Published September 28, 2021 by with 0 comment

Darknet Dictionary


 

420


From wikipedia: is a code-term used primarily in North America that refers to the consumption of cannabis and by extension, as a way to identify oneself with cannabis subculture or simply cannabis itself. Observances based on the number 420 include smoking cannabis around the time 4:20 p.m. (with some sources also indicating 4:20 a.m Also known as the special sale when the vendor Tony76 executed the most famous Scam on Silk road.


Administrator


In charge of a collection of services a year or two ago, including TorStatusNet, Hidden Image Board, a hosting service.


Agora


An online market. It is operated as a Tor hidden service, such that online users are able to browse it anonymously and securely without potential traffic monitoring. The website launched in December 2013. It is part of the Deep Web. It has been recommended in some way by the same guys of BTCfog.


Altcoin


Any digital cryptocurrency other than Bitcoin, altcoin – any digital cryptocurrency other than Bitcoin.


Anonymity


This thing you want to have if you don't want to be found while using dark net markets.


AnonFiles


File upload site. You want to send a PDF/image/whatever to another user? Upload it to anonfiles, then you can share your custom link, and whoever you send it to can download your file anonymously.


Astrid


Creator and Moderator of /r/DarkNetMarkets, very promiscuous have had relations with all Moderators there, also is the CSS guru!


Avengers


A group of individuals who are well known for ordering LSD from many vendors back in the day of Silk Road 1.0, reagent testing it, consuming it, a writing reviews about the quality of the products. They currently can be found on the deep web on the Majestic Garden forum.


AYB


All Your Base, general Onionland portal


AYW


THW without the CP. Known formally as All You’re Wiki. Most people use it now.


Backopy


The Administrator of Black Market Reloaded (BMR)


Bergie Web


The level of the internet hierarchy that comes between the “surface” and the “deep web,” if you are comparing the internet to an ocean. This includes porn, chans, and other sites that provide you with information on how to access the deep web. Peer-to-peer file sharing networks are also part of this level.


Bitcoinfog


“Wash” your bitcoins. Bitcoins can be traced, so let’s say you received bitcoins from an illegal activity, those coins can be traced back to you if you use them on another website that is linked to your real identity (localbitcoins, paypal, bitstamp, MtGox etc). This handy website will erase all traces on your coins. the service is accessible here:


http://fogcore5n3ov3tui.onion/


Bitcoins


An open source, peer-to-peer payment network and pseudo-anonymous digital currency being used for almost all transaction on the darknet.


Black Market Reloaded


Also known as BMR,the oldest dark net market since Silk Road was shut down, the site is currently offline and planned to be back with a newer version.


Blockchain


Wikipedia Definition: A block chain is a transaction database shared by all nodes participating in a system based on the Bitcoin protocol


BotDW


Boss of the Deep Web


Buyers


A marketplace user that is not a vendor.


Carding


The practice of stealing and selling credit card information CD (Controlled Delivery)


The technique of controlled delivery is used when a consignment of illicit drugs is detected and allowed to go forward under the control and surveillance of law enforcement officers in order to secure evidence against the organizers of such illicit drug traffic.


Cirrus


A silk road forum moderator.


Chisquare/psi


Hugest faggot, avoid him more. Hosts numerous services. (Its not us who said this!) Cipherspace


tor hidden services / i2p / freenet / any other anonymity network Cold Storage


A secure offline wallet for your Bitcoins or other cryptocurrencies CP


When mentioned in the context of the deep web – it usually mean Child pornography, something you should know and avoid at all cost when browsing around.


Clearnet


Regular internet (non TOR)


Cryptography


All the means of hiding and encrypting the data that you send over the internet.


Dark Net


A general term that describes the hidden websites hosted on the TOR / I2P and other networks that you cannot access with regular internet connection without using some special software or get crawled by Google and other search engines. more info can be found here Dark Nexus


HTTP Refresh Chat


DarkNetMarkets


A sub Reddit meant for the discussion of the various Dark Net markets, can be found at this link.


DDOS Attack


Denial-of-service attack Form of an attack that is an attempt to make a machine or network resource unavailable to its intended users, was common on Silk road, some say it was used to locate the server location using a know tor vulnerability. Read the Wikipedia page for the technical explanation


DBAN


Darik’s Boot and Nuke software for wiping you harddrive from all information.


Deep Web


Synonymous with “Dark Net”.


DeepDotWeb


The site where this list was created, can be found here: http://www.deepdotweb.com A Blog focusing on deepweb news.


Defcon


Current administrator of Silk Road 2.0.


Dispute


In our context, this term is usually used to describe a disagreement between a buyer and a seller on the markets.


Digitalink


a/k/a Jacob Theodore George IV, according to Homeland Security Investigations (HSI) Digitalink was the first vendor on Silk Road selling illegal drugs to be arrested.


DoD / Coachella / HH (and some others)


A Well known scammer & troll, was eventually doxxed on some article and was not seen much since.


Domestic


A term that refers to making an order from a vendor the resides on the same country as the buyer.


Donations


You will encounter many requests for them on the darknet markets, will usually list a bitcoin address.


Doxx


The act of posting in a public forum the personally identifying information of a pseudonym used by an individual or the information posted therein.


Dread Pirate Roberts


The pseudonym used by the administrator of the original Silk Road market. It has been speculated that more than one person may have been using this pseudonym, but “Ross William Ulbricht” has been indited by the FBI as being the sole owner.


DDG/Duck Duck Go


A search engine that respects privacy.


