top | item 10886997

How to access the Darknet. The safe way

143 points| herbst | 10 years ago |torgeek.pw | reply

88 comments

order
[+] sarciszewski|10 years ago|reply
> I see this questioned regularly, and yeah it is generally a good idea. If you have a VPN provider that you trust to not keep logs, it can be a very good addition for your security setup.

Therein lies the problem. You can't trust VPN providers.

https://gist.github.com/joepie91/5a9909939e6ce7d09e29

[+] warmlagoon|10 years ago|reply
IMHO Even thought the provider would log it is still better than not using one in a lot of cases. If whoever can see my VPN address, he would otherwise see my real address directly.

In that way he has to find a way to get the VPN provider to give out my real address. What might be possible with a lot, but for sure not with all of them.

Also think countries, my country does barely have any contracts with other countries for crimes like this. So they would have to use a complicated way to actually force them to give out my data.

In most situations we are already way over the realistic damage done in forms of costs to catch the individual.

[+] celticninja|10 years ago|reply
Cryptostorm are a decent VPN as they claim no logs are kept, however even if this is not accurate, their payment/token system allows you to access the service without linking it to you via a payment mechanism. To further cloud things you can pay with Bitcoin.
[+] samstave|10 years ago|reply
You need a GUI to hop through 7 proxies -- then you'll be safe.
[+] necessity|10 years ago|reply
This is simple to overcome by hosting your own.
[+] at-fates-hands|10 years ago|reply
>> Therein lies the problem. You can't trust VPN providers.

Your link is borderline nonsense.

The only real evidence they give about not using VPN's is when hidemyass proxy gave up some Anon's in 2011. However, it very clearly states in the hidemyass TOS that their service is not to be used in illegal activity, which is exactly what the hackers who they gave up were doing. They only gave up the information after receiving a court order, even though they had seen the hackers in chats saying they used their service, at which point they did nothing until the government stepped in.

http://www.theregister.co.uk/2011/09/26/hidemyass_lulzsec_co...

[+] tasqa|10 years ago|reply
While the advice is okay, the title is a huge turn off. There is no such thing as the Darknet. Please stop referring to the TOR network this way. It is harmful to the community and encourages journalists to write about TOR in a negative way!
[+] soneca|10 years ago|reply
I have a negative view of the Tor network, actually the name I use is indeed Darknet (or Deep Web).

My take is that it is valuable to use Tor to (try at least) to escape companies tracking and government spying.

But to visit any website only available on Tor network is not worth any effort on my part, as I have no doubt (currently) that it is all about illegal porn or illegal drugs and sinister scams.

Anyone care to give some counter argument to why this Tor Network deserves a positive light?

[+] Tiksi|10 years ago|reply
I've always taken darknet to mean a network physically separate from the Internet, like a wireless mesh or something along those lines. However it's definitely changed in usage to mean any network that's not part of the public internet, even if it's layered on top of it, freenet, tor, ipfs even.
[+] herbst|10 years ago|reply
i mostly agree. and even spend some actual thought on it. the point is there are good guides for tor, those work perfectly well for people with basic IT understanding.

I tried to target my keywords to people who miss that understanding. People coming directly from YouTube having no idea what it is all about. Those search for the darkweb.

Anyway. Kudos on pointing this out.

[+] CptThrowawy|10 years ago|reply
Nation state agencies just go to upstream providers and grab traffic metadata there, your VPS/VPN not keeping logs won't help against a targeted investigation. Even just downloading Tor or Tails gets your IP "task queued" according to Snowden leaks.

You would want to both obtain and use Tor nowhere near your meatspace identity, pref with different hardware than you usually use, and leave your phone at home if protection from tracking is your highest priority.

[+] herbst|10 years ago|reply
Not everybody is living in the US tho.

Most countries can barely force any other country to give out consumer data from local companies. If you do not live in a five eyes state we can safely assume that nobody will target you that way for Tor browsing.

