How To Access the DARK WEB in 2024 (3 Levels)

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 มิ.ย. 2024
  • Is your stuff for sale on the Dark Web? Find out with Dashlane: dashlane.com/networkchuck50 (50% off) with code NETWORKCHUCK50
    🔒🌐 How to Access the Dark Web in 2023 Safely: 3 Levels of Security 🌐🔒
    Ever heard of the Dark Web and wondered how to access it? The allure of the unknown is captivating, but it can also be perilous. In this video, I guide you through 3 different methods to access the Dark Web, ranging from basic to high-security measures. We'll delve into what the Dark Web actually is, its legitimate uses, and the precautions you should take when navigating this mysterious part of the internet.
    📝 What You'll Learn:
    ✅ The Good, the Bad, and the Ugly of the Dark Web
    ✅ Why the ToR Browser alone might not be enough
    ✅ How a VPN can add an extra layer of security
    ✅ The ultimate security with Tails
    ✅ Bonus: The NetworkChuck Cloud Browser
    💡 Sponsored by Dashlane: Don't let your personal information be up for sale on the Dark Web! Use Dashlane's powerful password manager and dark web monitoring services to keep your digital life secure. Get Dashlane: dashlane.com/networkchuck50 (50% off) with code NETWORKCHUCK50
    🎥 Related Videos:
    I Put a Dark Web website on a Raspberry Pi: • i put a DARK WEB websi...
    👇 Resources & Links:
    ToR Browser: www.torproject.org/download/
    Dashlane: dashlane.com/networkchuck50
    Tails: tails.net/
    👀 Who Should Watch This?
    Curious about the Dark Web
    Concerned about Online Security
    Aspiring Ethical Hackers
    Network Enthusiasts
    🔔 If you found this video informative and helpful, please consider subscribing and hitting the bell to get notified of our latest content!
    🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy
    SUPPORT NETWORKCHUCK
    ---------------------------------------------------
    ➡️NetworkChuck membership: ntck.co/Premium
    ☕☕ COFFEE and MERCH: ntck.co/coffee
    Check out my new channel: ntck.co/ncclips
    🆘🆘NEED HELP?? Join the Discord Server: / discord
    STUDY WITH ME on Twitch: bit.ly/nc_twitch
    READY TO LEARN??
    ---------------------------------------------------
    -Learn Python: bit.ly/3rzZjzz
    -Get your CCNA: bit.ly/nc-ccna
    FOLLOW ME EVERYWHERE
    ---------------------------------------------------
    Instagram: / networkchuck
    Twitter: / networkchuck
    Facebook: / networkchuck
    Join the Discord server: bit.ly/nc-discord
    AFFILIATES & REFERRALS
    ---------------------------------------------------
    (GEAR I USE...STUFF I RECOMMEND)
    My network gear: geni.us/L6wyIUj
    Amazon Affiliate Store: www.amazon.com/shop/networkchuck
    Buy a Raspberry Pi: geni.us/aBeqAL
    Do you want to know how I draw on the screen?? Go to ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
    fast and reliable unifi in the cloud: hostifi.com/?via=chuck
    #darkweb #tailslinux
    Dark Web 2023 Guide
    How to Access the Dark Web Safely
    Secure Dark Web Browsing
    Using ToR Browser for Dark Web
    Dark Web Security Levels
    VPN and Dark Web
    Exploring the Dark Web
    Onion Network Explained
    Dashlane for Dark Web Monitoring
    Anonymity on the Dark Web
    Risks of the Dark Web
    Tails OS for Dark Web
    Dark Web vs Deep Web
    Protect Yourself on the Dark Web
    Onion Routing Security
    Access .onion sites safely
    Dark Web Encryption
    Criminal Activities on the Dark Web
    Legitimate Uses of the Dark Web
    Journalists and the Dark Web
    Government and the Dark Web
    Secure Email on the Dark Web
    Three Layers of Dark Web Security
    CIA's Presence on the Dark Web
    Snowden-level Security on Dark Web
    Dark Web Myths and Facts
    Free Expression on the Dark Web
    Dark Web for Beginners
    Advanced Dark Web Access Techniques
    Avoid Dark Web Scams
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 4.4K

  • @NetworkChuck
    @NetworkChuck  8 หลายเดือนก่อน +380

    Is your stuff for sale on the Dark Web? Find out with Dashlane: dashlane.com/networkchuck50 (50% off) with code NETWORKCHUCK50
    🔒🌐 How to Access the Dark Web in 2023 Safely: 3 Levels of Security 🌐🔒
    Ever heard of the Dark Web and wondered how to access it? The allure of the unknown is captivating, but it can also be perilous. In this video, I guide you through 3 different methods to access the Dark Web, ranging from basic to high-security measures. We'll delve into what the Dark Web actually is, its legitimate uses, and the precautions you should take when navigating this mysterious part of the internet.
    📝 What You'll Learn:
    ✅ The Good, the Bad, and the Ugly of the Dark Web
    ✅ Why the ToR Browser alone might not be enough
    ✅ How a VPN can add an extra layer of security
    ✅ The ultimate security with Tails
    ✅ Bonus: The NetworkChuck Cloud Browser
    💡 Sponsored by Dashlane: Don't let your personal information be up for sale on the Dark Web! Use Dashlane's powerful password manager and dark web monitoring services to keep your digital life secure. Get Dashlane: dashlane.com/networkchuck50 (50% off) with code NETWORKCHUCK50
    🎥 Related Videos:
    I Put a Dark Web website on a Raspberry Pi: th-cam.com/video/bllS9tkCkaM/w-d-xo.htmlsi=jTxWSdxsow9ROokB
    👇 Resources & Links:
    ToR Browser: www.torproject.org/download/
    Dashlane: dashlane.com/networkchuck50
    Tails: tails.net/
    👀 Who Should Watch This?
    Curious about the Dark Web
    Concerned about Online Security
    Aspiring Ethical Hackers
    Network Enthusiasts
    🔔 If you found this video informative and helpful, please consider subscribing and hitting the bell to get notified of our latest content!
    🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy

    • @alexmelone
      @alexmelone 8 หลายเดือนก่อน +2

      Thank you!!!

    • @frontforumfocus
      @frontforumfocus 8 หลายเดือนก่อน +4

      hahha there is my youtube password going for 50 bucks

    • @ZSquirrel678
      @ZSquirrel678 8 หลายเดือนก่อน +2

      Everyone can be found 😉

    • @nathancoats6432
      @nathancoats6432 8 หลายเดือนก่อน

      Can you make a video on how to install I2P on whonix? I had to download a portable version of tor and then make some changes to the about:config file in that portable version of tor. Worked great but just want to see how you would do it. Would make a good video.

