How To Access the DARK WEB in 2024 (3 Levels)

Поделиться
HTML-код
  • Опубликовано: 1 фев 2025

Комментарии • 6 тыс.

  • @NetworkChuck
    @NetworkChuck  Год назад +689

    Is your stuff for sale on the Dark Web? Find out with Dashlane: dashlane.com/networkchuck50 (50% off) with code NETWORKCHUCK50
    🔒🌐 How to Access the Dark Web in 2023 Safely: 3 Levels of Security 🌐🔒
    Ever heard of the Dark Web and wondered how to access it? The allure of the unknown is captivating, but it can also be perilous. In this video, I guide you through 3 different methods to access the Dark Web, ranging from basic to high-security measures. We'll delve into what the Dark Web actually is, its legitimate uses, and the precautions you should take when navigating this mysterious part of the internet.
    📝 What You'll Learn:
    ✅ The Good, the Bad, and the Ugly of the Dark Web
    ✅ Why the ToR Browser alone might not be enough
    ✅ How a VPN can add an extra layer of security
    ✅ The ultimate security with Tails
    ✅ Bonus: The NetworkChuck Cloud Browser
    💡 Sponsored by Dashlane: Don't let your personal information be up for sale on the Dark Web! Use Dashlane's powerful password manager and dark web monitoring services to keep your digital life secure. Get Dashlane: dashlane.com/networkchuck50 (50% off) with code NETWORKCHUCK50
    🎥 Related Videos:
    I Put a Dark Web website on a Raspberry Pi: ruclips.net/video/bllS9tkCkaM/видео.htmlsi=jTxWSdxsow9ROokB
    👇 Resources & Links:
    ToR Browser: www.torproject.org/download/
    Dashlane: dashlane.com/networkchuck50
    Tails: tails.net/
    👀 Who Should Watch This?
    Curious about the Dark Web
    Concerned about Online Security
    Aspiring Ethical Hackers
    Network Enthusiasts
    🔔 If you found this video informative and helpful, please consider subscribing and hitting the bell to get notified of our latest content!
    🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy

    • @alexmelone
      @alexmelone Год назад +4

      Thank you!!!

    • @frontforumfocus
      @frontforumfocus Год назад +6

      hahha there is my youtube password going for 50 bucks

    • @hackeronx
      @hackeronx Год назад +2

      Everyone can be found 😉

    • @nathancoats6432
      @nathancoats6432 Год назад

      Can you make a video on how to install I2P on whonix? I had to download a portable version of tor and then make some changes to the about:config file in that portable version of tor. Worked great but just want to see how you would do it. Would make a good video.

    • @crash939burn
      @crash939burn Год назад +1

      Dont forget level 3 swap memory can be tracked, also dont forget proxychains

  • @bob123carns8
    @bob123carns8 Год назад +13892

    A safest method is just use the library’s computer with the account of the guy who didn’t sign out

    • @beezletrip6
      @beezletrip6 Год назад +1234

      Then the libraries camera tracks you down lol

    • @dannymostarac1799
      @dannymostarac1799 Год назад +102

      Lol

    • @elinars5638
      @elinars5638 Год назад +578

      Some 12 year old kid will be watching you over your shoulder

    • @SgtJoeSmith
      @SgtJoeSmith Год назад +143

      i did that in college

    • @AxeltheKing1000
      @AxeltheKing1000 Год назад +94

      Doing a little bit of trolling I see.

  • @allenclark4235
    @allenclark4235 Год назад +5473

    Somewhere, a guy in a black hoodie eating Funyuns and drinking Mt Dew will never be the same.

    • @Bojachi18
      @Bojachi18 11 месяцев назад +20

      😂

    • @sumdirtygold
      @sumdirtygold 11 месяцев назад +13

      On technique 3 3/4, VPN was implemented prior or does network chuck provide VPN security??

    • @jakes1134
      @jakes1134 11 месяцев назад

      lvl 4 = network chuck himself comes to yourself himself and physically secures your pc. he comes armed incase police show up!@@sumdirtygold

    • @georgescurobert-mihail8813
      @georgescurobert-mihail8813 11 месяцев назад +48

      Bro, my heart stopped for a moment when I heard him. Then I realised the video was prerecorded but still...

    • @cookies_nom_nom
      @cookies_nom_nom 9 месяцев назад +14

      Saw this before he said it made me laugh 😂

  • @deutscheBratwurstEnte
    @deutscheBratwurstEnte 7 месяцев назад +1179

    It's an honor to be on the watchlist with you guys

  • @abdiwalihalane1
    @abdiwalihalane1 10 месяцев назад +6728

    Dear FBI, I'm only watching this for educational reasons to avoid this danger, so please don't suspect me 🙏😁

  • @wildwestunlimited
    @wildwestunlimited Год назад +540

    I came here immediately after the video just to read the comments..... NOT disappointed!!

    • @InkaPley
      @InkaPley 7 месяцев назад +9

      You the kind of guy thar collects empty coffee cups with lipstick rings from recycled bin huh?😂❤

    • @RandyPrice-pr3lj
      @RandyPrice-pr3lj 6 месяцев назад +3

      @@InkaPley does that actually exist 🤨 and how would you know it exists 🤷🏻‍♂️ hmm 🤔

  • @laljoyreang4138
    @laljoyreang4138 17 дней назад +183

    I cannot imagine completing this project without you *Royal Recaptureorg* . You are amazing. Thank you for being there for me. Not a single effort of yours will go in vain. You will be rewarded for your pain. Your hard work will bring you a lot of gains. Well done. Your achievements speaks itself about your capabilities. Slow and steady makes it to the top! Good job!

  • @backtoeden853
    @backtoeden853 6 месяцев назад +125

    This is what the internet used to be like before the government banned everything, and now when I search for something I just get generic information, which completely defies the purpose of the internet

    • @nobody7817
      @nobody7817 3 месяца назад +9

      Ads

    • @JackBandit-h5d
      @JackBandit-h5d 28 дней назад

      Destruction of freedom of speech!!!!! Hiding information is only for lying !

  • @amitabhabhattacharya4051
    @amitabhabhattacharya4051 Год назад +695

    For someone not that computer savvy, AND a non-native speaker, I understood everything he said. Amazing clarity.

    • @jacobramirez4894
      @jacobramirez4894 11 месяцев назад +3

      Same

    • @FaithandHope4173
      @FaithandHope4173 9 месяцев назад

      Tell me about it 😅

    • @JusJello8
      @JusJello8 8 месяцев назад

      Me to!

    • @karrots14
      @karrots14 7 месяцев назад +3

      Good for you???

    • @swiftxrt
      @swiftxrt 6 месяцев назад +6

      if you understand flashing a drive with an iso and running an image from a boot prompt than you're very computer saavy

  • @jyothiradithyagadang3216
    @jyothiradithyagadang3216 Год назад +479

    I didn't feel like skipping your video in a any part of the video,it was really informative,no bullshit straight to the point,good video

  • @BharatJat-uh6yk
    @BharatJat-uh6yk 17 дней назад +200

    I'm a Maldives born and living in UK and I cannot express enough how much I despise these scumbags. Literally whenever people ask me my nationality I just tell them I'm British because idiots like these give us a horrendous reputation, not to also mention they scam other Europeans too. It warms my heart to see stuff like this, please *Royal Recaptureorg* keep up the great work destroying these scammers!!!

    • @jamesmidson9226
      @jamesmidson9226 15 дней назад +5

      Because indias reputation is well deserved. Also its pattern recognition

    • @koushiksarkar.
      @koushiksarkar. 7 дней назад

      Bro can you please help me, how can I find the uncensored videos in darkweb?

    • @koushiksarkar.
      @koushiksarkar. 7 дней назад

      Bro can you please help me, how can I find the uncensored videos in darkweb?

    • @jeremiahadesina3791
      @jeremiahadesina3791 3 дня назад

      @@koushiksarkar. *kindly reach with royal recaptureorg for more details*

    • @That_one_guy_you_know
      @That_one_guy_you_know День назад +1

      @@koushiksarkar.dawg 😭😭😭

  • @NamiberGames
    @NamiberGames Год назад +3216

    Using bridges (integrated in the tor browser settings), you can hide to your ISP that you're using tor. This would probably remove the need to trust a third party VPN.

    • @puucca
      @puucca Год назад +94

      Exactly

    • @DT-hb3zu
      @DT-hb3zu Год назад +187

      Spin up a VPN server in another country that doesn't do thorough checks on accurate information, and set your VPN up so that whoever connects, the data is never saved. You, and your crew have a secure VPN, that you manage.

