Dark Spider

Dark Net (or Darknet) is an umbrella term describing the portions of the Internet purposefully not open to public view or hidden networks whose architecture is superimposed on that of the Internet. “Darknet” is often associated with the encrypted part of the Internet called Tor network where illicit trading takes place such as the infamous online drug bazaar called Silk Road. It is also considered part of the Deep Web. Anonymous communication between whistle-blowers, journalists and news organisations is facilitated by the “Darknet” Tor network through use of applications including SecureDrop.

Dark Spider is web crawler project that has parts that have been made public from time to time, including the largest list of Onion sites. It’s primary purpose is data mining, and gathering intelligence for Civil Contracts to discover threats of interests to law enforcement. Dark Spider is supported by Global Incidents Maps.

Morgan Clements

I’ve known Dan Wolfe for at least 8 years and have always found him to be responsive, attentive to detail, and honest. Our work as a military and government contractor has at times required customized solutions. Dan built a custom dark-web search engine which we used for government and corporate clientele. This proved to be one of our biggest successes and produced results that had a very significant impact on national security, while also helping us serve our favorite financial-services clients. Dan operates with the necessary level of integrity required for such efforts and I hope we can partner with him for a long time to come.

Morgan Clements www.GlobalIncidentMap.com Dark Spider September 9, 2019

Prepper Broadcasting Network

The Prepper Broadcasting Network. Redefining the 21st Century prepper. Promoting Self-reliance and Independence. Shows on all things survival, preparedness, homesteading, disaster response and the like. Promoting Self-reliance and Independence. Shows on all things survival, preparedness, homesteading, disaster response and the like. We will get you on or keep you on a road to disaster and emergency preparedness.

Dan Wolfe has worked with me for several years in helping to build and
maintain my website Prepper Broadcasting as well as all facets
pertaining to including the invaluable help in setting up automated
systems to promote what I do and in developing my 24/7 radio feed. His
services as a webmaster along with his prompt and expert work have
enabled me to move faster and far beyond what I ever expected. He’s
always been available when I’ve needed him most carving out the time to
make work what I could not. I would consider Dan an expert in his field
and an asset not to be passed up by anyone needing help with anything
web related.

Glen Martin Owner PBN September 5, 2019

American Preppers Network (Blog)

I have worked with Dan Wolfe since 2009, he has been able to secure our
sites, and upgrade them. Over the years he has worked on countless
websites for me, customizing scripts, templates, and connecting them to
social media. Always a pleasesure to work with, and prompt with answers
and advice.

Tom Martin Owner APN Network September 5, 2019

American Preppers Network

 

I am still involved with the APN, and still run the official channel on the Rizon IRC network since before 2009 when we launched the official websites. I mostly take a back end admin status on the site, and let the editors and authors handle the bulk of the details for the content, my job has always been to keep the sites online. The entire project is far more complex than it appears online from the main website. There are over 45 thousand users in the forum, and over 65 thousand connected via the main sites. (This doesn’t even come close to the social media networks, or the sister project of Prepper Broadcasting)

  • wolfe

“The American Preppers Network (APN) is a non-profit corporation and part of a growing international movement of people who call themselves preppers. The social network is organized by state and regional blogs and forums. The members are volunteer contributors who are dedicated to providing free information on survival skills, preparedness, self-sufficiency and sustainability.

The network of blogs is based on the concept originally created by Riverwalker of Stealth Survival who founded the first Preppers Network, Texas Preppers Network. The social network is composed of a variety of media that include a chatroom, forums, social networking pages.

The individuals involved in the prepper network prefer to be called preppers instead of survivalists because they are regular people with normal lifestyles and jobs who prepare for a variety of reasons whether natural or man-made.

A unique difference that sets the network of preppers apart from their survivalist counterparts is the growing number of women involved in the movement.” – wikipedia

Project 17 – Key Penetration

blockchain, block, chain
Tumisu (CC0), Pixabay

One of the first hardcore security projects I was involved with had to do with asymmetric cryptography, and a proof of concept at penetration of public keys. The premise was rather simple, as Moore’s Law expands, how long before any brute force attack against a public/private key pair can be broken, and what can be done to prevent it.

While my compatriots attempted at solving the mathematical predictions of the amount of CPU power that would be needed to crack encryption protocols like PGP and GPG protected data, I took a different approach.

Most people in the industry at the time could not have predicted the emergence of quantum computing, neither could I have at the time. However, I knew as the computer power increased in it’s ability to crack secured systems, so too would the secure systems being used as well. What would not change was human nature.

One of the flaws I discovered had nothing to do with the encryption itself, but rather with the CLI. If a user imported a private key which had been corrupted, the CLI system would reject the key. This meant that a brute force attack would know when it failed at cracking a private key simply by recording the response from the target server as a null. As Moore’s Law reaches it’s zenith with quantum computers, this flaw needs to be protected against by adding a recaptcha  based proof of work system to the private key importing protocol, and intentionally given a false positive on key chained inputs.

For the sensitive nature of the data being protected in relation to this challenge, Public-key cryptography was replaced with a One Time Page based system based on my work.

  • wofle