THANK YOU for stopping by Underground America Inc. 

Do yourself a favor. Think for yourself. Be your own person. Question everything. Stand for principle. Champion individual liberty and self-ownership where you can. Develop a strong moral code. Be kind to others. Do no harm, unless that harm is warranted. Pretty obvious stuff...but people who hold to these things in their hearts seem to be disappearing from the earth at an accelerated rate. Stay safe, my friends. Thanks for being here.     

The Internet Underground: Tor Hidden Services

By InfoSec

Some people think onion routing or the Tor network is for criminals and people with something to hide. Well, they are half right. The Tor network was designed to give a masked, “semi-safe”, passage to those who needed to get information out. According to its website, “Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.”

People use Tor as a way to bypass traffic filters or monitors throughout the Internet. If using a minimum of SSL encryption, this medium has been recognized as being a “safer” way to communicate over the Internet. What most people do not realize is that there is an entire subnet underground out there called “Darknet” or “Deepweb”. Others just call the underground Internet Tor network hidden servers. These hidden servers usually have a “.onion” extension and can only be seen using a Tor proxy or TorVPN. The easiest way to get onto the Tor network is with the Tor Browser Bundle (TBB). It is free and very easy to install and then use. All you have to do is go to the and download TBB and within minutes you will be connected.

There are legitimate reasons to use Tor, especially for those who are trying to hide their identities from oppressive governmental regimes or reporters trying to minimize leaking the identity of informants. Some will even stay on the proxy network and use services like Tor mail, a web based email service. There are still some anonymity challenges. If you are on the same network, you may still leak the originating IP address and there is a risk of someone capturing your traffic. Some will even go as far as only using HTTPS (SSL encryption) or reverting back to the good old VPN.

There are darker usages of the hidden servers. There are E-Black Markets all over this network that sell anything from meth to machine guns and services that range from assembling credit card data to assassinations (“you give us a picture; we’ll give you an autopsy report!”). Most of the sites trade their goods with an e-currency called Bitcoins, an anonymous electronic commodity that can purchase almost anything.

One of the most popular “secret” sites was called “The Silk Road” or SR had almost anything you can think of. SR had evolved over the years and had recently dropped its weapon sales section and created a new site called the Armory. Shortly after, the Armory closed due to the lack of traffic and interest. They have also banned assassination services to minimize attention from showing up on Law Enforcement’s radar. They still had plenty of drugs, counterfeit items, and stolen goods though.

There are still plenty of other sites that focus on arms dealing or unfiltered auction site. Once you are on Tor, the next thing you would have to do to communicate with some of these sites is to get an anonymous Tor based email. This is a web based email that you log into that acts just like a regular email except it only exists in the Tor world. Another popular communications mechanism is TorPM.
Tor Communications

Tor Mail –

E-Black Market sites

The Silk Road:

Black Market Reloaded:

Zanzibar’s underground marketplace:


EU Weapons & Ammunition:

CC4ALL (Credit Card site):

CC Paradise:

C’thulhu (“organized criminal group”):

Assassination Board:

Another hitman:

Swattingservice (fake bomb threats):

Onion-ID (fake ID): http://g6lfrbqd3krju3ek.onion/

Quality Counterfeits:

Social Network


LiberaTor (weaponry & training):

The Hidden Wiki:




So let’s take this step by step.

1.) Download “
Tor Browser Bundle” from
2.) Double left click on “Start Tor Browser”.
3.) You should then see Vidalia connecting to Tor.
4.) The Tor Browser should automatically open.

You are now on the “Deepweb”, "Darknet".

You can now access “.onion” domains.

Create a TorMail account on jhiwjjlqpyawmpjx.onion.
Create a TorPM account on 4eiruntyxxbgfv7o.onion/pm/
Enjoy a little more anonymity for research.
Disclaimer: do NOT break the law. This was written to explain what the (Darkweb / Deepnet / Tor hidden service) is and what kind of things you may find. It is not an invitation to break the law with no recourse. Just like any network, this one has both good and bad guys. If you break the law, you will get caught. Bad guys have to be lucky EVERY time. Good guys only  have to be lucky once.                     

Stay Informed:

Forget the NSA, the LAPD spies on millions of innocent folks  

Meet the Muslims Suing the Cops for Their Own Surveillance Records

Apple Is Right: The FBI Wants to Break Into Lots of Phones

FBI says it will help local and state law enforcement break into encrypted devices

NYPD spying in Muslim areas - with CIA's help

CIA’s Secret LSD Experiments on America

'Gestapo' tactics at US police 'black site'

Appeals Court Rules Police Can Lie to Suspects   

Don't want your information monitored online? Whatever you do, don't Google.
Google Alternatives:
DuckDuckGo / StartPage             

Money>    How to Make Money    Money Laundering    Extra Income(s)    Debt Bubble    Audit the FED    Blackmail

Living Large>    Pass any drug test free    Drug Stings    Adult Vacations    Hacking    Street Racing    Encryption   

Street Drugs>    Price Guide    Marijuana    Buy/Sell     Molly    Mushrooms    DMT    Cocaine    Meth     Heroin    more...

How to Buy Sell Marijuana Online

Nude Protest (NSFW)

LEAK: JFK & Marilyn Monroe Sex Tape (NSFW)

CENSORED 15 post/sites banned or removed by GOV from Internet

Cops Are Corrupt (by city/state)


How to BEAT Stingray, NSA, DHS, and FBI surveillance 

How to Rob a Bank and get away scot-free for Dummies 

Who's a SNITCH? Check here for pictures and locations..

There's now a website that snitches on SNITCHES

Making METH at home is quick n easy

How to BEAT Police and DEA drug stings

How to Make PIPE BOMBS for Dummies