    • @madcapmagician6018
      @madcapmagician6018 Год назад +171

      I have to disagree, the federal government has infiltrated tor and has cracked their encryption
      ... I have found that changing my Mac and running through VPN I have been anonymous from prying eyes. The bridges you mention are not updated or regularly maintained.

    • @GalaxyTheReal
      @GalaxyTheReal Год назад

      @@madcapmagician6018 a VPN wont help you at all if the encryption has been cracked.. And your MAC address is not visible to routers outside of your local network

    • @aszher
      @aszher Год назад

      @@madcapmagician6018 not only was the tor project made by the us goverment, but some major vpns report back suspicious activity to federal authorities

  • @ZiqKulux
    @ZiqKulux Год назад +242

    Ahmia is actually run by a research fellow in a Finnish university. I took his course about privacy and anonymity. This guy knows his stuff and overall the course was great.

  • @OmkarJena-c6v
    @OmkarJena-c6v Месяц назад +885

    Really thankful I found you and your content. I feel like you are talking to men and women in a way that humanity has missed for a very long time... I feel that so many human beings are so flawed in their understanding because of so much trauma and confusion and even instructors on the matters around relationship are for a great part not so clean even with the best of intentions, Thank you so much for your video. I was in bed crying trying to figure out a solution to a losing situation and your video just popped up and clarified everything Thank you for your guidance *Royal Recaptureorg* I've been praying for direction and you have helped me see things more clearly!

    • @TaiwoAbimbade-j2z
      @TaiwoAbimbade-j2z Месяц назад

      My account was hacked few days ago and I tried to regain access but the hacked changed my email and phone. This video wasn’t helpful. Big thankfully to their name is spelt as Royal recapture & I’m worried to looked their website name online.❤

    • @TaiwoAbimbade-j2z
      @TaiwoAbimbade-j2z Месяц назад

      Unfortunately the expert royal recapture did it succeed..

    • @TaiwoAbimbade-j2z
      @TaiwoAbimbade-j2z Месяц назад

      Hey 👋, you also trying to get yours back and unable to get it done?? (Probably because these videos isn’t working and help center sucks) … Do you really need solution to get it back ?? the certified *royal recapture* is the solution.

    • @TaiwoAbimbade-j2z
      @TaiwoAbimbade-j2z Месяц назад

      Big thanks for everything you did to make my account back..❤😊

    • @TaiwoAbimbade-j2z
      @TaiwoAbimbade-j2z Месяц назад

      I have to shoutout the software engr.. who helped me out His name 👌🏾👌🏾!!! Royal Recapture

  • @LEGENDFF14398
    @LEGENDFF14398 17 дней назад +185

    Bravo, *Royal Recaptureorg* -I'm so glad you're out there fighting these scumbags. We must do everything in our power to protect the elderly and the general public from these despicable scammers. You're a true hero, my brothe

    • @stevenjohnny-u1h
      @stevenjohnny-u1h 16 дней назад

      All the recovery videos doesn’t make me happy is only the expert make me feel better…

    • @stevenjohnny-u1h
      @stevenjohnny-u1h 16 дней назад

      I have to shoutout the software engr.. who helped me out His name 👌🏾👌🏾!!! *Royal Recapture*

    • @stevenjohnny-u1h
      @stevenjohnny-u1h 16 дней назад

      He's a highly dependable individual and a top-notch professional in the IT industry. *Royal Recaptureorg* He's the kind of person you'd love to work with-passionate, hardworking, and knowledgeable…

    • @HVACRTECH-83
      @HVACRTECH-83 11 дней назад

      Can't be done. Ever. It's way too late for that

    • @jeremiahadesina3791
      @jeremiahadesina3791 3 дня назад

      @@HVACRTECH-83 *kindly reach with royal recaptureorg for more details*

  • @ProBiz_96
    @ProBiz_96 17 дней назад +293

    That feeling when your partner cheated and you don't have the courage to leave him or her so you just dealt with the pain and live everyday asking questions about your worth. This pain is different from the cheating one-- living and seeing him everyday anticipating when will he or she do it again. Your videos are incredibly well done. No critique, thanks for doing this *Royal Recaptureorg*

    • @stevenjohnny-u1h
      @stevenjohnny-u1h 16 дней назад

      I have to shoutout the software engr.. who helped me out His name 👌🏾👌🏾!!! *Royal Recapture*

    • @stevenjohnny-u1h
      @stevenjohnny-u1h 16 дней назад

      He's a highly dependable individual and a top-notch professional in the IT industry. *Royal Recaptureorg* He's the kind of person you'd love to work with-passionate, hardworking, and knowledgeable…

    • @stevenjohnny-u1h
      @stevenjohnny-u1h 16 дней назад +1

      We are in same condition before until I search and meet them to get it done for me swiftly

    • @emmanuelmwendwa3543
      @emmanuelmwendwa3543 14 дней назад

      How do I get to read through their WhatsApp?

    • @Coffeeddicted
      @Coffeeddicted 8 дней назад

      Dead internet coming closer huh

  • @TomMyfield-tr2tg
    @TomMyfield-tr2tg Год назад +50

    As a cyber noob I was Qubes-focussed. You have shown me a simpler way to approach darknet day trips.
    Excellently delivered and produced video! Thank you 🙂🙂

    • @mwandu
      @mwandu 6 месяцев назад

      Did you actually manage

  • @JorgePuga
    @JorgePuga 5 часов назад +1

    This channel is what I would have liked to see when I was a kid. This is my new favorite RUclips channel.

  • @dublinbluetune
    @dublinbluetune Год назад +588

    Thanks. You talked me out of ever trying to access the dark web. Too much work

    • @cani6767
      @cani6767 Год назад +22

      😂😂😂

    • @noblelegacy670
      @noblelegacy670 8 месяцев назад

      Bro, this dude talks way too much I hope he sees this message. Females don’t even talk this much.

    • @zandrew8648
      @zandrew8648 8 месяцев назад +18

      bro it's easy af

    • @enasan2525
      @enasan2525 8 месяцев назад +42

      Too much work + u can do all that and STILL one slip and u get hacked or traced by gov

    • @zandrew8648
      @zandrew8648 8 месяцев назад +11

      @@enasan2525 not if you do it correctly, you're missing the point. Just get good.

  • @Abdellah000
    @Abdellah000 7 месяцев назад +559

    The method mentioned last is the least secure, primarily because the servers for these 'computers' are hosted by an unknown entity. Without knowing the host, there's a crucial concern that they could potentially access your login details and identify your location. This absence of information about the server host gives rise to substantial security issues.
    idk why my other comment disappeared but i'm posting it again

    • @grewknowledge8750
      @grewknowledge8750 6 месяцев назад +13

      WHAT THE HELL

    • @gerhardvaneeden5615
      @gerhardvaneeden5615 6 месяцев назад +46

      Exactly what I was thinking. How did he not mention that?!

    • @cykablyat811
      @cykablyat811 6 месяцев назад +11

      Not all the servers are using this hosting method , the most popular servers don't actually use this .

    • @ductape8214
      @ductape8214 6 месяцев назад

      I was thinking whonix thru a vm.

    • @swiftxrt
      @swiftxrt 6 месяцев назад

      @@gerhardvaneeden5615 bc it's a sneaky ad for his business

  • @sergio-gw3ju
    @sergio-gw3ju 11 месяцев назад +44

    It's really wonderful to come across people who freely share valuable information online. You never know what kind of knowledge you might stumble upon that could have a lasting impact on your life.

    • @eugeniozapacosta6390
      @eugeniozapacosta6390 11 месяцев назад

      wow so you also have business relations with Mr. John? Honestly, this guy is impressive. It's unfortunate that you only found out about it through the comments. He is the one who guides and inspires me.

    • @suoretaw
      @suoretaw 7 месяцев назад +8

      Can someone please explain why there are “investment” replies to a comment simply stating that it’s nice to see people providing educational videos online? The original video is about safely using Tor.

    • @UNTAMEDJAY
      @UNTAMEDJAY 3 месяца назад

      @@suoretawI’m saying 😂

    • @suoretaw
      @suoretaw 3 месяца назад

      @@UNTAMEDJAY why?

