A big shoutout to TCM Security for sponsoring this video. Register now to receive a 10% discount on all TCM Security Certifications, potentially making your most significant step toward a career in ethical hacking. Go here: davidbombal.wiki/3vQsqWm // Stephen's Sims’ Social // X: x.com/Steph3nSims RUclips: www.youtube.com/@OffByOneSecurity // Stephen's Book (Co-Author) // Gray Hat Hacking Series by various authors: US amzn.to/3B1FeIK UK amzn.to/3A920AL // Heath Adams’ RUclips Channel // ruclips.net/user/thecybermentor // RUclips video REFERENCE // Free Exploit development training (beginner and advanced) ruclips.net/video/LWmy3t84AIo/видео.html Buffer Overflow Hacking Tutorial (Bypass Passwords): ruclips.net/video/c2BvS2VqDWg/видео.html Reverse Engineering 101 tutorial with the amazing Stephen Sims!: ruclips.net/video/5FXrCHLAJZM/видео.html Hacking Roadmap to Success: ruclips.net/video/wb72sJBA5_c/видео.html Real World Windows Pentest Tutorial: ruclips.net/video/BsS7VITiUXo/видео.html // David's SOCIAL // Discord: discord.com/invite/usKSyzb X: www.x.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RUclips: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Intro 00:58 - Disclaimer 02:23 - TCM Security sponsored segment 04:40 - The Dark Web 05:44 - How to stay safe on the Dark Web // Using TOR 10:45 - Whonix vs Tails 11:10 - Working with law enforcement 13:47 - Having experience with the Dark Web 15:34 - The "Incognito Market" story 20:52 - What to do before going into the Dark Web 22:14 - Setting up a VPN 25:38 - Whonix and Tails 30:03 - Whonix virtual box 31:29 - How to find things on the Dark Web // The Dark Net Market Buyer's Bible 38:48 - Understanding cryptography 41:08 - The Dark Net Market Buyer's Bible continued 42:33 - The Dark Net Reddit 48:34 - Dark Net link directory 50:59 - Getting through Captcha in the Dark Web 54:40 - Monero wallet explained 57:40 - Things for sale on the Dark Web markets 01:07:13 - Breached data for sale on Telegram and Twitter 01:12:14 - Seeing unwanted things on the Dark Web 01:13:14 - Real-time Bitcoin transactions 01:14:51 - Cryptocurrency is not anonymous 01:15:54 - Trustworthy sources on the Dark Web 01:19:01 - Conclusion dark web deep web dark net darknet tor tails whonix onion vpn opsec onion websites malware malware analysis cybersecurity cybersecurity jobs hacking ethical hacking how to access the dark web deep web tor browser how to access the deep web safely how to access dark web how to access the deep web access dark web dark web tutorial dark web browsing how to access the dark web with tor the onion router dark web browser access the dark web deep web browsing how to get on the dark web silk road what is the onion router what is tor dark web movie anonymous cube how to browse the internet anonymously how to browse the web anonymously how to be anonymous on the internet invisible online hide identity privacy how to be anonymous browse the internet anonymously browse the web anonymously online privacy online privacy tips hide online hidden identity Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! #darkweb #hacking #tor
David is a wildly talented tech interviewer, to say "I'm a little slow let me ask this clarifying question" is a beautiful way of slowing down the lesson to fully addressed the material for object permanence sake. Bravo my man this is why I'm a dedicated fan 🙌
David, I watch and read a lot regarding all items related to cybersec, but it is always refreshing knowing there’s always more to learn. You provide that within your videos, which says a great deal about your shorts and videos. Keep up the amazing content my dear friend! 🙏🏼
If you are law enforcement, and you want to create criminals that otherwise may not exist, building a honeypot is definitely easier than looking for people already committing crimes.
“The Onion routing protocol is not as anonymous as you think it is. Whoever controls the exit nodes is the one who controls the traffic, which makes me… the one in control." mr robot
That's why you ALWAYS use a VPN (and from what I've gathered from this video) preferably your own because companies cannot be trusted they will sell out to the highest bidder 100% of the time. I love Express BPN but they are not my trusted friends. Using a Firewall system is also advisable and an all around smart move even being on the general web, much less the Deep and Dark web which are obviously more dangerous. It's mostly about being diligent, using common sense, (maybe not so common these days) and most importantly if you don't have malevolent intentions on the dark web then most likely you'll never have to worry about being hacked or traced much less arrested. People who are malevolent by nature deserve the same coming back their way ×3
This is one of the few mistakes (I think) in the show. As you cannot select which exit nodes you want to control when targeting someone. Nodes are selected based on uptime and stability. If you could I'd imagine this would be a major security oversight.