    • @crash939burn
      @crash939burn 8 หลายเดือนก่อน +1

      Dont forget level 3 swap memory can be tracked, also dont forget proxychains

  • @bob123carns8
    @bob123carns8 7 หลายเดือนก่อน +5215

    A safest method is just use the library’s computer with the account of the guy who didn’t sign out

    • @beezletrip6
      @beezletrip6 7 หลายเดือนก่อน +455

      Then the libraries camera tracks you down lol

    • @dannymostarac1799
      @dannymostarac1799 7 หลายเดือนก่อน +34

      Lol

    • @elinars5638
      @elinars5638 7 หลายเดือนก่อน +233

      Some 12 year old kid will be watching you over your shoulder

    • @SgtJoeSmith
      @SgtJoeSmith 5 หลายเดือนก่อน +46

      i did that in college

    • @AxeltheKing1000
      @AxeltheKing1000 5 หลายเดือนก่อน +36

      Doing a little bit of trolling I see.

  • @allenclark4235
    @allenclark4235 4 หลายเดือนก่อน +1732

    Somewhere, a guy in a black hoodie eating Funyuns and drinking Mt Dew will never be the same.

    • @Bojachi_VODs
      @Bojachi_VODs 3 หลายเดือนก่อน +7

      😂

    • @sumdirtygold
      @sumdirtygold 3 หลายเดือนก่อน +4

      On technique 3 3/4, VPN was implemented prior or does network chuck provide VPN security??

    • @jakes1134
      @jakes1134 3 หลายเดือนก่อน

      lvl 4 = network chuck himself comes to yourself himself and physically secures your pc. he comes armed incase police show up!@@sumdirtygold

    • @georgescurobert-mihail8813
      @georgescurobert-mihail8813 3 หลายเดือนก่อน +13

      Bro, my heart stopped for a moment when I heard him. Then I realised the video was prerecorded but still...

    • @cookies_nom_nom
      @cookies_nom_nom หลายเดือนก่อน +4

      Saw this before he said it made me laugh 😂

  • @abdiwalihalane4964
    @abdiwalihalane4964 2 หลายเดือนก่อน +874

    Dear FBI, I'm only watching this for educational reasons to avoid this danger, so please don't suspect me 🙏😁

  • @PlNKUHOSHI
    @PlNKUHOSHI 6 หลายเดือนก่อน +1218

    And Level 4 would be: Buying a separate laptop just for using it for the dark web with no personal informaton on it, webcam and microfone disabled in device manager + sticky tape on camera. And under no circumstances ever connect to it to the internet in your home, always use it using public wifi, or a Prepaid Wifi-dongle that you have paid for in cash and needs no registration.
    Never access the Dark Web from your own home, in case you mess up something you are made...

    • @asitha0010
      @asitha0010 5 หลายเดือนก่อน +27

      Thanks bud ❤

    • @vicdog619
      @vicdog619 5 หลายเดือนก่อน +38

      So even using lvl 3 (tails) don't use my own internet?

    • @PlNKUHOSHI
      @PlNKUHOSHI 5 หลายเดือนก่อน

      @@vicdog619 If you look up or buy stuff and services that could get you arrested then no. If you just browse the "Silk Road" or similar then maybe.

    • @fakecubed
      @fakecubed 4 หลายเดือนก่อน +41

      There's some levels of redundancy that are good if you are prone to messing up and you are for whatever reason a serious target for resource-rich opponents. For the vast majority of casual anonymity wanters, it's usually not important to go so crazy with it.

    • @freen1364
      @freen1364 4 หลายเดือนก่อน +17

      I would use a vm

  • @IdfathAbdallah
    @IdfathAbdallah 6 หลายเดือนก่อน +1263

    The method mentioned last is the least secure, primarily because the servers for these 'computers' are hosted by an unknown entity. Without knowing the host, there's a crucial concern that they could potentially access your login details and identify your location. This absence of information about the server host gives rise to substantial security issues.

    • @mr702s
      @mr702s 6 หลายเดือนก่อน +322

      It's a stealth sell. He's selling his service.

    • @toterttitentel497
      @toterttitentel497 6 หลายเดือนก่อน +29

      pin this!

    • @tenstepsfromhell
      @tenstepsfromhell 6 หลายเดือนก่อน +124

      On point. Only something booting from a custom BIOS would have been more secure than Tails. He went backwards suggesting you surf using your daily machine - any existing spywares in there can link your identity to keystrokes and even capture screenshots of your activity. Super insecure.
      No application layer security such as browser, can match the lower layers of security such as Tails which includes custom kernel/OS. Stick with Tails.

    • @theJOY007
      @theJOY007 6 หลายเดือนก่อน +6

      yea dude

    • @drunkensessions
      @drunkensessions 6 หลายเดือนก่อน +1

      This dumb mofo is just pushing NordVPN and that bootable usb thing.

  • @NamiberGames
    @NamiberGames 8 หลายเดือนก่อน +2339

    Using bridges (integrated in the tor browser settings), you can hide to your ISP that you're using tor. This would probably remove the need to trust a third party VPN.

    • @puucca
      @puucca 8 หลายเดือนก่อน +79

      Exactly

    • @DT-hb3zu
      @DT-hb3zu 8 หลายเดือนก่อน +135

      Spin up a VPN server in another country that doesn't do thorough checks on accurate information, and set your VPN up so that whoever connects, the data is never saved. You, and your crew have a secure VPN, that you manage.

    • @madcapmagician6018
      @madcapmagician6018 8 หลายเดือนก่อน +123

      I have to disagree, the federal government has infiltrated tor and has cracked their encryption
      ... I have found that changing my Mac and running through VPN I have been anonymous from prying eyes. The bridges you mention are not updated or regularly maintained.

    • @GalaxyTheReal
      @GalaxyTheReal 8 หลายเดือนก่อน

      @@madcapmagician6018 a VPN wont help you at all if the encryption has been cracked.. And your MAC address is not visible to routers outside of your local network

    • @aszher
      @aszher 8 หลายเดือนก่อน

      @@madcapmagician6018 not only was the tor project made by the us goverment, but some major vpns report back suspicious activity to federal authorities

  • @jeroenvdw
    @jeroenvdw 5 หลายเดือนก่อน +75

    I can only imagine that the FBI is behind the website you mentioned in the end and if you connect to it they will know it's you.

    • @thejoshpresle
      @thejoshpresle 9 วันที่ผ่านมา +2

      Why would they care? Using TOR isn't illegal.

    • @vrsce0178
      @vrsce0178 9 วันที่ผ่านมา +1

      @@thejoshpresle Exactly.

  • @amitabhabhattacharya4051
    @amitabhabhattacharya4051 6 หลายเดือนก่อน +139

    For someone not that computer savvy, AND a non-native speaker, I understood everything he said. Amazing clarity.

  • @dublinbluetune
    @dublinbluetune 7 หลายเดือนก่อน +206

    Thanks. You talked me out of ever trying to access the dark web. Too much work

    • @cani6767
      @cani6767 4 หลายเดือนก่อน +13

      😂😂😂

    • @noblelegacy670
      @noblelegacy670 21 วันที่ผ่านมา

      Bro, this dude talks way too much I hope he sees this message. Females don’t even talk this much.

