Millwall Forum - The Darknet
Vital Football

Latest Millwall FC News

Welcome to the Millwall Fans Forum

Vital Football on FacebookVital Football on TwitterVital Football via RSS Feed
Not logged in.
( Login | register | forgotten password )
Random quote: Take a bow son! (tik-a-boo-sern) - Andy Gray
- (Added by: Willwall)
Current Poll (see more polls)
Brentford MotM
Suggested By: Site Staff
Archer8%
McLaughlin5%
Hutchinson13%
Cooper8%
Meredith1%
Wallace26%
Tunnicliffe1%
Saville1%
Ferguson2%
O'Brien5%
Gregory13%
Sub - Elliott6%
Sub - Onyedinma11%
The Vital Football Members League
Vital Members League Table
RankNamePoints
1.waterloowacker333
2.ParisWall222
3.kevrelles195
4.midway lion180
5.Kryan Bing113
6.whiskylion98
7.lionheart4884
8.FireWall79
9.bazzwall66
10.numbernine63
Vital Football Comment
Breaking League News
Jump to forum:
The Darknet
04 October 2017 08:09 Post ID: #1556151
MOjo
200050010010010010025
Before heading out of the office for all day meeting's I thought I would leave you with this.

Now, I am no way geeky, however there is a whole world out there that is truly the 'wild West', it is occupied by good and bad, the thing is given everybody's anonymity you don't know who is who.

The Darknet; TOR (The Onion Ring or Router) is a mad and slightly dangerous place where you can say, do and buy almost anything you like without being traced, complete anonymity. That means when doing business you don't know who is who, it could be 'The Man' a genuine trader or it could be plod, government agents, gangsters, killers, rivals, anyone. So an online black market for selling anything...........

The description below does get a bit geeky, it is basically explaining how your IP address gets decrypted so the website or person receiving info doesn't know where it came from. Remember everytime you use your computer or phone there is a trail that leads back to the device, when you come onto MO the website knows who you are and when log on. Useless info unless you're an advertiser. For instance travel websites know how many times you look at a certain flight, they have software that will increase the cost specifically to that IP address if you show enough interest, c**ts.

Then there is Paris, he is allegedly getting paid (to supplement is pension's plural) for writing exciting bollocks to keep the traffic 'up on MO, this generating more advertisers revenue. I'll tell you he is one slippery person, sitting there in his Northern bolt-hole drinking beer at £2.95 a pint writing Airship stories and getting paid.

TOR was partly put together by the CIA and GCHQ, it was done primarily to be dropped into China, North Korea (?), Iran to undermine those regimes. Sorry if this is going on a bit, it interests me in the same way Moods likes stats on Millwall history, and then there is 'business'.

============================================

Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Tor does not prevent an online service from determining when it is being accessed through Tor. Tor protects a user's privacy, but does not hide the fact that Tor is being used. Some websites restrict what is allowed when using Tor. For example, you can't access the BBC without them identifying an IP address.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the next node destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.
Like post
Like this post
0
Top of the page Bottom of the page
04 October 2017 08:33 Post ID: #1556152 - in reply to #1556151
Supreme MO
500020001000100100100252525
FireWall - 4/10/2017 08:09

Before heading out of the office for all day meeting's I thought I would leave you with this.

Now, I am no way geeky, however there is a whole world out there that is truly the 'wild West', it is occupied by good and bad, the thing is given everybody's anonymity you don't know who is who.

The Darknet; TOR (The Onion Ring or Router) is a mad and slightly dangerous place where you can say, do and buy almost anything you like without being traced, complete anonymity. That means when doing business you don't know who is who, it could be 'The Man' a genuine trader or it could be plod, government agents, gangsters, killers, rivals, anyone. So an online black market for selling anything...........

The description below does get a bit geeky, it is basically explaining how your IP address gets decrypted so the website or person receiving info doesn't know where it came from. Remember everytime you use your computer or phone there is a trail that leads back to the device, when you come onto MO the website knows who you are and when log on. Useless info unless you're an advertiser. For instance travel websites know how many times you look at a certain flight, they have software that will increase the cost specifically to that IP address if you show enough interest, c**ts.

Then there is Paris, he is allegedly getting paid (to supplement is pension's plural) for writing exciting bollocks to keep the traffic 'up on MO, this generating more advertisers revenue. I'll tell you he is one slippery person, sitting there in his Northern bolt-hole drinking beer at £2.95 a pint writing Airship stories and getting paid.