@@official.sirhaxalotIt's not targeting exit nodes to track the victim who's using the node, it's running a whole bunch of exit nodes, and entrance nodes. I'm not sure of the specifics but they access the target over tor and can tell when the request goes through both of the controlled nodes. So when that happens they know the destination the exit node is supplied with is the target IP. It's like a "100 servers + 12 months and a whole heap of luck" sort of situation. You're right that it doesn't make sense though, he found it because he was curious about the bandwidth- he was already IN the network, no tor nodes were accessed during the process unless he was trying to track the user's too
Thank you for continuing to bring interesting guests on your channel. These type of specialists or experts in their fields are very engaging to learn from. Ive also learned quite a bit from you. Appreciate your good work in the space. Please keep it going.
This is actually a good explainer for what the dark web even is for a layman. Would love to see a deep dive into some of the local area kinda suburb spanning networks that exist sometimes, via various protocols, custom hardware or not (lowra etc). I remember seeing one that was partially on a UHF channel once a very long time ago.
A lot of this can give a writer a realism to the work they do. Obviously peppering or writing stories around this. We don't have a term for "gritty" that really applies to the Dark Web/Darknet. It's a blurry road between too much tech and too little and through there is a sharp line that you need to walk, as a writer of fiction.
Wow this is great info to find out so much is out there from the DarkWeb. Its really scary how the internet has come to since I started exploring the Internet from 1995 to now has changed dramatically. So much to learn.
supporting law enforcement at a moment the law still plays the game of the "war" on the supposed "drug's" that were ones in drugstores is the problem of our day's
Una excelente explicación con referencia al Dark Web y los protocolos a seguir y los riesgos que con llevan... Muy agradecido por toda la información brindada a Ustedes.
Just a heads up a lot of agencies are now monitoring a lot of torque traffic and browsing as well as other countries around the world. I was strongly recommend supposed to do their best and due diligence and providing the upmost security providing that is not even on their own equipment will probably be your best bet I do know that The traffic is being monitored by different agencies, law-enforcement agencies that are working on joint task force so if you’re planning to use this information on this site
One more excellent video!! A perfect idea for the next one indeed it would be the public encryption. One suggestion that I have comes from the book "Nine algorithms that changed the future" which proposes an example with colours for understanding how someone can exchange a secret in public.
Its pretty sad how privacy (a basic human right) is frowned upon… Look at all the hoops people have to jump through just to not be spied on everywhere you go online. Why isn't privacy the standard and if people wanted to allow Google and the government to be able to watch what they do they can?
Sir please make a video for a beginner of ethical hacking ,how to begin ,tools ,what need to be studied first please briefly explain from step 1 the beginning ,also on phone not lap or pc please
@@AnonymousQwertyyeah tor is like 3 anonymous decentralized vpns anws. If an additional VPN tied to your credit card was used, user will get de-anonymized😱 can’t believe this guy is supposed to be an expert
In the neuralink future of "neurological slavery" (quote from ai robot "Sophia") knowing how to "jail-break" devices will be necessary just to simply exist in your own head without rf hegemony. Mark my words.
Few reasons, you have to configure it correctly (TOR over VPN), and you are only as good as your weakest link. A bad VPN provider may log traffic and give law enforcement such data at request. You need to have an absolutely trusted VPN provider with no logs and annual audits. Tor over VPN means you connect to the VPN FIRST, then to Tor. You also must have KILL SWITCHES. Because if connection drops while using Tor over VPN, you could potentially leak your IP. Kill switches block network connection until a VPN tunnel is connected. Keep in mind the more hops you add, you will increase connection latency. But if configured correctly, it would indeed improve overall privacy and hide the very fact you use Tor from your ISP
@davidbombal thank you for putting these amazing training videos. I’ve got the vpn installed and running but my tor browser times out whenever the vpn is connected and when I disconnect it, I can search and do anything with tor. So how did he connect to the vpn and still access tor?
🤔 What's the purpose of a NFT? If I'm not mistaken, you can implant files inside these things perhaps an eye needs to be upon these based on certain profiles? But idk, I'm just thinking here.
