for information on social media, websites, and other public records.</p>
<h3>2. Recon-ng</h3>
<p><a href="https://github.com/lanmaster53/recon-ng" target="_blank" rel="noopener">Recon-ng</a> is a powerful and efficient reconnaissance tool that can help security professionals and penetration testers gather the information they need to identify vulnerabilities and secure their systems. However, it requires some technical expertise and familiarity with the command-line interface to use effectively.</p>
<h3>3. Spiderfoot</h3>
<p><a href="https://intel471.com/solutions/attack-surface-protection" target="_blank" rel="noopener"> Spiderfoot</a> is an open-source reconnaissance tool that automates the process of gathering information about a target, such as domains, IP addresses, email addresses, and social media profiles. The tool is written in Python and is available for Windows, Linux, and macOS. Spiderfoot can help security professionals and penetration testers gather valuable information about their targets. Its integration with a variety of data sources and user-friendly interface make it a popular choice in the security community. However, it may require some technical expertise to set up and configure properly</p>
<h3>4. Shodan</h3>
<p><a href="https://www.shodan.io/" target="_blank" rel="noopener"> Shodan</a> is a search engine that allows users to discover internet-connected devices and systems, including servers, routers, webcams, and other IoT devices. Unlike traditional search engines, Shodan indexes information about the devices themselves, rather than the web pages they host. Shodan has the ability to provide users with detailed information about the devices it discovers, such as their location, operating system, open ports, and even the types of software they are running. This can be valuable for security professionals and researchers looking to identify potential vulnerabilities or threats in their networks.</p>
<h3>5. TheHarvester</h3>
<p><a href="https://github.com/laramies/theHarvester" target="_blank" rel="noopener"> TheHarvester</a> is an open-source reconnaissance tool that automates the process of gathering information about a target, such as email addresses, subdomains, and open ports. The tool is written in Python and is available for Windows, Linux, and macOS. TheHarvester has the ability to search multiple sources for information, including search engines, social media platforms, and public databases. This allows users to gather a comprehensive profile of their targets, including email addresses, domain names, and other important information.</p>
<p>These are the five best tools for OSINT research. Each of these tools has its own unique features and capabilities, so it is important to choose the one that best suits your needs. With the right tool, you can easily gather the information you need to conduct effective OSINT investigations.</p>
<h2 id="wpaicg-exploring-the-benefits-of-osint-research-how-it-can-help-you-find-valuable-information">Exploring the Benefits of OSINT Research: How It Can Help You Find Valuable Information</h2>
<p>OSINT (Open Source Intelligence) research is a powerful tool. It is a form of intelligence gathering that relies on publicly available sources, such as the internet, to collect data. OSINT research can be used to uncover a variety of information, including market trends, competitor analysis, and criminal activiy.</p>
<p>One benefit of OSINT research is that it is cost-effective. Unlike other forms of intelligence gathering, such as hiring a private investigator or conducting a survey, OSINT research can be done with little financial investment. This makes it an attractive option for businesses and organizations that are looking to save money while still gathering valuable information.</p>
<p>Another benefit of OSINT research is that it can provide a wealth of information in a short amount of time. By leveraging the power of the internet, OSINT researchers can quickly and easily access a variety of sources, such as news articles, social media posts, and public records. This allows them to quickly gather a large amount of data in a short period of time.</p>
<p>OSINT research can also be used to uncover hidden information. By using advanced search techniques, and accessing dark web resources, OSINT researchers can uncover information that may not be readily available. This can be especially useful for uncovering information about competitors or potential criminals.</p>
<p>Finally, OSINT research can be used to verify information. By cross-referencing data from multiple sources, OSINT researchers can ensure that the information they are gathering is accurate and up-to-date. This can be especially useful for businesses and organizations that need to make sure that the information they are using is reliable.</p>