Emergency BTC Address


An address to be held on record to send all funds to in case of a market shutdown. This would ideally be a cold storage address with no information that could be used to connect the owner to their identity. This address would only be checked after a market was shut down in order to recover outstanding funds.


Encryption


Using secret information to make it infeasible without knowledge of said information to decipher the ‘cypher-text’ produced into a plain text message. This can take one of two forms, symmetric encryption which used a shared secret that both parties must know in advance, or public key cryptography where the information to encrypt the information differs from the secret needed to decrypt the information.


Escrow


The use of a neutral third party to ensure that a transaction payment will be made to a seller on completion of items sent to a buyer. Generally after a purchase is made, the funds are held


‘in escrow’ to be released when the buyer states the seller has met the terms of the purchase.


Generally the third party will also offer arbitration in case of a dispute between the two parties.


Electrum plugin


Used on The Marketplace to create multi signature transactions with a click of a button – full usage instructions can be found in this tutorial.


Fagmin/dgft


New Admin Of Torchan


FBI


The Federal Bureau of Investigation. This is the USA’s state-wide police who prosecute violations of federal laws. They do not involve themselves in violations of state law.


FE


Finalize early. This is the release of escrow funds before the seller knows that the conditions of the contract have been met. This is used to reduce seller risk from BTC price fluxuation, and against market shutdown. This is also used to scam buyers as after the escrow has been released there is no recourse for the buyer if the seller does not deliver on their promises.


Feedback


A message left from a seller to the vendor, or vice versa, about how well a transactions went.


It is considered good form to not reveal any information about the methods the seller used to ship the order nor the vendor’s or seller’s location or details. This is made publicly available to allow users of a site to determine if they should trust the vendor or seller Flush (Curtis Green)


An individual the FBI accuses Dread Pirate Roberts of ordering to be murdered. This person is also accused of being ‘Chronicpain’ from the Silk Road Forums, and an employee of Silk Road. The details of the allegations can be read – Here, here & This is a great resource.


Freedom Hosting]


Huge free web provider. Some of its services hosted child porn. Busted by the feds around the same time SR was busted. SR also was hosted on it for a while before it switched to a dedi server.


Freenet


A peer-to-peer platform for censorship-resistant communication.


FUD


Fear, Uncertainty and Doubt


Galaxy Deep Web Social Network


(http://hbjw7wjeoltskhol.onion/) is the currently most active dark net chat, a great place to keep in touch with friends and vendors, share the newest FUD and fuck up your OPSEC while waiting for your order to be shipped.


Gawker


An online blog that reports on web trends. Notable for being one of the first major sites to report on the existence of the Silk Road on 2011-06-01 at http://gawker.com/the-


underground-website-where-you-can-buy-any-drug-imag-30818160


GCHQ


British Government Communications Headquarters, equivalent to the NSA in the United States.


Grams


Cross Marketplace search engine for the DeepWeb (see the sidebar link here) HackBB


Famous hacking phpBB board, also hosted downloads for files like zeuS.


Hard Candy


Infamous page on Hidden Wiki for child porn.


Harry71


Onion Spider Robot (http://skunksworkedp2cg.onion/) is a daily updated extensive list of Onion sites. The owner runs a crawler that checks if the sites are up, fetches the link and title and dumps it on his homepage.The site also contains some statistics about uptime and hosts.


Hidden Service


Another term for a .onion domain name. It can only be accessed through the Tor network, and cannot be seized by a government.


Honeypot


A hidden service or other website setup by law enforcement in attempt to attract and trap people who participate in illegal activities. Other cited uses include helping the military and government protect their secrets and the FBI defending large businesses.


Hushmail


An email provider that focuses on privacy and used industry standard protocols PGP and 256-bit AES encryption. It claims to be secure to the extent that not even company employees can read the contents your emails. Hushmail is known to cooperate with law enforcement by handing over encrypted emails.


Hidden Wiki


A ‘hidden service’ website on the Tor anonymous network that allows for open editing of subjects related to hidden services and activity in them. “You will never find a more wretched hive of scum and villainy. We must be cautious.”


Hub Forums


An Onion based platform for cross marketplace discussion, like DNM sub reddit, but forum based and fully anonymous – read the details here.


I2P


The ‘Invisible Internet Project’. Originally designed as a way to be able to use IRC


anonymously, it has become one of the more popular anonymous networks. While similar to Tor, key differences include the fact that I2P focuses on gaining access to sites within the network, and not to the Internet at large. Not as much academic research has been done on this project as Tor. This service is very popular in Russia. About half the routers appear to be located there. Details can be found at https://geti2p.net


International


Outside of one’s own country. Some avoid international transactions because customs adds time and risk to an order. Some countries such as Australia are known for having customs that are extremely hard to get an order past.


IRC


Internet Relay Chat. A communication system allowing easy transfer of messages in the form of text. It is intended for group discussion in sessions called channels.


JB


See hard candy, except for teens.


Lavabit


A defunct email provider that shut down in August 2013 after being forced to hand over its SSL private keys to the US government.


LE / LEO’s / LEA’s


Law Enforcement / Law Enforcement Officers / Law Enforcement Agents Library


Usually refers to Tor Library, the largest centralized eBook service on the Darknet.


Libertas


Pseudonym used by one of the original Silk Road forum administrators, and also used by one the administrators of Silk Road 2. Arrest by thr ‘Garda Siochana’ (irish police) Details of the arrest may be found at this link.


Liberte


Another Linux distribution similar to TAILS and Whonix with the purpose of enabling anyone to communicate safely and covertly in hostile environments.