Dear Mr. David, I hope this message finds you well. I am a recent graduate with a degree in Computer Science and am eager to start learning the fundamentals of networking. However, I am unsure of the best starting point. Would you recommend that your networking course on Udemy be a suitable place to begin? Here is the link to the course for reference: Complete Networking Fundamentals Course. Kind regards, Ihtisham Ul Haq , Pakistan
So I download whonix to be relatively good to go and preconfigured, and the FIRST thing I have to do is disabling javascript in the tor browser? lol? I always heard whonix is the way to go..but such a basic feauture not enabled by default?
Hello sir. I have a laptop which has win11...but i want to dual boot it. And i have no space... But i was thinking of using my 64gb sd card as my computer harddrive and dual boot linux on it... But there is a problem I don't know how to do it.. so can you please make a video about it. It will help me a lot. Thank you. Please reply
Ooh I have the SAMSUNG EVO Plus 128GB Micro SDXC w/SD Adaptor, Up-to 160MB/s, Expanded Storage for Gaming Devices, Android Tablets and Smart Phones, Memory Card, MB-MC128SA/IN
If you have all these Dark Net market places, why has Ross William Ulbricht(creator of Silk Road) been jailed for life while some of these creators are still free to continue selling these bad goods/products. Surely all these Dark Net market places can be traced since the Tor Network is not as safe as people think!
Did you not listen to him? It's not that simple to just track the servers to the marketplaces and shut them down. Usually they are taken down due to bad opsec. And they do throw the book at the admins if they catch them
A big shoutout to TCM Security for sponsoring this video. Register now to receive a 10% discount on all TCM Security Certifications, potentially making your most significant step toward a career in ethical hacking. Go here: davidbombal.wiki/3vQsqWm
// Stephen's Sims’ Social //
X: x.com/Steph3nSims
RUclips: www.youtube.com/@OffByOneSecurity
// Stephen's Book (Co-Author) //
Gray Hat Hacking Series by various authors:
US amzn.to/3B1FeIK
UK amzn.to/3A920AL
// Heath Adams’ RUclips Channel //
ruclips.net/user/thecybermentor
// RUclips video REFERENCE //
Free Exploit development training (beginner and advanced) ruclips.net/video/LWmy3t84AIo/видео.html
Buffer Overflow Hacking Tutorial (Bypass Passwords): ruclips.net/video/c2BvS2VqDWg/видео.html
Reverse Engineering 101 tutorial with the amazing Stephen Sims!: ruclips.net/video/5FXrCHLAJZM/видео.html
Hacking Roadmap to Success: ruclips.net/video/wb72sJBA5_c/видео.html
Real World Windows Pentest Tutorial: ruclips.net/video/BsS7VITiUXo/видео.html
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X: www.x.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
RUclips: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Intro
00:58 - Disclaimer
02:23 - TCM Security sponsored segment
04:40 - The Dark Web
05:44 - How to stay safe on the Dark Web // Using TOR
10:45 - Whonix vs Tails
11:10 - Working with law enforcement
13:47 - Having experience with the Dark Web
15:34 - The "Incognito Market" story
20:52 - What to do before going into the Dark Web
22:14 - Setting up a VPN
25:38 - Whonix and Tails
30:03 - Whonix virtual box
31:29 - How to find things on the Dark Web // The Dark Net Market Buyer's Bible
38:48 - Understanding cryptography
41:08 - The Dark Net Market Buyer's Bible continued
42:33 - The Dark Net Reddit
48:34 - Dark Net link directory
50:59 - Getting through Captcha in the Dark Web
54:40 - Monero wallet explained
57:40 - Things for sale on the Dark Web markets
01:07:13 - Breached data for sale on Telegram and Twitter
01:12:14 - Seeing unwanted things on the Dark Web
01:13:14 - Real-time Bitcoin transactions
01:14:51 - Cryptocurrency is not anonymous
01:15:54 - Trustworthy sources on the Dark Web
01:19:01 - Conclusion
dark web
deep web
dark net
darknet
tor
tails
whonix
onion
vpn
opsec
onion websites
malware
malware analysis
cybersecurity
cybersecurity jobs
hacking
ethical hacking
how to access the dark web
deep web
tor browser
how to access the deep web safely
how to access dark web
how to access the deep web
access dark web
dark web tutorial
dark web browsing
how to access the dark web with tor
the onion router
dark web browser
access the dark web
deep web browsing
how to get on the dark web
silk road
what is the onion router
what is tor
dark web movie
anonymous
cube
how to browse the internet anonymously
how to browse the web anonymously
how to be anonymous on the internet
invisible online
hide identity
privacy
how to be anonymous
browse the internet anonymously
browse the web anonymously
online privacy
online privacy tips
hide online
hidden identity
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#darkweb #hacking #tor
Hi Mr David Bombal Can You Tell me How to Minning Cpu in Pc Please 📶
It is just wild that this stuff actually exists.