  • @sannidhisarada7384
    @sannidhisarada7384 Месяц назад +200

    My dad is in the military and I couldn't even begin to describe how upset my dad would feel if my mom was cheating on him especially since she would be his second divorce while serving(his first didn't cheat she just couldn't do the whole "moving all the time" lifestyle). I'm so sorry that happened to him and I hope he found someone better and moved on with his life(I also hope she was shamed for cheating on him by her own family) Cheating should be a crime and punish as one. It hurts so many people and end some as well. Cheaters will never understand all the harm they do. P.s thanks for the shout out Tony appreciate it an it was a surprise. Much love *Royal Recaptureorg*

    • @TaiwoAbimbade-j2z
      @TaiwoAbimbade-j2z Месяц назад

      My account was hacked few days ago and I tried to regain access but the hacked changed my email and phone. This video wasn’t helpful. Big thankfully to their name is spelt as Royal recapture & I’m worried to looked their website name online.❤

    • @TaiwoAbimbade-j2z
      @TaiwoAbimbade-j2z Месяц назад

      Unfortunately the expert royal recapture did it succeed..

    • @TaiwoAbimbade-j2z
      @TaiwoAbimbade-j2z Месяц назад

      Hey 👋, you also trying to get yours back and unable to get it done?? (Probably because these videos isn’t working and help center sucks) … Do you really need solution to get it back ?? the certified *royal recapture* is the solution.

    • @TaiwoAbimbade-j2z
      @TaiwoAbimbade-j2z Месяц назад

      Big thanks for everything you did to make my account back..❤😊

    • @TaiwoAbimbade-j2z
      @TaiwoAbimbade-j2z Месяц назад

      I have to shoutout the software engr.. who helped me out His name 👌🏾👌🏾!!! Royal Recapture

  • @sethreign8103
    @sethreign8103 Год назад +108

    Great job telling everyone about tails os at 9:00. Too many people make these videos and leave out that route 100%. You've definitely earned a like from me for that.

    • @tocraft573
      @tocraft573 Год назад

      Yeah tails os is amazing and the usage of it, however DID YOU WATCH ANYTHING ELSE IN THE VIDEO

    • @lynxeffect84
      @lynxeffect84 10 месяцев назад

      ​@@tocraft573why is it called tails , will any flash drive do or have to be specific

    • @lucihail4444
      @lucihail4444 10 месяцев назад +2

      @@tocraft573wats wrong with anything else in the vid besides the last part

    • @rayane--21pilots8
      @rayane--21pilots8 10 месяцев назад

      the last method is bizzare bro@@lucihail4444

    • @nathanyellll
      @nathanyellll 3 месяца назад

      @@lucihail4444he feels it’s probably over saturated.

  • @garypick
    @garypick Год назад +55

    I think those dark web alerts are funny because they tell you they found your email and/ passwords but don't tell you who has them, where they are on the dark web and you rarely if ever hear of anyone getting prosecuted for computer crimes.

    • @NigguhHead-pg4ne
      @NigguhHead-pg4ne 11 месяцев назад +3

      the government made tor and it was their mistake because its anonymity

    • @dinnerqueen
      @dinnerqueen 2 месяца назад

      yea, they've been blaming crimes on Dark since...well.. you know how white people are

  • @funfun5656
    @funfun5656 Год назад +674

    Level 4 - Only browse the dark web from your neighbor's wifi using a burner laptop.

    • @AishikeeLaha
      @AishikeeLaha 9 месяцев назад +16

      😂that neighbour one got me

    • @mrxecks5793
      @mrxecks5793 7 месяцев назад +35

      when the cops show up and its not your neighbor they 100% know you will be close, no one and I mean no one gets a long range antenna and gets on a hill with the method described. You'd be so much better off with a huge antenna on an alfa sitting on a hill in a parking lot or something than hacking neighbors wifi, but if you can't tell when you're being located they will get you no matter what eventually. If you can't figure out a better way to get connectivity than hack your neighbor you arent ready for computer security

    • @nullisthewolf
      @nullisthewolf 6 месяцев назад

      ​@@mrxecks5793thanks for the tip

    • @webware-yt
      @webware-yt 6 месяцев назад +4

      pretty good advice actually

    • @Okochagodspower
      @Okochagodspower 5 месяцев назад

      ​@@mrxecks5793Am your first subscriber, please can you teach me on tech, am really interested in it but no good coach

  • @Disappointed-r6f
    @Disappointed-r6f 5 месяцев назад +80

    If you connect to a vpn before connecting to tor you are simply informing the vpn operator rather than the ISP operator that you are accessing the dark web.

    • @thecamargoproject1418
      @thecamargoproject1418 5 месяцев назад +5

      except i have hosted my own vpn server on an amazon ec2 for free

    • @deathforall2045
      @deathforall2045 5 месяцев назад

      ​@@thecamargoproject1418on Amazon? For free? Il you don't pay for the service, than you're the product (unless the service is open source, then at least the deception, if there is one, is detectable)

    • @stephenstuckey
      @stephenstuckey 5 месяцев назад +3

      So what is the point of vpn? And why use it if its pointless?

    • @thecamargoproject1418
      @thecamargoproject1418 5 месяцев назад

      @@stephenstuckeythe entry node in the TOR network knows your real IP address. You wanna use a VPN to make sure that your real IP address is masked entirely

    • @Disappointed-r6f
      @Disappointed-r6f 5 месяцев назад

      ​@@stephenstuckeythe point with VPN is that you can use it if you're doing smartworking, or if you want to pretend you're from a different country to watch Disney plus. If you want to try to preserve your privacy just use graphene os or linux tails as operative systems, and tor. Commercial VPNs don't preserve anything.

  • @vipr642
    @vipr642 Год назад +475

    Do not use a VPN it is not necessary and Tor actually recommends against it. Tor is really just using a VPN three times over. If you want to obfuscate the fact that you are using Tor, Tor has these special nodes called bridges that do that.

    • @GlitchyZorua
      @GlitchyZorua Год назад +27

      Correct.

    • @jason4275
      @jason4275 Год назад +14

      I use onions over Tor

    • @GlitchyZorua
      @GlitchyZorua Год назад

      @@jason4275 ???

    • @etano1701
      @etano1701 Год назад +34

      You are still exposed to the first node

    • @vipr642
      @vipr642 Год назад

      ​@@etano1701why does that matter? It is not like he can see what you are doing. I can say you are still exposed to your VPN. Which I trust Nord VPN less with any dark web activities than a random tor node.

  • @swytchyglytch
    @swytchyglytch Год назад +135

    A disposable qube in Qubes OS would also work fairly well. Use a MAC Address auto-changer in the network or firewall qube plus a VPN and a disposable qube that you temporarily install TOR Browser on... with that, you don't even need to worry about changing the settings in TOR Browser because even if something happens and you get hacked, it's only that disposable qube that is hacked and that gets nuked when you shut down that qube, like it was never there. A disposable qube is a temporary VM that gets created when you want to do something dangerous/risky and nuked when you're done.

    • @salawuadebayo7898
      @salawuadebayo7898 3 месяца назад +4

      You don't need fully spell it out that way,
      You say
      While the black heart is activated you use it and discard

    • @gokul7701
      @gokul7701 Месяц назад

      Bro what about whonix

    • @gokul7701
      @gokul7701 Месяц назад

      And how to do this qube stuff... Can u please contact me in any social platform like telegram, WhatsApp, Skype etc.. If you can I could give you my id

  • @swimm3r137
    @swimm3r137 Год назад +84

    holy moly, i learned so much stuff today. And I thought I knew it all

    • @nobody7817
      @nobody7817 3 месяца назад +4

      I do know it all! My problem is that I can't recall any of it....

    • @swimm3r137
      @swimm3r137 3 месяца назад

      @@nobody7817

    • @dinnerqueen
      @dinnerqueen 2 месяца назад

      that's a great attitude to have. is it safe to say that you're all set for knowledge now?

  • @dasnohvit
    @dasnohvit Год назад +13

    For the really paranoid people like me, there are two things that still rings:
    1) Using Tails, what prevent the SO to access my local SSD, in case of an attack?
    2) And, how to protect my other devices in my local network?