TOR was partly put together by the CIA and GCHQ, it was done primarily to be dropped into China, North Korea (?), Iran to undermine those regimes. Sorry if this is going on a bit, it interests me in the same way Moods likes stats on Millwall history, and then there is 'business'.

============================================

Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Tor does not prevent an online service from determining when it is being accessed through Tor. Tor protects a user's privacy, but does not hide the fact that Tor is being used. Some websites restrict what is allowed when using Tor. For example, you can't access the BBC without them identifying an IP address.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the next node destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.


"Then there is Paris, he is allegedly getting paid (to supplement is pension's plural) for writing exciting bollocks to keep the traffic 'up on MO, this generating more advertisers revenue. I'll tell you he is one slippery person, sitting there in his Northern bolt-hole drinking beer at £2.95 a pint writing Airship stories and getting paid."




Actually, the Airship is the real thing.

I'm in talks at the moment with the Richmond and Twickenham Times.

Here's a copy of the initial communication:


Dear Sir/Madam,

A group of Millwall supporters are travelling from Devon Street (Old Kent Road) to Brentford FC, by Model LTA-1000 Zeppelin, on Saturday 14th October inst.

As the organiser of the event, I wondered if R&TT were interested in a ‘Scoop’ over their West London rivals?

I have two photographs saved as jpgs, of the maiden flight over Greenwich a couple of weeks ago.

The exclusive, as far as entertainment goes, is Joe "Shaddap You Face” Dolce supplying the cabaret on the return journey!

Obviously, everyone is excited, and cannot wait for the game to come around.

If you a stuck for a couple of thousands words, I have friends who are ‘in the trade.'


Kind regards

Mr P. Wall BSc.


..... stand-by for a double-page spread.

Like post
Like this post
0
Top of the page Bottom of the page
04 October 2017 11:21 Post ID: #1556165 - in reply to #1556151
Supreme MO
5000500100100100
what the fuck you on about, could you explain a bit clearer
Like post
Like this post
0
Top of the page Bottom of the page
04 October 2017 17:24 Post ID: #1556201 - in reply to #1556151
MOaner
500050005001001002525
I don't care if someone knows who i am. If they don't like what i say they can fuck off.
Like post
Like this post
0
Top of the page Bottom of the page
04 October 2017 17:44 Post ID: #1556206 - in reply to #1556151
GeroniMO
10005001001001001002525
onion routing brings tears to your eyes,........... now beetroot streaming is a killer, so called because of a resemblance to hemoglobin.
Like post
Like this post
0
Top of the page Bottom of the page
05 October 2017 00:45 Post ID: #1556229 - in reply to #1556151
Sir MO
5001001002525
FireWall - 4/10/2017 08:09

Before heading out of the office for all day meeting's I thought I would leave you with this.

Now, I am no way geeky, however there is a whole world out there that is truly the 'wild West', it is occupied by good and bad, the thing is given everybody's anonymity you don't know who is who.

The Darknet; TOR (The Onion Ring or Router) is a mad and slightly dangerous place where you can say, do and buy almost anything you like without being traced, complete anonymity. That means when doing business you don't know who is who, it could be 'The Man' a genuine trader or it could be plod, government agents, gangsters, killers, rivals, anyone. So an online black market for selling anything...........

The description below does get a bit geeky, it is basically explaining how your IP address gets decrypted so the website or person receiving info doesn't know where it came from. Remember everytime you use your computer or phone there is a trail that leads back to the device, when you come onto MO the website knows who you are and when log on. Useless info unless you're an advertiser. For instance travel websites know how many times you look at a certain flight, they have software that will increase the cost specifically to that IP address if you show enough interest, c**ts.

Then there is Paris, he is allegedly getting paid (to supplement is pension's plural) for writing exciting bollocks to keep the traffic 'up on MO, this generating more advertisers revenue. I'll tell you he is one slippery person, sitting there in his Northern bolt-hole drinking beer at £2.95 a pint writing Airship stories and getting paid.

TOR was partly put together by the CIA and GCHQ, it was done primarily to be dropped into China, North Korea (?), Iran to undermine those regimes. Sorry if this is going on a bit, it interests me in the same way Moods likes stats on Millwall history, and then there is 'business'.

============================================

Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Tor does not prevent an online service from determining when it is being accessed through Tor. Tor protects a user's privacy, but does not hide the fact that Tor is being used. Some websites restrict what is allowed when using Tor. For example, you can't access the BBC without them identifying an IP address.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the next node destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.