Definitely not! Your exit node exposes you and the NSA monitors thousands of nodes, just like they do with the clear net.
I need that cryptography video😅
Big up man
David is a wildly talented tech interviewer, to say "I'm a little slow let me ask this clarifying question" is a beautiful way of slowing down the lesson to fully addressed the material for object permanence sake. Bravo my man this is why I'm a dedicated fan 🙌
David, I watch and read a lot regarding all items related to cybersec, but it is always refreshing knowing there’s always more to learn. You provide that within your videos, which says a great deal about your shorts and videos. Keep up the amazing content my dear friend! 🙏🏼
Thank you very much!
If you are law enforcement, and you want to create criminals that otherwise may not exist, building a honeypot is definitely easier than looking for people already committing crimes.
Yup, just like tcap.
You became one of my favorite IT channels on here, always exciting content for a newbie like me ❤
“The Onion routing protocol is not as anonymous as you think it is. Whoever controls the exit nodes is the one who controls the traffic, which makes me… the one in control." mr robot
Mr. Robot
That's why you ALWAYS use a VPN (and from what I've gathered from this video) preferably your own because companies cannot be trusted they will sell out to the highest bidder 100% of the time.
I love Express BPN but they are not my trusted friends. Using a Firewall system is also advisable and an all around smart move even being on the general web, much less the Deep and Dark web which are obviously more dangerous. It's mostly about being diligent, using common sense, (maybe not so common these days) and most importantly if you don't have malevolent intentions on the dark web then most likely you'll never have to worry about being hacked or traced much less arrested. People who are malevolent by nature deserve the same coming back their way ×3
This is one of the few mistakes (I think) in the show. As you cannot select which exit nodes you want to control when targeting someone. Nodes are selected based on uptime and stability. If you could I'd imagine this would be a major security oversight.
@@official.sirhaxalotIt's not targeting exit nodes to track the victim who's using the node, it's running a whole bunch of exit nodes, and entrance nodes. I'm not sure of the specifics but they access the target over tor and can tell when the request goes through both of the controlled nodes. So when that happens they know the destination the exit node is supplied with is the target IP. It's like a "100 servers + 12 months and a whole heap of luck" sort of situation.
You're right that it doesn't make sense though, he found it because he was curious about the bandwidth- he was already IN the network, no tor nodes were accessed during the process unless he was trying to track the user's too
@@official.sirhaxalotinteresting take , do you think they wrote that on the script just to make mr robot more interesting and like “he knows his shit”
Thank you for continuing to bring interesting guests on your channel. These type of specialists or experts in their fields are very engaging to learn from. Ive also learned quite a bit from you. Appreciate your good work in the space. Please keep it going.
Best recommendation, or lack of, for a VPN ever. Loved it. Instant respect.
This is actually a good explainer for what the dark web even is for a layman. Would love to see a deep dive into some of the local area kinda suburb spanning networks that exist sometimes, via various protocols, custom hardware or not (lowra etc). I remember seeing one that was partially on a UHF channel once a very long time ago.
Thank you David …this right here is a gem in the broad space of cybersecurity
A lot of this can give a writer a realism to the work they do. Obviously peppering or writing stories around this.
We don't have a term for "gritty" that really applies to the Dark Web/Darknet.
It's a blurry road between too much tech and too little and through there is a sharp line that you need to walk, as a writer of fiction.
David :- Secrets of Dark Web
Dark web:- We will Come to you 😅
😂
movie clip from The Limey comes to mind 'Tell Him, Tell him I'm coming, you tell him I'm fooking coming'
Ah, sweet!
Edit: For educational purposes, this is awesome!
Glad you think so!
I have newly started my cyber security journey and love such helpful videos, thanks sir! subscribed!
David, you're very consistent in your videos. 🎉
You are the best David
Thank you!
Wow this is great info to find out so much is out there from the DarkWeb. Its really scary how the internet has come to since I started exploring the Internet from 1995 to now has changed dramatically. So much to learn.
This was an amazing episode
I’m very appreciative you for that video David )
You're welcome!
Give a like who has watched till end ❤
Thanks David sir & Steven sir for great info.
I'm half way through but gosh the dark web is awful and somewhere I don't want to be! Fascinating video though.