<p>In conclusion, OSINT research is a powerful tool for gathering valuable information. It is cost-effective, provides a wealth of information in a short amount of time, can uncover hidden information, and can be used to verify information. For these reasons, OSINT research can be an invaluable asset for businesses and organizations looking to gain a competitive edge.</p>
<h2 id="wpaicg-how-to-use-osint-research-to-uncover-hidden-data-and-insights">How to Use OSINT Research to Uncover Hidden Data and Insights</h2>
<p>Open-source intelligence (OSINT) research is a powerful tool for uncovering hidden data and insights. It involves collecting and analyzing publicly available information from a variety of sources, such as the internet, social media, and public records. By leveraging OSINT research, organizations can gain valuable insights into their customers, competitors, and the market.</p>
<p>To get started with OSINT research, it is important to first identify the type of data you are looking for. This could include customer demographics, market trends, or competitor analysis. Once you have identified the type of data you need, you can begin to search for relevant sources. This could include websites, social media accounts, and public records.</p>
<p>Once you have identified the sources you want to use, you can begin to analyze the data. This could involve using search engines to find relevant information or using data mining tools to uncover hidden patterns and trends. You can also use social media analytics to gain insights into customer behavior and sentiment.</p>
<p>Finally, it is important to document your findings. This could involve creating reports or visualizations to present your findings in an easy-to-understand format. This will help you to communicate your findings to stakeholders and make informed decisions.</p>
<p>By leveraging OSINT research, organizations can gain valuable insights into their customers, competitors, and the market. By identifying the type of data you need, searching for relevant sources, analyzing the data, and documenting your findings, you can uncover hidden data and insights.</p>
<h2 id="wpaicg-tips-and-tricks-for-effective-osint-research-strategies-for-getting-the-most-out-of-your-research">Tips and Tricks for Effective OSINT Research: Strategies for Getting the Most Out of Your Investigation</h2>
<p>1. Start with Open Source Intelligence (OSINT) Basics: Before beginning your research, it is important to understand the basics of OSINT. Familiarize yourself with the different types of OSINT, such as public records, social media, and dark web sources.</p>
<p>2. Utilize Advanced Search Techniques: Utilize advanced search techniques to narrow down your search results and find the most relevant information. Use Boolean operators, wildcards, and other search modifiers to refine your search.</p>
<p>3. Use Multiple Sources: Don’t rely on just one source for your research. Use multiple sources to get a more comprehensive view of the topic.</p>
<p>4. Verify Your Sources: Make sure to verify the accuracy of the information you find. Check the source of the information and look for any potential bias.</p>
<p>5. Stay Up-to-Date: Keep up with the latest news and developments in the field of OSINT. Subscribe to newsletters and follow relevant blogs and social media accounts to stay informed.</p>
<p>6. Protect Your Privacy: Be aware of the potential risks associated with OSINT research. Make sure to protect your privacy and take steps to ensure your safety. Use a VPN when conducting research. Use <a href="https://freakynewguy.net/how-to-access-the-dark-web/" target="_blank" rel="noopener">Tor</a> or set up a <a href="https://www.whonix.org/" target="_blank" rel="noopener">Whonix Gateway</a></p>
<p>7. Use Automation Tools: Automation tools can help you save time and effort when conducting OSINT research. Utilize automation tools to streamline your research process.</p>
<p>8. Take Notes: Keep track of your research by taking notes. This will help you stay organized and make it easier to refer back to your research later.</p>
<p>9. Share Your Findings: Share your findings with others in the OSINT community. This will help you build relationships and gain valuable insights from other researchers.</p><p>The post <a rel="nofollow" href="https://freakynewguy.net/5-best-tools-for-osint-research/">5 Best Tools for OSINT Research</a> appeared first on <a rel="nofollow" href="https://freakynewguy.net">That Freaky NewGuy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://freakynewguy.net/5-best-tools-for-osint-research/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">220</post-id>	</item>
		<item>
		<title>How To &#8211; Access The Dark Web</title>
		<link>https://freakynewguy.net/how-to-access-the-dark-web/</link>
					<comments>https://freakynewguy.net/how-to-access-the-dark-web/#comments</comments>
		