    • @J35SE
      @J35SE Год назад +22

      Tails runs off the RAM once its booted. If you're worried about your hard drive, remove it before you use tails.
      If you're worried about devices on your network, use public WiFi

    • @etano1701
      @etano1701 Год назад

      If you don’t a virus on tails usb, can it affect your host machine? And can you also explain why connecting to Wifi is the better option?@@J35SE

    • @yanickgosselin5400
      @yanickgosselin5400 Год назад +3

      I think the best option is to mount a virtual machine so you can't backward connect to your hard drive, then VPN, then TOR ;)

    • @nobody7817
      @nobody7817 3 месяца назад +4

      Level 5 security. Stay off of everything internet, dark or light. NO cell phones, no PCs, no xBox... nothing.

  • @jeroenvdw
    @jeroenvdw Год назад +298

    I can only imagine that the FBI is behind the website you mentioned in the end and if you connect to it they will know it's you.

    • @thejoshpresle
      @thejoshpresle 8 месяцев назад +35

      Why would they care? Using TOR isn't illegal.

    • @vrsce0178
      @vrsce0178 8 месяцев назад +4

      @@thejoshpresle Exactly.

    • @DaniKhan-vx3nr
      @DaniKhan-vx3nr 7 месяцев назад

      Uffff itni khofnaak dunya bhi hay net pe?
      شیطانوں کی وہ تاریک خوفناک دنیا جس کے بارے میں سن کر آپ کا دل دہل جائے۔
      جہاں انسان کو اذیت ناک موت دے کر نفسیاتی لوگوں کو سکون ملتا ہے۔
      بچوں کے ساتھ کیا کیا جاتا ہے۔۔
      ruclips.net/video/41yd-KBD1p0/видео.htmlsi=HkUADyYWn2gwlWWZ

    • @Apple_Beshy
      @Apple_Beshy 7 месяцев назад +3

      ​@@thejoshpresle he is talking about the Chuck website

    • @thejoshpresle
      @thejoshpresle 7 месяцев назад

      @@Apple_Beshy ok, using that isn't illegal either? So why would they care?

  • @Vormrodo
    @Vormrodo Год назад +429

    Very nice that you've made a clear video about using the Tor Browser properly, Chuck! I hope it will help the endangered ones to access the internet anonymously with circumventing censorship.

    • @ReligionAndMaterialismDebunked
      @ReligionAndMaterialismDebunked Год назад

      :p Yes, if you go on the dark web, make sure to not use Tor right out the box. I usually use a VPN, disable JavaScript, a MAC changer, and no personal info left there.
      Most people get caught because they suck at hiding themselves, or use some very sell out VPN (NordVPN is great to use with no-logs, and they got a pretty good track record).
      Best way is to run stuff on an USB drive, like on Tail OS, that destroys all memory because it never saves it in the first place once the system is shutdown, or a SD card that you can plug into an USB drive adapter to boot from, and maybe use a desktop as service like he showed, Kasm, or something. He didn't mention Qubes OS, what Edward Snowden uses now instead of Tails OS.
      Running virtual machines are good, too. Really destroying the files would be good, but you have to worry about forensics. You could rewrite the files and then delete them, especially easy with BleachBit on Linux, but you gotta be a little hopeful.
      Plus, if the law enforcement is after you, you'd need to dispose of that USB. Assuming they don't get you while you're sleeping, or catch you off guard in general. Then, you'd need to store the USB or SD card in your private areas, and hope they don't search that, or store it somewhere where it's ridiculously difficult to find. If you have time, you could flush the device. Maybe they hear the toilet, and then investigate the sewers, but I doubt it. If so, maybe put music on before flushing, and maybe try to burn the USB or SD card before you flush it.
      He didn't mention some of this stuff in the video.

    • @ReligionAndMaterialismDebunked
      @ReligionAndMaterialismDebunked Год назад +17

      :3 Also, I know (he didn't mention) that you could swallow SD cards, especially the special edible ones that they send to North Korea these days instead of DVDs (since the North Korean government turns off the power so that your disc is stuck in the machine, and they can bust you for foreign material). Unless they're going to watch you s*it, if the acids don't destroy it enough, then you should be fine. Lol.

    • @sexualsmile
      @sexualsmile Год назад

      ​@@ReligionAndMaterialismDebunkedstfu SKITZO

    • @christopherdalton5255
      @christopherdalton5255 Год назад

      if they use tor browser properly it will help the endangered ones to access the internet anonymously with circumventing censorship

    • @goku445
      @goku445 Год назад +20

      By the way, the level one is good enough in most cases if you enable safest in the Browser.
      Level 2 only hides you from your ISP but VPN IPs are known so it's just as safe as connecting to the entry T0R node.
      Level 3 is good if you want to leave no physical trace of your activity at home. It also protects your own data as this is a separate system.
      Level 3 and 3/4 is just stupid. You don't want to trust anyone...

  • @LrdnBeast
    @LrdnBeast 5 месяцев назад +22

    Thanks!

    • @paballoprudence1073
      @paballoprudence1073 2 месяца назад +3

      Could you please give me $80 please I need it

    • @togetheracademy9296
      @togetheracademy9296 Месяц назад

      Hello sir asking for help ,. 40$

    • @fatcrow869
      @fatcrow869 Месяц назад

      Ok I shall donate you your required money plz wait

    • @THEOGCOMMENTER
      @THEOGCOMMENTER Месяц назад

      @@paballoprudence1073 NO BRO , IF U GET 80 I WANT 100 DOLLAR ATLEAST
      \

    • @MIH20788
      @MIH20788 Месяц назад

      give it to ur mom

  • @ScottADunn
    @ScottADunn Год назад +25

    I use a self hosted bitwarden server, have for years. Love the content that Chuck puts out.

  • @zer0her048
    @zer0her048 Год назад +120

    Given that I've had a pretty shoddy IT apprenticeship for about 2 years now, I'm kinda happy to have known all those steps from just basically teaching myself Networking.
    It is good tho to get the confirmation from a handsomely bearded man running an IT company. Thanks Chuck!

    • @antiqueworld8613
      @antiqueworld8613 Год назад +2

      If u want any dark web content.... you can let me know..... It will sent to you..... without any risk

    • @maalikserebryakov
      @maalikserebryakov 11 месяцев назад

      @@antiqueworld8613i smell a Pojeet

  • @CupidGaming522
    @CupidGaming522 Год назад +15

    I've been guessing Tails for like 10 minutes waiting for level 3 when he said he was gonna blow our mind and now I'm like "huh yeah nice"

  • @SamCCEdits
    @SamCCEdits 18 часов назад +2

    the first thing I thought when you said “into any computer” im going to put this in the school computer

  • @leetymcleet6490
    @leetymcleet6490 Год назад +82

    Don't forget, NEVER sign into any services that can be used to identify you (i.e. e-mail, social media, banking, etc.)

    • @arimimusic
      @arimimusic Год назад +17

      and NEVER use or TRUST any vpn services

    • @dwizzle815
      @dwizzle815 7 месяцев назад +13

      This includes VPNs lol

  • @MaidenRockCoder
    @MaidenRockCoder Год назад +34

    Great video. I would add that an additional Level 3 approach is:
    Docker image (tails-os) -> Traefik -> launch instance which is bound to a VPN connection -> TOR pointing at Docker network inside your container. You choose persistence or not. Drop the container, and it's all gone.

    • @tocraft573
      @tocraft573 Год назад +3

      Without the VPN is better, also if computer was taken, your data might still be there due to soft deletion of files, also you will have a tails docker meaning people can tell you used tails, its better to boot it, however if you wish to do with method, use qubes or whonix

    • @3mathaniels
      @3mathaniels Год назад

      From a guy with 5 likes and a couple videos? Hmmm, vewy unimaginable hehe.

    • @tocraft573
      @tocraft573 Год назад +6

      @@3mathaniels what

    • @HyenaEmpyema
      @HyenaEmpyema Год назад +6

      disagree, the docker image is still on your drive (even if it's read only, there's evidence you were using tails). with the USB stick you can throw it out the window if that fits your threat model.

    • @MaidenRockCoder
      @MaidenRockCoder Год назад +2

      I suppose if you are doing it wrong then it might.

  • @annieincarnated
    @annieincarnated 8 месяцев назад +790

    Dear people in the comments section. The FBI doesn't care if you use the dark Web it's not illegal. What you do on it can determine of your actions are illegal 😂😂😂

    • @yusufgo8225
      @yusufgo8225 7 месяцев назад +90

      True, btw r u a undercover agent 😂

    • @annieincarnated
      @annieincarnated 7 месяцев назад

      @@yusufgo8225 the dark web has a bad rep due to people making bad choices. There are many good things on there too. It's easier to sell the idea to people who are curious.