[+] sandworm101|10 years ago|reply
Accessing Tor "safely" is something over and above accessing the normal internet safely. Advice like "don't open PDFs" isn't very helpful. Nor is "don't use javascript" or "don't log into social media." Such inactions don't help you access anything safely, they help you not access things in the first place.

(1) Use a secure OS. Unless you are security guru, that should be some flavour of linux. A liveUSB of Tails is pretty idiot proof. It worked for Snowden.

(2) Don't run any web browser, tor or otherwise, under any sort of elevated privilege (ie not while admin).

(3) Understand how to verify a website's certificates. You can indeed log into social media safely via tor (ie your password won't be harvested by the exit node) if you know how to verify the website.

(4) Don't take anonymity casually. Understand why you are using Tor, what you are protecting, who your adversary is, and develop relevant procedures. Don't rely on easy checklists you find at Tor-for-Dummies.com.

[+] birdperson|10 years ago|reply
> Use a secure OS... A liveUSB of Tails is pretty idiot proof.

That implies Tails is very secure. Why is that? Is it because it has never been hacked before or has Tails been shown to be virtually hacker-proof? As someone non-technical I might be misunderstanding something. If so, can you clarify that?

Thanks.

[+] Havoc|10 years ago|reply
>Your operating system could be infected, or leaking information otherwise.

"otherwise"? Is that code for has Windows 10 written on the box?

[+] zanny|10 years ago|reply
Microsoft backported a lot of the logging and tracking to Windows 7 and 8 as well. Not all of it, but enough to consider any computer running fully updated Windows to be user-privacy compromised.
[+] TallGuyShort|10 years ago|reply
Lots of things leak information in ways that aren't considered and infection. Tools used to administer corporate infrastructure, for instance. Windows 10 might fit in that category too.
[+] secfirstmd|10 years ago|reply
If anyone is interested, we (www.secfirst.org) just launched an Android open source app called Umbrella, which has lessons like this, along with a ton of other digital and physical security stuff. Everything from secure email to dealing with kidnap:

https://play.google.com/store/apps/details?id=org.secfirst.u...

[+] vjvj|10 years ago|reply
why does this app require access to my current or saved locations?
[+] Sir_Cmpwn|10 years ago|reply
You should make this available via F-Droid.
[+] esMazer|10 years ago|reply
looks interesting which they had an iOS version
[+] simonebrunozzi|10 years ago|reply
This article has several mistakes and typos. I find it actually hard to enjoy reading it, and it also seems very superficial. Am I the only one to feel this way?
[+] herbst|10 years ago|reply
Thank you for this feedback. I usually dont write, it is just a topic where i felt that could need some noob friendly coverage and just started writing. If i even proceed i will look into someone that proof reads my blabber. It is also not my first language.

(i am actually even surprised about the interest)

[+] megraf|10 years ago|reply
I'd actually recommend a SOCKS5 Proxy over a VPN.

> The SOCKS server does not interpret the network traffic between client and server in any way, and is often used because clients are behind a firewall and are not permitted to establish TCP connections to servers outside the firewall unless they do it through the SOCKS server.

[+] kauegimenes|10 years ago|reply
Dont look at the comments in this blog post...
[+] sidcool|10 years ago|reply
Quite a let down article.
[+] leoplct|10 years ago|reply
I have Tried. There are only drugs, underage photos, scams, fake passaports and so on. What's the point of Darknet besides illegal activtities?
[+] hluska|10 years ago|reply
This is a very poor answer and, while I'm pretty sure that you're just trolling, Tor is important enough that your 'claim' really needs to be rebutted.

Consider a service like SecureDrop. Armed with SecureDrop, journalists and dissidents/whistleblowers can communicate in a more secure way.

Or, consider a publication like Propublica. They set up a hidden service so that they could talk about censorship in China...and hopefully allow Chinese citizens to read it without ending up in serious legal trouble.

Statements like yours are the problem and I seriously hope that you take the time to educate yourself. Ignorance may be funny to you, but it makes it more dangerous for legitimate activists and journalists to use Tor.

[+] nvrsummer|10 years ago|reply
Well at least they didn't give away the real Darknet