Over the years there has been a gradual shift from the dogmatic acceptance of political and moral views that have put hidden chains on the feet of citizens of this generation. Political and moral views have plagued the world for several years, limiting what people can do and how people can behave in society. People are stigmatized all over the world for doing what most will call “political defiance” or just simply following their hearts and passion. This is where Intellectual Dark Web comes into play.
In the time of oppression, tyranny and
general oppression to those who will not simply subject to established morals
and political views of the society, a change has come. There is a new shift, a
new kid in the block that has the capacity to combat the revered bully (this
political injustice) and help create a society where individuals can live free.
There is a movement that has been expanding
for many years now, although new to many people it is growing very fast in fame
and popularity. There is a name for this movement— it is called “The Intellectual
The Intellectual Dark Web was devised by
the renowned Financier and mathematician—Eric Weinstein. He put a name on this
group, not to expose them (they are not obscured) but to know this group of
What is the Intellectual Dark Web?
This bears no similarities with the actual
Dark Web that incorporates concealed internet networks or users and has no
requirement for sophisticated software.
This group is not hidden; This is a heterogeneous group of intellectuals
from students to professors and professionals in different fields. The Intellectual
Dark Web consist of individuals who have a different mindset from the one that
the political society has instilled in a lot of us.
This group of individuals; Biologists, neuroscientist,
Sports commentators, comedians, journalists, entrepreneurs, and physiologist
share a common belief. They believe that “political correctness” stifles their
ideas and so they see the already established political views that limit
individuals and rid them of their personal choices as their enemy.
The ideas of the Intellectual Dark Web
What is the Intellectual Dark Web and what precisely are the thoughts that have made individuals like Eric Weinstein, Dave Rubin, Tim Ferriss, Jordan Peterson, Joe Rogan, Sam Harris and Ben Shapiro
Into what an ongoing New York Times profile
portrayed as scholarly “rebels” (intellectual renegades)? As
indicated by the Times author Bari Weiss, most underscore the natural contrasts
among people, an inclination that free discourse is “under attack,”
and a dread that identity politics can bring peril to the US.
Intellectual Dark Web: What People Think
An audience of Harris’ digital broadcast
may add to the rundown a vociferous barrier of the legitimacy of hereditary
clarifications for IQ contrasts between racial clusters, a supporter of
Peterson’s recordings may demand the loathsome impact of “postmodern
neo-Marxism” on school grounds, and an aficionado of Ben Shapiro may add
an incredulity toward the truth of “transgenderism.”
The Intellectual Dark Web considers itself
to be a partnership that resists grounded political classifications so as to
protect these thoughts against the crawling impact of thought control. This
directs us to another vital definition of the term Intellectual Dark Web, the
proposal that its thoughts are dubious, as well as especially inventive in our
political minute. On the off chance that the Intellectual Dark Web excites the
annoyance of specific pundits in the media, it is for similar reasons that new
advances in the web age are “troublesome.”
It would take a certain level of
forgetfulness, in any case, not to see that these type of polemics over
political rightness are definitely not new: they have existed for something
like 30 years, as far back as a strikingly comparative arrangement of media
discusses based on school grounds started in the late 1980s and mid-1990s.
At the finish of the Reagan years,
political rightness turned into a most loved terror of traditionalist learned
people, who trusted that school teachers had locked onto illiberal or
authoritarian ideas of equality, and were teaching their understudies with an
incendiary perspective of American culture. The present “Intellectual Dark
Web” provocateurs once in a while name these ancestors, who in the
relatively recent past possessed a comparative place in national media
discusses. In any case, the examination recommends that the
“renegade” thoughts of these figures are really a settled
organization in American talk: an establishment whose house is on the political
Intellectual Dark Web as of today
What is the Intellectual Dark Web and what
is evidently so novel about the “Intellectual Dark Web”? It isn’t
only its astute utilization of video channels like YouTube or Patreon, however
its case to be diverse and trans-partisan. It has turned out to be run of the
mill for the individuals from this club when they show up openly — on the web
broadcasts of Harris or Joe Rogan, for instance, or on the YouTube channels of
Dave Rubin and Peterson— to stretch decidedly both their ideological partitions
and their regard for the scholarly ideas that they accept enable them to defeat
them. In his prelude to their dialog on his show, for instance, the liberal
Harris distinctively lauded the convectional Shapiro for his readiness to
discuss him in spite of their differences on inquiries, for example, religion
and “free or unrestricted will.” But this kind of collegial
discussion will, in general, be a sideshow for where individuals from the
heterogeneous group (Intellectual Dark Web) collectively concur.