		<dc:creator><![CDATA[Freaky Newguy]]></dc:creator>
		<pubDate>Sat, 24 Sep 2022 05:16:56 +0000</pubDate>
				<category><![CDATA[ITSec]]></category>
		<category><![CDATA[Dark Web]]></category>
		<category><![CDATA[IT Sec]]></category>
		<category><![CDATA[tor]]></category>
		<guid isPermaLink="false">https://freakynewguy.net/?p=109</guid>

					<description><![CDATA[<p>What is the Dark Web? The Dark Web is often considered to be the most dangerous part of the internet. A subset of the deep web it cannot be indexed by traditional search engines. It is accessible with the right tools and can be extremely valuable if used correctly. Before accessing the Dark Web it… <span class="read-more"><a href="https://freakynewguy.net/how-to-access-the-dark-web/">Read More &#187;</a></span></p>
<p>The post <a rel="nofollow" href="https://freakynewguy.net/how-to-access-the-dark-web/">How To &#8211; Access The Dark Web</a> appeared first on <a rel="nofollow" href="https://freakynewguy.net">That Freaky NewGuy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img decoding="async" width="1024" height="684" data-attachment-id="119" data-permalink="https://freakynewguy.net/how-to-access-the-dark-web/dark-web/" data-orig-file="https://freakynewguy.net/wp-content/uploads/2022/09/dark-web.jpg" data-orig-size="1378,920" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="dark-web" data-image-description="" data-image-caption="" data-medium-file="https://freakynewguy.net/wp-content/uploads/2022/09/dark-web-300x200.jpg" data-large-file="https://freakynewguy.net/wp-content/uploads/2022/09/dark-web-1024x684.jpg" src="https://freakynewguy.net/wp-content/uploads/2022/09/dark-web-1024x684.jpg" alt="" class="wp-image-119" style="width:564px;height:377px" srcset="https://freakynewguy.net/wp-content/uploads/2022/09/dark-web-1024x684.jpg 1024w, https://freakynewguy.net/wp-content/uploads/2022/09/dark-web-300x200.jpg 300w, https://freakynewguy.net/wp-content/uploads/2022/09/dark-web-768x513.jpg 768w, https://freakynewguy.net/wp-content/uploads/2022/09/dark-web-660x441.jpg 660w, https://freakynewguy.net/wp-content/uploads/2022/09/dark-web.jpg 1378w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h2 class="wp-block-heading">What is the Dark Web?</h2>



<p>The Dark Web is often considered to be the most dangerous part of the internet. A subset of the deep web it cannot be indexed by traditional search engines. It is accessible with the right tools and can be extremely valuable if used correctly.</p>



<p>Before accessing the Dark Web it is useful to understand some of the key characteristics that are driving Dark Web growth. Let us first summarize where the Dark Web fits into the World Wide Web.</p>



<h4 class="wp-block-heading"><strong>The Surface Web</strong></h4>



<p>The Surface Web consists of web sites that are accessible using a search engine and a standard browser (e.g., news sites, company public websites, online shopping sites).</p>



<h4 class="wp-block-heading"><strong>The Deep Web</strong></h4>



<p>The Deep Web is a part of the surface internet not directly accessible through search engines but hidden behind a login wall or paywall (e.g., company network accessed via VPN)</p>



<h4 class="wp-block-heading"><strong>The Dark Web</strong></h4>



<p>Access to the Dark Web requires specific technology, such as a proprietary browser or encryption program. For most people “the internet” or “web” consists of social media sites such as Facebook or Instagram and news sites that appeal to any point of view. The internet is a place where you can shop, find recipes and send grandad an email with a funny picture of a cat. What many people are unaware of is that the web they use, accessed through Bing and Google, is just a small part of the web as a whole.</p>



<p>This “surface” or “indexed” web can be considered the public face of the World Wide Web. Beneath this lies a much larger layer that consists of sites not indexed by search engines such as private databases, password protected sites and email services. This layer is often called the “deep web”. Below this, we come to the Dark Net.</p>



<p>The dark level of the internet consists of sites deliberately hidden from view using encryption. Why are these sites hidden? People often answer that it is because criminal activity is involved, otherwise why hide? A closer examination of the history of the dark web and its evolution reveals a more nuanced truth.</p>



<p>The Dark Net is not one network but a term that encompasses many services such as Tor, Freenet and I2P. These services provide decentralized, encrypted and anonymous internet communications making them popular tools for sharing secret or sensitive data for both legitimate and nefarious purposes.</p>



<h2 class="wp-block-heading">The Tor Network</h2>



<p>This article will concentrate on the <a href="https://www.torproject.org/" target="_blank" rel="noopener">Tor Network.</a> Tor (The Onion Router) is easily the most widely known Dark Net (Freenet and I2P are other popular choices) and is frequently cited as an example of the disreputable side of the internet. Tor can be accessed through freely available software including a web browser that is very similar to Mozilla Firefox and provides even a novice user a high level of anonymity. </p>



