Tag Archives: Deep Web

List of Hidden Marketplaces (Tor & I2P)

Silk Road 2.0

Silk Road 2.0

Silk Road 2.0 Url:  silkroad6ownowfk.onion
Forum Url: silkroad5v7dywlc.onion
Sub reddit URL:  http://www.reddit.com/r/SilkRoad/ & http://www.reddit.com/r/SilkRoadTwo (this one is very new and not so active yet)
Note: Good luck.

Continue reading List of Hidden Marketplaces (Tor & I2P)


68 million Dropbox passwords stolen by hackers

Earlier this week, Dropbox reset user passwords for all accounts that hadn’t changed them since 2012, following its discovery of a file containing hashed and salted passwords that were obtained in a previous security breach.

Now, Motherboard reports that the company’s systems were hacked in 2012, and the attackers were able to get away with 68 million usernames and passwords. The legitimacy of the data was verified by Motherboard and vouched for by security expert Troy Hunt.

Continue reading 68 million Dropbox passwords stolen by hackers

Both Of The Men Accused Of Running The Silk Road Made The Exact Same Mistake

Blake Benthall and Ross Ulbricht

The FBI arrested 26-year-old San Francisco tech worker Blake Benthall on Wednesday, accusing him of running the infamous deep web marketplace the Silk Road.

But Benthall wasn’t the founder of the site. Instead, his version of the Silk Road was often dubbed “Silk Road 2.0” to reflect the fact that it was a relaunched version of the original site.

The first incarnation of the Silk Road was shut down by the FBI in October 2013, after alleged founder Ross Ulbricht was arrested in a San Francisco library.

Court documents for the seizure of both the original Silk Road and the Silk Road 2.0 show that the site’s two alleged operators made the same error that enabled authorities to link them to the site.

Ross Ulbricht, the San Francisco resident accused of creating the original Silk Road, allegedly used a Silk Road user account which was registered to his personal email address.

The rossulbricht@gmail.com email account was also posted on the Bitcoin Talk forum as contact information for a poster looking to hire “an IT pro in the Bitcoin community.”

Ulbricht was caught in part due to the links between his personal Gmail account and other online accounts. It was trivially easy for investigators to string together usernames and IP addresses, with the help of information and IP logs obtained from Google.

The records show that Ulbricht regularly logged into a VPN service in a San Francisco internet café. On the same days he was allegedly using the VPN to mask his web traffic to the Silk Road’s administrative dashboard, Google’s records showed that he also checked his personal Gmail account.

After learning of the demise of his predecessor, surely the man behind the Silk Road 2.0 would take better care? It seems not.

The FBI briefly took the Silk Road 2.0’s servers offline in order to make a copy (known as an “image”) of the site. Because of the way the hosting account was set up, it fired off a series of emails to a pre-determined address in order to detail the site’s downtime.

Those emails, the FBI claim, went to blake@benthall.net, the personal email account of the San Francisco web developer accused of running the site.

Benthall used his personal email account to manage the web hosting account that the FBI says was used to keep the Silk Road 2.0 online. Additionally, he used that email address to create an account on a US-based Bitcoin exchange, and received his first transaction on the very day that the Silk Road 2.0 came online.

As the Daily Dot reports, Google again turned over IP logs and account information, this time for Benthall’s personal email account, to the FBI, revealing Benthall’s name and location information. It was obvious who owned the account: The email address was blake@benthall.net, it was registered to “Blake Benthall,” and IP logs show that it was accessed from Las Vegas and Lake Tahoe hotel rooms reserved under the name “Blake Benthall.”

There’s no denying that Ulbricht and Benthall were clever men, after all, the FBI accuses them both of running a complex deep web marketplace. Both men are alleged to have used modern anonymity services, and took care to anonymize their currency movements online.

But it was the simple mistake of using their personal email accounts for activities related to the Silk Road that made the FBI’s job easy, and likely led directly to their capture.

Stormy, Tor’s simple Deep Web publishing tool, set for September launch

Tor is not only one of the most powerful privacy tools to ever hit the Internet. Crucially, it’s also becoming one of the easiest to use.