    • @zandrew8648
      @zandrew8648 2 วันที่ผ่านมา

      bro it's easy af

    • @enasan2525
      @enasan2525 วันที่ผ่านมา

      Too much work + u can do all that and STILL one slip and u get hacked or traced by gov

    • @zandrew8648
      @zandrew8648 20 ชั่วโมงที่ผ่านมา

      @@enasan2525 not if you do it correctly, you're missing the point. Just get good.

  • @wildwestunlimited
    @wildwestunlimited 5 หลายเดือนก่อน +130

    I came here immediately after the video just to read the comments..... NOT disappointed!!

  • @jyothiradithyagadang3216
    @jyothiradithyagadang3216 4 หลายเดือนก่อน +115

    I didn't feel like skipping your video in a any part of the video,it was really informative,no bullshit straight to the point,good video

  • @swimm3r137
    @swimm3r137 4 หลายเดือนก่อน +26

    holy moly, i learned so much stuff today. And I thought I knew it all

  • @ZiqKulux
    @ZiqKulux 8 หลายเดือนก่อน +101

    Ahmia is actually run by a research fellow in a Finnish university. I took his course about privacy and anonymity. This guy knows his stuff and overall the course was great.

    • @safeerahmad5442
      @safeerahmad5442 8 หลายเดือนก่อน +6

      What’s the course called ?

    • @etano1701
      @etano1701 8 หลายเดือนก่อน +8

      Name?

    • @willyclintonne8165
      @willyclintonne8165 7 หลายเดือนก่อน +2

      What's the name of the course.

    • @colonelfustercluck486
      @colonelfustercluck486 6 หลายเดือนก่อน +3

      I think it's private and anonymous......🙃

    • @theycallmekensington
      @theycallmekensington 3 หลายเดือนก่อน

      I'd love to get a link to that course

  • @sethreign8103
    @sethreign8103 6 หลายเดือนก่อน +68

    Great job telling everyone about tails os at 9:00. Too many people make these videos and leave out that route 100%. You've definitely earned a like from me for that.

    • @tocraft573
      @tocraft573 5 หลายเดือนก่อน

      Yeah tails os is amazing and the usage of it, however DID YOU WATCH ANYTHING ELSE IN THE VIDEO

    • @lynxeffect84
      @lynxeffect84 2 หลายเดือนก่อน

      ​@@tocraft573why is it called tails , will any flash drive do or have to be specific

    • @lucihail4444
      @lucihail4444 2 หลายเดือนก่อน

      @@tocraft573wats wrong with anything else in the vid besides the last part

    • @rayane--21pilots8
      @rayane--21pilots8 2 หลายเดือนก่อน

      the last method is bizzare bro@@lucihail4444

  • @TomMyfield-tr2tg
    @TomMyfield-tr2tg 4 หลายเดือนก่อน +5

    As a cyber noob I was Qubes-focussed. You have shown me a simpler way to approach darknet day trips.
    Excellently delivered and produced video! Thank you 🙂🙂

  • @vipr642
    @vipr642 7 หลายเดือนก่อน +263

    Do not use a VPN it is not necessary and Tor actually recommends against it. Tor is really just using a VPN three times over. If you want to obfuscate the fact that you are using Tor, Tor has these special nodes called bridges that do that.

    • @GlitchyZorua
      @GlitchyZorua 7 หลายเดือนก่อน +14

      Correct.

    • @jason4275
      @jason4275 7 หลายเดือนก่อน +7

      I use onions over Tor

    • @GlitchyZorua
      @GlitchyZorua 7 หลายเดือนก่อน

      @@jason4275 ???

    • @etano1701
      @etano1701 7 หลายเดือนก่อน +15

      You are still exposed to the first node

    • @vipr642
      @vipr642 7 หลายเดือนก่อน

      ​@@etano1701why does that matter? It is not like he can see what you are doing. I can say you are still exposed to your VPN. Which I trust Nord VPN less with any dark web activities than a random tor node.

  • @shepherd7583
    @shepherd7583 8 หลายเดือนก่อน +19

    Thanks for letting us save this. I couldn't save it to my cybersecurity playlist but now I can. Thanks Chuck! I love you

  • @little-wytch
    @little-wytch 6 หลายเดือนก่อน +90

    A disposable qube in Qubes OS would also work fairly well. Use a MAC Address auto-changer in the network or firewall qube plus a VPN and a disposable qube that you temporarily install TOR Browser on... with that, you don't even need to worry about changing the settings in TOR Browser because even if something happens and you get hacked, it's only that disposable qube that is hacked and that gets nuked when you shut down that qube, like it was never there. A disposable qube is a temporary VM that gets created when you want to do something dangerous/risky and nuked when you're done.

  • @garrymcgaw4745
    @garrymcgaw4745 25 วันที่ผ่านมา +1

    You never cease to amaze me Chuck. Cheers from Aussie mate.

  • @godividarr
    @godividarr 8 หลายเดือนก่อน +12

    I love your channel. Thank you for what you do.
    Any way I could persuade you to do a video focusing on TOR bridges? Finding them, setting them up, etc?

  • @ScottADunn
    @ScottADunn 8 หลายเดือนก่อน +18

    I use a self hosted bitwarden server, have for years. Love the content that Chuck puts out.

    • @phr3ui559
      @phr3ui559 8 หลายเดือนก่อน +8

      ok

  • @PenAce
    @PenAce 24 วันที่ผ่านมา +2

    Just dropped what I'd call a more comprehensive video. Major props to Chuck though! 🎥👊

  • @sergio-gw3ju
    @sergio-gw3ju 2 หลายเดือนก่อน +11

    It's really wonderful to come across people who freely share valuable information online. You never know what kind of knowledge you might stumble upon that could have a lasting impact on your life.

    • @user-qk3ov7ng6g
      @user-qk3ov7ng6g 2 หลายเดือนก่อน +1

      Don't procrastinate when it comes to saving and investing. Don't wait for the perfect timing; start now because the current moment is the best time to invest.

    • @vandejong9343
      @vandejong9343 2 หลายเดือนก่อน

      What specific type of investment are you referring to? I'm aware that making money through investing is not as straightforward as it may appear.

    • @user-qk3ov7ng6g
      @user-qk3ov7ng6g 2 หลายเดือนก่อน

      Cryptocurrency trading appears to be quite lucrative. Despite the constantly changing nature of Bitcoin, it's evident that the cryptocurrency community is here to stay. John Joseph, you're doing an excellent job.

    • @manuelolaf772
      @manuelolaf772 2 หลายเดือนก่อน

      I apologize for interrupting, but I have been searching for assistance with this type of trading as my work consumes most of my time, leaving me with limited opportunities to focus on trading. How can I get to know him?

    • @user-qk3ov7ng6g
      @user-qk3ov7ng6g 2 หลายเดือนก่อน

      INSTAGRAM

  • @ctrlaltchris
    @ctrlaltchris 7 หลายเดือนก่อน +21

    Great video, Chuck. Looks like there’s a lot of varying opinions in the comments on the most secure way to connect but the video was terrific and your style is absolutely boss. Rock on.

