Safely Accessing the Dark Web

Jun 28, 2024

Safely Accessing the Dark Web

Introduction

  • Purpose: Demonstrating three ways to access the dark web, from insecure to Snowden-level secure.
  • Context: The dark web isn't inherently bad; it was created for anonymity and free expression and has legitimate uses (e.g., journalists, activists, etc.).
  • Risks: It's also a breeding ground for illegal activity, and personal data can be bought and sold here.

Tools for Security

  • Dashlane: Sponsor of the presentation; it's a tool for password management and dark web monitoring.

Method 1: Most Insecure (Tor Browser Only)

  1. Download Tor Browser: From torproject.org (like downloading Chrome or Firefox).
  2. Install and Connect: After installation, simply click 'Connect' to access the dark web.
  3. Functionality: Tor Browser allows access to regular websites and dark web websites (URLs end in .onion).
  4. Drawbacks: Not very secure; your ISP can detect your Tor usage and your first onion router can see your actual IP address.

Method 2: More Secure (Tor Browser + VPN)

  1. Connect to VPN First: Choose a reputable VPN service.
  2. Launch Tor Browser: After connecting to the VPN.
  3. Adjust Tor Settings:
    • Privacy and Security: Increase the security level to 'Safest'.
  4. Reason: This adds an extra layer of encryption before you connect to the Tor network.
  5. Added Security: Your ISP can’t see you connecting to Tor, and your IP address is hidden from the first onion router.

Method 3: Most Secure (Tails OS on USB Drive)

  1. Introduction: Tails Linux is a portable OS on a USB drive known for forgetting everything once you shut it down.
  2. Why Tails: Trusted by Edward Snowden.
  3. Setup Steps:
    • USB Stick: At least 8GB.
    • Download Tails: From tails.net.
    • Write Image: Use Bena Etcher to write the Tails image to the USB stick.
  4. Usage: Boot your computer from the USB stick.
  5. Advantages: Uses Tor by default, leaves no trace, portable and can be used on almost any computer.
  6. Further Security: Optionally, connect to VPN before connecting to Tor.

Method 3.75: NetworkChuck Cloud Browser

  1. Introduction: Cloud-based browser that operates from another computer in the world.
  2. How: Go to browser.networkchuck.com and choose Tor Browser.
  3. Usage: Can be done on a phone as well.
  4. Security: Highly secure as it operates remotely.

Final Tips and Warnings

  • Be Extra Cautious: Even on the most secure levels, be aware of where you're navigating.
  • Download Safety: Disconnect from the internet before opening any downloaded files.
  • Stay Safe: Follow these guidelines to avoid becoming a dark web horror story.