This fall, Tor’s developers plan to release Stormy, a hidden service launcher that will make it as easy as a few clicks to publish an anonymous Deep Web site to the Tor network. Stormy 1.0, which has been in planning for some time, is scheduled for release on September 15, 2014, according to the Tor Project’s newly released two year roadmap.

“We have a lot of people asking for [point-click-publish hidden services] around the world,” Andrew Lewman, Tor’s executive director, told the Daily Dot this spring. “Some prototype use cases could involve human rights activists communicating and coordinating without exposing their networks, or law enforcement working with whistleblowers or informants in criminal organizations, or victims of abuse reaching out to safely have a conversation with someone to find help and resources. However, time will tell which use cases make the most sense.”

Earlier plans for point-click-publish hidden services were discussed at Tor’s 2014 Winter Developer Meeting in Reykjavik, Iceland. The Stormy 1.0 launch is being planned at the Summer meeting in Paris, France, this week.

The developers of the open-source software will begin soliciting community and peer-reviewed feedback for Stormy in July.

Tor, already an essential tool with more than 120 million downloads  in the last year, is quickly becoming a common sight in hotspots around the globe. In recent months, hundreds of thousands of Internet users in countries like RussiaIraq, and Turkey used the software to circumvent government censorship of the Internet.

While browsing Tor’s hidden services is easily accomplished with a few clicks, actually publishing your own anonymous website is more difficult. Tor’s own how-to website describes some of the steps as too complex to cover.

Easy-to-make mistakes in setting up hidden services can result in the unmasking of users, a potentially catastrophic result for whistleblowers, anonymous bloggers, and anyone else publishing sensitive data.

Third-party tools like Jot2Tor have attempted to make anonymous publishing a trivial task but the inclusion of a new, easy-to-use automated tool built and backed by the Tor Project is bound to make hidden services more popular than ever before.

“The result will be a way to provide portals to submit text, pictures, and video,” the mission statement on Tor’s wiki says. “These sites will not have the ability to log information that can be used to track down citizen journalists or other users, and will be resistant to distributed denial of service (DDoS) attacks.”

With the release of Stormy, any whistleblower or human rights activist in the world should be able to easily and anonymously talk to anyone and everyone. Better yet, so could your mom and dad. It’s easy to imagine the vast power this kind of tool can invest in its users almost regardless of computer literacy.

“Usable secure software is a priority of ours,” Lewman told the Daily Dot. “It does no one any good to have perfectly secure but unusable software in the hands of the general user.”

Due to the Tor Summer Meeting, developers were unable to respond to requests for comment in time for publication. We still don’t know if Stormy will be automatically bundled with the Tor Browser Bundle, or if it will be an additional program that users will have to grab on their own.

Tor plans to lift the cover on Deep Web hidden services

Rig in the dark (tripod) | Flickr - Photo Sharing!

Using the powerful Tor anonymity network, anyone can build a website on the Deep Weba so-called hidden service—that reveals nothing about its location or who created it. By design, no one knows exactly how many hidden services exist.

That is about to change.

Roger Dingledine, the Tor Project leader, wants to collect much more information about hidden services—“without harming privacy”—including, for instance, the total number that exist and how much of the Tor network load they account for.

“It should help researchers understand the breakdown of Tor traffic, how hidden services are distributed and advertised, and hopefully help others understand how much privacy hidden services can provide,” Tor executive director Andrew Lewman told the Daily Dot.

Even though hidden services account for some of Tor’s most famous uses, even experts can only offer educated guesses for how the technology is actually used.

Silk Road, perhaps the most famous hidden serivce of all time, thrived for two years because it was built on the technology that directed its servers to only accept connections through Tor. Many more uncensored websites of all kinds survive as hidden services today.

In 2013, the hidden service Freedom Hosting was accused by the FBI of being “the largest facilitator of child porn in the world.” It was also the biggest Web host on the Tor network. When Freedom Hosting and its many clients were shut down, observers struggled to understand the scope and consequences of the crash. Estimates varied wildly as experts wondered if over half of all hidden services had suddenly been killed during the international police operation.

