I've played a little in that arena but there isn't anything you can find on there that you can't find on the "regular" Internet. You don't think you can find child porn on the regular net? Can't buy drugs?
I think I've read on another thread here that people will come kick your ass and steal everything you own if you go there. Right....
Another misconception is that it's anonymous and you can do anything and not get in trouble. Like the FBI is going to say prostitution is legal if it's done on the Dark Web and not mess with it? You don't think they know about torrents and backpage for hookers? There are search engines just like Google only you search "there" instead of here. Harder for the average joe but I've explained how easy torrents are to some of my friends and they act like I'm explain quantum physics
TOR may or may not be compromised, as well. I'd tend to lean to it not being now shot through with Holes thru which FBI can peer thru but I don't know and thats true also of many others, they don't know.
For Non-Technical Minds, those who don't dig the feeling of being trapped inside the most Nightmare-ass User's Manual ever made...it can get Tricky, this here + the fact that IMO anyways that there is nothing worth going thru all of this, there....on DarkWeb? Illustrates why I just say 'fuggit":
(from
DeepDotWeb.com)
"Let’s start with TOR and some critical ‘rules’ you should always force yourself to follow. First, if you’re like me and want to avoid the ‘guilty by association’ accusation you might not want people to know that you have or even use TOR. It’s quite common to use today, but some undereducated people hear TOR and immediately think you’re buying/selling drugs and weapons or spreading snuff films. It’s understandable if you’d just rather avoid that conversation with people. If you’re not going to be super paranoid and use a separate computer or OS (or VM) to run TOR, you can still keep it from Prying eyes by running Tails (a live TOR-bas Linux distro) on CD/DVD or USB.
Running a whole distro can be time-consuming and sometimes inconvenient with things like wireless NIC driver woes, or problems with persistence. If you would rather avoid all that, then look at installing just the TOR application on a USB drive. This way it can disappear from your machine when needed and all updates, temp files etc should write to the USB stick. You can do this easily by choosing a USB drive as your installation path when running the TOR installer. If you like to be extra careful and don’t want the contents of the USB to be viewable, use an encryption program to create an encrypted volume and install TOR in that. This works fine as I have done it myself. Without the encryption/decryption software on their PC, nosey snoops will see what looks like a USB drive with no formatting (blank).
From a network point of view you can also hide your TOR usage from your ISP or anyone else monitoring online. Since TOR is banned in some oppressive countries, this makes it that much more important for freedom of speech, whistleblowers, and those suffering political oppression. Since ISPs or government routers will block access to known TOR nodes, it was necessary to set up TOR bridges and relays to allow these people access, since the oppressive routers won’t identify the session establishing to any public TOR node.
Anyone around the world can volunteer to run a TOR bridge and provide this access. That doesn’t mean that bridges/relays are only available to people with blocked connections. Perhaps you just don’t think that your ISP has any business knowing that you connect to TOR? Although, if you are using TOR with VPN this won’t matter much anyway, however it still provides an additional hurdle in tracking who’s doing what, so it’ not a bad idea. To make use of TOR relays you can simply send a properly formatted email to some nice folks who will respond with a relay, at which time you will configure this in your TOR settings.
When TOR launches, open settings and answer “yes” to the question concerning blocking/sensoring (FIGURE A);and then a custom bridge or bridges can be configured in the blank box (FIGURE B). You can request a new relay periodically to keep them confused and guessing. For additional information on TOR bridges/relays, please refer to their Tor: Bridges support page.
DarkWeb alot like that "Haunted House" kids told us about when we were young then when you went in it just ended up being an old lady living with a bunch of cats.
Interesting to Note though: its
possible had Cheryl Mills been smart enough to steer Hillary into use of Dark Web to accomplish certain communications via TorMail or some other, on DarkWeb then somehow spoofed her eMail Addy on communiques to folks so that appeared to be @State.Gov email addy
maybe Hill's Trainwreck of Private Server never happens?
Don't know for sure but that is one thing....
If you DO want to communicate with someone as Privately as possible, over Internet....DarkWeb provides that.
Its why people in China use it, Government there sees you say some stuff they don't like and bad stuff may follow.
I think that some in North Korea use DarkWeb too.
Mentioned bcuz I'm pretty sure that this ^^^ communicating away from Government Eyes is about the only really +EV use of DarkWeb right now.
Yeah......the ability to get to a MarketPlace where you can buy stuff you may not be able to find elsewhere...