  • @funfun5656
    @funfun5656 7 หลายเดือนก่อน +82

    Level 4 - Only browse the dark web from your neighbor's wifi using a burner laptop.

    • @AishikeeLaha
      @AishikeeLaha หลายเดือนก่อน +2

      😂that neighbour one got me

  • @SaintD382
    @SaintD382 5 หลายเดือนก่อน +1

    This video is super-helpful, thank you! Subscribed 👍

  • @alvintawandamatongera9982
    @alvintawandamatongera9982 25 วันที่ผ่านมา +8

    To whom it may concern: I am not here because I want to be a part of the dark web, I am here for educational purposes. Thank you

  • @zer0her048
    @zer0her048 8 หลายเดือนก่อน +113

    Given that I've had a pretty shoddy IT apprenticeship for about 2 years now, I'm kinda happy to have known all those steps from just basically teaching myself Networking.
    It is good tho to get the confirmation from a handsomely bearded man running an IT company. Thanks Chuck!

    • @antiqueworld8613
      @antiqueworld8613 6 หลายเดือนก่อน +1

      If u want any dark web content.... you can let me know..... It will sent to you..... without any risk

    • @maalikserebryakov
      @maalikserebryakov 3 หลายเดือนก่อน

      @@antiqueworld8613i smell a Pojeet

  • @CupidGaming522
    @CupidGaming522 8 หลายเดือนก่อน +8

    I've been guessing Tails for like 10 minutes waiting for level 3 when he said he was gonna blow our mind and now I'm like "huh yeah nice"

  • @BigFurr.45
    @BigFurr.45 5 หลายเดือนก่อน

    Dude, absolutely kills it in explaining tor browser 😂✊🏼

  • @kambarah
    @kambarah 4 หลายเดือนก่อน +1

    Dude....amazing content!

  • @MaidenRockCoder
    @MaidenRockCoder 7 หลายเดือนก่อน +27

    Great video. I would add that an additional Level 3 approach is:
    Docker image (tails-os) -> Traefik -> launch instance which is bound to a VPN connection -> TOR pointing at Docker network inside your container. You choose persistence or not. Drop the container, and it's all gone.

    • @tocraft573
      @tocraft573 7 หลายเดือนก่อน +2

      Without the VPN is better, also if computer was taken, your data might still be there due to soft deletion of files, also you will have a tails docker meaning people can tell you used tails, its better to boot it, however if you wish to do with method, use qubes or whonix

    • @3mathaniels
      @3mathaniels 7 หลายเดือนก่อน

      From a guy with 5 likes and a couple videos? Hmmm, vewy unimaginable hehe.

    • @tocraft573
      @tocraft573 7 หลายเดือนก่อน +6

      @@3mathaniels what

    • @mcpr5971
      @mcpr5971 7 หลายเดือนก่อน +6

      disagree, the docker image is still on your drive (even if it's read only, there's evidence you were using tails). with the USB stick you can throw it out the window if that fits your threat model.

    • @MaidenRockCoder
      @MaidenRockCoder 7 หลายเดือนก่อน +2

      I suppose if you are doing it wrong then it might.

  • @garypick
    @garypick 7 หลายเดือนก่อน +12

    I think those dark web alerts are funny because they tell you they found your email and/ passwords but don't tell you who has them, where they are on the dark web and you rarely if ever hear of anyone getting prosecuted for computer crimes.

    • @NigguhHead-pg4ne
      @NigguhHead-pg4ne 3 หลายเดือนก่อน

      the government made tor and it was their mistake because its anonymity

  • @johnpick8336
    @johnpick8336 5 หลายเดือนก่อน

    Thanks for posting!

  • @officialpacman486
    @officialpacman486 4 หลายเดือนก่อน

    I just became a fan!!🎉

  • @lindaeknoian2290
    @lindaeknoian2290 7 หลายเดือนก่อน +39

    Mr. Chuck, I am a first time viewer and I must say I love your style of introducing technical subjects in the most entertaining and easy to understand way! You are so good! I really learned a technical concept or idea in a fun way. Have you ever thought about doing some live improv? You have the talent. I am now a fan! Thanks again and look forward to your next video! Happy Cybering! 😉

    • @Matoboy254
      @Matoboy254 7 หลายเดือนก่อน +3

      Do you think your gonna get seen by him and you will be in his next video or smth cuz ur not.

    • @Matoboy254
      @Matoboy254 7 หลายเดือนก่อน +1

      No offence

  • @Vormrodo
    @Vormrodo 8 หลายเดือนก่อน +421

    Very nice that you've made a clear video about using the Tor Browser properly, Chuck! I hope it will help the endangered ones to access the internet anonymously with circumventing censorship.

    • @ReligionAndMaterialismDebunked
      @ReligionAndMaterialismDebunked 8 หลายเดือนก่อน

      :p Yes, if you go on the dark web, make sure to not use Tor right out the box. I usually use a VPN, disable JavaScript, a MAC changer, and no personal info left there.
      Most people get caught because they suck at hiding themselves, or use some very sell out VPN (NordVPN is great to use with no-logs, and they got a pretty good track record).
      Best way is to run stuff on an USB drive, like on Tail OS, that destroys all memory because it never saves it in the first place once the system is shutdown, or a SD card that you can plug into an USB drive adapter to boot from, and maybe use a desktop as service like he showed, Kasm, or something. He didn't mention Qubes OS, what Edward Snowden uses now instead of Tails OS.
      Running virtual machines are good, too. Really destroying the files would be good, but you have to worry about forensics. You could rewrite the files and then delete them, especially easy with BleachBit on Linux, but you gotta be a little hopeful.
      Plus, if the law enforcement is after you, you'd need to dispose of that USB. Assuming they don't get you while you're sleeping, or catch you off guard in general. Then, you'd need to store the USB or SD card in your private areas, and hope they don't search that, or store it somewhere where it's ridiculously difficult to find. If you have time, you could flush the device. Maybe they hear the toilet, and then investigate the sewers, but I doubt it. If so, maybe put music on before flushing, and maybe try to burn the USB or SD card before you flush it.
      He didn't mention some of this stuff in the video.

    • @ReligionAndMaterialismDebunked
      @ReligionAndMaterialismDebunked 8 หลายเดือนก่อน +16

      :3 Also, I know (he didn't mention) that you could swallow SD cards, especially the special edible ones that they send to North Korea these days instead of DVDs (since the North Korean government turns off the power so that your disc is stuck in the machine, and they can bust you for foreign material). Unless they're going to watch you s*it, if the acids don't destroy it enough, then you should be fine. Lol.