The primary fascination of Shapiro and
Harris’s discussion was not their Ethical hurly-burly, but rather their display
of unanimity against the left-wingers that had assaulted both of them. Even
with the politically right left, and to a minor degree the neo-extremist far
right, these masterminds mean to introduce themselves as protectors of
“motive,” “truth,” and “certainties.” This
connection to sane standards — not to gatherings or clans — directs them now
and again to portray themselves as another political focus.
What is the Intellectual Dark Web teaching us?
On a basic level, these Intellectual Dark Web
publicists are right; that motive and discipline have a place with neither
right nor left. In any case, a closer look into the real ideas set forward with
regards to these qualities, these–as far as anyone knows moderate crusaders
against political accuracy may share more similarities with preservationist
ancestors than this group care to admit. In spite of the fact that it is unlike
political “tribalism,” as one author penned it in the web-based
magazine Quillette — the nearest thing there is in comparison to the
Intellectual Dark Web — the campaign tends to consider dissidents,
progressives, and liberals as its essential enemies.
Be that as it may, not exclusively do these
scholars contradict themselves “to one side,” extensively, they reuse
the neoconservative arraignment of “postmodernism” so as to clarify
the reason for this left adoption by political rightness or correctness.
Jordan Peterson has been the most intense
advertiser of this thought, having expressed on endless events that the
contemporary left determines its thoughts and strategies from a mix of
post-structuralism and Marxism prepared in the US’ colleges: a hypothesis of
class battle rethought as a battle to the death between racial, ethnic,
including sexual personality clusters.
This theory of post-structuralism and Marxism mix proposed by Peterson is not unanimously accepted by his allies in full. In any case, in different structures all through the diverse open stages of the “Intellectual Dark Web,” you can see endless reiterations of the thought that radical or leftist school educators outfitted with perilous speculations from the Old Continent are transforming cohorts of youthful progressives into foes of the liberal democracy. In a few renditions of this holdback, the Intellectual Dark Web goes more distant than their neoconservatives’ predecessors, whose paeans to customary school educational program frequently had little ramifications outside the grounds.
It is well known that the internet is not a safe place to be due to the number of different hackers and troublemakers who are ready to capitalise on errors in your system and hack your PC and steal your identity while you are streaming that free video online. Not only this, but the government agencies are also very keen to track your online activities and your personal information. This puts you in a situation where the “bad” and “good” guys are also monitoring you and are curious in your online behaviour.
For many years now your privacy is at risk, and if you are following the news, you probably heard about CAMBRIDGE ANALYTICA case, which is a great example of “good” guys selling your data. Between all this, you all are well aware that the public internet is very much prone to get your identities and data stolen. This is the case with cafe’s, public libraries and sometimes even public transport.
We live in a world where everyone is willing to know what you are doing online and is trying to breach your privacy all the time, and this is where and when the time to think about VPNs (Virtual Private Networks) come in to play. Once you start using them, you are taking a first step of minimizing the risk of your identity and data being tracked and using the internet becomes safer and allows you to sleep at night.
So what does VPN mean and how does VPN work?
What does VPN stand for?
VPN – a Virtual Private Network, is a protected and secure tunnel between two or more devices.
You are accessing the internet via your system that connects you to a server (it is usually a website). So, when you are connected to that server (aka website), at that point your internet activity is accessible to hackers and the agencies.
On the other hand, when you use a VPN, it establishes another connection (a middleman) that involves a private server (VPN). In this case, your connection is routed through the private server which keeps your online activity and personal information hidden. In simple terms, you have got yourself a new server by using a VPN which is a buffer between you and the website.
So now, all you do on the internet passes through that server which is a powerful gateway that opens a new path to access the public internet. So if anyone is looking forward to recording what is being done by you, they will trace you to an anonymous server, not your original location. Which of course means that your identity is now protected.
VPN is NOT a PROXY
A very important thing to understand is that a VPN is not a proxy. Getting this out of the way is very important, so no mistakes are done. A proxy is similar to a VPN but it is not a VPN. It also hides behind a server when you are using internet through a proxy, nevertheless, usually, the quality of the paid private proxies does not devote resources to encrypting all traffic that passes through them, and therefore can accept simultaneous connections from many more users. See a simple explanation below:
The functioning of VPN: How VPN works?
As previously mentioned, VPNs offer you a very safe and encrypted gateway to access the internet without revealing your true identity. So when you are assessing internet from just anywhere in the world, any person who would be willing to track your activities will find nothing. So the answer to the question: What does a VPN do? Is:
VPNs are all about encryption where P2P (peer to peer) connections safeguards your data and connections. Just in case the snooper gets his hands on some of the data, he would not be able to access the servers due to secure encryption at both ends.