Litecoins


An alternative cryptocurrency, similar to bitcoin. The key difference is that while bitcoin uses hashcash-SHA256^2 at the ‘proof of work’, litecoin uses hashcash-Scrypt which is designed to use more memory and be less subject to custom hardware designed to solve the problem quickly. More details of this difference may be found at: https://en.bitcoin.it/wiki/Hashcash


LocalBitcoins


An site designed to allow over the counter trading of bitcoins. Famed for it’s anonymous nature people who sell on the site have been under constant pressure to avoid being


prosecuted as unlicensed money traders. This extra risk and the extra work generally cause a significant price difference between the site and a more open (and regulated) exchange.


Lucyskyhigher


Reddit mod sexiest biotch on the always informative and largely humorous gathering place for all darknetmarkets, /r/Darknetmarkets


Marco Polo Taks Force


A multi law enforcement agency task force based in Baltimore put together to investigate to investigate Silk Road and eventually included investigators from the FBI, DEA, DHS, the IRS, U.S. Postal Inspection, U.S. Secret Service, and the Bureau of Alcohol, Tobacco, Firearms and Explosives


Mariana’s Web


Urban legend of a secret website in the deepweb.


Marketplaces


Catch all term for web sites set up to allow trade between vendors and buyers. When used in the context of sale of illegal goods, these usually provide anonymity to the buyer and seller, a method of escrow to ensure to reduce risk from new vendors and sellers, and a method of advertising goods to be sold at a price so that a purchase may be initiated and paid for without involvement of the seller. Most markets are also set up as ‘hidden services’ under anonymity networks like tor, i2p, or freenet, although there do exist some ‘clearnet’ markets that operate over standard HTTP/HTTPS.


Mixie


First major service operator on Tor in 2007. Services include a basic message board on the home page, a PM service, a “create your own bbs-like board” system (anyone could create a community for free) called SnapBBS, and a few more features. Also hosted an OnionNet IRC


server.


Molly


Any damned thing you can shove into a gelcap and get somebody to buy. In theory, this is supposed to be MDMA in the gelcap, but more commonly you get something like methylone, BZP, a benzofuran, talc, or something potentially toxic like PMA. Test first before consuming, http://dancesafe.org/health-and-safety/adulterant-screening-kit-instructions is a good resource.


MSM


Main Stream Media — Big news outlets designed for common consumption by the masses.


These can range from more neutral sites like the BBC in the UK, Al Jazeera in the middle east, or The New York Times in the USA, to sites like the Daily Fail, Fox News, or Pravda which are not as known for being well vetting their news articles.


MtGox


Magic: The Gathering Online exchange. One of the first public exchanges for bitcoins to currencies such as USD. Because it was designed in haste, it has been plagued with issues of security. Widely considered to be completely insolvent, a lack of transparency has allowed constant rumour to circulate. They are no longer taking exchanges after claiming to be defrauded by outside parties taking advantages of quirks in the bitcoin protocol.


Multi Signature Escrow


Where an address is signed by both the buyer and the seller with their private keys. The buyer will send funds to the address and the seller ships the product. If both parties are happy they sign off on the address and release the funds in escrow, You can see example for such open source service here.


Nameless


IRC server hosted by chi. No identities, all usernames randomly generated.


Nekro


Huge faggot, avoid him. (he said this, not us!)


MTLjohn


Was a funny Scammer on SR1 , kept popping again and again under different identities just to be exposed each by another vendor (LuckyLuciano) since he was so easy to provoke.


Onion


A hidden website using the Tor network. Name comes from the ‘onion routing’ used by tor.


The url is composed of a hash of information used to identify the correct system, so most addresses are somewhat random. While creating an onion is easy, and the routing itself has few known weaknesses, securing such a site to leak no information is exceptionally difficult.


Onion Browser


A web browser like the Tor Browser Bundle (TBB). A web browser designed to work with the tor network to browse hidden services and normal websites anonymously, without leaking user information. While easier to use properly without leaking information, bugs in a browser can cause serious problems, such as the javascript bug that was used in part to shut down Freedom Hosting.


OnionForum


The original forum for Tor created by Legith in the early days of ’05.


Onionland


A general term to describe tor hidden services


OnionNet


First real IRC network designed for Onionland. All IRC ops are pedophiles though. Long history but not many people use it anymore.


Onion Routing


A technique for anonymous communication over a computer network. Messages are repeatedly encrypted and send through multiple network nodes. The process is comparable to peeling an onion, each node removes a layer of encryption uncovering routing instructions for the following layer.


opDarknet


Campaign launched by Anonymous a couple years ago. Targeted child porn sites as well as Freedom Hosting.


Optimus Crime/OC


Admin of HackBB.


OPSEC


Operation Security. The process of protecting little pieces of data that could be grouped together to form a bigger picture, or expose your identity.


OrBot


A mobile version of the tor router for Android. Can be found on the Google Play store.


Designed to either work with it’s own browser, or can be set up to work as proxy for any system that supports it. Can also be used on a rooted device to provide a transparent proxy that will force all apps to use tor for connecting.


Pastebin


A website used to store text for a certain period of time. It is popular on the deep web because it is an easy way to anonymously share information.


Parallel construction


Parallel construction is a law enforcement process of building a parallel – or separate –


evidentiary basis for a criminal investigation in order to conceal how the investigation began.