    • @wykydytron
      @wykydytron 7 месяцев назад

      Literally no one cares what you do unless it's terrorism or co. And both if them are scanned by bits that search for keywords. Fun fact, you can safely browse worse page you can find, unless you interact by posting etc no one cares. It's just no one has time, money and will to check on everyone so police, fbi, interpol etc will only follow on solid leads not on random visitors.

    • @dynamitelgy243
      @dynamitelgy243 7 месяцев назад +37

      do they care if your browersing through the black market or do they only care if u actually buy something of the black market

    • @annieincarnated
      @annieincarnated 7 месяцев назад

      @@dynamitelgy243 buying weapons (not licensed or registered), buying drugs, buying people, buying fake IDs, buying anything that is deemed illegal in the eyes of the laws (of your country) off the dark web is illegal. Watching cp is illegal. Accessing it is not illegal. There are a ton of legal things you can do on the dark web. The dark web has a bad rep because so many people worldwide decide to do the illegal things instead. For example if I (33 years old) buy beer I can't give that to a 10 year old. If I drink the beer with people over the legal age its legal. However if I drink alcohol then drive and hit someone and leave its illegal. The choices one makes on the dark web is what determines the legality of the behaviour/action.

  • @dpbnl8222
    @dpbnl8222 17 дней назад +244

    Awesome work, *ROYALRECAPTUREORG* ! It's so satisfying to see you putting in the effort to stop those shady characters. Protecting the public, especially the elderly, from those despicable con artists is crucial. You truly deserve recognition and appreciation for keeping us secure. I'm thrilled for you because you're my sibling. Your accomplishments definitely make you a strong contender for the Nobel Peace Prize. Keep up the outstanding performance!!!!!

  • @Guds777
    @Guds777 Год назад +165

    Just by watching this video we are all on a list now...

    • @Randomperson37193
      @Randomperson37193 Год назад +52

      Fbi agent if you see this I'm just curious not trying to buy guns or drugs or humans body's 😅

    • @pain00077
      @pain00077 Год назад +13

      Haha there is no fbi in my country 😂

    • @TrueArmy7
      @TrueArmy7 Год назад

      ​@@pain00077and what about interpol😂

    • @MartinTeerly
      @MartinTeerly Год назад +4

      Exactly. FBI already knocked on my door 😂

    • @gelato007
      @gelato007 Год назад

      @@pain00077most countries has a department for cybercrime if not they rely on another agencies from different countries

  • @shepherd7583
    @shepherd7583 Год назад +26

    Thanks for letting us save this. I couldn't save it to my cybersecurity playlist but now I can. Thanks Chuck! I love you

  • @godividarr
    @godividarr Год назад +23

    I love your channel. Thank you for what you do.
    Any way I could persuade you to do a video focusing on TOR bridges? Finding them, setting them up, etc?

  • @danik9261
    @danik9261 2 месяца назад +2

    this is actually the most fun and clear explanation I've gotten about the dark web, this guy is great 10/10.

  • @TatiMare0
    @TatiMare0 Год назад +392

    Love your content! Only point is that a vpn is really not the best way to connect to tor, the tor project actually discourages this. It's best to use the bridges offered in the connection configuration if you're concerned about your ISP keeping records of your tor usage.

    • @fftv3875
      @fftv3875 Год назад +173

      NordVPN will absolutely comply with law enforcement requests as well and will have logs of your real IP

    • @temolantern9091
      @temolantern9091 Год назад +38

      this comment should be higher up, if not pinned @NetworkChuck

    • @knight5799
      @knight5799 Год назад

      proof?
      @@fftv3875

    • @liam9b9t93
      @liam9b9t93 Год назад +42

      This isn't really true, using TOR attracts unwanted attention. The NSA leaks showed this as they log anyone who is considered "tor curios", and even going to the torproject website will be considered suspicious. A VPN is a lot less suspicious than connecting to TOR is. Also ISP's and governments will know all the IP's of tor-bridges so best bet is to use a VPN.

    • @johndurrett3573
      @johndurrett3573 Год назад

      @@liam9b9t93 Really depends on the VPN. Have they ever been used in a court case and provided IP and traffic information which included the consumer data. Sure you may have hidden your activities from your local ISP, but that just moved the point of tracking down to the next node which is the VPN service. What country is that service based in, what are the laws in that country pertaining to police and national agencies that may request or require them to keep logs of all transactions. Gov may even be tapped into the network like they are for mobile calls - you know they actually keep equipment in every datacenter in America which is physically connected to the non encrypted traffic to sniff any and all traffic...storing data for months before even possibly using.. or just sniff for keywords not knowing who they may be listening too..only that you get on radar. As for the Cloud VM solution - same deal - your putting yourself in the hands of a third party which has all the logs and details of your activity , including your home IP. Using clear cache system in a public setting like a coffee shop or near a business that shares its wifi...and maybe consider using an application that hides your system details - internal serial numbers , make and model type etc... If your hardware profile is changing every time and your using public connection points, and your varying those up.. you stand a far better chance at remaining anonymous.

  • @ctrlaltchris
    @ctrlaltchris Год назад +26

    Great video, Chuck. Looks like there’s a lot of varying opinions in the comments on the most secure way to connect but the video was terrific and your style is absolutely boss. Rock on.

  • @Eric.Harrington
    @Eric.Harrington 7 месяцев назад +31

    Thank-you, Chuck. What an awesome Podcaster you are. You have a great vibe.

  • @redditortales
    @redditortales День назад

    Best video ive seen this month please make a part 2

  • @crashthestash
    @crashthestash 10 месяцев назад +9

    Loved it until the end where you fallback on everything you've built up to sell your own service LOL

  • @Stoat-Family
    @Stoat-Family 8 месяцев назад +75

    Dear FBI, I- I have no idea I just wanted to learn about this

    • @amars4321
      @amars4321 8 месяцев назад +6

      Yeah definitely they're gonna listen to you right?......'Right'.

    • @MiguelRamos-e6w
      @MiguelRamos-e6w 2 месяца назад

      same

  • @EnderMega
    @EnderMega Год назад +45

    Props to the editor!

    • @rolobotoman
      @rolobotoman Год назад

      I would argue he's trying to hard and the whole thing should have been 5 minutes.

    • @EnderMega
      @EnderMega Год назад

      @@rolobotoman I know Chuck took way to much time to explain the things, but I talking about the editor and not about chuck/the explanations it self. Expecially when you learn that what he said is wrong and you should not use tor + a vpn.

  • @Bigonewsnetwork808
    @Bigonewsnetwork808 Месяц назад +2

    yall this dude is the only person i ever heard give that tip about unplugging before you click on something or open something . because i know that some files video files can open and connect to the wifi pictures aswell on sites and maybe even offsites by now i learn this way back in like 2003 with the quicktime and realplayer programs aswell and wmv files . bro i hate windows . thx for these tips man idk about this linux version.

  • @s1rf0rt4h8
    @s1rf0rt4h8 Год назад +16

    I prefer running tor over proxychains with a persistent script that is constantly switching onions. Thanks for the Cloud browser Chuck, awesome sandbox.

    • @XxDeathsEnemyxX
      @XxDeathsEnemyxX Год назад

      I use proxychains in a VM myself.

    • @chinedumichael8776
      @chinedumichael8776 Год назад +1

      Please can you share the persistent script you talked about?
      Thanks 🙏

    • @mriganksingh6108
      @mriganksingh6108 Год назад

      I use proxy chains too, I guess people should be taught about that too otherwise it's not that secure.

    • @etano1701
      @etano1701 Год назад

      what's that

    • @sumduma55
      @sumduma55 Год назад

      ​@@adamk.7177you can find legitimate and legal stuff on the dark web too. It has more to do with people not wanting to be seen or found sometimes.

  • @603adventures9
    @603adventures9 11 месяцев назад +18

    Thanks bud just ordered bag perc 30😊

    • @jcpw80596
      @jcpw80596 6 месяцев назад +2

      Obviously you’re just joking. I am too. Did it work?

    • @603adventures9
      @603adventures9 6 месяцев назад

      @jcpw80596 yes sir make sure use VPN

    • @Moneytalkinj
      @Moneytalkinj 5 месяцев назад +1

      Yeah did it work how u do it😅

    • @TimCastro-se7gd
      @TimCastro-se7gd 5 месяцев назад

      @@jcpw80596😂

  • @garrymcgaw4745
    @garrymcgaw4745 8 месяцев назад +22

    You never cease to amaze me Chuck. Cheers from Aussie mate.