It is not the only protection of your identity; it is also allowing you to have a whole new location and a new IP address for yourself where you can access the internet without any content filters and intermediation by any of the government agencies. Even your internet service provider will have no clue about what is going on at your end. This allows you to watch Canadian Netflix, or access Linked in if you are in Russia (yes, it is banned in Russia), or use google in China.
Why VPNs are effective?
However, keeping into consideration the utility and effectiveness, VPNs are a high tech product for the people that are looking to keep their private data safe and secure. It is also well known to the people who like their online privacy to be visible only to them.
Which VPNs to use for better safety?
So now since you are aware of why a VPN is extremely necessary and how it works, it is time to introduce you to some of the famous and easy to use VPN services.
Some of these services are free while some are paid. But the one thing that is common in both of them is the quality! They both work fine. It only depends on what you are planning to use the VPN for. I will start with my favourite ones:
It is one of the VPNs that serve from a lesser number of locations and just around 5000 servers. However, they make sure that their servers are not flooded while they maintain the privacy to hold their brand name and reputation strong as they position themselves as the most secure service you would ever find. Its connections are an end to end encrypted and can be used on as many as six devices in a single time. As far as the prices are concerned, its longer duration plan is very economical while the short-term ones are equally ridiculous in my opinion.
It is one of the most reliable VPNs with over 2000 servers in 148 locations that are supported on three device types. It is well known among the users for its fast speed and efficient customer support. However, it is a paid service and comes in various packages. Each of the packages has certain perks that come with it for you to choose from. You can even opt for its free trial in the start which is something I like that companies do.
It is known for its superb speed although it has about 1000 servers in 60 countries only and does not offer a trial (which is a pitty from my point of view). Still, it is widely known across the world for its connectivity and a well-built client support. The only drawback it has is that it is much more expensive than the other VPNs, but the point here is; here, you get what you pay for! Seriously!
It is the VPN service we would recommend you if you want to remove the data limits while streaming from your VPN clients. They offer unlimited data usage and are supported by 700+ servers. Not only this, VyprVPN has about 200,000+ IP addresses for its users which means you can do just about anything you wish! It even supports above 3-5 devices which is another plus in comparison with other competitors. The only issue you might have is, its monthly plan is a bit expensive especially in the case when your usage is not that big.
This one is one of the trending VPNs. Its 1000 servers are located around 20 countries while they are proliferating. TunnelBear is the easiest VPN to use with a free VPN as a free trial backed by 500 MB data limit tool! Regarding pricing, they offer a competitive price on all kinds of packages.
The company has servers in 50+ countries, with 1000+ servers in 100+ locations. They have a variety of uses they supports which in my understanding other companies should build their content around. I had a chance to use their VPN across my devices, and most of the time the connections was stable, nevertheless, some applications refused to connect through the recommended servers. They are a competitor in their market and can be considered as an option.
This service provider I am using for many years to host my websites, buying domains, using website builders and other services they provide. Everything is working great on their end, except a little bit uneducated service support. The pricing is very competitive on the market, and the quality represents and over delivers with the prices they have.
In short, if you want to stay safe while browsing online, do use a VPN to make sure your privacy and security are both upheld.
There is a great buzz about Shadowban and people are looking for the most proper information about what is it and how it is affecting the social media presence. Today we have come up with the latest information about Instagram shadowban as well as twitter shadowban, what it is, how to get it, avoid it, and the reasons why are people getting it.
So, to know more about this, all you need is to read this article for the better understanding of the whole process.
What is Shadowban?
The term Shadowban refers to ghost banning, and sometimes as stealth banning. This banning type is affecting the online accounts that are found to be violating the rules and terms of service and conditions of a specific social media platform which regulates online community’s ethics.
You might have heard about Instagram shadowbanning and shadowbanned twitter accounts. These are the most known bans, which are affecting the users and are very frustrating because it takes you some time to realize what had happened. What to do when you get shadowbanned?
Before going deep into the Instagram Shadowban, it is necessary to keep in mind that Instagram has been implementing different algorithms since 2016 and as a result of this, there are accounts which have got affected and now are experiencing decreased engagement on their channels, decreased post visibility and likes.
This still does not mean that your account has been shadowbanned, it might be that the content on your account is not engaging enough. Due to all the updates Instagram releases, it has become very difficult to have engagement like it was 2 years ago.