PGP/GPG


Pretty Good Privacy/ Gnu Privacy Guard. PGP was introduced in 1991, and was formalized


with RFC 2440 and RFC 4880. Uses a combination of public-key and symmetric-key cryptography to ensure that messages can be delivered without a third party gaining access to the contents of the message. It also allows for a message to be signed so that the author of the message is indisputable. Many different algorithms can be used for the encryption, but the most commonly used methods are RSA for the public key crypto, and AES for the symmetric cypher. It is extremely important hat the public key of any party be fully verified in order to know that the message is being delivered to the correct recipient or is from the correct sender.


Here we have a simple usage guide for windows.


P2P Escrow


Most commonly used to refer transactions using ‘P2SH’ addresses as defined by BIP 016. A public key is provided by a seller, market, and vendor, and used to create an address which requires two of the three parties to sign in order to redeem. The buyer than pays to this address. Of extreme importance is the ‘redeemScript’ which details the information needed to redeem funds send to the address, which is a hash of the redeemScript. The goal of this method is that no one party has enough information to take funds from these P2SH addresses.


Even if the market is hacked or taken down, the funds cannot be seized, and a buyer and seller can, with the redeemscript, finalize a transaction outside of the market’s involvement if they choose to.


Phishing


The act of using social engineering techniques to get private information such as user names and passwords. An example would be to send out a message claiming to be from an administrator asking for a password, or setting up a fraudulent website that a looks to be well know market’s site in order to gain user name and password information.


Pidgin OTR


Secured instant messaging software Pidgin is a free and open source client that lets you organize and manage your different Instant Messaging (IM) accounts using a single interface.


The Off-the-Record (OTR) plug-in designed for use with Pidgin ensures authenticated and secure communications between Pidgin users.


PIN Code


Personal Identification Number Code. Uses as a secondary validation method to protect against loss of funds if the username and password are discovered. Generally it is only asked for during transfer of funds to outside the market or to confirm and finalize orders.


Processing Time


Time required by a market or vendor in order to complete a transaction. Generally this involves waiting for sufficient confirmations on the blockchain to ensure a deposit has been met, or to run funds through a bitcoin mixer on the market. Also used to for time required by a vendor once getting a transaction to put the goods into the post.


Project Black Flag


Market set up shortly after the fall of the original Silk Road. Widely suspected to be a scam, this was confirmed to be the case after a short period of time.


Proxy


Unlike a VPN, a proxy is a service that only changes the IP address websites can see within your web browser, rather than on all applications on your computer.


RAT (Remote Administration Tool)


A piece of software that allows a remote operator to control a system as if he has physical access to that system.


RC (Research chemicals)


From wikipedia, Research Chemical are chemical substances used by scientists for medical and scientific research purposes. One characteristic of a research chemical is that it is for laboratory research use only. A research chemical is not intended for human or veterinary use.


Resolution


Used when there is a dispute between a buyer and seller. This usually involves whatever market used to serve as an arbitrator to determine how funds are to be released from escrow.


Reviews


The corpus of feedbacks left on a site, along with more information information gained by outside channels. Used by buyers to determine if they should take a vendor or buyer as legitimate.


Riseup/Safe-mail


Excellent e-mail services.


Ross Ulbricht


Accused of the FBI of being the sole owner of the pseudonym ‘Dread Pirate Roberts’ and creator of the Silk Road. He was an Eagle Scout and in a known libertarian. The original Silk Road website went down after his arrest.


Same Same But Different (SSBD)


Peter Phillip Nash, Was arrested and accused in Australia for being on the Silk Road moderators You can read the full details about the moderators bust in this post.


Samples


In the context of a market, a free or low cost item sent to a well known buyer in order to establish legitimacy. This proves that at least the seller has access to a product and is capable of delivering it in as secure way. The receiving party is expected to leave public feedback regarding the quality of the products and how well it’s been packaged.


Satoshi Nakamoto


A pseudonym of the person or group of people who created Bitcoin and anonymously published its source code.


Shared Send


A free method to tumble Bitcoins provided by blockchain.info. It routes transactions through a shared wallet breaking the chain of transactions.


Scammer


One who would attempt to defraud either a vendor or seller. For a vendor this can take the form of simply not ever sending products, sending poor quality or misrepresented products, or


‘selective scamming’ where known individuals are send product but large transactions or those from unknowns are not sent out. For a seller, this will mean that they claim to have not received goods that were delivered or that the goods were of poor quality/misrepresented.


Sheep


Second big online market to fail. Vendors flocked to the site citing it’s well polished vending design, and users followed. Disappeared without a trace taking all funds in escrow with it.


Despite the manhunt that followed, it remains unclear if it was a deliberate scam, a result of being hacked, or a combination of the two.


Shipping


Process of a vendor packaging and sending goods. A source of extreme difficulty for vendors, and how many have been caught. Ideal methods will appear be legitimate business to individual packages and correspondence. It is considered poor form to disclose any specifics of a shipment made, as it could be used to target a vendor.


Shilling


Creating accounts on Reddit / Forums for the sole intention of posting Positive / Negative post about someone or something while trying to make them look authentic.


Silk Road


‘The ebay of illegal goods’. First reported to a wide audience by Gawker 2011-06-01, it flourished due to a large vendor and user base, and strict controls to weed out scammers.


Taken down after the arrest of Ross Ulbricht at the start of October, 2013. While it was not the first nor the last market for illegal items, none have matched it’s popularity and trust level given by vendors and users.


SMAC


A tool that can change your MAC address


SMS4Tor


Self-destructing messages. Similar to Privnote but for Tor. I prefer this because it’s an onion address AND does not require javascript (Privnote requires JS). You type out a message on their site, create a custom link, and share it to another user. The link will only work once, and so whoever opens it first is the only one who can read it. A great alternative to PGP as it is much more user-friendly. Very secure when combined with PGP encryption. *This one’s a little harder to find but if you google “self destruct message tor” you should be able to find it.