    • @sexualsmile
      @sexualsmile 8 หลายเดือนก่อน

      ​@@ReligionAndMaterialismDebunkedstfu SKITZO

    • @christopherdalton5255
      @christopherdalton5255 8 หลายเดือนก่อน

      if they use tor browser properly it will help the endangered ones to access the internet anonymously with circumventing censorship

    • @goku445
      @goku445 8 หลายเดือนก่อน +20

      By the way, the level one is good enough in most cases if you enable safest in the Browser.
      Level 2 only hides you from your ISP but VPN IPs are known so it's just as safe as connecting to the entry T0R node.
      Level 3 is good if you want to leave no physical trace of your activity at home. It also protects your own data as this is a separate system.
      Level 3 and 3/4 is just stupid. You don't want to trust anyone...

  • @kumbiraimot2890
    @kumbiraimot2890 4 หลายเดือนก่อน

    I like the way you present your stuff its fun and engaging keep tt shit up bro plus loving the beared we need a video on hw you keep it clean

  • @gregario888
    @gregario888 3 หลายเดือนก่อน

    Awesome vlog.
    A big thumbs up.

  • @trysometruth
    @trysometruth 7 หลายเดือนก่อน +6

    I can't say I'll ever do any of what you explained here, but *damn* you are good at explaining. I mean, next level.

  • @Guds777
    @Guds777 8 หลายเดือนก่อน +85

    Just by watching this video we are all on a list now...

    • @howtorape
      @howtorape 8 หลายเดือนก่อน +29

      Fbi agent if you see this I'm just curious not trying to buy guns or drugs or humans body's 😅

    • @pain00077
      @pain00077 8 หลายเดือนก่อน +6

      Haha there is no fbi in my country 😂

    • @TrueArmy7
      @TrueArmy7 8 หลายเดือนก่อน

      ​@@pain00077and what about interpol😂

    • @MartinTeerly
      @MartinTeerly 7 หลายเดือนก่อน +1

      Exactly. FBI already knocked on my door 😂

    • @gelato007
      @gelato007 7 หลายเดือนก่อน

      @@pain00077most countries has a department for cybercrime if not they rely on another agencies from different countries

  • @tonysicily2687
    @tonysicily2687 4 หลายเดือนก่อน

    Best explanation of what the ‘Dark web’ is, thank you

  • @vincenttesta5673
    @vincenttesta5673 2 หลายเดือนก่อน

    Amazing video !!

  • @anthonyat2401
    @anthonyat2401 7 หลายเดือนก่อน +2

    What an excellent presentation, lively and very clear.

  • @brengien
    @brengien 8 หลายเดือนก่อน +5

    I think he should have went into a little more detail with bridges because they are another level of security and are pretty useful. Other than that, great job, it helped me a lot. 👍

  • @gerry2345
    @gerry2345 4 หลายเดือนก่อน +1

    I like this vid. Good insight.

  • @Labdominals
    @Labdominals 12 วันที่ผ่านมา +1

    what filter did you use at 0:11? Made my entire laptop invisible

  • @cloudburstdrones
    @cloudburstdrones 8 หลายเดือนก่อน +12

    Thanks for uploading this!

  • @SeventhDeven
    @SeventhDeven 8 หลายเดือนก่อน +6

    I never thought about using a virtual PC to access Tor.
    Personally, I don't think I'll use the dark web. I'd rather have an app monitor that stuff for me.
    Also, nice web design!

  • @aaronbanks3673
    @aaronbanks3673 6 หลายเดือนก่อน

    Excellent video!

  • @appsolutehub
    @appsolutehub 6 หลายเดือนก่อน

    Amazing content with great presentation ❤️

  • @jafrex
    @jafrex 8 หลายเดือนก่อน +3

    Absolutely loved the video! The last method was pretty sneaky and did not see that coming. What about using a Virtual Machine? Is that unsafe in some way?

    • @valor36az
      @valor36az 8 หลายเดือนก่อน +2

      Don’t use a VM

    • @etano1701
      @etano1701 8 หลายเดือนก่อน

      why@@valor36az

    • @Noconstitutionfordemocrats1
      @Noconstitutionfordemocrats1 8 หลายเดือนก่อน

      ​@@valor36azWhy?

    • @CaltaTomas
      @CaltaTomas หลายเดือนก่อน

      @@valor36az IMHO running tor in vm is much safer then running tails in notebook where your personal data is on the connected disk.

  • @marcomontecino5161
    @marcomontecino5161 8 หลายเดือนก่อน +31

    Great explanation and tutorial. My experience with basic TOR has been that I can't get into many websites, like WP, NYT, and others, because they recognize that I am using TOR and not a common browser they rely on to recognize computers´s digital fingerprint. I wonder if extra levels would allow me to enter such sites and others overseas, particularly with a pay wall restriction with a limit of only one or two articles per month.

    • @bynarie
      @bynarie 7 หลายเดือนก่อน +5

      Bridges?

    • @aashd9245
      @aashd9245 7 หลายเดือนก่อน +4

      Use proxies after the exit node. That will make websites stop believing you to be using Tor. Or if it's by the fingerprint, then that is the entire purpose of every privacy feature: to use a standardized fingerprint same for everyone (except OSs like Qubes which are built for damage reduction not prevention)

    • @marcomontecino5161
      @marcomontecino5161 7 หลายเดือนก่อน

      @@aashd9245 thanks for the tips, unfortunately I've never written proxies, how do you go about it and what types of proxies do you write, is there a website that list some of them. I've never used Qubes OS, but I have the feeling it wouldn't let me run most Windows software and apps, but I could be wrong. Have you use it.?.

    • @Si74l0rd
      @Si74l0rd 7 หลายเดือนก่อน +8

      Disable JavaScript and the paywall will go away. That's probably why you're being blocked from accessing them.

    • @cheemsbread5423
      @cheemsbread5423 7 หลายเดือนก่อน +4

      They don't detect that you're using TOR from your fingerprint, it's from the exit node's IP address being logged as an exit node.

  • @skogquist
    @skogquist 6 หลายเดือนก่อน

    good job chuckie

  • @rvsqaa
    @rvsqaa 27 วันที่ผ่านมา

    Man
    I had so many patience for this video.

  • @s1rf0rt4h8
    @s1rf0rt4h8 8 หลายเดือนก่อน +13

    I prefer running tor over proxychains with a persistent script that is constantly switching onions. Thanks for the Cloud browser Chuck, awesome sandbox.

    • @XxDeathsEnemyxX
      @XxDeathsEnemyxX 8 หลายเดือนก่อน

      I use proxychains in a VM myself.

    • @chinedumichael8776
      @chinedumichael8776 8 หลายเดือนก่อน +1

      Please can you share the persistent script you talked about?
      Thanks 🙏

    • @mriganksingh6108
      @mriganksingh6108 8 หลายเดือนก่อน

      I use proxy chains too, I guess people should be taught about that too otherwise it's not that secure.

    • @etano1701
      @etano1701 8 หลายเดือนก่อน

      what's that

    • @sumduma55
      @sumduma55 8 หลายเดือนก่อน

      ​@@adamk.7177you can find legitimate and legal stuff on the dark web too. It has more to do with people not wanting to be seen or found sometimes.

