The Blue Board

We aren't just committed to college football; we're early enrolling in it.

Boards ▾

The Blue Board

We aren't just committed to college football; we're early enrolling in it.

The Green Board

Where the madness isn't just in March.

Reply

Anyone here ever explored

  • 247Sports

    T I G E R73080

    The deep web? I haven't, and I have no intentions of doing so, but I still am curious if anyone has done it. It scares me, personally.

    signature image signature image
  • Nope. Unless you are doing something illegal I see no reason for the average person to go there.

    signature image signature image signature image
  • I messed around with TOR and some hidden sites for a while but that was about it.

    signature image
  • 247Sports

    CptAUmerica21

    Jcrick said... (original post)

    I messed around with TOR and some hidden sites for a while but that was about it.

    any stories?

    what foul things live down there

    signature image signature image signature image

    @rpayne2107

  • TitanInsider

    CorchBlue

    Jcrick said... (original post)

    I messed around with TOR and some hidden sites for a while but that was about it.

    What is TOR?

    signature image signature image

    Go Blue and Go Titans!

  • T I G E R73080 said... (original post)

    any stories?

    what foul things live down there

    Not really. You have to know exactly where you're going/what you're looking for and I wasn't in the market for anything like that. I mainly got into it after I read an article about it just to see what you could do and what was out there. Other than a few instructional sites and The Silk Road I haven't gotten into it. I still go to The Silk Road from time to time just to see what is there, but I never buy anything. That place is insane, I've seen everything from automatic weapons to tens of thousands of dollars worth of drugs to rocket scientists for hire there. It's really unreal the first time you go and realize that you really can buy and sell anything on there.

    signature image
  • BamaOnLine

    Ichabod

    I'm curious. Someone explain themselves

    signature image signature image signature image
  • 247Sports

    CptAUmerica21

    Jcrick said... (original post)

    Not really. You have to know exactly where you're going/what you're looking for and I wasn't in the market for anything like that. I mainly got into it after I read an article about it just to see what you could do and what was out there. Other than a few instructional sites and The Silk Road I haven't gotten into it. I still go to The Silk Road from time to time just to see what is there, but I never buy anything. That place is insane, I've seen everything from automatic weapons to tens of thousands of dollars worth of drugs to rocket scientists for hire there. It's really unreal the first time you go and realize that you really can buy and sell anything on there.

    isnt the GOV all over that

    signature image signature image signature image

    @rpayne2107

  • 247Sports

    jlkfy3

    I read the thread from TOS the other day and then did some more reading elsewhere. It's crazy stuff and I'm tempted to access it just to see, but if I do, I won't do it on my own computer. I read some horror stories about being hacked, etc and while they may not be true, it's enough to give me pause.

    signature image signature image signature image
  • T I G E R73080 said... (original post)

    What is TOR?

    It's a little complicated, so bear with me. TOR is both an application (Firefox addon plus some other downloads) as well as a network. The application is used to access the network. The network is a self-contained "deep web", or part of the internet that cannot be searched or reached through normal means. When you log onto TOR, you join the worldwide network of computers also running the program. When you start it up, you are funneled through three separate proxies at all times. Your information is encrypted between each step and each proxy is another computer running the program that agrees to host traffic. This means that you are protected on the front and back ends when you browse TOR, meaning that all your ISP sees is the first proxy you go to and all the destination site sees is the last proxy you go to. There is another proxy thrown in between so that your entry node (first proxy) and your exit node (last proxy) cannot be matched to each other, thus allowing your browsing to be virtually untraceable (the only way would be to analyze all traffic coming into the network worldwide and going out of the network worldwide and matching up exact bits of information by size as the come in or leave the network which would still be almost impossible even with the most advanced supercomputer in the world). As an added layer of protection, your proxies are automatically and randomly changed once every 10 minutes. You can also randomize your proxies whenever you want (say with each page you visit), making your traffic even more untraceable.

    Once you are on TOR there is the normal internet (which is still there) and then there are what are called "hidden sites". Hidden sites are sites that are hosted on the network itself and cannot be accessed from outside the network, thus meaning that all traffic that has ever gone there (including hosting information) is completely anonymous. These sites cannot be searched for and you have to know the exact address for the site, which are called "onion" addresses, and are extremely complex so you're not just going to guess them or happen to stumble upon them. These sites can range from anything from some dude's blog to ultra-exclusive torrent sites to places like The Silk Road, which is like Amazon.com but for strictly black market merchandise (see my other post above).

