Tor onion site

Pijus Jauniškis in Entertainment2022, January 26 · 7 min readWhat to know before exploring dark web linksBefore you start, let’s go through your dark web checklist real quick:You need a Tor browser. Luckily for you, The Tor Project (they maintain the network’s technological base) has one ready to download.Be careful. Keep in mind that the anonymity of the Tor network makes it a haven for criminals and hackers. A few things to keep in mind:You have to be careful when entering any dark web link. Before entering the Tor network, shut down most other programs or apps. Download and use a VPN (Virtual Private Network) for added security. Don’t forget there are hidden pages. Surfing Tor isn’t easy. Aside from being isolated from the everyday internet, most of the Tor network isn’t indexed, rendering it invisible to search engines. In essence, the network is populated by hidden websites. Yes, search engines exist on Tor, but their reliability is questionable. DataProt, a website dedicated to advising on cybersecurity, has a great looking infographic explaining how Tor works. Tor sometimes has websites made exclusively for the network. These usually come as onion links with the “.onion” domain. To find the best dark web links on Tor, you have to use a website list – just like блокировки the one below. Here are ten cool dark web links to paste into your Tor browser today!The Hidden Wiki is usually presented as your one-stop-shop for dark web links. That’s not the case. Many of the links present in The Hidden Wiki are of dubious (if not criminal) nature. Many more don’t work. As far as resources go, it’s somewhat useless. Which is why we recommend Daniel.Daniel’s website lists 7,000.onion addresses. They are separated into several categories to make browsing easier. Moreover, Daniel’s site has an in-built test functionality. This means you can have the website check if any given Tor website is online. The list shows the last time a website was checked and whether it was online. This makes Daniel’s website an excellent first step in exploring Tor.ProPublica is an investigative journalism outfit. Their 2016 reporting on sexual abuse won the Pulitzer Prize that year. ProPublica is accessible on the “clearnet” – that is, the regular internet you’re using right now. Yet it also maintains a Tor website. Accessing it via a Tor browser gives you a layer of anonymity and security, as well as allows you to bypass country blocks. As a bonus, ProPublica is one of the most polished web experiences you’ll have on the dark web. It’s also not the only one to have a dark web link: you can also use Tor to read The New York Times and other news sites or use their SecureDrop integration for whistleblowing purposes.3. Ahmia – for those who want a Tor search engine http://msydqstlz2kzerdg.onion I still maintain that going into Tor without having dark web links already in your hand is a fool’s errand. But some people insist on search engines, and several Tor engines do exist. I’m going to recommend Ahmia. While it’s hard to tell which engine works the best, Ahmia presents itself as a hidden service search engine, and that’s what it does. It also works to remove child abuse content from their search results, which is both the morally right thing to do and a good service for those who want to trawl the dark web.4. DuckDuckGo – search the clearnet securely and without trackinghttps://3g2upl4pq6kufc4m.onion Google collects a lot of your information. Its search results tend to be biased. DuckDuckGo, however, was built on the idea of not collecting user com data. The results that this search engine shows you are always neutral. It’s similar to the Surfshark Search feature offered by Surfshark. You’re most likely to find DuckDuckGo useful outside of the dark web. Indeed, it doesn’t search for Tor websites. This is a bit of a bummer since the popular Tor search engines are all ugly and uncomfortable to use. DuckDuckGo has a presentation similar to Google. And unlike the Tor search engines, it won’t lead you to quite so many illegal websites after a simple search.5. Riseup – tools for activists and organizershttp://nzh3fv6jc6jskki3.onionRiseup provides email and chat services that keep no records of your activity. It is also protected from malicious attacks. It also has no intention of cooperating with any government – unlike, say, Google. Riseup supports the causes of “human liberation, the ethical treatment of animals, and ecological sustainability.” That’s why Riseup also provides organizational tools, mailing lists, and more. However, knowing the dark web link isn’t enough – you need an invitation code to create a Riseup account. But you can still browse the security section! It has excellent tips on how to add a dash of information security to your daily life.6. Hidden Answers – ask what you want in anonymityhttp://answerszuvs3gg2l64e6hmnryudl5zg