  • @be-kind00
    @be-kind00 8 หลายเดือนก่อน +12

    I assume with option 3.25 you start w/ a vpn? Also doesn’t Nord have a gov requirement to store and share log with law enforcement?

  • @farooqnadeem4959
    @farooqnadeem4959 3 หลายเดือนก่อน

    Thank u this was very helpful iam going to try it next time I try tor ❤❤❤

  • @603adventures9
    @603adventures9 3 หลายเดือนก่อน +1

    Thanks bud just ordered bag perc 30😊

  • @user-mn2xl1jb7l
    @user-mn2xl1jb7l 8 หลายเดือนก่อน +3

    THANKS BRO YOU ARE THE BEST

  • @dasnohvit
    @dasnohvit 8 หลายเดือนก่อน +6

    For the really paranoid people like me, there are two things that still rings:
    1) Using Tails, what prevent the SO to access my local SSD, in case of an attack?
    2) And, how to protect my other devices in my local network?

    • @J35SE
      @J35SE 8 หลายเดือนก่อน +16

      Tails runs off the RAM once its booted. If you're worried about your hard drive, remove it before you use tails.
      If you're worried about devices on your network, use public WiFi

    • @etano1701
      @etano1701 8 หลายเดือนก่อน

      If you don’t a virus on tails usb, can it affect your host machine? And can you also explain why connecting to Wifi is the better option?@@J35SE

    • @yanickgosselin5400
      @yanickgosselin5400 7 หลายเดือนก่อน

      I think the best option is to mount a virtual machine so you can't backward connect to your hard drive, then VPN, then TOR ;)

  • @SenMid
    @SenMid 6 หลายเดือนก่อน

    i have to say this is very educational thanks

  • @FishyGorilla6060
    @FishyGorilla6060 3 หลายเดือนก่อน +1

    Great video - can you run tails on an azure environment? Would that be as good as using a usb if it sat on its own network?

  • @kaeji_namitsua
    @kaeji_namitsua 8 หลายเดือนก่อน +5

    One setup I would use above all of those is Kodachi instead of Tails and setup multiple VPNs. You need really fast internet for that because it will reduce it to 1% of the original speed. I would also run custom TOR profile

    • @michaelbeckerman7532
      @michaelbeckerman7532 4 หลายเดือนก่อน

      What is Kodachi and why do you prefer it to Tails?

  • @EnderMega
    @EnderMega 8 หลายเดือนก่อน +42

    Props to the editor!

    • @rolobotoman
      @rolobotoman 7 หลายเดือนก่อน

      I would argue he's trying to hard and the whole thing should have been 5 minutes.

    • @EnderMega
      @EnderMega 7 หลายเดือนก่อน

      @@rolobotoman I know Chuck took way to much time to explain the things, but I talking about the editor and not about chuck/the explanations it self. Expecially when you learn that what he said is wrong and you should not use tor + a vpn.

  • @JackDaniels-sf6hs
    @JackDaniels-sf6hs 6 หลายเดือนก่อน

    This video made me miss the time before social media. When it was all anonymous.

  • @xxxgamer9123
    @xxxgamer9123 4 หลายเดือนก่อน

    Oh man you are the best ❤

  • @CrittingOut
    @CrittingOut 8 หลายเดือนก่อน +14

    I don't know why you're suggesting to use Tor with a VPN when this is not suggested by the project or anyone relevant to the dark web.

    • @TardyMoments
      @TardyMoments 8 หลายเดือนก่อน +1

      Yeah I was asking myself this, it’s usually a 50/50 split of people saying it’s better and people saying it’s worse but until the Tor or Tails project say it’s the way to go, I won’t be doing it.

  • @johnb3598
    @johnb3598 6 หลายเดือนก่อน +14

    Watched video purely out of curiosity and appreciated how informative this was. Not looking to browse DW anytime soon but was cool to learn more about it. Thanks!

    • @cani6767
      @cani6767 4 หลายเดือนก่อน

      Agreed, I don't care that much to put in that much effort, that will have sketchy stuff

  • @h.8185
    @h.8185 4 หลายเดือนก่อน

    I was totally going to download Tor lol glad I watched

  • @Premium2023oct
    @Premium2023oct 4 หลายเดือนก่อน

    You guys are really smart .

  • @AtzalTheManAnimations
    @AtzalTheManAnimations 8 หลายเดือนก่อน +3

    another step could be using a virtual machine with a VPN then using the network chuck website that you mentioned at the end of the video

  • @leetymcleet6490
    @leetymcleet6490 8 หลายเดือนก่อน +8

    Don't forget, NEVER sign into any services that can be used to identify you (i.e. e-mail, social media, banking, etc.)

    • @gamingch4538
      @gamingch4538 8 หลายเดือนก่อน +4

      and NEVER use or TRUST any vpn services

  • @WebbChannel1
    @WebbChannel1 5 หลายเดือนก่อน +1

    YOU ROCK MAN!! Very Important Techie information presented in a FUN Way. You have a great personality - don't change. I liked and subscribed to your channel. Thanks for all you do!!

  • @gracescheffler2870
    @gracescheffler2870 2 วันที่ผ่านมา

    the black hoodie and funyuns with mt dew was extra specific

  • @jtrx1888
    @jtrx1888 8 หลายเดือนก่อน +662

    Dearest Chuck: Thank you for the level of professionalism you exercise in this and all of your videos. I recognize and appreciate that you spend great effort ensuring your videos are factual and informative while genuinely never advocating or encourage illegal activity. Keep up the good work!

    • @xyssxy
      @xyssxy 7 หลายเดือนก่อน +21

      Well, except hes spreading missinformation

    • @jtrx1888
      @jtrx1888 7 หลายเดือนก่อน +1

      @@xyssxy oh?

    • @dropsiarz369
      @dropsiarz369 7 หลายเดือนก่อน

      @@jtrx1888 he probably mean misinformation about using VPN

    • @paveljelinek772
      @paveljelinek772 7 หลายเดือนก่อน +1

      ​@@xyssxyproof? Davai!

    • @handleneeds3charactersormore
      @handleneeds3charactersormore 7 หลายเดือนก่อน

      Using a VPN is some fed level Bs that will only make you stand out possibly leading to government obtaining info on you as opposed to just using Tor. Research instead of licking Chuck's chuck and boots and just saying "huh?" when someone points it out

  • @TatiMare0
    @TatiMare0 7 หลายเดือนก่อน +383

    Love your content! Only point is that a vpn is really not the best way to connect to tor, the tor project actually discourages this. It's best to use the bridges offered in the connection configuration if you're concerned about your ISP keeping records of your tor usage.