    So yeah, that's TOR.

    signature image
  • T I G E R73080 said... (original post)

    isnt the GOV all over that

    I'm sure they are in some form or another, but it's still completely anonymous. There are places where you can screw up and get caught, but they don't involve the network, the involve the mailing and payment process, but there are forums on there (which make places like this look like kindergarten) that can walk you through what to do.

    signature image
  • BamaOnLine

    Ichabod

    Jcrick said... (original post)

    It's a little complicated, so bear with me. TOR is both an application (Firefox addon plus some other downloads) as well as a network. The application is used to access the network. The network is a self-contained "deep web", or part of the internet that cannot be searched or reached through normal means. When you log onto TOR, you join the worldwide network of computers also running the program. When you start it up, you are funneled through three separate proxies at all times. Your information is encrypted between each step and each proxy is another computer running the program that agrees to host traffic. This means that you are protected on the front and back ends when you browse TOR, meaning that all your ISP sees is the first proxy you go to and all the destination site sees is the last proxy you go to. There is another proxy thrown in between so that your entry node (first proxy) and your exit node (last proxy) cannot be matched to each other, thus allowing your browsing to be virtually untraceable (the only way would be to analyze all traffic coming into the network worldwide and going out of the network worldwide and matching up exact bits of information by size as the come in or leave the network which would still be almost impossible even with the most advanced supercomputer in the world). As an added layer of protection, your proxies are automatically and randomly changed once every 10 minutes. You can also randomize your proxies whenever you want (say with each page you visit), making your traffic even more untraceable.

    Once you are on TOR there is the normal internet (which is still there) and then there are what are called "hidden sites". Hidden sites are sites that are hosted on the network itself and cannot be accessed from outside the network, thus meaning that all traffic that has ever gone there (including hosting information) is completely anonymous. These sites cannot be searched for and you have to know the exact address for the site, which are called "onion" addresses, and are extremely complex so you're not just going to guess them or happen to stumble upon them. These sites can range from anything from some dude's blog to ultra-exclusive torrent sites to places like The Silk Road, which is like Amazon.com but for strictly black market merchandise (see my other post above).

    So yeah, that's TOR.

    [mindblown]

    signature image signature image signature image
  • jlkfy3 said... (original post)

    I read the thread from TOS the other day and then did some more reading elsewhere. It's crazy stuff and I'm tempted to access it just to see, but if I do, I won't do it on my own computer. I read some horror stories about being hacked, etc and while they may not be true, it's enough to give me pause.

    That's one of the strengths/weaknesses of TOR. It is constructed so that you cannot use Java or Flash or any other apps that allow direct connectivity between the web site and your computer. The strength is that your computer cannot be accessed from the end site (if somebody says that it can, they are FOS). On the other hand, it means that you cannot stream video or really visit most of the normal internet while using it, so it's use is really quite limited to certain functions. Like I said above, it's not something that you are just going to get and use all the time for browsing the internet or stumbling across cool stuff, you have to know what you want to use it for and where you are going if it's going to be useful at all.

    signature image
  • TitanInsider

    CorchBlue

    Jcrick said... (original post)

    It's a little complicated, so bear with me. TOR is both an application (Firefox addon plus some other downloads) as well as a network. The application is used to access the network. The network is a self-contained "deep web", or part of the internet that cannot be searched or reached through normal means. When you log onto TOR, you join the worldwide network of computers also running the program. When you start it up, you are funneled through three separate proxies at all times. Your information is encrypted between each step and each proxy is another computer running the program that agrees to host traffic. This means that you are protected on the front and back ends when you browse TOR, meaning that all your ISP sees is the first proxy you go to and all the destination site sees is the last proxy you go to. There is another proxy thrown in between so that your entry node (first proxy) and your exit node (last proxy) cannot be matched to each other, thus allowing your browsing to be virtually untraceable (the only way would be to analyze all traffic coming into the network worldwide and going out of the network worldwide and matching up exact bits of information by size as the come in or leave the network which would still be almost impossible even with the most advanced supercomputer in the world). As an added layer of protection, your proxies are automatically and randomly changed once every 10 minutes. You can also randomize your proxies whenever you want (say with each page you visit), making your traffic even more untraceable.

    Once you are on TOR there is the normal internet (which is still there) and then there are what are called "hidden sites". Hidden sites are sites that are hosted on the network itself and cannot be accessed from outside the network, thus meaning that all traffic that has ever gone there (including hosting information) is completely anonymous. These sites cannot be searched for and you have to know the exact address for the site, which are called "onion" addresses, and are extremely complex so you're not just going to guess them or happen to stumble upon them. These sites can range from anything from some dude's blog to ultra-exclusive torrent sites to places like The Silk Road, which is like Amazon.com but for strictly black market merchandise (see my other post above).

    So yeah, that's TOR.

    Very interesting to me as a network major, might check it out.

    signature image signature image

    Go Blue and Go Titans!

  • Here's an article about The Silk Road, which is probably the most famous of the hidden sites. The article sells it as a drug market, but it's really more expansive than that. I have never and don't ever plan on buying anything there, but it is pretty crazy to just look and see what goes on in places like this. There are links in the article for downloading TOR and TSR's onion address if you're interested in doing some window shopping or just getting acquainted with what is possible on the deep web.

    The Underground Website Where You Can Buy Any

    Making small talk with your pot dealer sucks. Buying cocaine can get you shot. What if you could buy and sell drugs online like books or light bulbs? Now you can: Welcome to Silk Road.

    http://gawker.com/5805928/the-underground-website-where-you-can-buy-any-drug-imaginable
    signature image
  • 247Sports

    jlkfy3

    Here's a picture of The Silk Road that I found the other night.

    signature image signature image signature image
  • T I G E R73080 said... (original post)

    Very interesting to me as a network major, might check it out.

