What os should I use on Tor to stay secure?

Status
Not open for further replies.
D

Deleted member 178

Curious: what's a honeypot site? Why does govt own it?:eek:

honeypot ; means letting something in plain sight to trap those interesting in it.

Example: put an open childporn site, many pedophiles will come visit it , then let the government collect datas about them.
 
  • Like
Reactions: CMLew
H

hjlbx

Curious: what's a honeypot site? Why does govt own it?:eek:

It's a site designed to attract users to it. Typically when the users access a honeypot they are monitored and tracked via various means. Also, honeypots are often used to distribute malware.
 
  • Like
Reactions: CMLew

XhenEd

Level 28
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Mar 1, 2014
1,708
Research and be prepared, if you're going to dive into the deep web.

BTW (and actually my intention for posting), thread title should be renamed to reflect the ongoing discussion. :)
 
H

hjlbx

The "entertainment" and "educational" factors of the deep web are a real let-down and not worth the effort. It's really not worth the effort...
 

CMLew

Level 23
Verified
Well-known
Oct 30, 2015
1,251
The "entertainment" and "educational" factors of the deep web are a real let-down and not worth the effort. It's really not worth the effort...

How about Dark Web? :D. I google this term it's even deeper than Deep Web. I guess using Tor might not be as secure when u dig deeper I supposed.
 
H

hjlbx

Curious: what's a honeypot site? Why does govt own it?:eek:

In a nutshell, honeypot sites are utilize a user's desire to obtain easy access or access to information to entrap (or ensnare) those users.
 
H

hjlbx

How about Dark Web? :D. I google this term it's even deeper than Deep Web. I guess using Tor might not be as secure when u dig deeper I supposed.

Deep Web, Dark Web, Hidden Web, etc... all essentially mean the same thing.

Various terminology for different Dark Web levels -- like "Marianas" Web.

Yes. There are different levels, but gaining access to the deeper levels is unlikely. Access to closed shells is impossible unless you have physical access or access to a LAN that connects you to a closed shell.

Don't get caught up in it as it is a waste of time...
 

LukeNukesEm

Level 5
Thread author
Verified
Sep 14, 2016
204
These deep web discussions make me laugh.

If you just want to spectate (take a "look-see") on the deep web, then just use Tor before you go through all the trouble of configuring a complicated anti-NSA set up on your system.

The deep web is not like the open web; sites change URLs often, the sites are randomly available, you can't gain access to many sites unless someone well-known to a site vouches for you, etc, etc. Also a site front page is not always indicative of content once you login into a site. For example, a site might be a hacker forum on the front page, but actually a child porn site upon access.

Yeah... McDonald's wifi... that's the ticket. I gotta tell ya, with that statement it is obvious you don't know what you're doing...

Most public wifi hotspots in the US and Europe are videotaped. The spy who got caught because he liked using McDonald's and Star Buck's wifi...

I'm not attacking you or putting you down personally. You just need to do a bit more research.
Nah I feel you deep web discussions make me laugh all the time. I just find it funny talking about internet that is only accessible by the tor network. And when I mentioned McDonalds I was giving an example, I'm not gonna be so in depth when just making a point I don't need to go crazy with the anonymity. Thanks for the response though, it is appreciated!
 
H

hjlbx

Nah I feel you deep web discussions make me laugh all the time. I just find it funny talking about internet that is only accessible by the tor network. And when I mentioned McDonalds I was giving an example, I'm not gonna be so in depth when just making a point I don't need to go crazy with the anonymity. Thanks for the response though, it is appreciated!

The dark web is like walking down a long hallway with almost all the doors to rooms being locked, bricked up and no longer there, or invisible.

I am sure it can be much more interesting than that, but it takes too much time and effort.

You might want to consider Puppy Linux on a USB, but even before going that little distance check out the dark web using Tor. It's really not all that interesting...
 
W

Wave

Curious: what's a honeypot site? Why does govt own it?:eek:
It's using a technique called "trapping" and it's very effective when it comes to tracking down criminals. It works by setting up a fake service in which the criminal will attempt to interact with (or view for long periods of time due to general interest), and then they are traced if possible and caught...

When you are using things like the Deep/Dark web on Tor, even if you get redirected or innocently end up viewing something you were not intentionally looking for/trying to access, the law will have no issue with prosecuting you regardless and will just assume you intentionally tried to find the content.

Basically you should just stay away and avoid it as much as possible because using it is like begging for bad news at your door step from the law agencies.
 

Crypto

Level 2
Verified
Jan 14, 2017
64
QubesOS is a great operating system if you want persistence for customizing things and downloading things as a general computer. If you wanted to step it up a notch you could remove the hard drive or solid state drive from your computer all together and just use Tails on a USB.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top