Darkspider Info was a directory of Tor Onion hidden websites and services, and aimed to be the largest collection of such URLs.
Original hosted on it’s own domain, I moved the data and spider to my blog, and added better filters. The directory now uses ahmia.fi ban list, as well as title and content filters, which are by no means complete, to remove links to porn sites, and other useless links. (filters against know scam sites, carding and other morally-illegal-garbage coming soon.) With the idea that only the most useful links remain. This list can be found by using the menu item “ONION DIRECTORY”.
My blog does not host this content; the service is simply a directory service connecting Internet users to content hosted inside the Tor network. Please be aware that when you access these sites through a proxy (Tor2Web, Onion Cab, or Onion Direct) you are not anonymous. To obtain anonymity, you are strongly advised to download the Tor Browser Bundle and access this content over Tor.
Dan Wolfe has no way of knowing what content is available via these links, and has no control over this automated service. Links are added via users, guests, and external sources. Concerns over copyright infringement, legal issues, and others should be directed to the owners of the sites when that information is available. Technical issues with this site should be direct to Dan Wolfe
Tor is free software for enabling online anonymity and resisting censorship. It is designed to make it possible for users to surf the Internet anonymously, so their activities and location cannot be discovered by government agencies, corporations, or anyone else.
Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than five thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”. Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored. An extract of a Top Secret appraisal by the National Security Agency (NSA) characterized Tor as “the King of high secure, low latency Internet anonymity” with “no contenders for the throne in waiting“.
The term “onion routing” refers to application layers of encryption, nested like the layers of an onion, used to anonymize communication. Tor encrypts the original data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communication can be de-anonymized through network surveillance that relies upon knowing its source and destination.
An adversary unable to defeat the strong anonymity that Tor provides may try to de-anonymize the communication by other means. One way this may be achieved is by exploiting vulnerable software on the user’s computer. The NSA has a technique that targets outdated Firefox browsers codenamed EgotisticalGiraffe, and targets Tor users in general for close monitoring under its XKeyscore program. Attacks against Tor are an active area of academic research which is welcomed by Tor itself.
– WikipediaClick here for reuse options!
Copyright 2016 Dan Wolfe