    Yeah it's pretty crazy stuff and took me a while to really understand what was going on. The neat part about it is that the software is open source and they have downloads for both the stable version and open versions for you to tinker with. As a side note, it's not all about illegal (here) stuff: the software was initially developed to give people in countries like China and Iran a way to anonymously communicate with the outside world and get around complicated firewalls. Every time you see things like videos of dissent getting out of places like that, they most likely used TOR to do it.

    signature image
  • Geaux247

    Lesticals

    Google comodohacker...or Lulzec

    signature image signature image signature image

    Danielle Hunter, Jamario Rasco, Anthony FREAK Johnson.. DL wrecking crew of 2013.

  • TitanInsider

    CorchBlue

    Jcrick said... (original post)

    Yeah it's pretty crazy stuff and took me a while to really understand what was going on. The neat part about it is that the software is open source and they have downloads for both the stable version and open versions for you to tinker with. As a side note, it's not all about illegal (here) stuff: the software was initially developed to give people in countries like China and Iran a way to anonymously communicate with the outside world and get around complicated firewalls. Every time you see things like videos of dissent getting out of places like that, they most likely used TOR to do it.

    I used read the mission statement of TOR, seems like a good cause.

    signature image signature image

    Go Blue and Go Titans!

  • 247Sports

    COOTERUSC77

    Must...go..there...now...

    signature image signature image signature image
  • SpartanTailgate

    Itz Pstein21607

    Woah, that is freaking nuts and mind blowing. What are some of the hacking stories?

    signature image signature image
  • Lions247

    ejb5212

    I've been on 4chan.... but after reading what Jkrick said i dont feel like they are th same thing

    “If you remember me, then I don't care if everyone else forgets.” ― Haruki Murakami

  • 247Sports

    jlkfy3

    T I G E R73080 said... (original post)

    Woah, that is freaking nuts and mind blowing. What are some of the hacking stories?

    This is the strangest I found...

    "A popup appeared on my screen with a guy PMing me. Sort of like an instant messenger, it popped up and he was like "What are you doing?" I didnt respond because it made me nervous and I minimized the window. Then he said "Don't minimize me lol." Like 5 minutes pass and he goes "You should thank me, I just cleaned out all your junk emails, it was getting out of hand." I sarcastically said "THANKS!" and went on my way. I come back like 30 minutes later and my Yahoo email went from having 1400 emails to 45. But what really mind****ed me was that a video game was DOWNLOADING on my Steam engine. It said 76% complete. I read the PM window and he said he bought me a ****ing video game using MY account with his own credit card. WTF? It was Team Fortress 2. Not even kidding... wtf?"

    I'm sure the CC was stolen. That is, if this is true. I suspect it's fabricated.

    signature image signature image signature image
  • TitanInsider

    CorchBlue

    jlkfy3 said... (original post)

    This is the strangest I found...

    "A popup appeared on my screen with a guy PMing me. Sort of like an instant messenger, it popped up and he was like "What are you doing?" I didnt respond because it made me nervous and I minimized the window. Then he said "Don't minimize me lol." Like 5 minutes pass and he goes "You should thank me, I just cleaned out all your junk emails, it was getting out of hand." I sarcastically said "THANKS!" and went on my way. I come back like 30 minutes later and my Yahoo email went from having 1400 emails to 45. But what really mind****ed me was that a video game was DOWNLOADING on my Steam engine. It said 76% complete. I read the PM window and he said he bought me a ****ing video game using MY account with his own credit card. WTF? It was Team Fortress 2. Not even kidding... wtf?"

    I'm sure the CC was stolen. That is, if this is true. I suspect it's fabricated.

    That is a lot of emails.

    signature image signature image

    Go Blue and Go Titans!

  • jlkfy3 said... (original post)

    This is the strangest I found...

    "A popup appeared on my screen with a guy PMing me. Sort of like an instant messenger, it popped up and he was like "What are you doing?" I didnt respond because it made me nervous and I minimized the window. Then he said "Don't minimize me lol." Like 5 minutes pass and he goes "You should thank me, I just cleaned out all your junk emails, it was getting out of hand." I sarcastically said "THANKS!" and went on my way. I come back like 30 minutes later and my Yahoo email went from having 1400 emails to 45. But what really mind****ed me was that a video game was DOWNLOADING on my Steam engine. It said 76% complete. I read the PM window and he said he bought me a ****ing video game using MY account with his own credit card. WTF? It was Team Fortress 2. Not even kidding... wtf?"

    I'm sure the CC was stolen. That is, if this is true. I suspect it's fabricated.

    Thats creepy as fvck..

    This post was edited by SimplyComplex 3 years ago

    signature image
  • HuskersIllustrated

    Nosfera2son

    This is some crazy stuff. Ive heard people talk about it here and there but have never actually had it explained. I think it would be fun to just get on and look to see whats on it.

    signature image signature image signature image

    Feed me to the wolves, and I will return leader of the pack. #FreeDA