Tell us some more I'm intrigued.
Like post
Like this post
0
Top of the page Bottom of the page
05 October 2017 07:29 Post ID: #1556232 - in reply to #1556151
Supreme MO
500020001001001001002525
The woman over the road has them and they could do with a good wash.
Like post
Like this post
0
Top of the page Bottom of the page
05 October 2017 07:34 Post ID: #1556233 - in reply to #1556151
gizMO
10025
Not all true. You can hid behind vpns as well. The one i use routes traffic through Panama. All to do with whether governments can request a company in that country to turn over logs.

It is very good for watching game of thrones without paying sky. Of course i do not condone or partake in that activity.
Like post
Like this post
0
Top of the page Bottom of the page
05 October 2017 09:22 Post ID: #1556243 - in reply to #1556233
MOjo
200050010010010010025
Ellis_Dee - 5/10/2017 07:34

Not all true. You can hid behind vpns as well. The one i use routes traffic through Panama. All to do with whether governments can request a company in that country to turn over logs.

It is very good for watching game of thrones without paying sky. Of course i do not condone or partake in that activity.


If you are buying half a kilo of Peruvian flake, and using your Bitcoin account you wouldn't rely vpns (Paris, visible pantie line to you) to hide you, it's absolutely traceable. You need the complete anonymity that TOR provides, plus keeping you Bit account away from the prying eyes.

The 'Dream Market' within TOR has some very reputable but invisible (as everyone is) traders that are constantly getting good rankings from customers. The whole market/trade is turning over millions (a guess) on a daily or weekly basis and remains virtual in that no agency can get to it or quantify it.
Like post
Like this post
0
Top of the page Bottom of the page
05 October 2017 14:49 Post ID: #1556281 - in reply to #1556151
MOaner
500050005001001002525
I downloaded Tor but i still can't find this dark web
Like post
Like this post
0
Top of the page Bottom of the page
05 October 2017 18:18 Post ID: #1556295 - in reply to #1556281
MOjo
200050010010010010025
Arthur2shedsJackson - 5/10/2017 14:49

I downloaded Tor but i still can't find this dark web


If you have downloaded TOR you are effectively there or invisible to one and all, it will be slightly slow as it relays around the world to decrypt your IP address.

Finding sites is the trick, Deep.Dot.Web, I can't give specific direction, this would be inappropriate.

Whatever you do though is untraceable, this would not be the case with your standard browser. Remember if you get up to no good (not that you would) you don't know who you're dealing with, it could be anyone, Russians, Armenians, Septics Bolivians, Plod anyone. Earlier this year some people bought firearms thinking they were dealing with traders, it was actually plod or some agency, they got nicked.

If you trade you will need to set up a Bitcoin account, completely legal, there are a whole load of protocols and safety measures you will to set up to keep this money safe, this isn't HSBC. And not surprisingly there are people out there trying to nick it, given there are no boundaries or cyber cops there is no way to recover it.

As I said at the beginning this is different gravy.

Like post
Like this post
0
Top of the page Bottom of the page
05 October 2017 22:46 Post ID: #1556321 - in reply to #1556295
MOaner
500050005001001002525
FireWall - 5/10/2017 18:18

Arthur2shedsJackson - 5/10/2017 14:49

I downloaded Tor but i still can't find this dark web


If you have downloaded TOR you are effectively there or invisible to one and all, it will be slightly slow as it relays around the world to decrypt your IP address.

Finding sites is the trick, Deep.Dot.Web, I can't give specific direction, this would be inappropriate.

Whatever you do though is untraceable, this would not be the case with your standard browser. Remember if you get up to no good (not that you would) you don't know who you're dealing with, it could be anyone, Russians, Armenians, Septics Bolivians, Plod anyone. Earlier this year some people bought firearms thinking they were dealing with traders, it was actually plod or some agency, they got nicked.

If you trade you will need to set up a Bitcoin account, completely legal, there are a whole load of protocols and safety measures you will to set up to keep this money safe, this isn't HSBC. And not surprisingly there are people out there trying to nick it, given there are no boundaries or cyber cops there is no way to recover it.

As I said at the beginning this is different gravy.



I can't find anyone selling grenades, machine guns, wacky baccy. I can't even find any good midget porn.
Like post
Like this post
0
Top of the page Bottom of the page
Pages (1):
1
Jump to forum: