DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption and Ciphers

DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption and Ciphers

Must go to VK.com, Livejournal, Telegram and Darkweb

UPDATE: USE Elliptic Curve Encryption. ED-25519 elliptic curve keys at https://www.wired.com/2017/01/get-even-easier-hide-dark-web/

From the Wired: The next generation of hidden services will also switch from using 1024-bit RSA encryption keys to shorter but tougher-to-crack ED-25519 elliptic curve keys.

And the (Dark/DeepWeb or Darknet) hidden service directory changes mean that (Darkweb or Tor Onion Network) hidden service urls will change, too, from 16 characters to 50. But Mathewson argues that change doesn’t effect the dark web addresses’ usability since they’re already too long to memorize.

In the Darkweb: DO NOT DEAL with the Websites and Web Hosting Services (like Freedom Hosting ll) who engaged with Child Pornography because the Hackers (like Anonymous) always targeting/hacking websites and web hosting services with child porn content as their number 1 hacking priority.

img_1657

1) The New Freedom of Speech and Privacy.
No to mass censorship and spying.

Extra Tips:

Enigma Cipher Encryption Machine Tutorial Video: Please modify

Deepweb websites
can be seen and access only in the deepweb by using a Tor like browsers only. Make
deepweb accounts, deepweb email addresses and deepweb websites in the deepweb
now. Your must have a “HTTPS” protocol prefix for
security thru SSL Certificate. NOT HTTP. Use VPN or Proxy
to cover your IP address and PGP keys as extra security for email and
login authentication. Use Bitcoins as a donation and payment method
without spying on you. The more professionally operated and maintained
deepweb (Tor .onion) websites, the more secured, resilient, more difficult to
attack, detect, track, hack and shutdown

.

2) Mariana’s Web is most secret Internet than the DarkWeb. that is
accessible only by Quantum Computers http://www.dwavesys.com/quantum-computing, Closed Shell Systems & Polymeric Falcighol Derivation.

3)The Ideal Deepweb ebsite is Torchan (http://zw3crggtadila2sg.onion/imageboard/
) for its authentication/dialog boxes before viewing and login into the website. The most
private and secured DeepWeb Website.
Also, The Website must have SSL Certification, VPN, Bitcoin Address and PGP
Key. It must be private, invite-only and PGP Key Authentication and Login

Username/Email//Password (or Paraphrase)
Protected.

*Make accounts in https://vk.com the
New Facebook and Twitter.*

A) To get access to the Deepweb or Darkweb, the Secret and Hidden Internet: Install
deepweb browsers or one of them like

1) Tor – https://www.torproject.org/

2) Tails – https://tails.boum.org/

3) I2P – https://geti2p.net/en/

B) Deepweb Search Engine and intro:
Enjoy your deepweb adventure. The victory awaits

1) The Hidden Wiki -http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page

2) The Hidden Wiki Org – http://thehiddenwiki.org/

3) TorLinks – http://torlinkbgs6aabns.onion/

4) Harry 71 Deepweb Crawler – http://skunksworkedp2cg.onion/sites_title.html

5) Hidden Answers – http://answerstedhctbek.onion/

6) http://ev3h5yxkjz4hin75.onion/wiki/index.php/Introduc..

C) Deepweb Social Media and Forum:
Better than facebook and twitter without snooping and censorship.
No phone numbers needed. Any email address

1) Galaxy 2 – http://w363zoq3ylux5rf5.onion/

2) Torbook – http://torbookntnjusnqd.onion/

3) Blackbook – http://blkbook3fxhcsn3u.onion/

4) Torchan – http://zw3crggtadila2sg.onion/imageboard/

5) 8Chan – http://oxwugzccvk3dk6tj.onion/

D) Deepweb Email and Messenging:
secured but use ciphers and encryption:

1) Tor box – http://torbox3uiot6wchz.onion/

2) Sigaint – http://sigaintevyh2rzvw.onion/

3) Mail 2 tor – http://mail2tor2zyjdctd.onion/

4) Lelantos – http://lelantoss7bcnwbv.onion//

5) Hidden rapport -http://jjx5ptpktk6lnycu.onion/login.php

6) Onion mail – http://iir4yomndw2dec7x.onion/

E) Bonus:

1) Bitcoin – https://www.bitcoin.com/

2) Cyber Ghost VPN – http://www.cyberghostvpn.com/en_us

3) PGP Key – http://www.gpg4win.org/download.html

4) SSL or HTTPS – https://www.instantssl.com

5) Use LINUX instead of Windows or MAC

6) Hushmail

7) Protonmail

8) Fake GPS

9) Locker

10) Encrypted messaging Apps like WhatsApp and Telegram

11) RSA or rsa.com for public and private keys

12) Opera Browser

Make passwords (now Paraphrase) 30 characters long mix small and big letters, numbers and symbols. Use manual/mechanical encryption devices like Enigma-Caesar cipher combination

Encrypt your communications by hand or manually BEFORE using and send to Encryption/Cipher Machines, Encryption Programs, Encryption Apps and Internet.