In 2018 Instagram shadowban happens when an account has violated Instagram TOS or does not fulfil the requirements of rules and terms and services of the platform. And because botting and other violations, Instagram started filtering out those accounts more strictly and are looking even into real peoples accounts which are not satisfying their terms of service
When your account is Shadowbanned, it becomes practically invisible and blocks your ability to engage new people. In more simple words, the account will no longer be able to share your images by the use of hashtags which people who are not already following you. Research by hashtags is still a very powerful and popular way of engagement on Instagram, and by blocking all the tags on your photos is equal to yelling under water.
Your photos are still can be seen by your current followers but will they not appear in the news feeds of other people when they use your specific hashtags. This is bad news for new accounts because nowadays building a following is much harder than ever before in the history of Instagram.
How to check if your Instagram is Shadowbanned?
There is a website which allows you to check if your Instagram account was shadowbanned, of if some posts or hashtags which you have posted are shadowbanned by the community. To check:
The tool will analyze last 10 posts and checks if you have any hashtags which are banned
Remove the hashtags which are affecting the post from being visible on that specific hashtag
A very similar case with Twitter; because they have rolled out stealth banning by merely cracking up their algorithms. So if your account is suffering from Twitter Shadowban, means that your tweets will be harder to find and will not appear on everyone’s feed who is following you. Therefore, as we have mentioned above, the reason for both platforms is a same-the violation of terms and services.
If you think that you can get more followers, or tweet replies by bots or some other manipulation, then you are wrong. The reason is now the social media platforms are securing their platforms for the purest and fair search results and user experience, and using bots, buying links, buying shares and reposts is not going to benefit you account in the long run.
How to know if my account is being Shadowbanned?
The simplest way to check whether or not shadowban has targeted your account is simply asking few people who do not follow you to check your specific photo with any hashtag or use the website I have mentioned above. We aware that sometimes the number of hashtags can also be an indication of a shadowban of your account, as abusing those to get more likes is just not going to work.
But in another case, if there any hashtags banned on your account, it must be a problem with your engagement strategy, which is most often the issue. The positive side of it is that you can work on it!
What are the reasons for Shadowbanning?
Until now Instagram and Twitter have not clearly defined what the main reasons behind shadowbans are, but according to professional internet marketers, there are more of your actions which are responsible. For example spamming people, commenting the same comment always, getting reported for something insignificant already puts you on the list of accounts to be aware of.
There are a couple of well known and popular reasons why you can get shadowbanned:
Using Bots and Scheduling Software
If you are using Instagram bots or software for your Instagram, then you are violating the terms and services of Instagram. Scheduling software allows posting images on your behalf regularly, follow and unfollow users, like pictures, comments on pictures etc. These actions are forcing the application to send push notifications to more users by abusing the system, and that is a violation of terms and conditions as you are exploiting the software abilities in an unethical way.
You are abusing Hourly Limits
Instagram has a limitation of likes, comments, messages per day. If you are abusing those limitations, then surely, you will be penalized for it. Some penalties mean that you cannot like, comments or follow others anymore. This can last to a couple of days, or in a shadowban or a ban of the account, which is, of course, everyone wants to avoid.
Most of the time the platform categorizes your content by hashtags which are being used. Which is why it is essential to choose hashtags which are in a very unsaturated, not shary or grey area niche. For example, if you use an innocent hashtag #beautyblogger, then might be it can overrun with inappropriate or adult content, which can count as spam and Instagram can take notice of it and ban your account. Keep in mind that this is just an example and Instagram is not that radical, nevertheless, this is a flag which is not beneficial for your account.
How to avoid being shadowbanned?
Stop using automated software and bots
It is essential to remove all kinds of bots and software to report, reschedule, and re-comment on your account posts. The reason is if you are using multiple accounts with the same bot, the chances you might get suspected when using same IP address is very high.
It is always better to have 100 followers who love you and support you than to have millions of followers who do not know you, or are bots themselves or irrelevant to your niche.
Take a break of 48 hours from actions from your account
Please hold on and do not get your account overloaded with a bundle of images, comments, likes, personal messages, follow and unfollows. It might be considered as spamming if you are doing more than the limit that has been defined for your account. IF your account has more than 5k, 10k, 25k, 50k, 100k of followers, the limits for actions differ.
Use Instagram responsibly, do not use bots, engage with your audience, get into a niche which can bring value to the followers and audience of your account. Do not abuse the system, because it will backfire on you sooner or later.
Every year, different gaming companies introduce different violent video games with the enhanced graphics in comparison with the previous years. The reason behind this is, now youth is more interested in playing violent games than any other genre. It is all due to very realistic and immersive graphics that attract the attention of all the gamers around the world. The games that come up on the market are now closer to reality and immersive storylines than ever before.