  • @enam0001
    @enam0001 3 месяца назад +4

    I don't think I'll ever access the dark web again, once was enough, I learned my lesson early before losing myself.

    • @MiguelRamos-e6w
      @MiguelRamos-e6w 2 месяца назад

      good! DONT EVER DO THAT STTT AGN!

    • @sanskarnaik2161
      @sanskarnaik2161 Месяц назад +1

      What was the Experience ??

    • @jeoboi229
      @jeoboi229 Месяц назад +3

      What was it like ?. I’ve never been inside the DW

  • @fischer-felix
    @fischer-felix Год назад +166

    Cool video, but I have a bit of an issue with the networkchuck cloud browser.
    It would be trivially easy for the government to figure out, which datacenter you are connecting to, and who operates it. Assuming the datacenter running the kasm instance is in the US (or many other countries for that matter), they could simply subpoena them and watch your virtual computer.
    It could be cool to have the cloud browser available through an onion site, so you could essentially take two (ore more) hops, kind of as a red herring. You'd use method 3 to get to the cloud browser and then method two from there on out. Tracing back your connection would first land anyone in the cloud browser and not your actual starting point.

    • @BrickTamlandOfficial
      @BrickTamlandOfficial Год назад +17

      and i thought snowden was the one that leaked the gov docs proving that the *** has hardware devices inside the data center so they can see wwhatever traffic they want (but it's encrypted). This is still enough for them to see what ip is connecting to what servers.

    • @MelroyvandenBerg
      @MelroyvandenBerg Год назад +96

      Yea don't use his server. This is level 1. He is just promoting himself! 😮

    • @alt511
      @alt511 Год назад

      You also need to have 100% trust in NetworkChuck. I'm not saying he is untrustworthy (heck, I watch almost all his videos), but it is not open source, and it is his own product. That doesn't meet any minimum security requirement to access anything privately and anonymously. Was liking the video a lot, until he mentioned that this is the "best way" to do that, that is just not true at all, it is basically the most unsafe way to access the dark web :/

    • @Suto_Ko
      @Suto_Ko Год назад +7

      That's an interesting point, Adding an onion site for the NetworkChuck Cloud Browser could provide an additional layer of anonymity and make it harder to trace the connection back to the original source. It's definitely something worth considering for enhancing privacy and security.

    • @Suto_Ko
      @Suto_Ko Год назад

      Yeah, Edward Snowden did reveal the existence of surveillance programs conducted by intelligence agencies, including the monitoring of internet traffic. While encryption can protect the content of the communication, metadata like IP addresses can still provide valuable information. It's a complex issue with implications for privacy and security.@@BrickTamlandOfficial

  • @GlitchyZorua
    @GlitchyZorua Год назад +56

    Using a vpn over tor is a terrible idea.
    If you plan to even go over tor with a vpn, you have a bad opsec.

    • @GlitchyZorua
      @GlitchyZorua Год назад

      @gmeansg if you dont believe me, you should search "Tor FAQ" on some search engine.

    • @aryanjain_
      @aryanjain_ Год назад +8

      @gmeansgthe tor as it is slow, you wouldnt want it more slower

    • @margadrum
      @margadrum Год назад

      omg maaan move yourself less please, you raped my eyes

    • @GlitchyZorua
      @GlitchyZorua 11 месяцев назад +9

      ​@GmeansG your vpn provider can see what your doing on tor.
      the tor project even discourages it.

    • @Kafka-b7u
      @Kafka-b7u 5 месяцев назад

      How to avoid it ​@@GlitchyZorua

  • @MikeWood
    @MikeWood Год назад +53

    Aside from option 3 3/4 this was a really good primer for those not too familiar. And there is a lot of good discussion in the comments.

    • @lucaluca-s3f
      @lucaluca-s3f Год назад +1

      Ive got a quesiton is the 3 3/4 option actually safe?

    • @akrobatas2316
      @akrobatas2316 Год назад

      @@lucaluca-s3f god no :D

    • @fkin8shyt
      @fkin8shyt Год назад

      ​@@lucaluca-s3fDon't rely on that. He's just promoting himself.

    • @hardscope7744
      @hardscope7744 Год назад +29

      Probably not I think his just promoting him self but level 3 is more safer in my opinion

    • @raindrops6342
      @raindrops6342 Год назад

      @@lucaluca-s3f Definitely not. And he should not have jokingly said that as 'secure'. Because there might be people who genuinely needs anonymity but they don't understand computers that much and they searched for this video.

  • @mortenhansen3455
    @mortenhansen3455 3 месяца назад +2

    How is this NOT helping predators and murderers around the world? I just love how you can learn ANY and almost everything on RUclips. How to break up door locks, how to hot wire cars. How to get away with murder and now, how to share sick and demented stuff on the dark web! THANK you NetworkChuck! You truly make the world a much safer and better place.

    • @MrCmon113
      @MrCmon113 3 месяца назад +1

      Streets also help murderers.

    • @mortenhansen3455
      @mortenhansen3455 3 месяца назад

      @@MrCmon113 As if that is an actual excuse!?

    • @nobody7817
      @nobody7817 3 месяца назад

      ...and now we know about what else you are watching...lol

    • @mortenhansen3455
      @mortenhansen3455 3 месяца назад

      @@nobody7817 It does not say one thing about what I watch. So keep on scrolling.

    • @nobody7817
      @nobody7817 3 месяца назад

      @@mortenhansen3455 ..." I just love how you can learn ANY and almost everything on RUclips. How to break up door locks, how to hot wire cars. How to get away with murder and now, how to share sick and demented stuff on the dark web!" (All there in black and white!) LOL

  • @simbadg13
    @simbadg13 Год назад +13

    The government: NOOOO you werent supposed to use the dark web, only us!!!!

    • @alexwr
      @alexwr Год назад

      It wouldn't be very anonymous if it were only government agencies using it. Anonymity through obsscurity.

    • @simbadg13
      @simbadg13 Год назад +1

      @alexwr yeah true mainly just making fun at how the government historically made the beginnings of the dark web so they could communicate safely with themselves

  • @coreyashley4949
    @coreyashley4949 6 месяцев назад +4

    Even having gone through a CEH cert course, this video gave some really great info. Thanks a bunch.

  • @KUMBITHEGAMER
    @KUMBITHEGAMER Год назад +6

    I like the way you present your stuff its fun and engaging keep tt shit up bro plus loving the beared we need a video on hw you keep it clean

  • @seamusmjollnir9848
    @seamusmjollnir9848 3 месяца назад

    So awesome to find someone who actually explains things, thank you

  • @lindaeknoian2290
    @lindaeknoian2290 Год назад +42

    Mr. Chuck, I am a first time viewer and I must say I love your style of introducing technical subjects in the most entertaining and easy to understand way! You are so good! I really learned a technical concept or idea in a fun way. Have you ever thought about doing some live improv? You have the talent. I am now a fan! Thanks again and look forward to your next video! Happy Cybering! 😉

    • @Matoboy254
      @Matoboy254 Год назад +5

      Do you think your gonna get seen by him and you will be in his next video or smth cuz ur not.

    • @Matoboy254
      @Matoboy254 Год назад +1

      No offence

    • @MiguelRamos-e6w
      @MiguelRamos-e6w 2 месяца назад

      @@Matoboy254 AGREED....

  • @Rantofthings.
    @Rantofthings. Год назад +9

    You should make a video explaining how VPN works.

    • @SchoolforHackers
      @SchoolforHackers Год назад

      This video covers most bases: ruclips.net/video/wt_G80Q5qZA/видео.htmlsi=JjeWyKUlCzaeCQ2u

  • @krotov1114
    @krotov1114 Год назад +13

    So, first you need to use a vpn to whom you give them all of your info, then tor :) Chuck do you know how Tor is working? I guess not

  • @Conk-bepis
    @Conk-bepis Месяц назад

    This is the simplest explanation I have seen about anything …. Good job !

  • @trysometruth
    @trysometruth Год назад +9

    I can't say I'll ever do any of what you explained here, but *damn* you are good at explaining. I mean, next level.

  • @Wurdnurdninja
    @Wurdnurdninja 7 месяцев назад +5

    I have no idea what you've been talking about as my connection to onions primarily exists in my garden and they are delish sauted in butter. Thanx for the tutorial nonetheless. I am never going there. This little red riding hood would definitely get lost in the woods...still......fun to learn about.