Uncrackable Codes and Ciphers

http://weburbanist.com/2010/05/31/cryptic-codes-11-le..
http://listverse.com/2007/10/01/top-10-uncracked-codes/

The Uncrackable Cipher Systems:

Voynich Cipher

Zodiac Killer Cipher

Beale Papers

Dorabella Cipher

D’Agapeyeff Cipher

ChaoCipher

Kryptos

Affine Cipher

Uncrackable Ancient Scripts

“To make a better uncrackable encryption and cipher Systems.”

The Manual Enigma Machine please modify it.

http://www.creativecrafthouse.com/index.php?main_page..

http://www.creativecrafthouse.com/index.php?main_page..

http://www.creativecrafthouse.com/index.php?main_page..

http://www.creativecrafthouse.com/index.php?main_page..

To modify the Manual Enigma Encryption Machines (Photo above): Please use any writing characters or writing scripts EXCEPT LATIN ALPHABETS Letters (Characters). The Writing Systems below:

https://en.wikipedia.org/wiki/List_of_writing_systems

Use rare languages for encrypted communication too

http://www.toptenz.net/top-10-rarest-languages.php

Then use a different Binary Code Systems by using Letters than Numbers or Using Numbers except Zero (0) and One (1). Do them Both. Combine with Bacon Cipher to hide the coded messages within the plain messages. Do it (encrypt) better than the Aryan Brotherhood Prison Gang in America. Use public and private keys that needs a year of preparation before use the cipher system.

Aryan Brotherhood Code (Bacon Cipher and Enigma Coded texts hidden within the Plaintexts)

The Hand written or typewriter written code book (DO NOT use of computers, gadgets or printers in making the code books) must be good enough for a year. The Number of Coding Methods like public/private keys, numbers, characters, symbols, binary codes, permutations and combinations must be HOW MANY SECONDS IN A YEAR. Then divide them (Coding Methods) into minutes, hours, days, weeks, months, quarters or semi annual of the the Year to make different Coding Patterns of your choice (NEVER use 1 coding pattern more than 1 or 2 messages to prevent code breaking). The book must only a select trusted FEW, distribute the code book excerpts to others weekly or monthly. You Need to make 10 more unique code books (good for 10 years). The best is 20 code books (20 years). Do not save in the computers with internet connection or flash drives, just Hand written or typewriter written paper only in codes, anagrams or invisible ink.

Mathematical skills like Algebra, Trigonometry, Algorithms, Geometry, Calculus and Statistics is important to make public and private keys for better encryption like RSA and PGP.

Also make a different writing paths rather than writing from horizontal left to right (Latin Writing Path), Writing from horizontal right to Left (Arabic Writing path). Other writing paths like skipping, diagonal, weaving, zigzag, vertical, spiral and etc. The number of characters per line in cipher blocks can be even or odd (17 of 20 characters per line). The patterns of cipher blocks must NOT in a square alone; means use diamond, circle, stripe, trapezoid and triangle hidden within the cipher block. Add nulls within the cipher block. Make your cipher sophisticated that the code breakers will call HOAX (means They quit) Just only to you.

DISCIPLINE, TRUST, ALERTNESS, AWARENESS AND UNIQUENESS are important for Successful Encryption.

The shape of the cipher block of zodiac killer cipher is square and odd (17 characters per line).

Encrypt your messages manually with Bacon Cipher plus enigma or other ciphers (used by Aryan Brotherhood prison Gang) before using encryption apps like Telegram, Mail, Morse Code Telegram, Text and Email. Modify by yourself all the time.

F) THE MOST
SECURED INTERNET/ONLINE USE LAYOUT:

F-1) USER ->Password -> PGP -> VPN –> HTTPS/SSL -> TOR/DARKWEB Quantum Computer, Closed Shell Systems (CSS) or Polymeric Falcighol Derivation (PFD) -> Password -> PGP -> VPN –> HTTPS/SSL -> Marianas’ Web

Buy Quantum Computers and Quantum Encryption now at http://www.dwavesys.com/quantum-computing

*******

Bonus

Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s