    • @fftv3875
      @fftv3875 7 หลายเดือนก่อน +169

      NordVPN will absolutely comply with law enforcement requests as well and will have logs of your real IP

    • @temolantern9091
      @temolantern9091 7 หลายเดือนก่อน +37

      this comment should be higher up, if not pinned @NetworkChuck

    • @knight5799
      @knight5799 7 หลายเดือนก่อน

      proof?
      @@fftv3875

    • @liam9b9t93
      @liam9b9t93 7 หลายเดือนก่อน +40

      This isn't really true, using TOR attracts unwanted attention. The NSA leaks showed this as they log anyone who is considered "tor curios", and even going to the torproject website will be considered suspicious. A VPN is a lot less suspicious than connecting to TOR is. Also ISP's and governments will know all the IP's of tor-bridges so best bet is to use a VPN.

    • @johndurrett3573
      @johndurrett3573 7 หลายเดือนก่อน

      @@liam9b9t93 Really depends on the VPN. Have they ever been used in a court case and provided IP and traffic information which included the consumer data. Sure you may have hidden your activities from your local ISP, but that just moved the point of tracking down to the next node which is the VPN service. What country is that service based in, what are the laws in that country pertaining to police and national agencies that may request or require them to keep logs of all transactions. Gov may even be tapped into the network like they are for mobile calls - you know they actually keep equipment in every datacenter in America which is physically connected to the non encrypted traffic to sniff any and all traffic...storing data for months before even possibly using.. or just sniff for keywords not knowing who they may be listening too..only that you get on radar. As for the Cloud VM solution - same deal - your putting yourself in the hands of a third party which has all the logs and details of your activity , including your home IP. Using clear cache system in a public setting like a coffee shop or near a business that shares its wifi...and maybe consider using an application that hides your system details - internal serial numbers , make and model type etc... If your hardware profile is changing every time and your using public connection points, and your varying those up.. you stand a far better chance at remaining anonymous.

  • @bomaathuis7277
    @bomaathuis7277 3 หลายเดือนก่อน

    I think you forgot to mention the nodes owned by the governemt and ISPs. They can always see what you connect to. The person who owns the last node always knows everything. Mr Robot reference there.

  • @IsaacZepeda
    @IsaacZepeda หลายเดือนก่อน

    I had to take a sip to my coffee the moment you said "clearly, you need some coffee", because you were right

  • @meyeame8956
    @meyeame8956 7 หลายเดือนก่อน +6

    Using a VPN before entering TOR is less secure than just accessing TOR directly unless you can absolutely guarantee the safety of your VPN provider (you probably can't).

  • @andyhill5645
    @andyhill5645 7 หลายเดือนก่อน +156

    PC Tech here - I have worked as a PC service technician for over 20 years. I first decided to explore the DW back in 2010 or so. TOR was new to me as was anything network security related at the time. Even after 20 years, you taught me some things today that I will implement in my future research as well as my work. Thank you. And I look forward to checking out the Chuck browser... seems like a very cool utility that I am missing out on.

    • @IdfathAbdallah
      @IdfathAbdallah 6 หลายเดือนก่อน +29

      as someone who use his brain i'm not using this
      The method mentioned last is the least secure, primarily because the servers for these 'computers' are hosted by an unknown entity. Without knowing the host, there's a crucial concern that they could potentially access your login details and identify your location. This absence of information about the server host gives rise to substantial security issues.

    • @antiqueworld8613
      @antiqueworld8613 6 หลายเดือนก่อน

      If u want any dark web content.... you can let me know..... It will sent to you..... without any risk

    • @amazingvideos1021
      @amazingvideos1021 6 หลายเดือนก่อน

      😂

    • @allienvlog3979
      @allienvlog3979 6 หลายเดือนก่อน

      interested
      @@antiqueworld8613

    • @carlos19989
      @carlos19989 6 หลายเดือนก่อน +3

      are your parents cousins?

  • @galaxystargraph
    @galaxystargraph 3 หลายเดือนก่อน

    YOU GOT ME. Dude I got scared for a second lol. Coincidentally I was eating funyuns and wearing a black hoodie, but no mountain dew. Just water lol

  • @vamsiakhil9325
    @vamsiakhil9325 6 หลายเดือนก่อน

    Your Awesome Brother ❤

  • @rudypieplenbosch6752
    @rudypieplenbosch6752 7 หลายเดือนก่อน +3

    Very informative, thanks Chuck.

  • @fischer-felix
    @fischer-felix 8 หลายเดือนก่อน +162

    Cool video, but I have a bit of an issue with the networkchuck cloud browser.
    It would be trivially easy for the government to figure out, which datacenter you are connecting to, and who operates it. Assuming the datacenter running the kasm instance is in the US (or many other countries for that matter), they could simply subpoena them and watch your virtual computer.
    It could be cool to have the cloud browser available through an onion site, so you could essentially take two (ore more) hops, kind of as a red herring. You'd use method 3 to get to the cloud browser and then method two from there on out. Tracing back your connection would first land anyone in the cloud browser and not your actual starting point.

    • @BrickTamlandOfficial
      @BrickTamlandOfficial 8 หลายเดือนก่อน +16

      and i thought snowden was the one that leaked the gov docs proving that the *** has hardware devices inside the data center so they can see wwhatever traffic they want (but it's encrypted). This is still enough for them to see what ip is connecting to what servers.

    • @MelroyvandenBerg
      @MelroyvandenBerg 8 หลายเดือนก่อน +91

      Yea don't use his server. This is level 1. He is just promoting himself! 😮

    • @alt511
      @alt511 8 หลายเดือนก่อน

      You also need to have 100% trust in NetworkChuck. I'm not saying he is untrustworthy (heck, I watch almost all his videos), but it is not open source, and it is his own product. That doesn't meet any minimum security requirement to access anything privately and anonymously. Was liking the video a lot, until he mentioned that this is the "best way" to do that, that is just not true at all, it is basically the most unsafe way to access the dark web :/

    • @SOLDAT_MENDES
      @SOLDAT_MENDES 8 หลายเดือนก่อน +7

      That's an interesting point, Adding an onion site for the NetworkChuck Cloud Browser could provide an additional layer of anonymity and make it harder to trace the connection back to the original source. It's definitely something worth considering for enhancing privacy and security.

    • @SOLDAT_MENDES
      @SOLDAT_MENDES 8 หลายเดือนก่อน

      Yeah, Edward Snowden did reveal the existence of surveillance programs conducted by intelligence agencies, including the monitoring of internet traffic. While encryption can protect the content of the communication, metadata like IP addresses can still provide valuable information. It's a complex issue with implications for privacy and security.@@BrickTamlandOfficial

  • @bernardfigiel198
    @bernardfigiel198 5 หลายเดือนก่อน

    @NetworkChuck - quick question - how do you consider a webpage which requires from user to provide an email address even safe in the first place?

  • @user-uw8hd6zu2b
    @user-uw8hd6zu2b 6 หลายเดือนก่อน +2

    i had an question while using tail os by ur method VPN is requireed to connect ? will tor will be access without VPN? if it connect without VPN is it safe ?

  • @MikeWood
    @MikeWood 8 หลายเดือนก่อน +50

    Aside from option 3 3/4 this was a really good primer for those not too familiar. And there is a lot of good discussion in the comments.