If Dingledine’s plan goes through, any similar event would immediately be able to be far better understood.

The new statistics would be kept as part of the Tor metrics portal, a set of data designed to provide important insight into an otherwise vague and intricate network. The portal currently tallies numbers like total users, network performance, and user origin.

Developing and coding the software to track hidden service statistics will require significant funding, so the Tor Project has proposed the idea to an unspecified funder. Lewman declined to go into specifics about who the funder was or how much money the project would require—“It’s all a proposal,” he said—but did say that if the project doesn’t get funded here, Tor would rely on volunteers to take up the task over time.

Deep Web hub hacked and shut down over child porn links

guts | Flickr - Photo Sharing!

For nine years, the Hidden Wiki has been the launching pad of choice for excursions into the Deep Web, the collection of websites hosted behind the anonymizing technology of Tor.

Many of those links lead to sites hosting graphic child pornography, something that’s caused no small amount of debate and introspection among those who frequent the Deep Web. On Sunday, a pseudonymous hacker named Intangir took the debate into his own hands, hacking into the Hidden Wiki’s servers and taking the site down in retaliation for its inclusion of child pornography.

Intangir calls himself the self-appointed “judge, jury, and executioner for all matters relating to Onionland” late last year—the onion here is a reference to “.onion,” the host name suffix used for Tor hidden services instead of names like .com and .org. He’s best known as the owner of Doxbin, a Tor hidden service dedicated to publishing people’s personal information such as social security numbers and home addresses.

The fall of the Hidden Wiki marks the biggest blow to Deep Web child pornography since August 2013 when the FBI took down Freedom Hosting and arrested its alleged owner, Eric Eoin Marques, who they called “largest facilitator of child porn on the planet.”


The hack, aided by groups like @LOIC_Squad (LOIC is short for Low Orbit Ion Cannon, a simple DDoS tool originating on 4Chan), went far beyoned just taking the Hidden Wiki out of commission. Intangir says he has access to the website’s entire database including user credentials and server IPs. The full database will be released in the coming days after it’s been “looked over,” he promised.

The Hidden Wiki, which Intangir called “gay as fuck” in the hack’s announcement, was apparently hosted in the United States on VolumeDrive.com and shared a server with an uploading site called SecureUploads.me.


Users attempting to access the old Hidden Wiki address were sent to Doxbin where they’re greeted with this message:

“Over a year ago, doxbin appointed itself as judge, jury, and executioner for all matters relating to Onionland. Today, we made a decision that TheHiddenWiki wasn’t good enough to own it’s own onion, so we dispatched the doxbin repossession team to retrieve TheHiddenWiki’s private_key and add it to our ever growing arsenal. To anyone mad at me due to your inability to find your hard candy (aka kiddie porn) fix somewhere else, I plan on updating this file periodically with a tally of how many attempts are made to visit the [child porn] page.”

Multiple copy cat sites have sprung up to replace the hidden wiki, but few include links to child porn.

Since the shutdown of Freedom Hosting in August, pedophile sites on the Deep Web have shrunk significantly. Many of the most popular websites, which were previously open to the public, have since become invite-only. The Love Zone, one of the most popular child pornography trading forums, now requires a user upload 50mb of hardcore preteen pornography to join–a hurdle for only the most hardcore of users that purposefully limits the forums’ growth.

It’s worth noting, however, that despite these restrictions The Love Zone still has more than 15,000 members.

The Hidden Wiki’s nine year lifespan is an eternity in the ephemeral world of the Deep Web. As thousands of other hidden websites have come and gone around it, the Hidden Wiki became something like a combination of Google and Wikipedia for an anonymous portion of the Internet that is purposefully difficult for new users to navigate.

