Darkspider has moved to Wolfe’s Blog

Darkspider Info was a directory of Tor Onion hidden websites and services, and aimed to be the largest collection of such URLs.

Original hosted on it’s own domain, I moved the data and spider to my blog, and added better filters. The directory now uses ahmia.fi ban list, as well as title and content filters, which are by no means complete, to remove links to porn sites, and other useless links. (filters against know scam sites, carding and other morally-illegal-garbage coming soon.) With the idea that only the most useful links remain. This list can be found by using the menu item “ONION DIRECTORY”.

My blog does not host this content; the service is simply a directory service connecting Internet users to content hosted inside the Tor network. Please be aware that when you access these sites through a proxy (Tor2Web, Onion Cab, or Onion Direct) you are not anonymous. To obtain anonymity, you are strongly advised to download the Tor Browser Bundle and access this content over Tor.

Dan Wolfe has no way of knowing what content is available via these links, and has no control over this automated service. Links are added via users, guests, and external sources. Concerns over copyright infringement, legal issues, and others should be directed to the owners of the sites when that information is available. Technical issues with this site should be direct to Dan Wolfe


Tor is free software for enabling online anonymity and resisting censorship. It is designed to make it possible for users to surf the Internet anonymously, so their activities and location cannot be discovered by government agencies, corporations, or anyone else.

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than five thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”. Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored. An extract of a Top Secret appraisal by the National Security Agency (NSA) characterized Tor as “the King of high secure, low latency Internet anonymity” with “no contenders for the throne in waiting“.

The term “onion routing” refers to application layers of encryption, nested like the layers of an onion, used to anonymize communication. Tor encrypts the original data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communication can be de-anonymized through network surveillance that relies upon knowing its source and destination.

An adversary unable to defeat the strong anonymity that Tor provides may try to de-anonymize the communication by other means. One way this may be achieved is by exploiting vulnerable software on the user’s computer. The NSA has a technique that targets outdated Firefox browsers codenamed EgotisticalGiraffe, and targets Tor users in general for close monitoring under its XKeyscore program. Attacks against Tor are an active area of academic research which is welcomed by Tor itself.

– Wikipedia

Click here for reuse options!
Copyright 2016 Dan Wolfe

I am a Web Developer, Information Professional, and writer. My experiance ranges from PHP, HTML5, Java, XML and Bash scripting to Blockchain API interfaces, law library research, data indexing and programming spiders to search the dark-net. I have worked as a civil contractor for several law enforcement agencies, and security companies, providing time relative information on data breaches, and identify thief. My focus in web development is based on encryption, security, and privacy.

Topics


Archery
Barter
Comix
Crypto-currency
DIY
Food Storage
Geek
General Posts
Homesteading
Off-The-Grid
Privacy
Reviews
Self-Defense
Self-Reliance
Self-Sufficient
Steem Posts
Survivalism
WPBookList Book Post

Still Updating

I am still in the process of updating this site, and transfering all the code and posts from wolfeblog.net, please bare with me - wolfe

DONATE WITH CPU

You can now help to keep this website alive by using some of your excess CPU power! Monero Crypto:

CPU: 0%
Hashes: 0 (0 H/s)
Ok + - Stop

USD calculator:

USD =

USD price:

1 USD = 0.00009700 BTC
1 USD = 0.00115700 ETH
1 USD = 0.00467200 LTC
1 USD = 0.00157500 DASH
1 USD = 0.00353700 XMR
1 USD = 145.370000 DOGE
1 USD = 0.00238500 ZEC
1 USD = 1.05000000 XRP
1 USD = 0.00238500 ZEC
1 USD = 0.28510000 STEEM
Powered by Crytptocurrency All-in-One Data by CryptoCompare API
Copyright © 2018 Dan Wolfe