    • @user-rr5hb9lj4m
      @user-rr5hb9lj4m 8 หลายเดือนก่อน +1

      Ive got a quesiton is the 3 3/4 option actually safe?

    • @akrobatas2316
      @akrobatas2316 8 หลายเดือนก่อน

      @@user-rr5hb9lj4m god no :D

    • @fkin8shyt
      @fkin8shyt 8 หลายเดือนก่อน

      ​@@user-rr5hb9lj4mDon't rely on that. He's just promoting himself.

    • @hardscope7744
      @hardscope7744 8 หลายเดือนก่อน +27

      Probably not I think his just promoting him self but level 3 is more safer in my opinion

    • @raindrops6342
      @raindrops6342 8 หลายเดือนก่อน

      @@user-rr5hb9lj4m Definitely not. And he should not have jokingly said that as 'secure'. Because there might be people who genuinely needs anonymity but they don't understand computers that much and they searched for this video.

  • @BirdManPhil
    @BirdManPhil 8 หลายเดือนก่อน +6

    Just use network chucks cloud browser, that you have to create an account and pay to use. That way when the fbi busts down network chucks door and seizes all his servers, they can just reference your account info

  • @jaguarreal9116
    @jaguarreal9116 2 หลายเดือนก่อน

    Netchuck, how about a VM within your home network. Or VM connected to vpn.
    Then u can install tools and stuff u dont want to loose. Clone as u go too.

  • @kcdonegan
    @kcdonegan 5 หลายเดือนก่อน

    I'm still too chicken to try and access the dark web. I just know so little about computers, internet, and internet security that I'd be one to mess things up for myself. lol. Great and informative video though.

  • @krotov1114
    @krotov1114 7 หลายเดือนก่อน +7

    So, first you need to use a vpn to whom you give them all of your info, then tor :) Chuck do you know how Tor is working? I guess not

  • @cadecapper4577
    @cadecapper4577 6 หลายเดือนก่อน +13

    Would using a VM like in your Kali Linux tutorial video achieve the same effect as level 3 in this video? Or does it make a difference when you boot from a separate drive entirely?

    • @martinmatin6275
      @martinmatin6275 4 หลายเดือนก่อน

      no, if windows has a backdoor then its useless

    • @chamezard
      @chamezard หลายเดือนก่อน

      A big No. Your traffic still pass your real OS and can be have some vulnerable or leaking metadata.

  • @BURTBROWN
    @BURTBROWN 5 หลายเดือนก่อน

    LOL!!! Your presentation is terrific... I just wish I understood more... Like what I could really find on the Dark Web that would make me go through all this stuff to find out... I DON'T THINK I'M SNOWDEN MATERIAL FOLKS!!!!! LOL!!!!

  • @scottm8579
    @scottm8579 4 หลายเดือนก่อน

    Pretty awesome thanks

  • @jnorfleet3292
    @jnorfleet3292 7 หลายเดือนก่อน +4

    Make sure to run the command macchanger to change your Mac address after booting from the usb before connecting, if using a public internet connection (Starbucks, library, etc.) So your real Mac address doesn't show up in their router logs, tracing the connection back to your computer.

  • @user-vy1uk4wc7t
    @user-vy1uk4wc7t 8 หลายเดือนก่อน +13

    We need more videos on this topic.
    1. How to find non-indexed onion sites even in onion search engines....
    2. Way to explore deep web (including : accessing to hidden ips).....
    😢😢😢😢😢

    • @ivanpatricklambert3676
      @ivanpatricklambert3676 8 หลายเดือนก่อน +3

      If you have to ask these questions, you probably shouldn't look for these sites 😅

    • @kris_wk
      @kris_wk 8 หลายเดือนก่อน +1

      For sure this. I find it much harder to surf the dark web vs clear web..
      Though if I’m honest, I haven’t really looked into it much.

    • @satanicllamaplaza
      @satanicllamaplaza 8 หลายเดือนก่อน +1

      Here’s a piece of advice for y’all. If the site is listed as a picture board. Don’t click it. Don’t care if it’s the most innocent sounding picture board name ever “heavens golden picture board” don’t click it. No picture boards for you.

    • @SOLDAT_MENDES
      @SOLDAT_MENDES 8 หลายเดือนก่อน +1

      1. Finding non-indexed onion sites in onion search engines can be challenging as they are intentionally hidden. It's best to network with trusted individuals or communities within the dark web to discover these hidden sites.
      2. Exploring the deep web requires using tools like Tor and Tails to access hidden services. However, accessing hidden IPs directly is not recommended as it can be risky and potentially illegal. It's important to prioritize privacy and security while navigating the deep web.

    • @SOLDAT_MENDES
      @SOLDAT_MENDES 8 หลายเดือนก่อน

      good advice, It's always better to err on the side of caution when it comes to clicking on unfamiliar websites, especially if they have questionable names or reputations. Stay safe and avoid those picture boards.@@satanicllamaplaza

  • @gigaset41a1
    @gigaset41a1 หลายเดือนก่อน

    You know you wanna try it 😂 great video man love the energy learned alot about onions you earned a sub right here man keep making great videos!

  • @Sadboyclique
    @Sadboyclique 5 หลายเดือนก่อน +3

    Just curious bc I find this stuff so so fascinating, so it’s not illegal to access/use the dark web as long as the stuff you’re doing isn’t like selling weapons,drugs, etc?

    • @noneofyourbusiness517
      @noneofyourbusiness517 13 วันที่ผ่านมา +1

      I am late but still: I don't know what country you are living in, but in most (fairly civilized) countries the usage of tools which sole purpose is to increase security and/or privacy is not against the law. Only sharing certain stuff or buying/selling illegal products/services etc. is illegal. But the fact that you use tails is (as I said in most countries) not against the law, and doesn't rise the punishment you get from the law/judge, no matter what you are doing. Although if you've only been doing legal stuff but get in the scope (because of whatever reason), sadly most humans think you're only doing this because of illegal activities, which could influence the trial, but that is by no means a reason to not use it. Although neither use products like he advertised at the end or a VPN simultaneously with ToR (multiple comments here explaining why).
      Tldr: chances are high that accessing the dark web is not illegal at all where you're from (that's why there are onion websites from legitimate companies).
      Source: trust me bro ;). No for real, look around, do some research and you should see my points being backed up by other (more trustworthy than a random person in the internet) sources.
      Most important: never think every single detail from one source is true, even if most of the informtion from that source is (this includes every single source out there including yt channels/videos, websites, blogs, family/friends and me) some of them lie because of profit, some of them are stupid and some of them simply don't have not enough knowledge or expertise and take assumptions. A mentality like that is exhausting and connected with ongoing mistrust, which can get depressing over time, but necessary for some cases, some of them are hunting the truth or staying as private as possible.

    • @ademarsilva5191
      @ademarsilva5191 5 วันที่ผ่านมา

      @@noneofyourbusiness517 maybe you won’t see this but this is the most complete and helpful comment I’ve ever seen in all tech TH-cam. Thanks for being so helpful