rmwm3vh65hzszdghblddvfiqd.onion Hidden Answers is one of those dark web links that keep making their way onto these lists. The reason for that is simple. Hidden Answers is the dark web version of Quora, Yahoo Answers, and Reddit. Once you access the site, you’ll soon notice that the questions on Hidden Answers touch upon a variety of topics. When people have the ultimate anonymity the internet can offer, they still ask where your nickname comes from – or would you have your head cryo-frozen after death.7. Tor Metrics – explore the statistics of the dark webhttp://rougmnvswfsmd4dq.onion The dark web is a curious subject: it’s not that easy to use, and it seems to be popular among shady people. But what if we put all that activity into numbers?Tor Metrics is the website that measures who and where uses the network. Surprisingly enough, about 20% of daily users come from Russia. The US is in second place, with around 18% of the share. Aside from revealing just how widely not-used Tor is (data suggests barely more than 1.5 million daily users), you can also see the scope of the network. Metrics record slightly more than 60,000 unique.onion addresses.We already established that many of the dark web links you find on link aggregators are offline. Thus, it paints a picture of the tiny world of Tor websites.8. ZeroBin – the secure way to share your pasteshttp://zerobinqmdqd236y.onion Just like clearnet, Tor has its utility websites. ZeroBin is one of them. If you use the Tor network regularly, you will want a way to share stuff with your dark web friends. ZeroBin allows you to do that with complete safety and privacy. One of its selling points is that even ZeroBin servers don’t know what you pasted. The data encryption takes place on your browser before it goes to the server. Options for sharing include password protection. And, of course, the pastes will be deleted sometime later.9a. Imperial Library – the fun dark web libraryhttp://xfmro77i3lixucja.onion Tor website lists like to harp about Sci-Hub. They miss two vital points: it’s down (at the time of writing), and a clearnet version exists – you don’t need Tor to use it.Sci-Hub is mostly useful for academic types who know the PMID, DOI, or URLs of papers they want to access. At the same time, websites like the Imperial Library of Trantor store stuff that’s interesting to the broader public. Imperial Library is a public depository of scanned books. As a bonus, it’s administered by a guy with a Riseup email address. To date, nearly four hundred thousand books have been uploaded.9b. Comic Book Library – reading comics but on the dark webhttp://r6rfy5zlifbsiiym.onion Interested in comic books instead? There’s also the Comic Book Library, with entries dating back to the 1930s. Of course, like any such effort, the scans are of dubious legality.10. Tunnels – explore the literal university undergroundhttp://62gs2n5ydnyffzfy.onion http://74ypjqjwf6oejmax.onion And for the end, a slice of something completely different. Some of the more famous Tor websites are about exploring the tunnels in American universities.Infrastructure like that is both dangerous and illegal to access. That’s why urban explorers hosted their blogs on Tor. It also helps that said universities are heavily tech-related. IIT Underground – focused on Illinois Tech – is the smaller of the blogs. Beneath VT – that’s Virginia Tech – is more prominent. It provides more details on the tunnels as well as the dangers associated with them.The websites are a step above the usual Tor website design, too. They still look like something from the early aughts, though.The threats lurking in the dark webThe dark web is the Wild West of the internet – exciting to explore but can also be dangerous. Here are some threats you might run into:Scams. Since most of the websites are non-indexed and unregulated, the probability of running into scams is much greater. This is especially true if you’re trying to purchase anything illegal or questionable. Why? Because “Excuse me, officer, but the drugs I ordered on the dark web were never delivered to me” is a poor alibi. And even if you’re getting something that’s not illegal, there’s no reason for a vendor to ever remain in the dark web. In short, it’s bad for traffic and sales.Malicious software. Keyloggers, ransomware, phishing malware, and other types of malicious software are more common on the dark web. This happens because there are fewer rules for website quality. They often come with poor encryption standards (http) and get universally marked as suspicious by normal browsers. Simply visiting a website like that could get you into trouble with malware.Government monitoring. Sadly, the same goes for many Tor-based websites. Anything illegal or deemed potentially harmful by your local government is usually closely monitored. Simply visiting such a website could get you into trouble with authorities.That’s why, even if you use The Onion Router, it’s a good idea to use Tor over a VPN.Beef up your internet privacy even moreSo if you want to experience the dark web, these Tor websites are a good starting point. But you should be aware of the security dangers involved in using the Tor network.The fact that you’re using Tor is not hidden from your ISP’s (Internet Service Provider) records. Keep your Tor browsing a secret by using Surfshark (it’s called Tor over VPN)! If necessary, it can even hide the fact that you’re using a VPN.Secure your data with a VPNBrowse the dark web privatelyGet Surfshark!Written byPijus JauniškisA privacy worrier with a knack for translating tech stuff into human languageRate and share this articleHand picked related articlesHow to use Tor, and is it safe to access the dark web?Aistė Jokšaitė in Cybersecurity, Internet Security2022, March 9 · 10 min readUsing Tor over a VPN: What, why and how?Pijus Jauniškis in VPN, Must-knows2021, January 6 · 7 min read
Tor onion site - Кракен сайт в тор браузере ссылка kraken9webe