Stats (Buyer)


Statistics used to determine legitimacy of buyers/sellers. Common are number of successful transactions, average reviews, and dollar amounts of successful transactions in total. These are usually imprecise in order to avoid anybody being profiled.


Stealth


Methods used by vendors during packaging to make them blend in with normal mail.


Disclosing any particular method of stealth is considered extremely poor form. Examples of stealth methods include making the item appear to come from a legitimate, known business; hiding the product in another, nondescript looking item; and using moisture barrier bags or mylar to eliminate product odor from being emitted from the package. Ideally, you would be able to open the item and give a cursory inspection of all the contents and find nothing unusual, but in practice this can vary greatly.


Sub Reddits


One of the subforums from the popular reddit.com community. Many times shortened to r/subredditname in common discussion. A team of administrators that are usually not affiliated with reddit determines the content policy of the sub reddit, with the website taking a very hands off approach.


SQL injection


An database code injection technique, used to attack data driven applications in which malicious SQL statements are inserted into an entry field for execution, many markets got shut down or lost their money because of this type of attack.


Tails


Are you using just Tor Browser Bundle? Then consider TAILS, it’s an operating system specially made for anonymous activities that you boot from a CD or usb stick. It leaves no traces on your computer and has plenty of built in tools that come in handy. *Check out their website, search “Tails boum” and you should find it very easily.


Talk.masked/core.onion


2 of the first major forums in Onionland besides Onionforum.


The Marketplace (i2p)


Market set up on the I2P network. Defined by use of an alternate anonymity network and the use of P2SH addresses to hold all funds in escrow during the ordering process. Tends to be either praised for its security or derided for the bugs and non-intuitiveness that it’s model provides. You can find full usage guide here.


Tony76


Was a trusted vendor on SR1, than ran a massive “FE” scam you can read the full story here, The FBI accuses DPR of placing a hit on the individual using this pseudonym. He scammed a large number of Silk Road users, but his true identity and the details of if he was killed or not are still in dispute.


Tor


The Onion Router. Uses ‘onion routing’ to provide anonymous access to the Internet by encrypting a message several times with each relay removing one layer before the final destination is reached. Funded heavily by the US government, it’s security has been a focus of much academic research with no serious known issues or backdoors that have been discovered yet. Used by journalists, government censors, and more to hide their true location and identity.


Torchat


IM service that works by having each user set up a ‘hidden service’ that can be used to contact them via Tor. Somewhat similar in purpose to OTR, but messages do not have plausible deniability.


Torch


Tor Search Engine (http://xmh57jrzrnw6insl.onion/) is your light in the dark net. Make sure to bookmark it if you want to wander the depths beyond your favorite markets.


Tormarket


Another market to rise and fall after SR’s demise. Not as big as Sheep, but the timing made many very cautious about the reliability of new markets.


TorMail


Tor Mail was a Tor hidden service that allowed to send and receive email anonymously, to email addresses inside and outside the Tor network. The service was seized by the FBI as part of the Freedom Hosting bust in August 2013.


Tor Browser Bundle (TBB)


A modified version of Firefox that allows people to easily use the Tor anonymity network. It is compatible with Windows, OS X, and Linux.


Tor Exit Node


The last relay that data traveling from its originator (a computer) to the recipient (a web server) travels through before reaching the recipient. To the recipient, traffic appears to originate from the exit node.


Tor Node


A data relay, either a connection point, a redistribution point (middle node), or an endpoint (exit node).


TS/LS/OPVA/pthc/PB/ptsc/petersburg/anything relating to a child/swirlface/r@ygold


CP keywords.


Tumble


A method to anonymize the source of your bitcoins.


TrueCrypt


Open source application used to encrypt storage devices such as hard drives and USB flash drives. It is also used to create encrypted virtual disks contained in a file that mount similarly to real storage devices.


Utopia marketplace


Market that had some connection to BMR (altho the nature of the connection is somewhat unclear). Had the advantage of being fully stocked with former BMR vendors at its public launch. Rapidly taken down by the Dutch police not long after it was unveiled to the public.


Vendors


Those who sell product on a market. This may be of an illegal nature, semi-legal nature, or completely legal nature. Because a vendor will be given a buyer’s full information to send the product to, any new vendor is under heavy scrutiny of being a scam or a ‘honeypot’ set up by law enforcement. Because of the difficult nature of the work, quality vendors tend to develop a cult following.


Vendors Roundtable


A vendor only discussion forum on Silk Road 1/2 forums. Used on a site to allow vendors to bring up issues about the market or buyers without raising alarm in the general populace.


VPN


Virtual Private Network. In the context of anonymous activity, this is usually a proxy that purports to be anonymous in nature to hide the end user’s identity. Generally either used to hide the fact that one is connecting to a anonymous network like Tor, or to hide the fact one is using an anonymous network like Tor (as many websites will block Tor outproxies). A VPN


does not provide true security as there is no way to know if the operator is keeping logs.


Whonix


(http://zo7fksnun4b4v4jv.onion) is an Debian based operating system focused on anonymity, privacy and security by isolation. Whonix consists of two parts: One solely runs Tor and is called Gateway. The other, the Workstation, is on a completely isolated network. Only connections through Tor are possible.


Whistleblowing


The disclosure by a person, usually an employee in a government agency or private enterprise, to the public or to those in authority, of mismanagement, corruption, illegality, or some other wrongdoing.


ZULU Time


UTC-0 Western European time zone.

Read More
Published September 26, 2021 by with 0 comment

How to make semtex( Educational purposes only) Im not responsible for someone blowing themselves or others up.




How to make Semtex


Semtex is a powerful explosive that is widely used by terrorists. It is a little more powerful that U.S C-4.

Here is the recipe to make it:

Materials:

1. RDX High Explosive

2. PETN High Explosive

3. Motor oil, petroleum jelly,

or vegetable oil

4. Mesuring device (cup, spoon, etc)

5. Wooden dowel or spoon for stirring

6. Rolling pin

7. Wooden Board or hard surface

8. Bowl

9. Wax paper or plastic wrap

10. Glass jar with lid

Procedure:

1. Place a small amount of RDX crystals on a wooden block or hard countertop. Using a rolling pin, crush the crystals into a fine powder, having the consistency of flour.

CAUTION!!! USE A ROLLING PIN ONLY, NOT A BLOCK OF

WOOD!! It is important to crush the crystals rather than using friction between two rubbing surfaces.

2. Repeat process until desired amount of RDX has been powdered. Then, using the same process, powder the same amount of PETN.

3. Mix 9 parts (cups, etc.) of RDX and 9 equal parts of PETN in a jar and shake for 5 minutes.

4. Pour the RDX/PETN mixture into a bowl of motor oil, petroleum jelly, or vegetable oil. Stir vigorously until a uniform paste is obtained.

5. Semtex can be used immediately for any task requiring a high explosive. If it is to be stored, however, mold the Semtex into a brick and place it in the middle of a square piece of wax paper or plastic film. Wrap tighly and seal it with rubber bands or adhesive tape to keep the brick airtight.

6. Store in a cool, dry place. The explosive should have unlimited shelf life, but it will lose its plastic properties after a while.

NOTE: In general, it is always preferable to mix explosives just before use to avoid the problems of and dangers of storage.

All chemicals can be purchased from Advance Scientific & Chemical. To get their catalog, send $5.00 to: Advance Scientific & Chemical, Inc.
Read More
Published September 26, 2021 by with 0 comment

Installing, launching and replicating Tails OS

What you need


USB or DVD with Tails pre-installed.


External DVD reader if necessary.


Laptop and projector for demonstration.


Blank DVDs or USB flash drives of at least 2GB (4GB if you intend to discuss the persistence feature in Tails; you will need at least 1 DVD and 1 USB, or 2 USBs, per participant)


Pre-downloaded Tails disk image (.iso) file to distribute to participants 


Installing Tails:


Step 1: Background


To start, you may want to explain the following:


The purpose of these exercises is to show you how to download and install Tails, verify a Tails .iso file so that you can authenticate a download of a new version of Tails in the future, and create new Tails disks and USB drives for friends and colleagues.


Distribute either the blank DVDs or USB flash drives, and the pre-downloaded Tails .iso images, to the group. Begin by explaining that Tails, as a live operating system, can be run from an external media device - however, in order for this to work properly, dragging and dropping Tails like regular file won't work. If you're working with DVDs, the Tails image must be burned to the DVD; if you're using USB flash drives, the image must be installed on the drive using a third-party application such as Universal USB Installer (


Note: It is important that any USBs or DVDs used during these exercises be blank, or at the very least contain no information that is not backed up elsewhere. Installing Tails on a media device deletes all data on that device; however, this deletion is not 100% secure and can potentially be recovered.


Step 2: Installing Tails


Walk participants through the relevant installation process(es) for the external media provided and their computer's operating system.


Installing Tails on DVD (Windows & Mac)


Windows:


Ask participants to find the Tails .iso on their machine; have them right-click on the Tails image and select 'Burn disc image'.


Participants will then need to select the drive on their machine to which the disc image will be burnt from a dropdown menu; once they've selected it, ask them to also check the box for 'Verify disc after burning' to ensure that it's been burned correctly.


Once this has been done, ask everyone to click "Burn" and wait for the process to complete.


Mac OSX:


Ask participants to launch Disk Utility (which can be found by going to Applications -> Utilities -> Disk Utility), and then to insert their blank DVDs into the drive.


Particpants will the need to locate the Tails .iso image on their machines, dragging and dropping it into the left pane of the Disk utility window directly beneath the section displaying the drive with the blank DVD.


With the Tails image highlighted, have everyone click on the "Burn" icon in the toolbar above.


On the next pop-up window, have participants check the "Verify burned data" box beneath "After Burning" - then, everyone will click on the "Burn" button.


Once burning is complete, the data will be verified to ensure that the burning process completed correctly.


Installing Tails on a USB Flash Drive (Windows)


Windows:


Note: these steps are also outlined, with helpful screenshots, on the Tails website (


https://tails.boum.org/doc/first_steps/installation/manual/windows/index.en.html [3]) Distribute blank USB flash drives to the group, and have everyone insert them into their computer's USB port. Remember - the blank drives must have at least 2GB of storage space, and at least 4GB if you plan to discuss and demonstrate setting up a persistent volume within Tails.


Have participants download and install Universal USB Installer (


http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/ [2]), ensuring that they are downloading and installing version 1.9.5.4 or later. Mention to the group that this application will allow them to properly install and mount the Tails .iso so they can be run directly from their USB drives, reminding them that dragging and dropping the .iso like a normal file won't allow for this.