<p>The browser allows users to access hidden sites with addresses consisting of random keys ending in <em>.onion</em>, as an example <a href="http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion" target="_blank" rel="noopener">http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion</a> is the link to “The Hidden Wiki” a page devoted to listing .onion sites. A standard browser such as MS Exchange or Chrome will not be able to access this page, a Tor enabled browser will render it as any other web page. An added bonus of a Tor enabled browser is that when you are browsing the Surface Web your activity is anonymized by encrypting your data and routing your communication through several “nodes” that hide your location and IP address.</p>



<p>The United States Naval Research Laboratory developed Tor in 2002 in order to provide a secure communication channel between U.S. intelligence agencies and their operatives in foreign countries. In 2015 it was then offered as a free service to encourage unrestricted access to the internet in situations where online censorship was intense or the threat of persecution for people seeking access to information considered illegal was prohibitive. The Tor Project still receives a majority of its funding from U.S government agencies such as the Department of State and the National Science Foundation. This support is justified by these agencies because Tor:</p>



<p>“provides potential life-saving online security and privacy in places – such as Iran and Syria – where political dissidents are often dealt with harshly”</p>



<p>There are persistent rumors and indeed some evidence that the Tor network still has ties to US intelligence agencies. However, papers leaked from the NSA indicate that compromising the Tor network is considered an extremely difficult operation and the Russian Internal Affairs Ministry has issued a government tender worth millions of rubles for anyone who can provide a reliable system to break Tors anonymity.</p>



<h2 class="wp-block-heading">How Tor Works (Very simplified version)</h2>



<p>The multi-layer encryption used by Tor has several advantages;</p>



<ul class="wp-block-list">
<li>The server receiving a request coming from the Tor network will only see the address of the last node it passed through (exit node). There is no simple way to find the origin of the request.</li>



<li>Each node in the chain only knows the previous and following hop for a request and is unable to read the content or final destination.</li>



<li>Only the exit node is able to view the content of the request however, the exit node does not know the original source only the preceding hop.</li>



<li>Given the uptake in publicly available SSL encryption even the end node data can be hard to intercept. </li>
</ul>



<h4 class="wp-block-heading">Modes of Tor Use</h4>



<p>A distinction needs to be drawn between the ways Tor can be used. Firstly, there is anonymous browsing or internet use where the user is simply accessing the normal internet but obfuscating their location and encrypting their communication. In this mode, users do not necessarily have nefarious motives. This form of anonymity protects users from Identity theft, reduces marketing surveillance and allows them to research topics that may be sensitive or embarrassing. Concealment of a user’s IP address is crucial for child protection or in a domestic violence situation. Over time our web browsing habits can be used to build a surprisingly details picture of our lives. Anonymous browsing can mitigate this risk. It has been calculated that up to 96 percent of Tor use is of this general browsing nature.</p>



<p>The second method of Tor use is providing or accessing a hidden service. These sites give the dark web its reputation of a den of identity thieves, drug dealers and paedophiles. However, perceptions are misleading. Many hidden services promote human rights, free speech and information prohibited in countries with repressive governments. The number of hidden services devoted to illegal activity is roughly the same as the number of hidden services dedicated to other subjects such as forums where drug users can get advice on safe use and domestic violence victims can come together for support. Given these numbers, the services dedicated to the most disturbing subjects such as murder and paedophilia would be a very small percentage.</p>



<p>The online markets of the Dark Net are practically the stuff of legend. The most famous, Silk Road was shut down in 2013 and other Dark Net markets such as Atlantis have disappeared under pressure by law enforcement. This shows that the anonymity of the dark Net is not the complete shield from law enforcement it is often made out to be.</p>



<h4 class="wp-block-heading">Tor Good or Bad?</h4>



<p>It is difficult to evaluate the good Tor provides and compare with the potential harm it produces. The ability to deliver safe, uncensored Internet access in countries like Iran, Russia and China needs to be balanced to to the possible harm created by the anonymous supply of drugs or firearms from an online black market. As well as the potential for harm minimisation by reduced violence and increased community, support. As mentioned previously Tor is just one of the many anonymising services available, were it to be compromised or shut down the activity on Tor, criminal or otherwise would quickly move to another possibly more secure anonymous platform. Given human nature one would have to come to the conclusion that if the dark Net did not exits, it would be invented tomorrow.</p>



