• Sign In
  • Sign Up
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
    • Cybersecurity

      How to: access the dark web on a phone

      You can access the dark web/darknet (in practice, the Tor network) from virtually any device and operating system capable of accessing the Internet. For security reasons, it is better to do this from a Linux distribution (ideally Tails or Whonix) rather than a smartphone. But if protection from law...

    • Cybersecurity

      Cybersecurity: why Tails is usually a first choice

      Tails helps you bypass censorship, protects you from surveillance (by the government or by corporations), viruses, and annoying ads. Tails is one of the strongest cybersecurity tools available today. At the same time, Tails is extremely easy to use, requires no complicated configuration, and has an...

    • Drugs

      The Breaking Bad Manifesto

      Breaking Bad is the world's first project to reveal how to produce psychoactive substances using modern synthesis methodologies adapted for clandestine environments and readily available chemical reagents.Prior to the project's launch, the global market faced numerous challenges, including: a l...

    • Cybersecurity

      One-Time Notes: Important Security Features to Know

      One-time notes, also known as disposable or self-destructing notes, are a way to leave someone a secret message without using a messenger or manual encryption. There are many such services on the internet, and we have one too: https://deepweb.net/note Why use it? One-time notes are primarily use...

    • Cybersecurity

      Internet censorship checker: OONI.org

      Want to know for sure whether the authorities in your country are blocking anything on the internet? Welcome to Open Observatory of Network Interference, "the world's largest open dataset on internet censorship". They are up and running since 2012. Wikipediahttps://OONI.org With OONI, you can find...

    • Cybersecurity

      PSA: metadata in files

      For those who aren't aware, it's usually a good idea to delete the metadata attached to files before sending them. This applies to photos of drugs on a messaging app as well as selfies on social media. For example, photos taken with a smartphone often include information such as the phone model, th...