Once the installation process has completed, have participants launch Universal USB


Installer:


Step 1 on the first screen will prompt users to select a Linux Distribution from a dropdown - Tails will appear in this list (probably as T(A)ILS), which should be selected.


Step 2 will prompt users to select an applicable .iso - everyone should use Browse to locate the Tails .iso on their computer and Open it.


Step 3 will ask for a USB drive to be selected - everyone should select the drive containing their blank USB from the dropdown.


Once the above steps have been completed, have participants click "Create" - this will format the USB drive and mount the Tails disc image, allowing it to be booted directly from USB. Once the process has been completed, have the group safely eject their formatted USBs.


Launching (or Booting) Tails:


Step 1: Background


Now that participants each have a DVD or USB with Tails properly mounted and configured, walk through the process of launching Tails for the first time. Before beginning, however, it may be useful to explain some basics about Live DVDs & USBs, and Tails in particular: While a computer has an operating system (likely Windows or Mac OS X) installed on the hard drive that boots every time you start your computer, you can actually boot into another operating system using specially configured "live" USB memory sticks or DVDs that you plug into the computer. These external operating systems do not install anything onto the hard drive of a computer, but just run in memory.


Sometimes, computers require a little help before they are able to boot an operating system from a USB drive or DVD. Windows and Linux computers may need the user to access the BIOS or Boot Menu when starting up. Apple computers will require the user to press the shortcut key to enter the Startup Manager at boot.


Step 2: Launching (or Booting) Tails


Launching Tails from a Live DVD or USB (Windows) Because many manufacturers make Windows PCs (and several models, as well), it?s not possible to provide one set of instructions that applies to all variations.


In many cases, the manufacturer will explicitly say which key to press during the boot process on the ?splash screen? ? the very first screen with the company?s logo.


However, if that is not the case for some participants, they should be able to find instructions for their specific make and model on the manufacturer?s website.


There are also a handful of websites that try to provide a comprehensive list for many


manufacturers, such as CraftedFlash (https://craftedflash.com/info/how-boot-computer-


from-usb-flash-drive [4]).


If for some reason the USB stick is not visible in the Boot Menu, trainers may need to help participants access the BIOS on their PC to enable USB booting.


The method for accessing a PC?s BIOS is as varied as PCs themselves, and trainers should consult the manufacturer?s website.


In the event that the manufacturer?s website cannot be reached, we offer the following, general guidelines:


Windows XP, Vista, 7:


1. Turn off computer, and insert Tails USB/DVD once it has completely shut down.


2. Turn on the computer.


3. During boot up there should be a notice displayed where one can press a key to enter the BIOS. Which key this is depends on your computer's manufacturer, but is often either F2, F12, Delete, Esc or Enter. If the Windows logo appears, you have missed the opportunity to enter BIOS and will need to restart your computer and try again.


4. Once in BIOS, navigate through the settings to find "Boot order", "Boot settings", or similar.


5. Following the on-screen instructions, move your USB/DVD to first priority for booting.


6. Save and exit BIOS, which will restart your computer.


7. Your computer should boot from USB/DVD after BIOS (rather than your hard drive), and a new screen should appear asking you to select Tails to boot, also providing you the option to boot Tails in safe mode. After 5 seconds it will automatically boot Tails normally.


8. After loading, you will find yourself on the Tails Greeter page.


Windows 8, 8.1 (8.x):


Windows 8.x (8.1 or later versions) users may need to disable ?Fast Boot? to access the device?s BIOS:


To do this, while running Windows, navigate to the Power menu option, hold Shift, and select Restart.


This will load The Advanced Startup Option Menu, select Troubleshoot and under Advanced Options select UEFI Firmware Settings. Your computer will now reboot into the BIOS.


Once you are in the BIOS, you should be able to change the boot order as outlined above in Steps 4 through 8.


You may also need to disable Secure Boot, disable UEFI, or enable BIOS Legacy for the computer to successfully boot from the USB/DVD. (Try to reboot at least once without changing these settings.


While in the BIOS, you may wish to point out to participants that they can set passwords to prevent tampering in the future. Of course, password settings should not be enabled unless the participant is using their own equipment.


Launching Tails from a Live DVD or USB (Mac OSX) Some versions of Mac computers have known issues with booting from Tails USB/DVDs, please see the following list on the Tails website:


https://tails.boum.org/support/known_issues/index.en.html#index13h2 [5]


To boot a Mac from a USB/DVD:


1. Turn off computer, and insert Tails USB/DVD once it has completely shut down.


2. Turn on computer, holding the Option key - do not release the key until Startup Manager


has appeared.


3. Within Startup Manager, you should see your USB stick or DVD device included among the choices.


4. Select the USB stick or DVD with Tails.


5. A new screen should appear asking you if you would like to boot to Tails normally (?Live?) or in Safe Mode. After 5 seconds it will automatically boot Tails normally.


6. After loading, you will find yourself on the Tails Greeter.


Step 3: Tails Desktop and User Interface


Once participants successfully boot into Tails from their live devices, review the User Interface and location of key features before proceeding. Some topline interface features and menu to highlight for the group include:


Top Navigation Bar


Applications menu


Places menu


Application Shortcuts for Tor Browser, Claws Mail, Pidgin, KeePassX


Notifications area


Bottom Panel


Desktop Shortcuts for Computer, amnesia's Home, Trash, Tails Documentation, Report an Error


Nautilus File Manager (via Places menu or Desktop shortcut) An overview of the basic Tails desktop user interface can be found on the Tails website:


https://tails.boum.org/doc/first_steps/introduction_to_gnome_and_the_tails_desktop/index.en.html


[6]


Replicating (or Cloning) Tails:


Step 1: Background


In this step, participants will create a new Tails USB from their existing installation. This exercise will make use of Tails Installer, an application available only within Tails that allows for an easier method of formatting and installing on USB drives or SD cards - this process is known as 'cloning".