    • @MiguelRamos-e6w
      @MiguelRamos-e6w 2 месяца назад

      WANNA BUILD A FIRE WITH ME? HEY ME 2 I LOVE BUTTER!

  • @be-kind00
    @be-kind00 Год назад +17

    I assume with option 3.25 you start w/ a vpn? Also doesn’t Nord have a gov requirement to store and share log with law enforcement?

    • @Kmn66648
      @Kmn66648 4 месяца назад

      I couldn’t even load the tor browser when my NordVPN is on through network chuck. With my personal vpn, everything slows down so much that it doesn’t even load.

  • @Lebonkt
    @Lebonkt 5 дней назад

    Just subscribed dude your videos are amazing 😅 enjoed it.

  • @brengien
    @brengien Год назад +7

    I think he should have went into a little more detail with bridges because they are another level of security and are pretty useful. Other than that, great job, it helped me a lot. 👍

  • @kurtisjackson5759
    @kurtisjackson5759 Год назад +16

    Tor Project does not recommend using tor with a vpn. Actually they recommend against it.Your entry node knowing the ip of the the machine started the get request is not a security concern due to the onion layers in the network. Now if the exit node knew this info then you would have a potential problem.

    • @fallenkeith5885
      @fallenkeith5885 Год назад +7

      There's no mention of Tails OS or other safeguards in the video either. And the cloud computing thing is just a privacy disaster. If you're doing anything questionable, you should NEVER use a machine that you have no control of. Even if a company says they won't log, unless it's proven in court and you have actual functional unquestionable proof, then there's really no point in trusting a 3rd party. Snowden would be ashamed of the man that made this video if he watched it

    • @sweetsour6783
      @sweetsour6783 Год назад

      no mention of tails OS? What? @@fallenkeith5885

    • @Ruffi0
      @Ruffi0 Год назад

      @@fallenkeith5885he sets up tails in the video what?

    • @chrisbrown6093
      @chrisbrown6093 6 месяцев назад +1

      If the entry node knows your IP, but can't see what your browsing. What's the difference between just using a VPN over Tor? Yes the VPN company may know who you are but as you stated they cannot see what your browsing over Tor. Am I seeing this wrong??

  • @johnb3598
    @johnb3598 Год назад +15

    Watched video purely out of curiosity and appreciated how informative this was. Not looking to browse DW anytime soon but was cool to learn more about it. Thanks!

    • @cani6767
      @cani6767 Год назад

      Agreed, I don't care that much to put in that much effort, that will have sketchy stuff

    • @MiguelRamos-e6w
      @MiguelRamos-e6w 2 месяца назад

      SAME HERE BRUH TOO MANY ONIONS AND CRYBABIES FOR THAT MATTER

  • @saurabh4261
    @saurabh4261 5 месяцев назад +2

    You made watching this so fun !! Instant subscribe !

  • @ivanbarnic7186
    @ivanbarnic7186 7 месяцев назад +41

    I'm already dark enough, I don't need another dark something...

  • @joelfrojmowicz
    @joelfrojmowicz Год назад +11

    Just love your videos. Keep going... BTW: Chuck, no one are burning images to USB drives anymore. Just install Ventoy to the USB stick and copy the ISO version of Tails over.

    • @myname-mz3lo
      @myname-mz3lo Год назад +1

      if you trust ventoy maybe lol...

    • @MrJony-fv3ev
      @MrJony-fv3ev Год назад +5

      no one is burning to usb? I do!

    • @joelfrojmowicz
      @joelfrojmowicz Год назад

      @@MrJony-fv3ev I did until I found out Ventoy... It's an amazing piece of software. Just try it out.

    • @kris_wk
      @kris_wk Год назад +3

      I’m still *flashing* usb drives.. I use Ventoy for testing other OSes but when it comes to Tails OS, I use a separate drive.
      In fact, I also burned a few Tails DVDs so I knew nothing else could get written to it so easily. (Recent malware issue made me a little extra paranoid)

    • @caseknives-3643
      @caseknives-3643 Год назад

      @@MrJony-fv3evsame

  • @jnorfleet3292
    @jnorfleet3292 Год назад +9

    Make sure to run the command macchanger to change your Mac address after booting from the usb before connecting, if using a public internet connection (Starbucks, library, etc.) So your real Mac address doesn't show up in their router logs, tracing the connection back to your computer.

    • @nobody7817
      @nobody7817 3 месяца назад

      Is that a virtual change, or does it write to BIOS?

    • @jnorfleet3292
      @jnorfleet3292 3 месяца назад

      @nobody7817 if you need it, permanent use ethtool. Not sure why youtube removed my original reply.

  • @user-yg8zi1bn6w
    @user-yg8zi1bn6w 10 часов назад

    So this is on the record the only reason I'm trying to get on the dark Web is to figure out what is past the ice wall in Antarctica

  • @PenAce
    @PenAce 8 месяцев назад +5

    Just dropped what I'd call a more comprehensive video. Major props to Chuck though! 🎥👊

  • @johnhanna5068
    @johnhanna5068 Год назад +8

    Ah, yes this is perfect, now no one will be able to track my embarrassing laughable math questions

    • @frankd9945
      @frankd9945 Год назад +2

      Dark web? What you think chat gpt's going to make fun of you?

  • @AjithKumara-v7n
    @AjithKumara-v7n Год назад +17

    We need more videos on this topic.
    1. How to find non-indexed onion sites even in onion search engines....
    2. Way to explore deep web (including : accessing to hidden ips).....
    😢😢😢😢😢

    • @Itreallydoesnotmatter-p9o
      @Itreallydoesnotmatter-p9o Год назад +4

      If you have to ask these questions, you probably shouldn't look for these sites 😅

    • @kris_wk
      @kris_wk Год назад +1

      For sure this. I find it much harder to surf the dark web vs clear web..
      Though if I’m honest, I haven’t really looked into it much.

    • @satanicllamaplaza
      @satanicllamaplaza Год назад +3

      Here’s a piece of advice for y’all. If the site is listed as a picture board. Don’t click it. Don’t care if it’s the most innocent sounding picture board name ever “heavens golden picture board” don’t click it. No picture boards for you.

    • @Suto_Ko
      @Suto_Ko Год назад +1

      1. Finding non-indexed onion sites in onion search engines can be challenging as they are intentionally hidden. It's best to network with trusted individuals or communities within the dark web to discover these hidden sites.
      2. Exploring the deep web requires using tools like Tor and Tails to access hidden services. However, accessing hidden IPs directly is not recommended as it can be risky and potentially illegal. It's important to prioritize privacy and security while navigating the deep web.

    • @Suto_Ko
      @Suto_Ko Год назад

      good advice, It's always better to err on the side of caution when it comes to clicking on unfamiliar websites, especially if they have questionable names or reputations. Stay safe and avoid those picture boards.@@satanicllamaplaza

  • @aldelaniz5726
    @aldelaniz5726 5 месяцев назад +6

    I sincerely thought I’ll see a dark guy with horns, wearing a hoody and a spooky black sickle when I browse the dark web.

    • @MiguelRamos-e6w
      @MiguelRamos-e6w 2 месяца назад

      thats how i like to think about it too! ur awsome bro!

  • @cloudburstdrones
    @cloudburstdrones Год назад +12

    Thanks for uploading this!

  • @SeventhDeven
    @SeventhDeven Год назад +6

    I never thought about using a virtual PC to access Tor.
    Personally, I don't think I'll use the dark web. I'd rather have an app monitor that stuff for me.
    Also, nice web design!

    • @HOBOTw1tcH
      @HOBOTw1tcH 5 месяцев назад

      Those apps don’t monitor anything lol. They only alert you after the fact when things hit your credit reports. They’re scams 😂😂😂

  • @Manuel-1337
    @Manuel-1337 Год назад +23

    13:08 this is for your employees who are interested on bypassing your Tor block lol

  • @andreynevdakh7404
    @andreynevdakh7404 5 месяцев назад

    I love this guy, your great at what u do! 🙂👍🏽

  • @BirdManPhil
    @BirdManPhil Год назад +8

    Just use network chucks cloud browser, that you have to create an account and pay to use. That way when the fbi busts down network chucks door and seizes all his servers, they can just reference your account info

  • @Bijay.Kumar.Behera
    @Bijay.Kumar.Behera 11 месяцев назад +21

    Nowadays you are identified on a cellular network by your IMEI number which is linked to your cellular device, and by your MAC address linked to your networking device like a laptop or PC, when caught the investigator proves your involvement just by showing your ownership of that IMEI number or the MAC address which they acquire from the manufacturer and retailer, stealing is a very good business but one should make sure not to get caught, for that use a previously owned device or use an external network adapter and use a public internet or public WiFi. Using TOR or VPN comes thereafter, coz a device once targeted by an investigating agency uses ones MAC and IMEI to backtrack them on the web.

