Do yourself a favor. Think for yourself. Be your own person. Question everything. Stand for principle. Champion individual liberty and self-ownership where you can. Develop a strong moral code. Be kind to others. Do no harm, unless that harm is warranted. Pretty obvious stuff...but people who hold to these things in their hearts seem to be disappearing from the earth at an accelerated rate. Stay safe, my friends. Thanks for being here.   

How to Buy Sell Marijuana Online
http://www.copsrcorrupt.com/buy---sell-marijauna-online-.html

Nude Protest (NSFW)
http://www.copsrcorrupt.com/nude-protest.html

LEAK: JFK & Marilyn Monroe Sex Tape (NSFW)
http://www.copsrcorrupt.com/marilyn-monroe-uncensored.html

CENSORED 15 post/sites banned or removed by GOV from Internet
http://www.copsrcorrupt.com/censored--banned-and-removed.html


Cops Are Corrupt (by city/state)
http://www.copsrcorrupt.com/cops-are-corrupt.html

VIDEO How to BEAT POLICE DOGS for Dummies
http://www.copsrcorrupt.com/police-dogs--know-your-rights-.html

How to BEAT Stingray, NSA, DHS, and FBI surveillance
http://www.copsrcorrupt.com/how-to-beat-stingray--nsa--fbi-and-police-surveillance.html 

How to Rob a Bank and get away scot-free for Dummies
http://www.copsrcorrupt.com/-how-to--rob-a-bank-and-get-away.html 

Who's a SNITCH? Check here for pictures and locations..
http://www.copsrcorrupt.com/snitches-of-america.html

There's now a website that snitches on SNITCHES
http://www.copsrcorrupt.com/snitch-on-snitches.html


Making METH at home is quick n easy
http://www.copsrcorrupt.com/-how-to--crystal-meth.html

How to BEAT Police and DEA drug stings
http://www.copsrcorrupt.com/how-to-beat-stingray--nsa--fbi-and-police-surveillance.html

How to Make PIPE BOMBS for Dummies 
http://www.copsrcorrupt.com/-how-to--pipe-bomb.html

Stay Informed:

Forget the NSA, the LAPD spies on millions of innocent folks

http://www.laweekly.com/news/forget-the-nsa-the-lapd-spies-on-millions-of-innocent-folks-4473467  

Meet the Muslims Suing the Cops for Their Own Surveillance Records
http://www.vice.com/read/meet-the-muslims-suing-the-cops-for-their-own-surveillance-records

Apple Is Right: The FBI Wants to Break Into Lots of Phones
http://www.theatlantic.com/technology/archive/2016/02/apple-is-right-the-fbi-wants-to-break-into-lots-of-phones/470607/

FBI says it will help local and state law enforcement break into encrypted devices
http://www.techspot.com/news/64316-fbi-help-local-state-law-enforcement-break-encrypted.html

NYPD spying in Muslim areas - with CIA's help
http://www.cbsnews.com/news/nypd-spying-in-muslim-areas-with-cias-help/

CIA’s Secret LSD Experiments on America
http://healthland.time.com/2012/03/23/the-legacy-of-the-cias-secret-lsd-experiments-on-america/

'Gestapo' tactics at US police 'black site'
http://www.theguardian.com/us-news/2015/feb/26/police-black-site-chicago-washington-politicians-human-rights

Appeals Court Rules Police Can Lie to Suspects
http://www.officer.com/news/12189403/appeals-court-rules-police-can-lie-to-suspects   


Don't want your information monitored online? Whatever you do, don't Google.
Google Alternatives:
DuckDuckGo / StartPage      

sexvacations
Click here for more.

THANK YOU for stopping by Underground America Inc.

Home  Contact  About  Site Map  Webmasters  Advertise  the Crew  Gear 

The Internet Underground: Tor Hidden Services

By InfoSec


Some people think onion routing or the Tor network is for criminals and people with something to hide. Well, they are half right. The Tor network was designed to give a masked, “semi-safe”, passage to those who needed to get information out. According to its website, “Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.”