Most linux systems come with the option to encrypt hard drive.
Love your videos. TCM are great too !
Good stuff David I do learn alot from your videos. Didnt know about the VPN that hops from location to location so thats a plus. Keep it up 👍🏻
Thank you once again for an educational video .😊
An ordinary estuary of his knowledge
Please do another with this guy! Asymmetrical cryptography.
DNM Bible doesnt recommend VPN while using Tor
supporting law enforcement at a moment the law still plays the game of the "war" on the supposed "drug's" that were ones in drugstores is the problem of our day's
Una excelente explicación con referencia al Dark Web y los protocolos a seguir y los riesgos que con llevan... Muy agradecido por toda la información brindada a Ustedes.
Awesome video, please call Stephen again for a new video about cryptography, i am sure it will be awesome and helpful too.
Nice video. Thank you for sharing, sir.
Thank you! I'm taking a digital forensics class and this was very helpful.
'bout to get buck wild up in the dark web!
Very nice once ! Thanks!.
Any links for the DNM bible ?
Great video interesting guy! Would like to see more collav
Just a heads up a lot of agencies are now monitoring a lot of torque traffic and browsing as well as other countries around the world. I was strongly recommend supposed to do their best and due diligence and providing the upmost security providing that is not even on their own equipment will probably be your best bet I do know that The traffic is being monitored by different agencies, law-enforcement agencies that are working on joint task force so if you’re planning to use this information on this site
THey run the TOR exit nodes.
One more excellent video!! A perfect idea for the next one indeed it would be the public encryption. One suggestion that I have comes from the book "Nine algorithms that changed the future" which proposes an example with colours for understanding how someone can exchange a secret in public.
very instructive thx David
helpful stuff, thank you.
Its pretty sad how privacy (a basic human right) is frowned upon…
Look at all the hoops people have to jump through just to not be spied on everywhere you go online.
Why isn't privacy the standard and if people wanted to allow Google and the government to be able to watch what they do they can?
Bad people are the reason why privacy is now folk lore
Sir please make a video for a beginner of ethical hacking ,how to begin ,tools ,what need to be studied first please briefly explain from step 1 the beginning ,also on phone not lap or pc please
What a great video.
Never use a VPN with TOR. That’s like TOR 101.
TOR itself says that using a VPN compromises security
@@AnonymousQwertyyeah tor is like 3 anonymous decentralized vpns anws. If an additional VPN tied to your credit card was used, user will get de-anonymized😱
can’t believe this guy is supposed to be an expert
@@daddybruce8084 he maybe talking about mullvad vpn which u can use monero
@@AnonymousQwertyyall just trolling the bots huh
What i don't understand @@zyyr
In the neuralink future of "neurological slavery" (quote from ai robot "Sophia") knowing how to "jail-break" devices will be necessary just to simply exist in your own head without rf hegemony.
Mark my words.
Hi David AI is changing every day. How does that affect our ability to use and defend from the dark net?
So, then why does the Tor Project recommend not using a vpn in most circumstances?
Few reasons, you have to configure it correctly (TOR over VPN), and you are only as good as your weakest link. A bad VPN provider may log traffic and give law enforcement such data at request. You need to have an absolutely trusted VPN provider with no logs and annual audits. Tor over VPN means you connect to the VPN FIRST, then to Tor. You also must have KILL SWITCHES. Because if connection drops while using Tor over VPN, you could potentially leak your IP. Kill switches block network connection until a VPN tunnel is connected. Keep in mind the more hops you add, you will increase connection latency. But if configured correctly, it would indeed improve overall privacy and hide the very fact you use Tor from your ISP
@davidbombal thank you for putting these amazing training videos.
I’ve got the vpn installed and running but my tor browser times out whenever the vpn is connected and when I disconnect it, I can search and do anything with tor.
So how did he connect to the vpn and still access tor?
Lots of bots in the comments
Yeah😂
Yeah many people have forgotten that they have become the bot initially then they have came up😅
Thanks, I guess.
Veracrypt is not considered safe anymore, why? Did he mean true crypt?
No True is deprecated, the updated version is veracrypt. It's considerably safe
True crypts algorithm was released by the three letter agencies. They changed to vera crypt
David can you please make video on pager what is it and how it is works?
Video quality is not good. Text is not visible. I am not talking about password stuff but other text other than confidential things.