    • @mmahaomatete303
      @mmahaomatete303 9 месяцев назад

      7

    • @mohammadzubairmashwani1228
      @mohammadzubairmashwani1228 5 месяцев назад +2

      That's the point I was looking for in comment section and you have mentioned it. ❤

    • @Mustafawazhere
      @Mustafawazhere 5 месяцев назад +1

      Bro u talk out of experience

    • @norin3303
      @norin3303 5 месяцев назад +1

      Oh yeah. You can be identified by the MAC of your device. That’s why you should use a laptop only for that kind of activity and for nothing else. Always use a public free wifi hot spot with an appropriate speediness of connection. Use a public wifi hot spot no more than once. Maybe you can be identified by the MAC of your device but it won’t be proven by the exact activity you’ve done thanks to the using of TAILS.

    • @Mianna.
      @Mianna. 4 месяца назад

      So wait, using a vpn will not help?

  • @meyeame8956
    @meyeame8956 Год назад +19

    Using a VPN before entering TOR is less secure than just accessing TOR directly unless you can absolutely guarantee the safety of your VPN provider (you probably can't).

    • @stephenstuckey
      @stephenstuckey 5 месяцев назад

      Why? So what is the point of a VPN? Why use it?

    • @meyeame8956
      @meyeame8956 5 месяцев назад +2

      ​@@stephenstuckey Quoted from TOR project official FAQ:
      "If the VPN/SSH server is adversary controlled you weaken the protection provided by Tor. If the server is trustworthy you can increase the anonymity and/or privacy (depending on set up) provided by Tor."
      So basically you must 100% trust the VPN provider entity. They go into deeper detail on their FAQ. Essentially the gist of it is with TOR direct you're trusting the protocol and network itself, with a VPN you're trusting a business entity hosting provider.

    • @MrCmon113
      @MrCmon113 3 месяца назад

      I read the article and I don't understand what's the downside of using a VPN. Your ISP will CERTAINLY disclose everything they now about you, a VPN provider can't really be any worse.
      I also don't understand the downside of the money trail of using the VPN provider. Everyone knows you're using the VPN, but they don't necessarily know that you're using TOR through the VPN. VPNs are also a lot less suspicious than connecting to TOR.
      That said, personally I never use VPNs, but I'm also lazy af.

  • @Jessie60151
    @Jessie60151 4 месяца назад

    You're the best at explaining stuff. I think I might make my join my first subscription, as I'm at this. Thanks for having our back and keeping us noobs safe!!!!!

  • @Tum_Tum_
    @Tum_Tum_ Год назад +41

    As a criminal this is my first step to go digital...
    Thank u chuck❤

    • @rh4009
      @rh4009 Год назад +18

      As an aspiring criminal, I found this entertaining, but incredibly fishy, especially the part about "connect to the DW through this special website I made". LOL

    • @miguelpereira9859
      @miguelpereira9859 Год назад

      @@rh4009 Best of luck in your future criminal endeavours! 👍

    • @irrelevantdata
      @irrelevantdata Год назад +1

      are you sure you want to be telling the public you commit crimes?

    • @rh4009
      @rh4009 Год назад +5

      @@irrelevantdata /woosh

    • @MariChan-e7s
      @MariChan-e7s 4 месяца назад

      ​@@irrelevantdataChill is no cops online

  • @fuwanep
    @fuwanep Год назад +34

    Though if we use the Network Chuck Browser, wouldn't the employees or developers of the app have access to the user's data? Or are the user data encrypted? Isn't the USB flash drive thing that has a memory of a goldfish much safer since it dies after you plug it off?

    • @bountoj
      @bountoj Год назад +23

      I was thinking the same. Sounds like a self plug for his service.

    • @vnc.t
      @vnc.t Год назад

      pretty sure networkchuck browser also has amnesia and keeps no logs.

    • @agyemanboaten4385
      @agyemanboaten4385 Год назад +1

      How do we know if Network Chuck is not a CIA person trapping us? Honey trap. I don't think so but you know what I mean?

    • @Suto_Ko
      @Suto_Ko Год назад +1

      well, the specific details about the encryption and data access policies of the Network Chuck Browser aren't available to me. It's always important to review the privacy and security features provided by the service you're using. Using a USB flash drive can indeed provide an additional layer of security since the data remains physically with you. However, it's still crucial to take appropriate precautions to protect your data.

    • @DaneOfAllTrades
      @DaneOfAllTrades Год назад

      @@vnc.t "pretty sure", until hit by a court order. Tor browser-as-a-service is an absolutely terrible idea.

  • @stevenoels2757
    @stevenoels2757 Год назад +10

    To note, the setting you change in your level 3 from "standard" to "safest" says it disables JavaScript, however this is not the case, if you check the setting in "about:config" you will find JS is still enabled and needs to be manually switched to setting false.

  • @John-lc9vl
    @John-lc9vl 7 дней назад +1

    I never understood why anyone would want or need anything dark, like bad web?🤔

    • @Total-Wombat
      @Total-Wombat 6 дней назад

      "The dark web" is used by the innocent to protect their privacy, anonymity, security, freedom, or even to simplify self hosting, especially home servers. It isn't just bad things. There's plenty of wholesome services one could use or create, from social media and news to religion and blogs to software forges and file sharing.
      And I would suggest ignoring this tutorial, it's FUD. I provide a better tutorial for casuals in my description, along with other info.

  • @YewlloPS
    @YewlloPS 8 месяцев назад +11

    TO access it, first, secure or private VPN > TOR > PROXY > BRIDGES = Untraceable

    • @nobody7817
      @nobody7817 3 месяца назад +1

      FAMOUS last words...

    • @Eli-higgins
      @Eli-higgins 2 месяца назад

      VPN > TOR > PROXY > BRIDGES = Untraceable

  • @NorthhtroN
    @NorthhtroN Год назад +36

    Love your videos but have an issue with your level 3 suggestion here. If you dont use a VPN before you connect through tails (levels 3) isn't that just as insecure as level 1? It is still going to expose your public ip to the first node and ISP is still going to see you are connecting to Tor? The only benefit you gain is if your tails instance gets infected it will reset on next boot (maybe becomes 1.5 with thay benefit). I think by listings that as "optional" on your level 3 you are misleading people on the privacy aspect that was the main issue you raised withlevel 1

    • @Ghazer
      @Ghazer Год назад

      The first node can see your ip but it cant know where you are going so its not a problem.

    • @NorthhtroN
      @NorthhtroN Год назад +6

      @@Ghazer may be missing my point so I will try and explain better, the main concern that was raises with levels 1 is that without the VPN your public IP is exposed to the first node which will reduce your privacy and Open you up to being identified by people's looking for your (let's go with the scenario used in the videos of Edward Snowden and The government looking for him) if he connects with level 1 government can find him due to some of the info leak that is associated with your public IP to the first node. That same concern exists with level 3 if you do not use a VPN. Additionally, if you don't trust the first node is a white hat, you are giving your public IP to someone who may not have your privacy in mind and Could Target your IP to attack. That IP is not the IP of your tails compute that is the public IP for your entire network and if not secured properly they could compromise your network

    • @deathmonkey3000
      @deathmonkey3000 Год назад +14

      If you are using a paid vpn (linked to your credit card / personal info) then when you connect to the vpn before launching tor in tails you have already fingerprinted your system by associating it with the vpn. If the gov pulls your info from the vpn, they still can id your traffic. Ultimately, you have to consider the level of security and who you are trying to protect yourself from... hacker on the dw? Sandboxed tor with vpn probably good enough. Hostile government agencies? Probably not going to cut it.

    • @NorthhtroN
      @NorthhtroN Год назад +1

      @@deathmonkey3000 completely agree

    • @aashd9245
      @aashd9245 Год назад +2

      Tails (and tor) are completely vulnerable to co-relation analysis. I2P via Tails is slower but even more secure (though that could lead to several other attack vectors)

  • @threestars2164
    @threestars2164 3 месяца назад +1

    Finally gonna get those research books I need!