Strongly anti-censorship, the Hidden Wiki’s owners have always brushed off widespread criticism about its content. Along with its dynamic collection of child pornography links, the website has linked to everything else the Deep Web has to offer, good and bad: Zoophilia (animal pornography), anonymous blogs, animal torture videos, anonymous email, revenge porn, enormous multimedia libraries, rape porn, anonymous chat rooms, blackmail porn, hacking forums, whistleblower sites like WikiLeaks, guides to identity theft, social networks, arms dealers, financial fraud, black markets, and much more.

Just about the only thing to offend the Hidden Wiki’s Deep Web peers, however, was the child pornography, which was listed under a section called “Hard Candy.”


This is far from the first time the Hidden Wiki was targeted by its enemies. Prior to this week’s incident, the most noteworthy battle against the Hidden Wiki was waged by the hacktivist collective Anonymous as a part of Operation Darknet in 2011.

Anonymous managed to bring the Hidden Wiki and several major child pornography websites down with distributed denial-of-service attacks for several days as well as release IP logs from visitors.

Although the attack was celebrated in the press, #OpDarkNet was a hollow victory. The Hidden Wiki and all the child porngraphy sites came back shortly and massively grew in popularity over the next two years.

The war over the Hidden Wiki is going both ways. Earlier today, an anti-censorship group took back control of the URL. The wiki isn’t back up—instead, users are now redirected to a page saying “Fuck doxbin! Tor doesn’t bow to terrorists.” But the site itself hasn’t returned.

And if the Hidden Wiki stays down, this offensive will have severely cut down the size and accessibility of the world of Tor child pornography which has been in a nosedive since August, making it harder than ever for new users to access that shadowy corner of the Web.


Dutch ecstasy is Silk Road’s most popular drug

Ecstasy_monogram.jpg (434×424)

The most popular drug on the Deep Web is a $9 ecstasy pill from the Netherlands known as “Superman Xtc.”

Sold by a pseudonymous business known as the “Chemical Brothers,” the pill won the honor from a new survey of the Silk Road 2.0 black market that measured, among other metrics, the feedback and reviews each product received. The Superman Xtc notched up a 4.9498 rating (out of 5) with 438 reviews.

The Netherlands has been called the ecstasy capital of the world, so it’s no surprise that it’s shipping an awful lot of the drug around the globe.

The Dutch were recently involved in the arrests of five prominent Deep Web drug dealers.

The second most popular product on on the Silk Road isn’t even a drug. Instead, it’s a £100 Tesco Voucher card, sold to customers who want an easy way to convert the digital currency Bitcoin to British Pounds. The card can be spent all over Great Britain at pubs, restaurants, tourist attractions, and more.

Third on the list is 200 milligrams of high quality DMT (Dimethyltryptamine), a psychedelic that has rapidly been gaining popularity across the United States in recent years, and now has more than 1.4 million American users.

The survey measured popularity by number and quality of reviews. Many sales go without reviews, so it’s impossible by design to measure everything sold on Silk Road. It’s also possible that drugs like ecstasy, which produces euphoria and empathy among other effects, can drive its smiling users to leave more positive reviews than other drugs.

If a customer smokes a ton of great weed, perhaps they won’t have the drive to write a positive review, preferring instead to use precious energy for chewing Doritos. We excitedly await a peer-reviewed research paper on the subject.

Common wisdom says that marijuana, a much more popular drug than ecstasy or DMT, would be near the top of the list for Silk Road popularity. In reality, the first weed featured (“3.5 grams of STINKY BUD” from the United Kingdom) comes in at number 13 on the list. Cocaine, ketamine, speed, and Xanax all feature higher.

There are plenty of possible explanations here. First, marijuana is more plentiful, meaning buyers have more options. It’s harder for a single product to dominate the weed industry than it is to dominate the DMT industry.

Second, it’s simply easier to find weed in real life. As one of the most commonly used drugs in the Western world, it’s often easier to reach out to a real life drug dealer than to go through Silk Road to find something as simple as pot.

But it’s not always easy for everyone to obtain good “STINKY BUD” from a neighbor, so rest assured knowing marijuana still sells very well on Silk Road.