However, all the excitement and “hype” in the youth is due to the marketers’ using sneaky advertisements which insist on people to try the beautiful graphics at least once. They put more oil in the flame by releasing unlimited trailers, game demos, ads on every available website, and blogs which only increase the popularity and creates a crazy hype among the audience. Therefore, the more violent video games are, the larger the hype and excitement of the gamers.
Are violent video games harmful?
The thing that matters here is the concern of people toward these kinds of video games. People think that such stuff is harmful to the mental growth, behavior and the temperament of the youth. They think that these games are the reason of rising risk factor for aggressive nature. They are becoming more aggressive and these techs them brutality. The concern of parents for their children’s future is fair and justifiable. But this is one side of the story, many of us unaware of the positive effect of these violent games that are shaping the young people thoughts in a positive way.
What is the positive aspect?
Apart from the aggressive behavior, desensitization, and violent thoughts, these addicting games are famous for a good cause. According to researches, those players who are addicted to playing such stuff have shown good civic behavior. Similarly, youth who played video games, take an interest in games as a fun activity to release stress. Further, consistent studies have shown evidence that youth often turn to action and drama oriented games to reduce stress and improve mood.
In the end, games are just games!
So it will not wrong if we say that games are just the games and everyone has its taste and preferences. Some people like to dress up Barbies and some love gun violence and fighting against rivals which does not mean they will become criminals, it is just for fun, and the experience which young children get from these addicting games can never have in real-life.
Whatever we say about it or no matter how much we discuss it, in the end, these are addictive games, and the whole idea of games is entertainment, attractiveness, and fun. They made so to attract the audience, and that’s it.
Anyways, moving on to our main topic and that is a list of top violent video games. If you are one of the addictive of violent games, then here is a list to consider.
The number one on our list is Bulletstorm. Yes, this sci-fi action game is full of thrill, fun, and entertainment. It primarily focuses on players using guns, electric whip-like device, kicks to destroy the opponents. You will experience the bloodshed, gore, and mutilation by playing the game of Bulletstorm and you will get a reward each time for extremely killing enemies.
Another amazingly thrilling and action-filled video game and that is Conan Exiles. You can experience the level of brutality with beheadings and maiming. The mission of this game is to destroy your enemies. In this journey, you will face the cruelty of Conan’ world, its surroundings, and cannibalism. There will be the human sacrifice, and that’s all.
Dark Souls III: The Ringed City:
There will be smashing of enemies into pieces; everything will look like the dome. There would be bloodshed everywhere with creatures moan and the terrifying noise of guns and medieval weapons. Yes, we are talking about Dark Souls III: The Ringed City. Just hold your breath and feel the fear of war.
Dead by Daylight:
Dead by Daylight another violent video game that has gained massive fame due to its aggressive category, fear, and thrill. In this assailer game, a merciless killer hit the players to sacrifice them to an evil entity. All these are done with different kinds of weapons, twinge, and spike the characters. All the injured players crawl on the ground to save their lives and even hung on the hooks grimly. Admittedly, this would be the cruelest game of the year.
Bloodshed monsters run throughout this violent and bloody gameplay, thus forcing the players to run as much as they can to save themselves from weapons and farm implements. This horrible game aims to catch the player and then torture him in a ghastly way, with different scenes of innards and the death. Moreover, the birth of the most violent Antichrist.
Resident Evil 7 Biohazard:
Bloody monsters are not the only fun of this thrilling game. But the blood-packed game also offers to glorify of the player who fights against cruelty shotguns and the explosives. There will be the exchange of shots between humans and the creatures. It is the fight for victory, and for this, there will be open wounds and injuries.
Sniper Elite 4:
There would be no casual scene in this electrifying game but will be a shooter who will act as a sniper. So, are you ready to experience the fear of different locations? There will be a tremendous use of sharp knives, guns, explosives. All you will need is to run and hide by finding a location to conduct surreptitious attacks against dangerous Nazi Soldiers.
Admittedly, there would be no peace and nonviolent attack option; all will be just cruelty and bloodshed.
You will need to show teamwork, cooperation with your other team members to win the game. You have to try your best to face each attack and give back a rapid answer in the form of explosion and shooting. Nothing could save you from enemies but to bravely fight. Each move will get a reward for you, and a single mistake can destroy everything.
These are some top violent video games on our list. Make sure to choose the game according to your stamina and mind level.
A senior editor at The Atlantic, Alexis C. Madrigal, devised a term “Dark Social”, to refer to the social sharing of content that cannot be tracked by Web Analytics Programs like Googla analytics or bit.ly. This means that one cannot monitor website referrals and social media activity. in 2018 Dark Social challenges marketers to trace the origins of traffic and engagement.