People use Tor as a way to bypass traffic filters or monitors throughout the Internet. If using a minimum of SSL encryption, this medium has been recognized as being a “safer” way to communicate over the Internet. What most people do not realize is that there is an entire subnet underground out there called “Darknet” or “Deepweb”. Others just call the underground Internet Tor network hidden servers. These hidden servers usually have a “.onion” extension and can only be seen using a Tor proxy or TorVPN. The easiest way to get onto the Tor network is with the Tor Browser Bundle (TBB). It is free and very easy to install and then use. All you have to do is go to the torproject.org and download TBB and within minutes you will be connected.

There are legitimate reasons to use Tor, especially for those who are trying to hide their identities from oppressive governmental regimes or reporters trying to minimize leaking the identity of informants. Some will even stay on the proxy network and use services like Tor mail, a web based email service. There are still some anonymity challenges. If you are on the same network, you may still leak the originating IP address and there is a risk of someone capturing your traffic. Some will even go as far as only using HTTPS (SSL encryption) or reverting back to the good old VPN.


There are darker usages of the hidden servers. There are E-Black Markets all over this network that sell anything from meth to machine guns and services that range from assembling credit card data to assassinations (“you give us a picture; we’ll give you an autopsy report!”). Most of the sites trade their goods with an e-currency called Bitcoins, an anonymous electronic commodity that can purchase almost anything.

One of the most popular “secret” sites called “The Silk Road” or SR has almost anything you can think of. SR has evolved over the years and has recently dropped its weapon sales section and created a new site called the Armory. Shortly after, the Armory closed due to the lack of traffic and interest. They have also banned assassination services to minimize attention from showing up on Law Enforcement’s radar. They still have plenty of drugs, counterfeit items, and stolen goods though.

There are still plenty of other sites that focus on arms dealing or unfiltered auction site. Once you are on Tor, the next thing you would have to do to communicate with some of these sites is to get an anonymous Tor based email. This is a web based email that you log into that acts just like a regular email except it only exists in the Tor world. Another popular communications mechanism is TorPM.
 
Tor Communications

Tor Mail –
http://jhiwjjlqpyawmpjx.onion


E-Black Market sites

The Silk Road:
http://silkroadvb5piz3r.onion/index.php

Black Market Reloaded:
http://5onwnspjvuk7cwvk.onion/index.php

Zanzibar’s underground marketplace:
http://okx5b2r76olbriil.onion/

TorBlackmarket:
http://7v2i3bwsaj7cjs34.onion/

EU Weapons & Ammunition:
http://4eiruntyxxbgfv7o.onion/snapbbs/2e76676/

CC4ALL (Credit Card site):
http://qhkt6cqo2dfs2llt.onion/

CC Paradise:
http://mxdcyv6gjs3tvt5u.onion/

C’thulhu (“organized criminal group”):
http://iacgq6y2j2nfudy7.onion/

Assassination Board:
http://4eiruntyxxbgfv7o.onion/

Another hitman:
http://2v3o2fpukdlpk5nf.onion/

Swattingservice (fake bomb threats):
http://jd2iqa4yt7vqvu5o.onion/


Onion-ID (fake ID): http://g6lfrbqd3krju3ek.onion/

Quality Counterfeits:
http://i3rg5diydpbxkewu.onion/

Social Network

    mul.tiver.se:
http://ofrmtr2fphxkqgz3.onion/

Informational

LiberaTor (weaponry & training):
http://p2uekn2yfvlvpzbu.onion/

The Hidden Wiki:
http://kpvz7ki2v5agwt35.onion/wiki/

Search

Torch:
http://xmh57jrzrnw6insl.onion/

Torlinks:
http://torlinkbgs6aabns.onion/


So let’s take this step by step.

1.) Download “
Tor Browser Bundle” from torproject.org.
2.) Double left click on “Start Tor Browser”.
3.) You should then see Vidalia connecting to Tor.
4.) The Tor Browser should automatically open.

You are now on the “Deepweb”, "Darknet".

You can now access “.onion” domains.

Create a TorMail account on jhiwjjlqpyawmpjx.onion.
Create a TorPM account on 4eiruntyxxbgfv7o.onion/pm/
Enjoy a little more anonymity for research.
 
Disclaimer: do NOT break the law. This was written to explain what the (Darkweb / Deepnet / Tor hidden service) is and what kind of things you may find. It is not an invitation to break the law with no recourse. Just like any network, this one has both good and bad guys. If you break the law, you will get caught. Bad guys have to be lucky EVERY time. Good guys only  have to be lucky once.