Cloning using Tails Installer is the easiest way for users to replicate and share Tails with their colleagues and contacts. Tails Installer also allows users to create persistent volumes in cloned copies of their original Tails installation - creating persistent volumes is covered in the


Storing Confidential Information in Tails [7] Deepening section.


Step 2: Replicating (or Cloning) Tails


Important Notes:


Any USB drive onto which Tails will be installed requires at least 2GB of free space, or 4GB if you plan to create a persistent volume within Tails on that device.


Any data on the device onto which Tails is being installed will be deleted.


Using Tails Installer to Clone Tails onto a USB Drive 1. If participants are not still booted into Tails from the previous step, have everyone re-launch and pause when they arrive at the Tails desktop.


2. From the Tails Desktop, direct the group towards the Applications menu in the upper-left hand corner; from there, go to Tails and then to Tails Installer (Applications -> Tails -> Tails Installer).


3. Have participants click the Clone & Install button, and then insert their USB drives into their machines.


4. In the Target Device dropdown menu, the USB drives participants have inserted will now appear - select this device and then click Install Tails, clicking Yes on the following warning screen.


5. Tails can now be launched from this new USB drive once installation completes.


Note: Persistent volumes can only be created on Tails installations cloned using Tails Installer; any persistent volumes within installations of Tails being cloned to other devices will not be copied.


AdIDS Category:


Deepening [8]


Parent Sub-topic(s):


Secure & Anonymous Workspaces using Tails [9]


Duration:


60 minutes


Platform:


Linux [10]


Mac OS [11]




Windows [12]


Summary:


Participants learn how to download Tails, confirm the authenticity of the Tails .iso file (the original file that must be downloaded from the Tails website), install Tails on external media, and create a new Tails USB stick or DVD from an existing Tails installation.


Note:


Inserting a USB or DVD device into a computer requires trusting that USB or DVD device.


Plugging untrusted removable media into a computer, just like opening untrusted attachments or clicking on untrusted links, is an inadvisable practice. Participants who are uncomfortable with using the provided media devices in the session can also learn how to boot from their own devices.


Credits:


Michael Carbone, Nick Sera-Leyva


Last Updated:


May 2015


- Export this page (.rtf) [13]


- Export this page (.pdf) [14]


All content on this site is available under a Creative Commons Attribution-Share Alike


Unported 3.0 license by multiple authors.


Except where otherwise noted, content is licensed by Internews for attribution to LevelUp.



About ? Email: levelup [at] riseup.net


PGP key ? Fingerprint: 8EF3 5BB8 8738 1EEB 87D8 CA4C 207B FB95 91A6 38BE


Source URL: https://www.level-up.cc/leading-trainings/training-curriculum/deepening/installing-launching-replicating-tails


Links


[1] https://tails.boum.org/download/index.en.html#download_iso


[2] http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/


[3] https://tails.boum.org/doc/first_steps/installation/manual/windows/index.en.html


[4] https://craftedflash.com/info/how-boot-computer-from-usb-flash-drive


[5] https://tails.boum.org/support/known_issues/index.en.html#index13h2


[6] https://tails.boum.org/doc/first_steps/introduction_to_gnome_and_the_tails_desktop/index.en.html


[7] https://www.level-up.cc/leading-trainings/training-curriculum/deepening/storing-confidential-info-tails


[8] https://www.level-up.cc/leading-trainings/training-curriculum/deepening


[9] https://www.level-up.cc/leading-trainings/training-curriculum/secure-anonymous-workspaces-tails


[10] https://www.level-up.cc/platform/linux


[11] https://www.level-up.cc/platform/mac-os


[12] https://www.level-up.cc/platform/windows


[13] https://www.level-up.cc/print/344


[14] https://www.level-up.cc/printpdf/344

Read More
Published September 26, 2021 by with 0 comment

Man Allegedly Tried to Bomb Cellphone Stores to Stop Pornography’

 

The 75-year-old man is in federal custody after he planted bombs around cell phone stores to stop pornography. Allen is said to have left boxes with wires outside of two stores in Michigan. Marie was on Tuesday. They were homemade pipe bombs, found by the FBI. Allen was seen on video putting the bombs in the bag.. Allen penned a letter to AT&T and other carriers that was sealed in a polka dot envelope. We are prepared to destroy tower communication in all of this country if immoral content is not stopped. This includes all manner of indecent communication and cursing. As software must be developed, you are therefore given six months to comply with this demand." Allen admitted that the organization was a hoax, according to prosecutors. Allen thought he would be arrested because of the bombs and threats.

The FBI says the devices were made with a metal pipe nipple and two metal end caps. There were metal spheres and nails found in the powders of each device. They enhance the explosion effect by propelling fragments of metal out to high speeds which can cause more damage and injuries. Flood discovered that Allen is a retired underground miner after looking at his LinkedIn profile. Extremists of anti-pornography have made violent threats before. Cry Exodus and the National Center on Sexual Exploitation were linked in April to violent white supremacist rhetoric online. Anti-masturabation groups are often linked to fascist ideologies. A Pornhub executive's mansion was allegedly lit on fire by an Arsonist shortly after payment processors stopped service to the site. Allen is accused of attempting to damage buildings used in interstate commerce, each carrying a sentence up to 20 years. 

Read More