Старейший магазин в рунете. Поиск по карте Находи и покупай клады прямо на карте. Проект существовал с 2012 по 2017 годы. Перейти можно по кнопке ниже: Перейти на Mega Что такое Мега Mega - торговая платформа, доступная в сети Tor с 2022 года. Правильная ссылка на! Даркмаркет направлен на работу в Российском рынке и рынках стран СНГ. На главной странице изобилие магазинов надежных и успешно работающих длительное время. Бесплатная горячая линия для зависимых и). Ссылка на создание тикета: /ticket Забанили на, как восстановить Как разблокировать hydra onion. На нашем представлена различная информация.ru, собранная. новый маркет в русском даркнете. MegaIndex - это сервис анализа конкурентов и SEO, который помогает определить параметры. Все города РФ и СНГ открываются перед вами как. Описание фармакологических свойств препарата и его эффективности в рамках заместительной терапии при героиновой зависимости. Реестр запрещенных сайтов. Zerobinqmdqd236y.onion - ZeroBin безопасный pastebin с шифрованием, требует javascript, к сожалению pastagdsp33j7aoq. Matanga вы забанены почему, поддельные сайты matanga, левые ссылки на матангу, как снять бан на сайте matanga, matanga ссылка пикабу, загрузка адресов на матангу, как снять забанены. Если же данная ссылка будет заблокированная, то вы всегда можете использовать приватные мосты от The Tor Project, который с абсолютной точностью обойдет блокировку в любой стране. Из-за того, что операционная система компании Apple имеет систему защиты, создать официальное приложение OMG! Доступ через tor - http matangareonmy6bg. Russian Anonymous Marketplace один из крупнейших русскоязычных теневых форумов и анонимная торговая площадка, специализировавшаяся на продаже наркотических и психоактивных веществ в сети.

Dear visitor!If you are outside Russia and have important information regarding urgent threats to the security of the Russian Federation, you can safely and anonymously share it with us via the virtual reception system (VRS) of the SVR over the TOR network. Our onion-address is:svrgovru24yd42e6mmrnohzs37hb35yqeulvmvkc76e3drb75gs4qrid.onionPlease do not send information concerning media inquiries, press releases, archival research and other similar issues through this channel.How to establish a secure communication with us via the VRS? Follow the simple instructions given below:1. Download and install on your computer/device a browser or an operating system that supports TOR. We recommend that you use open source software (e.g. www.torproject.org, tails.boum.org, etc). Make sure you verify the installation package's digital signature after downloading.2. Run your TOR-browser and enter our onion-address to access the VRS of the SVR over the TOR network.3. During you first visit to the VRS you will be given a five-words code that you should write down or memorize. You will need it in the future to log back in and check for responses from our team in case we are interested in additional communication.4. If you are in hostile environment and/or have reasons to worry about your security, do not use a device (smartphone, computer) registered to you or associated in any way with you or people from your personal settings for network access. Relate the importance of information you want to send us with the security measures you are taking to protect yourself!5. If you are familiar with PGP, consider encrypting your message to our virtual reception system by the following public PGP-key as an additional layer of security:-----BEGIN PGP PUBLIC KEY BLOCK-----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==
=5vim
-----END PGP PUBLIC KEY BLOCK-----Уважаемый посетитель!Если вы находитесь за пределами России и располагаете важной информацией об угрозах безопасности Российской Федерации, то можете направить её нам безопасным и анонимным способом через виртуальную приёмную Службы в сети TOR по адресу:svrgovru24yd42e6mmrnohzs37hb35yqeulvmvkc76e3drb75gs4qrid.onionНе пересылайте по данному каналу материалы, касающиеся вопросов СМИ, архивной работы и подобной тематики.Как связаться с нами через виртуальную приёмную Службы в сети TOR?Следуйте следующим простым инструкциям:1. Загрузите и установите интернет-браузер либо операционную систему с поддержкой сети TOR. Рекомендуем использовать программное обеспечение с открытым исходным кодом и из авторитетных независимых источников (например, с сайтов torproject.org или tails.boum.org), а также проверить цифровую подпись установочного архива после скачивания.2. Запустите TOR-браузер и введите приведённый выше адрес виртуальной приёмной Службы в сети TOR.3. При первом посещении виртуальной приёмной Вам будет присвоен уникальный идентификатор (комбинация из 5 слов), который в дальнейшем потребуется для доступа к ответу Службы на Ваше сообщение в случае, если оно представит интерес.4. Если вы находитесь во враждебной среде и опасаетесь за свою безопасность, то не используйте для выхода в сеть и поддержания с нами связи смартфоны, компьютеры и другие электронные устройства, ассоциированные с Вами или Вашими знакомыми. Соотносите значимость передаваемой Вами информации с принимаемыми мерами по обеспечению своей безопасности!5. Если вы знаете, как работать с PGP, то в качестве дополнительной меры зашиты рекомендуем зашифровать своё сообщение в наш адрес с использованием следующего публичного PGP-ключа:-----BEGIN PGP PUBLIC KEY BLOCK-----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==
=5vim
-----END PGP PUBLIC KEY BLOCK