I’m confused as to how to keep yourself safe on the internet. Some are saying just to use tor. Some are saying VPN and TOR
No VPN. Anything decent isn't free and thus tied to your financials
Is it best practice to use a VPN with Tor? Or should Tor do all the work?
I’ve got a quick question, where do u install the vpn, is it on ur main host or on a workstation on ur virtuabox?
Main
🤖🤖🤖🤖Thanks! I've watched this video 5 times now and I love it! 🤖🤖🤖🤖
Jk thanks for the content Dave
Bad Joke. Video is 2 hours live and you watched it 5 times (7h)? Mathing never mathed. 2/10
That was entertaining
Of course we now know that Telegram will give your stuff to LEO upon subpoena.
Game Over.
Love from Pakistan and big respect for you sir.
how is it going
what is the voice at 46:50 ??
Curious about what would be a good substitute for veracrypt...?
Thanks for another great video. This is a mandatory requirement for anyone doing anything .onion related. Think it's a game!!
🤔 What's the purpose of a NFT?
If I'm not mistaken, you can implant files inside these things perhaps an eye needs to be upon these based on certain profiles?
But idk, I'm just thinking here.
Is there a trusted virtual box for Android and iPhones you would recommend?
Really nice educational content, but way to much pub interruption
What is more safer: multyproxy with tor or miltyhoping with a vpn ?
Dear Mr. David,
I hope this message finds you well. I am a recent graduate with a degree in Computer Science and am eager to start learning the fundamentals of networking. However, I am unsure of the best starting point. Would you recommend that your networking course on Udemy be a suitable place to begin? Here is the link to the course for reference: Complete Networking Fundamentals Course.
Kind regards,
Ihtisham Ul Haq , Pakistan
Wasent non good enabling vpn while using tor and tails?
What do you think about parrotOS in comparison to tails and whonix?
Please make a video on how to send file from Android phone to Kali linux OS laptop like we send in windows through datacable please
you had me on this one David... subscribing now..
why there are no docker containers for Tails or Whonix ?
love you videos from uganda
Thank you!
Bro really expose the dark web on youtube ... Love from India ❤❤
thank you @david I love to see more from Steph
29:30
What about veracrypt is not safe? What information is there?
What about Parrot OS immutable USB drive boot?
Best way to access dark web using tail os in virtual machine
Love from Pakistan, sir , huge respect for u and your hardwork for making such videos ❤
Thank you! And you're welcome!
Where are the bots?
You're here.
So I download whonix to be relatively good to go and preconfigured, and the FIRST thing I have to do is disabling javascript in the tor browser?
lol?
I always heard whonix is the way to go..but such a basic feauture not enabled by default?
Lots of comments in the bots 👀
if he did record this screen will be clean image too bad
I feel stupid but if I may ask is this guy not Sam Altman if not so why do they look a like?
damn it, the cupon has expired yesterday :,(
I think this video shoot on 11sep but release on 22sep
More info on RSA
david how do i post hacking videos my every video got removed removed and i got 2 strikes
Don't use RUclips.
Wow sir ❤❤. Impressive thumbnail.
Thank you so much 😀
So what your saying is....stay away from the dark net. Too risky and stupid people should not try. Insightful, thank you.
Why so many bots
Bots are always a problem these days unfortunately ☹️
Did I miss it? Where can I read this bible?
Hello sir. I have a laptop which has win11...but i want to dual boot it. And i have no space... But i was thinking of using my 64gb sd card as my computer harddrive and dual boot linux on it... But there is a problem I don't know how to do it.. so can you please make a video about it. It will help me a lot.
Thank you.
Please reply
Ooh I have the SAMSUNG EVO Plus 128GB Micro SDXC w/SD Adaptor, Up-to 160MB/s, Expanded Storage for Gaming Devices, Android Tablets and Smart Phones, Memory Card, MB-MC128SA/IN
baffled
Proxychain
An anti ddos tool? So wicked ...
Hey please make vedio on tp link ac 1300 installation than its already made please give me link
Why not access it via a burner laptop...
What is a burner laptop?
Love from Pakistan i appreciate u bloom:)
If you have all these Dark Net market places, why has Ross William Ulbricht(creator of Silk Road) been jailed for life while some of these creators are still free to continue selling these bad goods/products. Surely all these Dark Net market places can be traced since the Tor Network is not as safe as people think!
Did you not listen to him? It's not that simple to just track the servers to the marketplaces and shut them down. Usually they are taken down due to bad opsec. And they do throw the book at the admins if they catch them
cause they are in russia noob
@@BenjTavenergood