Through an analytic platform, you can tell if a visitor came from Facebook, Instagram or Twitter. But this isn’t possible in the case of dark social. In the past, when everything was link-based, we discovered something through links/search or by browsing via bookmarks. So, the site visitor who arrived on a site without referrer he/she had to be the direct visitor. But now it’s not the same.
Dark Social Traffic comes with no apparent evidence of a consumer visiting and interacting with the business website. But being able to detect traffic, it gives you a complete picture of your content.
Now let’s get this straight. When someone publishes a website link from his Facebook page, his/her goal is for as many of his/her customers as possible to see it. The customers can now like, comment or share it on Facebook elsewhere. This is a public social media someone uses to gain an audience and drive traffic to his/her website. This is one kind of sharing. Now let’s see another way of sharing and gathering an audience.
Dark Social Sharing
Suppose that someone finds a great blog on a website. Now instead of sharing it on his/her Facebook page, directly paste the link into a message and send it to his/her friends using Facebook messenger. Now, this link is available for their friends to click and explore. This type of sharing is known as Dark Social Sharing.
Dark Social Marketing
Using private messaging, for example, WhatsApp, Facebook Messenger, Instagram, etc. to connect with your customers is an old traditional method of sale and customer service. This can be referred to as the Dark Social way of marketing experience.
Dark Social Dominates Over Sharing Activity
According to Researches and Reports, dark social accounted for 84% of the content shared online in 2016. However, this shows it’s important for the marketers to find a better and relevant way of sharing experience.
Well, according to a report, almost 85% of all the sharing occurs with copy/paste action of URL. However, the rest of the 15% is done with the help of the sharing button. So, it is concluded that still a significant amount of visits are unknown according to Dark Social Traffic to the marketers. The only option that left is to track the audience by tracking activity via Dark Social.
How to hunt down Dark Social Traffic
The best way to track Dark Social Traffic is to use the Google Analytics to find out the unidentified traffic.
1. Google Analytics
The best way to perform is it by creating a new section in Google Analytics.
• Click on Audience, then on Overview and then Add Segment
• Now select Direct Traffic
• This helps you only to access traffic marked as “direct.”
• Now click on Advance which is on the top right
• Add the pages that are super easy to keep in mind in the following format:
After doing this, the results which will be displayed will be those links that consider as DARK SOCIAL TRAFFIC. Many other different tools are targeting to lessen the probabilities of traffic being checked off as “Direct” even though without acknowledging where it comes from.
2. Add This
AddThis helps you to track traffic simply from Dark Social by generating a share button for your website, moreover, it also helps you to simply copy/paste the code for tracking. However, It is also probable to include sharing to more than 200 networks with this. Plus, the customization options it offers assure you that the browsing isn’t interrupted.
GerSoical.io is a tool that helps you analyze different kinds of shares. Once you install this tool, it allows you to copy/paste the code to site, and thus aid you to track all the copy/pasted shares by offering real-time data analysis. GetSocial.io also offers you a cross-device sharing measurement, makes all types of sharing visible.
With the help of Po.st, you can have link shortening and at the same time social sharing option to track the messages that directly come from Dark Social.
Moreover, it enables the different marketers to check out the Dark Social Traffic simply by copy/pasting the URLs.
This tool enables marketers to monitor that dark social traffic from copy-paste URLs. This tool is beneficial for marketers to dig into for audience. On the other hand, it also provides visitors with an opportunity to revisit the page where they clicked through copy/past by single click.
Bit.ly is a popular tool which works by shortening the links and also helps as a useful assistant in tracing the dark social traffic. The best way to use this tool is by providing a abridged link to your every post and to embolden the visitor at your site to share the useful content through this link. In this way, you can have check and balance on the traffic.
With the evolution of social platforms, and the rapid change of social networks, it is getting quite difficult for the marketers to comprehend all the changes just to keep their value audience in touch and active.
With the passage of time, the users now tend to opt using mobile applications, messaging services, and private networks; however, dark social will get higher from now on.
Yes, it’s true that dark social traffic can prove as a headache for many business owners. But on the contrary, there are many tools available to detect such traffic. No doubt, it can be quite challeging to go through such tools and analyze, but we believe that marketers can easily detect and undertsand from where the traffic is coming from.
Dark social shares may be difficult to track, but this doesn’t mean that the marketers should give up on acquiring insights into their user’s behavior. Howeever, with the help of testing different tools, one can be able to find the perfect solution to detect dark social traffic by assisting you to understand consumers behavior.
