at March 13,2017
It is nice to have a 45 minutes user’s guide to “how to user TOR” and buy and see illicit goods for sale. I wish the presenters did go into the technical details behind the protocol(s) that TOR users because that is truly what makes TOR unique. I find it interesting it that at DefCon, the two presenters were presenting material that anyone from the street could have walked in and understood. Using TOR does not seem to be terribly challenging or hard to do—that was the most surprising. Anyone who can watch a YouTube video for the length of a TV show will be able to shop and purchase items from TOR.
at April 18,2017
This was good manual for the TOR and darknet. It is interesting how there are legit videos and people talking and encouraging to be anonymous. I like the idea of privacy. I really do not like enabling by gps location or putting picture in facebook profile. The idea of broadcasting my home address or publicizing my face terrifies me. Who know who wants that information. But at the same time, going to that extent to cover your footsteps, to me, is only for people who are doing shady things. It is fun to know how easy it is to do this but also scary in some way. If this really is the future I do not know how to take it.
at May 05,2017
An interesting view of a shady part of the internet. This contained way more information than I needed but shows that people in oppressed countries have a means of communication outside of a watchful eye. If I didn't understand Tor and the Darknet I do now. From an information perspective, it provides a look into the minds of people who may not be on the up and up. The explanation of bitcoin also was very interesting. I do hope that "These guys" are not right in thinking that we all should worry about a government who is checking up on us and that we need to resort to Tor for our own security.
at May 08,2017
This video was publish on December 31, 2014 and presents a “How To” guide for using TOR, Darknets, and Bitcoin. The presentation was given by two members, “Metacortex” and “Grifter”, from DC801 – a Salt Lake City, UT based DEFCON group. During the course of their discussion they covered various content items found on the Darknets such as : drugs, pornography, counterfeit material, murder for hire (hit men), money laundering, arms, hacking, cracking, carding, etc. Key to browsing anonymously and accessing the Darknets is TOR (The Onion Router) - a series of routers which anonymously forward traffic and where each router is only knowledgeable about 1 hop in either direction. TOR was initially used to give citizens of countries with repressive regimes anonymous access to content censored by those governments. However, anonymity is a double-edged sword and criminal organizations are now using it to conduct business over the Darknets. Access to TOR software can be accomplished by either downloading and installing a CLI Daemon (Linux) or the TorrBrowser. The presenters also made an unsubstantiated comment that anyone attempting to download and use TOR software is immediately places on an NSA list. Another way to work anonymously is to use the TAILS Debian Linux Live distribution. Once the TOR browser has been installed, the Darknets can be accessed via TOR hidden services – the only way to access those sites. Searches can also be accomplished a number of ways, but it appears the most common is through Grams – a Google-like search of the TOR Darknet. Where this presentation shines, though, is in the live demonstrations accessing the various sites and criminal marketplaces on the TOR Darknets. The big take-away is that it is exceedingly easy to do.
at September 09,2017
Whenever I watch a Defcon video, I have an overwhelming urge to play Trade Wars. :-)