Why You Shouldn't Use Microsoft Windows11.
...
This page contains important information about how to stay anonymous online, using the Tor network and tools to keep you safe when browsing the Dark Web. Besides this you will find information about surveillance states and how they expand their laws to allow suveillance of innocent people, where Sweden seems to surpass most other countries for exception of Russia and India as of the new law that was introduced on July 1st 2022 ( 2022:711 ).
Latest update: 2023-02-15
The Deep Web is the part of Internet that isn't available in the search engines, like Google or Bing for example. The sites usually apply an robots.txt that doesn't allow indexing by search engines, thus making it difficult to find. However that is just one part of the mystery, that is called the Deep Web. The other part is the sites that uses robots.txt to deny indexing and make use of an authentication solution, like logins with username and password, or in some cases a card reader together with a certificate or just a certificate installed in your web browser. Which basically means a requirement of credentials establishing your identity in order to access the system and its information. Some are legit, some aren't.
Examples for use of Deep Web are banking information, information like photos and documents saved in the cloud ( usually encrypted ) and confidential government data.
However I wouldn't recommend Tor Browser for your banking or tax report needs, use Firefox instead with the appropriate settings and plugins ( not too many ).
"Tor network gets between 90 to 100 percent of its budget via contracts and grants coming from three military-intel branches of the US Federal government: The Pentagon, The State Department and an CIA spinoff organization called the BBG".
"Tor was created not to protect the public from government surveillance, but rather, to cloak the online identity of intelligence agents as they snooped on areas of interest. But in order to do that, Tor had to be released to the public and used by as diverse a group of people as possible: activists, dissidents, journalists, paranoiacs, kiddie porn scum, criminals and even would-be terrorists — the bigger and weirder the crowd, the easier it would be for agents to mix in and hide in plain sight."
There are several "Dark" networks available, but the most famous and used is the Tor Network. The Tor network and others like can't be used with your everyday ordinary web browser like Chrome, Chromium, Firefox etc.
However: Brave Browser now supports onion URLs.
The "Dark Web" is not regulated, IP addresses are hidden and some resources require logins or another authentication mechanism like invites by another existing member or by paying a fee ( usually in Bitoin ).
Tor network uses a series of intermediary nodes ( IPs ) that encrypt your data all along the network chain. At the endpoint, your data is decrypted by an exit node so that no one can pinpoint your location or tell which file came from which computer.
Inaccessible by traditional browsers due to its unique registry operator and it's hidden by various network security measures like firewalls and encryption.
The TOR network uses encrypted pages ending in ”.onion”.
Tor itself offers no protection when torrenting and will leak the user’s IP address with torrent clients.
Tor can also leak real IP addresses when accessing files, such as PDFs or other documents, which could bypass proxy settings.
Windows users are even more vulnerable to different types of leaks, than others, which will expose the user’s real IP address.
Be careful, always use the safest possible Linux distribution, hardened. Now some leaks published by Restore Privacy shows how devs collaborate with the FEDS. Always use the browser without javascript or Flash etc. Now move on to read the following article, then continue to read the rest of ours.
► Read Is Tor Trustworthy and Safe?
For example is the U.S: an FTC report, shows you how they sell your personal data. Now you should expect nothing less, no matter what part of the world you live in.
Other examples from Brazil:
This is particularly useful before downloading anything from the Dark Web. If you are using Tor Browser click on the onion symbol to the left of the URL. You will get a list of bridges and nodes. For downloading via a terminal window, you just copy and paste the IP you get there to find out its speed.
First you need to choose a VPN provider that uses OpenVPN, WireGuard or IKEv2 protocol. "Not PPTP or L2TP" which are both considered insecure. Also make sure it is a "No log" VPN provider.
Countries that has blocked or outlawed the use of VPNs - Tor Browser: Blog post by Proton VPN
Then download and install Tor Browser and I recommend the use of Bridges, to obfuscate the use of the Tor Browser from being detected by sites and your ISP provider, some block the use of Tor.
Also another important thing you should know is "DO NOT install plugins" in Tor Browser, unless you are sure that they don't leak your real IP-adress !
Tor Browser ships with two plugins: NoScript and HTTPS Everywhere.
In the settings menu, on the general tab, scroll down until you see a section titled “Performance,”.
Then make sure you’ve checked off “Use recommended performance settings.”
This will cause Tor Browser to automatically use settings that work best with your computer, based on your computer’s hardware and operating system.
It will increase the speed !
Note:You must restart Tor browser after changing this setting, before it will take effect.
Note: The Tor Browser also works on the open Internet "NOT GOOGLE or Baidu".
Some sites may not function properly without ( javascript ) ! Drupal API based sites for example works with Tor browser. Some Wordpress sites work, others don't. For sites that you need and that do not work with Tor browser, Firefox with a few privacy plugins and security customizations is recommended.
China has outlawed the anonymity services and blocks Tor traffic from crossing "The Great Firewall". How to bypass the firewall if you are a Chinese citizen here. "Private and unlisted obfs4 bridges is your best choice".
DuckDuckGo ( Recommended for privacy ) , BING by Microsoft™, YAHOO. These are regular search engines for the Open Internet.
It is strongly recommended "NOT" to enter the "Dark Web" without the use of a secure VPN ( setup without a DNS leak ), because of the exit nodes. The exit nodes can be run by federal government agencies or criminals. You don't know who runs the exit nodes, since it is anonymous.
While it is claimed that most exit nodes are secure and run by private citizens, I wouldn't recommend you buy into that rubbish. It is more likely that you are being surveillanced, than not. KEEP THAT IN MIND !
Examples: The FBI is tracking Tor users with spyware. ( In this particular case - not a problem ), however it might be used in other ways and for other purposes.
It all depends on if the exit traffic is unencrypted or not and if it contains identifying information or not. Also you should know that Javascript plays an important role in revealling your real identity.
The Tor network uses three hops and the nodes are either normal nodes ( which can be used on hop 2 ) or, gateway nodes or exit nodes ( which can be used on hop 2 or 3 ). So the exit node will be at the second hop in most cases "assumed".
A honeypot is a security mechanism that creates a virtual trap used to lure in hackers and other criminals. It is an intentionally compromised computer system that allows hackers to exploit vulnerabilities or in some cases to study the visitors of a Dark Web site to find out their intentions and real identity.
A real life example is how a hacker created three websites running Debian on a VMWare virtual machine, targeting Tor users interested in or seeking counterfeiting services, illegal drug products, and pedophiles. He soon decided to focus his attention on pedophiles and was able to identify some people using Windows as you can see in this article.
How he did it: "At first, only login data and network packet captures were used to deduce the user’s identity. Later, link traps were introduced before finally introducing a “security scanner” as a requirement to gain the highest level of membership."
This means you download and run "unknown" software, that can and most likely will comprimise your system and personal details.
"The exit node IP address does not uniquely identify a visitor but rather, provides the endpoint used in the tor circuit."
However reading the hackers article, it is disturbing to see how much pedophiles are active on the Dark Web.
This example shows how honeypots can be setup and used for different purposes and not just by agencys like the FBI.
In August 1, 2013 some users discovered Freedom Hosting sites were serving a hidden iFrame, which could be another website within the website you are visiting. After analyzing this, it was discovered a Windows program hidden in a variable "Magneto" CVE-2013-1690 sent MAC-addresses and Windows hosts names to a place in Virginia, US. Back then TOR browser did not have an auto-update feature, which is has now.
However, the Malware planted by the FBI included innocent victims as well, so what can you do, but protect yourself with knowledge and apply it to your systems. Hell, even the so call good guys are hacking us....WTF...
You should not register on a website that doesn't use a SSL certificate or use a non-ssl site unless you have a VPN installed and it is configured properly. Looking at the obvious fact that your ISP, whether in the U.S or not records every move you make online and can read the data if your traffic is un-encrypted and visits a non-ssl website.
They then move on to selling your data to advertising agencies and your government, this should atleast make you stoṕ and think.
Some VPN-providers offers extra "protection" like a proxy, however the traffic through a proxy is not encrypted, but masks your IP. You should, ask your VPN provider if what they offer a proxy.
You should also look at: No-log claims have held up in court or not and if they have lots of servers worldwide and if the VPN was at some point hacked.
Make sure the VPN provider also automatically enables aggressive IPv6 blocking to prevent any DNS leaks. This could give away your real "IP address".
Here is why Private Internet Access by default blocks IPv6.
Although if you are connecting over the Tor network using bridges, you will sometimes see that you are connected using IPv6 protocol. Internet Protocol version 6 is the most recent version of the Internet Protocol.
A very informative article by Scott Hogg regarding the IPv6 protocol.
Google statistics on the implementation and usage of IPv6.
You can block IPv6 in Debian 11 or LMDE5, without doing so in your router or asking your ISP.
I recommend you "spoof" your MAC-adress, using Macchanger for Linux.
In theory: if you download a software component to interface with a website. ActiveX & WMI could pass on that information or JAVA ( Since JDK 1.6, Java developers are able to access network card details via the NetworkInterface class.)
Games like World of Warcraft, can access sensitive system information and send it to the developers website.
Another possibility would be that they have certain scripts on their servers and forces your browser to download and install them, like a plugin for example.
A website however ( "the website server" ) can only see MAC addresses if they are based on the same network/Ethernet IP address as you are.
This means that your ISP can't see your computers MAC-adress, only the routers.
Still it is a good idea to spoof your MAC-adress anyway.
More on this topic here:
Now that we have gone through this, let us move on.
I recommend the following sites for this:
If there are no leaks etc, you are good to go, but I recommend you read the entire article !
Is just as risky as when you are surfing the open Internet. Downloading unknown files, without an always updated Antivirus solution installed is not a good idea. Also Android smartphones are even more vulnerable to attacks, than iPhones and computers using Linux.
The preferred systems for any type of Malware are:
Which Spyware is preferred by governments:
You should know that the company behind this Pegasus Spyware also made Amazon’s AWS cloud infrastructure as a part of their system.
NSO says it has 60 customers in 40 countries, all of them intelligence agencies, law enforcement bodies and militaries.
French President Emmanuel Macron's phone was listed as a potential target for surveillance by Morocco as an example.
European countries some 22 member countries are using Spyware against its citizens and some like Sweden actually made it legal:
Outside EU:
Anom - A planted app made by the FBI and used by criminals. The operation was named "The Trojan Shield" and for three years, the FBI collected data. This data has resulted in several arrests worldwide. In total 16 European countries had access to the data for 18months. The operation was headed by the FBI and Europol along with Dutch and Swedish police.
EncroChat - EncroChat for Android phones offered its users the ability to send encrypted messages, make encrypted call (EncroTalk) and write encrypted notes (EncroNotes). However, the encrypted traffic passed through a server located in France.
UK, French and Dutch police was able to breach the security of the server in 2019 and upload Malware.Thus giving them access to all calls, encrypted messages and even the PIN codes entered by its users. It is speculated that the devices themselves were also infected by the uploaded Malware. Worth noting is that a proportion of the 60,000 EncroChat userbase were ordinary users, NOT criminals.
I would say update your smartphone to the latest version, but we all know that you are lucky if the manufacturer gives you two updates after you purchase the phone. Check your version and then have a look here.
Recommended article: Android devices 50 times more infected with malware compared to iOS.
So the best you can do is to install a VPN for Android ( I recommend you choose a well known ) and NOT A FREE VPN for this purpose.
Jailbreaking:
Basically what this means is that you are enabling your device to be able to install apps from sources not found in the Google Play Store.
For Android Nougat and earlier versions:
For Android Oreo and newer:
No need to enter "Settings". Anything not downloaded through the Google Play Store will prompt you with a confirmation dialog. Click to enable installation from an Unknown Source.
Rooting your device:
Not all models of an Android smartphone can be rooted.
Rooting is how you get complete access to everything in the Android operating system and it allows you to uninstall apps that came pre-installed, like Google, Facebook etc.
For example, I was able to root my Samsung, but not my other phone. There are software, that uses Zeroday exploits to root the device and there are custom ROMs for your smartphone.
Yes, there is such a thing and it used to be very expensive. It is not anymore and there are Android apps that support this. This prevents people or government agencys from tracking your every move, without the help of Google.
More on this, coming soon...I still need to test that it works with the Telephone company operators, but when connected to an Internet connection, it works.
Next you will want to install: Malwarebytes Anti-Malware for Android.
Now once this is done, you should first update the app database and do a full scan of your device.
Easy install of Tor Browser for Android from Google Play and make sure you use Bridges obfs4 ( recommended ).
Or I recommend you download from the official Tor Project site.
You might want to have a look at the apps from the Guardian Project.
Now if you made it this far reading the article, here are some good resources. Note that some links on these sites offer ( illegal ) things, some that may serve as a wakeup call for you Windows users. You will soon realize that everything from banking accounts ( Bank Of America, PayPal accounts and more are for sale ).
bj5hp4onm4tvpdb5rzf4zsbwoons67jnastvuxefe4s3v7kupjhgh6qd.onion
zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/Main_Page
qrtitjevs5nxq6jvrnrjyz5dasi3nbzx24mzmfxnuk2dnzhpphcmgoyd.onion
torlinksge6enmcyyuxjpjkoouw4oorgdgeo7ftnq3zodj7g2zxi3kyd.onion
darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion
Messageboards:
xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion
p2qzxkca42e3wccvqgby7jrcbzlf6g7pnkvybnau4szl5ykdydzmvbid.onion
wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion
protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion
Free and anonymous file-sharing:
crqkllx7afomrokwx6f2sjcnl2do2i3i77hjjb4eqetlgq3cths3o6ad.onion
Sites "Not" listed in the "Dark Web Search engines":
zkj7mzglnrbvu3elepazau7ol26cmq7acryvsqxvh4sreoydhzin7zid.onion
duawf4muvwftwzadofnmojptq7hs3unlnvgw5xttwkcxojmxvhxtzxad.onion
ghostspdkcy3qvi4467vrk6bw3ig4hhrribnxrx3zilve7byj3aqoaid.onion
zkllmhuxmf3u6lh4cl3lueyoxjvxoocnwv7k2wrhatyhw2mknfjtnrid.onion
thestock6nonb74owd6utzh4vld3xsf2n2fwxpwywjgq7maj47mvwmid.onion/
Is your Instagram account safe, or your LinkedIn? Search using username or email.
breachdbsztfykg2fdaq2gnqnxfsbj5d35byz3yzj73hazydk4vq72qd.onion
jvgypgbnfyvfopg5msp6nwr2sl2fd6xmnguq35n7rfkw3yungjn2i4yd.onion/
anonyradixhkgh5myfrkarggfnmdzzhhcgoy2v66uf7sml27to5n2tid.onion
There are no actual evidence of their existence so far, but that don't mean that these sickening things doesn't exist somewhere well hidden. Their name is thought to have originated from the 1983 horror film Videodrome, where torture is shown live on TV in a red-painted room.
This is where very sick people can pay to watch live streamed videos, of rape, torture, murder or worse.
An article from: The Sun - What is a red room and Red Room Deep Web Complete Guide.
If you encounter any Red Rooms on The DarkWeb, I suggest you report it to the FBI or whatever agency your country uses.
Search engines:
duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion
juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion
haystak5njsmn2hqkewecpaxetahtwhsbsa64jom2k22z5afxhnpxfid.onion
oniondxjxs2mzjkbz7ldlflenh6huksestjsisc3usxht3wqgk6a62yd.onion
xmh57jrknzkhv6y3ls3ubitzfqnkrwxhopf5aygthi7d6rplyvk3noyd.onion/cgi-bin/omega/omega
relateoak2hkvdty6ldp7x67hys7pzaeax3hwhidbqkjzva3223jpxqd.onion
sdolvtfhatvsysc6l34d65ymdwxcujausv7k5jk4cy5ttzhjoi6fzvyd.onion
This page will be updated with more information and links....
Windows has always been the preferred platform for gaming, but after STEAM's interest in Linux more game developers are making their games natively available for Linux.
All information on this website is published in good faith and for general educational purposes and for use in safe testing environments only. While linuxexperten.com strives to make the information on this site as accurate as possible, linuxexperten.com does not warrant its completeness, reliability and accuracy.
We are not responsible for any losses or damages associated with the use of our website. While we strive to provide only links to useful websites, we have no control over the content of these sites and links to other sites do not constitute a recommendation for all content contained on these websites.
This is a professional review site that receives compensation from the companies whose products reviewed. Each service or product are thoroughly tested and given high marks if considered to be the very best. Independently owned and the opinions expressed here are no one elses.
None at the moment.