Facebook’s data breach has been the centre of attention for the last few days now. #deletefacebook has been all over Twitter over the past week and continues to dominate talking points all over the world. It was also caught up with two very big named CEO’s. Brian Acton, the Co-founder of WhatsApp – (who itself is a Facebook property when it was sold to the company for about $19 billion in 2014), tweeted the following:
Elon Musk apparently was not aware about his own company’s presence on Facebook, until the SpaceX and Tesla CEO responded to a tweet calling him out to delete the pages in regards to the sudden boycott Facebook movement.
Musk responded to the comments and in less than 20 minutes, he had taken down pages he didn’t even know he had. Both SpaceX and Tesla Facebook pages had over 2.6 million Likes and Follows, and very high engagement rates with the audience. Musk’s big statement on Facebook comes on what might just be one of the worst weeks for the social media company. Over the week, it was leaked that Cambridge Analytica (a consulting firm that closely works with data, and apparently also with United States president Donald Trump’s election campaign), had unethically gathered data from about 50 million Facebook users. People all over the world have then showed concern over the disregard for their private information. It was reported that Mark Zuckerberg had lost an estimated $5 billion in a matter of hours over the situation. On early Monday this week, politicians in the United States and the United Kingdom heavily criticized Facebook and demanded Zuckerberg to provide more explaination.
After proving in fact that he really is “the man” on Twitter, in another tweet, Musk wrote about using Instagram and that how he believes that the social media was “borderline” since Facebook’s “influence” is “slowly creeping in”, despite Instagram being owned by Facebook. Only a matter of time until both SpaceX and Tesla’s social media managers will have to go and find other platforms.
This is something I am committing and putting my soul into, and this article will guide you and provide step by step instructions on how you can start selling drugs online. This is of course for educational purposes, but this is legit if you decide to use it.
Why should you sell drugs online?
The logical parallel to this would be, why should you eat healthily, why should you work out, why should you smoke weed or do absolutely nothing? You do not have to do anything, you have a human right to do whatever your heart desires, or not to. As long as this does not hurt lives, does not limit freedom or damages someone else’s property. This is your (if you want, GODS) given human right.
So let us rephrase the title here a little bit. Did a voluntary exchange of good hurt anybody? I do not think so…
Why should you sell drugs online? Because there is nothing wrong in exchanging goods, even it these goods are cocaine, MDMA, LSD etc… We are grownup intellectuals who can make a decision when it comes to making a choice, and making out choice illegal (I am talking on about selling drugs online) is a crime.
You are a criminal!
A criminal is someone who takes your goods using violence, power, and authority. Let me help you here. Police, governments, laws, FBI, and even Facebook… but selling what others need and want to offer a fair exchange for it is should not be a crime.
At this moment you are probably yelling at your screen and comparing this to some other disgusting stuff you saw on “the Television” and read on some beauty blog. There are indeed some moral things you might have a conflict with, but this more about the utilitarian reasons for why you should sell drugs online.
This type of business can make the world a better and safer place. How? Imagine that you (who is probably not a drug lord) are living in a country where drugs are illegal and the only way to get some is to find a local dealer in a dark corner. Now imagine that you could order it online from someone who is a clean seller, who can even be your neighbor with 3 kids, a wife, and 12 cats?
The second scenario allows you to make a transaction without risking your life in that dark alley where you might as well get robbed, killed or beaten up by some random dude whose number you got from some online forum, or a beauty blog…
Is it safe to sell drugs online?
This is the case where a more positive than negative answer will apply. We understand that selling drugs online is not something you would brag about, therefore it is most recommended to stay one step ahead of the authorities. This indeed holds some risk, and I will try to mitigate the risks to a minimum in this article.
Key elements to stay anonymous
Operations Security (OpSec)
Online Security (Digital)
Anonymous Cryptocurrency Payments
In my previous article, we have discussed the end of Bitcoin Security Being a Myth, where the most recommended anonymous currency is going to be Monero. If you want to sell drugs online, then Monero is your cup of tea if you like it or not.
Monero has a hard-coded anonymity, which is why we will use ZION Market as an example because is uses Monero as the main currency.
This Guide Outline
To make this guide as understandable as possible, I will divide it into many sections and subsections with their own small tutorials and guides. It is important that you follow and dive in the steps and information, as this can save your life.
We will be using different software, so please read carefully about the installation and execution of each software.
You have to know about:
TAILS – This is a secure operating system which we will be using in the tutorial.
PGP (Pretty Good Privacy) – Read about encrypted Communication
Even though I will try to be as straight to the point as possible with this guide, I still recommend reading much more about Operations Security and digital security in general. This is especially important if you are planning to sell drugs online. Darknet is an amazing thing, not a typical place for an everyday user, but it is monitored excessively by authorities.
