Articles
Pages
Products
Research Papers
Blogs
Search Engines
Events
Webinar, Seminar, Live Classes
Monday, 11 February 2019 12:23

Dark Web Beginners Security Guide

Author:  [This article is originally published in darkwebnews.com written by Tarquin]

[This article is originally published in darkwebnews.com written by Tarquin - Uploaded by AIRS Member: Anna K. Sasaki] 

We did plan on creating our own amazing, in-depth deep web security guide for beginners. But, we found one by Jolly Roger that is better than anything we could put together.

The original guide can be seen on The Hub Forums here: gttp://thehub7dnl5nmcz5.onion/index.php?topic=52.0. All credit goes to Jolly Roger who obviously put in a lot of time creating this fantastic guide.

When looking for sites on the Deep Web then just go and check out our mega Deep Web Linkslist. It is one of the biggest lists of hidden .onion URL’s on the internet.

Donations

Jolly Roger has put in a lot of work to create this comprehensive deep web security guide for beginners. If you appreciate the work he has done, why not give a small donation…

Donation Address: 1PkJ928QWC5BuQAsHoNQzRV5wfnveJSRCp

Tip for Beginners:

Before doing anything on the Dark Web or even learning about it, make sure you are protected with a VPN and Tor. The guide below goes into this, but you should be using a VPN to even read this guide or any other Dark Web related topic.

The Feds are watching everything, so you are better off not letting them know you are even interested in the Dark Web. This site here goes through pretty good VPN’s and they usually have good discounts. https://topvpnsoftware.com

The Guide

  1. INTRODUCTiON TO SECURE COMMUNICATION – TOR, HTTPS, SSL
  2. PGP, TAILS, VIRTUAL BOX
  3. PGP CONTINUED
  4. WHOLE DISK ENCRYPTION AND FILE SHREDDING
  5. JAVASCRIPT VULNERABILITIES AND REMOVING PERSONAL METADATA FROM FILES
  6. GENERAL SECURITY PRECAUTIONS WHEN POSTING ONLINE, LEARN FROM OTHERS’ MISTAKES
  7. EXIF DATA
  8. RETAINING A LAWYER, HOW TO HANDLE GETTING CAUGHT OR INTERROGATED
  9. COMBINING TOR WITH A VPN
  10. COMBINING TOR WITH A VPN CONTINUED
  11. VPN FOR WINDOWS USERS">CONNECTING TOR -> VPN FOR WINDOWS USERS
  12. TRACKING COOKIES
  13. LEARNING FROM OTHERS’ MISTAKES. LIBERTAS, DPR, SABU, LULZSEC
  14. HOW FAR WILL LAW ENFORCEMENT GO?
  15. FRAUDULENT PRIVATE MESSAGES
  16. LEARNING FROM OTHERS’ MISTAKES. HOW THEY BUSTED SABU
  17. LEARNING FROM OTHERS’ MISTAKES. SABU BECAME FBI INFORMANT AND BETRAYED JEREMY HAMMOND
  18. WHERE YOU MIGHT CONSIDER RUNNING TO, IF YOU HAD NO OTHER CHOICE
  19. SECURING YOUR ACCOUNT FROM FBI MONITORING
  20. INVINCIBILITY MINDSET, FEDERAL GOVERNMENT BULLYING TACTICS
  21. HOW TO CONNECT TO TOR OVER TOP OF TOR
  22. HOW TO VERIFY YOUR DOWNLOADED FILES ARE AUTHENTIC
  23. VERIFYING SIGNED MESSAGES WITH SIGNATURES AND SIGNING YOUR OWN MESSAGES
  24. AN EXAMPLE OF REALLY BAD OPSEC – SMARTEN UP!
  25. TOR CHAT
  26. OBTAINING, SENDING AND RECEIVING BITCOINS ANONYMOUSLY
  27. CLEARNET VS HIDDEN SERVICES – WHY YOU SHOULD BE CAREFUL
  28. THEY ARE WATCHING YOU – VIRUSES, MALWARE, VULNERABILITIES
  29. MONITORING YOU WITH AN ANTENNA
  30. COOKIES & JAVASCRIPT REVISITED, PLUS FLASH COOKIES AND OTHER BROWSER TRACKING
  31. A FEW RECOMMENDATIONS
  32. COLD BOOT ATTACKS, UNENCRYPTED RAM EXTRACTION
  33. THE STRENGH OF CRYPTOGRAPHY AND ANONYMITY WHEN USED PROPERLY
  34. PGP/GPG Email Addresses
  35. ANOTHER SCAM EMAIL – BEWARE
  36. AN INTRODUCTION TO AN EXPERT ON OPSEC, PLUS MD5 & SHA-1 CHECKSUMS
  37. IT IS OBVIOUS WHEN YOU ARE USING TOR
  38. ARE YOU USING SAFE-MAIL.NET ?
  39. YET ANOTHER EXAMPLE OF HOW STRONG CRYPTOPGRAPHY AND PROPER OPSEC CAN PROTECT EVEN PEDOPHILES
  40. LOCALBITCOINS PART 1 – POLICE ARE WATCHING IT!
  41. LOCALBITCOINS PART 2 – THIEVES, SCAMMERS AND COUNTERFEIT BILLS!
  42. LOCALBITCOINS PART 3 – MORE SCAM STORIES
  43. LOCALBITCOINS PART 4 – SELLERS BUSTED FOR MONEY LAUNDERING
  44. HIDING TOR FROM YOUR ISP – PART 1 – BRIDGES AND PLUGGABLE TRANSPORTS
  45. CAPABILITIES OF THE NSA
  46. WHY YOU SHOULD ALWAYS BACK UP YOUR DRIVES, ESPECIALLY ENCRYPTED DRIVES
  47. BITCOIN CLIENTS IN TAILS – BLOCKCHAIN AND ELECTRUM
  48. Kenyan Hacker Steals Billions Through Hacking
  49. 14 Tips To Online Safety And Security
  50. Top Court in India Rules That Privacy Is a Fundamental Right
  51. Security Tips for Online Shopping This Holiday Season
  52. 1 Week with Snowden’s Preferred OS: A Look at Qubes & the Balance of Security

Leave a comment

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.
Please wait
online research banner

airs logo

AIRS is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Subscribe to AIRS Newsletter

Receive Great tips via email, enter your email to Subscribe.
Please wait

Follow Us on Social Media