<h4 class="wp-block-heading">How to Access Tor</h4>



<p>1. Download the installation file for your operating system and language at the <a href="https://www.torproject.org/download/" target="_blank" rel="noopener">Tor Browser Download Page.</a></p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img decoding="async" width="565" height="309" data-attachment-id="114" data-permalink="https://freakynewguy.net/how-to-access-the-dark-web/tor1/" data-orig-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor1.png" data-orig-size="565,309" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="tor1" data-image-description="" data-image-caption="" data-medium-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor1-300x164.png" data-large-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor1.png" src="https://freakynewguy.net/wp-content/uploads/2022/09/tor1.png" alt="" class="wp-image-114" srcset="https://freakynewguy.net/wp-content/uploads/2022/09/tor1.png 565w, https://freakynewguy.net/wp-content/uploads/2022/09/tor1-300x164.png 300w" sizes="(max-width: 565px) 100vw, 565px" /><figcaption class="wp-element-caption">Tor Download Page</figcaption></figure>
</div>


<p>2. Run the install program.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="287" height="305" data-attachment-id="115" data-permalink="https://freakynewguy.net/how-to-access-the-dark-web/tor-3/" data-orig-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor-3.png" data-orig-size="287,305" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="tor-3" data-image-description="" data-image-caption="" data-medium-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor-3-282x300.png" data-large-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor-3.png" src="https://freakynewguy.net/wp-content/uploads/2022/09/tor-3.png" alt="" class="wp-image-115" style="width:146px;height:155px" srcset="https://freakynewguy.net/wp-content/uploads/2022/09/tor-3.png 287w, https://freakynewguy.net/wp-content/uploads/2022/09/tor-3-282x300.png 282w" sizes="auto, (max-width: 287px) 100vw, 287px" /><figcaption class="wp-element-caption">Tor Install Icon</figcaption></figure>
</div>


<p>3. Choose the install location of the software. You will need about 220MB. </p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="389" height="222" data-attachment-id="116" data-permalink="https://freakynewguy.net/how-to-access-the-dark-web/tor-5/" data-orig-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor-5.png" data-orig-size="389,222" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="tor-5" data-image-description="" data-image-caption="" data-medium-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor-5-300x171.png" data-large-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor-5.png" src="https://freakynewguy.net/wp-content/uploads/2022/09/tor-5.png" alt="" class="wp-image-116" srcset="https://freakynewguy.net/wp-content/uploads/2022/09/tor-5.png 389w, https://freakynewguy.net/wp-content/uploads/2022/09/tor-5-300x171.png 300w" sizes="auto, (max-width: 389px) 100vw, 389px" /><figcaption class="wp-element-caption">Choose Install Location</figcaption></figure>
</div>


<p>4. Open the Tor browser and click on Connect</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="501" height="195" data-attachment-id="117" data-permalink="https://freakynewguy.net/how-to-access-the-dark-web/tor-6/" data-orig-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor-6.png" data-orig-size="501,195" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="tor-6" data-image-description="" data-image-caption="" data-medium-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor-6-300x117.png" data-large-file="https://freakynewguy.net/wp-content/uploads/2022/09/tor-6.png" src="https://freakynewguy.net/wp-content/uploads/2022/09/tor-6.png" alt="" class="wp-image-117" style="width:602px;height:234px" srcset="https://freakynewguy.net/wp-content/uploads/2022/09/tor-6.png 501w, https://freakynewguy.net/wp-content/uploads/2022/09/tor-6-300x117.png 300w" sizes="auto, (max-width: 501px) 100vw, 501px" /></figure>
</div>


<p>3. When the browser is finished connecting to the Tor network a good place to start browsing is The Hidden Wiki. <a href="http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion" target="_blank" rel="noopener">http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion</a> The Hidden Wiki contains links to a broad cross section of hidden sites and advice that will give you a great starting point as you explore the &#8220;dark side&#8221; of the web.</p>



<p><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-vivid-red-color">A word of warning.</mark> While this article has tried to be balanced in its description and analysis of the Dark Web do keep in mind that it <strong>IS</strong> used by criminals and some pretty messed up people. If you explore very much some of the content you come across <strong>WILL </strong>be disturbing. Viewer discretion is advised..</p>
<p>The post <a rel="nofollow" href="https://freakynewguy.net/how-to-access-the-dark-web/">How To &#8211; Access The Dark Web</a> appeared first on <a rel="nofollow" href="https://freakynewguy.net">That Freaky NewGuy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://freakynewguy.net/how-to-access-the-dark-web/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">109</post-id>	</item>
	</channel>
</rss>
