Darknet Tech
-
Get a TLS certificate for your onion service
Domain certificates for onion can now be purchased through Harica, and this article describes how to purchase the configuration. -
How to get affordable DV certificates for onion sites
Site administrators can also now easily acquire a DV certificate for your v3 onion site using HARICA. -
A mysterious group has hijacked Tor exit nodes to perform SSL stripping attacks
At one point, the group ran almost a quarter of all Tor exit nodes. Group still controls 10% of all Tor exit nodes today. -
Attack on Tor Causes “v3 Onion” Downtime, Experimental Fix to Land Soon
V3 onion sites are down due to a bug that doesn’t preserve the “live” status of the consensus. -
Should You Use a ‘Dark Web Scan’ to Protect Your Identity?
The dark web is a large, hidden network of websites not indexed or found on typical search engines. -
5 Steps for Secure Malware Analysis
Malware analysis is a tricky process. Incorrect handling leads to accidental self-exposure, which can be devastating depending on where the infection occurs. -
How to stop the onion denial (of service)
We would like to present you with two options that we believe can provide a long-term defense to the problem while maintaining the usability and security of onion services. -
Onion Service version 2 deprecation timeline
As humankind's understanding of math and cryptography evolved, the foundation of version 2 became fragile and at this point in time, unsafe. -
How to run an SSH connection through Tor
One such method is with the help of Tor. With Tor, you can add a level of anonymity and even hide your services from prying/hacking eyes. -
How To Make Anonymous Requests using TorRequests and Python
TorRequest is a wrapper around requests and stem libraries that allows making requests through TOR.
\can any one tell me what are some trusted venders
Commented on Dark Web Anti-Fraud: Exposing Fraudulent Sites on the Dark Web, the Deceptive Dark Web Market “DeepMarket”