Latest Posts
-
The money board hype “darknet” concept: we come from the darknet, ready to run away
In the eyes of some players, the dark web is one of the few application scenarios of Bitcoin. -
How To Make Anonymous Requests using TorRequests and Python
TorRequest is a wrapper around requests and stem libraries that allows making requests through TOR. -
Scallion : GPU-Based Onion Hash Generator
Scallion lets you create vanity GPG keys and .onion addresses (for Tor’s hidden services) using OpenCL. -
Tor Exit Nodes Located and Mapped
Tor Exit Nodes are the gateways where encrypted Tor traffic hits the Internet. -
Scallion: a GPU-based Onion hash generator
Scallion can help us use OpenCL to create GPG keys and .onion addresses for Tor hidden services. -
Build Your Relay
Each relay requires a public IPv4 address, preferably directly on the host, or through NAT and port forwarding. -
Brute force to get a good-looking .onion domain name
The domain name of .onion is generated by private key> (rsa)> public key> (sha1)> hash value> (base32 encoding)> get the ugly address .onion -
-
The past life of Darknet Tor (Onion Routing) and its related principles and techniques
The original purpose of "Onion Routing" was not to protect privacy, or at least not to protect the "privacy" that most people think. -
Nantong cracked a big “darknet” infringement of citizens’ personal information case seized 50 million pieces of data
The biggest feature of the "dark web" is that after encryption processing, ordinary browsers and search engines cannot enter, and using bitcoin as a transaction currency.
how to get service listed? get review no contacts found...
Commented on Floundering, BreachForums goes online again on dark web and clearnet, access restored