Most important part of this whole guide is to stay safe, protected and secured on the interwebs. Think about yourself first. Do not know how to emphasize it even more but read more than just my guide recommended sources. This will pay off when you have your Darknet Drug Empire up and running.
Operations Security (OpSec)
This is a must know for anyone who is working cybersecurity, but in short Operations Security is a method in which you approach data and information protection. In its cor,e it is a 5 step process where you identify critical information leaks which can lead to exposing the victim if it is a person or an organization.
In other words, look at OpSec as a methodology where you as a user protect yourself and your data from being collected from different sources which if exposed can make you “visible” and approachable by authorities.
A perfect example would be the world-famous story of Ross Ulbricht and the SilkRoad. (I highly recommend reading and watching documentaries about this guy and what he did)
SilkRoad Operations Security Fail
Mr. Ross was a person behind the largest darknet drug (and not only) selling market on TOR. The market was shut down after an ongoing investigation found some traces in 2013 which lead to Ross.
An FBI after googling “SilkRoad” and “onion” and ended up on a forum.
He used the forums filter to filter the posts to 2011 (right before SilkRoad became HUGE)
He found a post name “A Heroin Store” and Bitcointalk.com
Alias of the original poster was “altoid” with a link in his account
Link redirected to a WordPress page with instructions how to get access SilkRoad (Just like this article tells you how to sell drugs online)
The agent doxed the nickname and found a post where “altoid” was searching for “the best and brightest IT pro in the bitcoin community to be the lead developer in a venture-backed Bitcoin startup company.”
Braking point – He used his personal Gmail in the early stages of the process
Lesson to learn
Everything you put on the internet stays here, safe and sound, and can be used against you in court. Can be traced. Can be doxed. Can be traced back to you. Let us be a few steps ahead of that.
P.S. Ross is serving a life sentence for his victimless venture.
You have to develop a mindset of being as anonymous as possible as this is very important and sometimes crucial part of survival. Keeping anonymity is important not only using different software but as well hardware.
Cannot emphasize that safety is a very crucial part of what we are doing, this indeed can cause some discomfort in terms of steps which has to be taken regarding the approach of this process. But with higher levels of comfort, you are lowering your level of security and therefore have higher risks of punishment.
If you do not mind people going through your mailbox, then this is a mindset you must change. Think of the fact that people searching your mailbox or mailman is delivering you dildo magazines which have your name on it. This is the level of concern you must have in this business. You must think in terms of no one has to know or have interest in what is in that mail, only the person it is intended for.
Your goal is to keep high levels of OpSec stay anonymous and separate your online personality with your real life so there is absolutely nothing connecting you in real life from day 0.
Operation Security Tips
Never use your real name (duh…)
Never use a name you have used before
Never use a nickname previously used by you or is somehow connected to you
Never tell anyone or login with there new credentials in front of people (be alone)
Never tell anyone (do I even have to mention this?)
Communicate using ENCRYPTED only communication
Never use a camera monitored public space or place to do your dirty thing
Now when you are aware of OpSec and have the right mindset, be ready to make some investments which are going to represent everything that was mentioned earlier. You have to get a new phone. When I say new, I mean NEW, because it should have zeroed history and have no trace of the previous usage.
Never show your new device to anyone! See tips. You have to create a new identity. Are you an android user? Buy an iPhone, cheapskate…. Be different… And do not brad about it. I mean, you got the idea. Oh yeah, do not put your moms’ number on the new phone or order pizza from the new phone (do I really have to emphasize such things?).
Always use TOR and TAILS. TOR should operate on a non-persistent installation of TAILS. You probably know now that TOR is using .onion domains which are operating majority of darknet markets and are used to sell drugs online.
If you are hearing about TOR the first time and still have no clue what is TAILS, delete your internet, shut down your computer and go get some fresh air.
Pre-paid SIM card with internet data
Stock (drugs and narcotics of course)
TAILS OS on a memory stick
Label Maker or printer
Shipping supplies (packaging, bags, tape etc)
Remember, you have to be someone you are not and stay anonymous and using your credit card is probably going to land you in jail pretty quick. If the police in case of something is going to trace your hardware which you were using for selling drugs online, sorry, your own fault. The goal is not to leave a digital trace. So, use cash, please. Preferably withdrawn where you were having a beer in a pub.
Nowadays laptops are pretty cheap, so go ahead and get some low-end computer and it will be enough because our software does not require a lot of computing power to run.
If your local shop will ask your name, address or phone number, give them fake information. By law, you are not required to give them your ID. They ask it for advertising data and refunds anyway.
Please do not buy your hardware from your friend Tim who works in the electronics store… We want to keep you as anonymous as possible, and better wear clothes you usually do not wear in public and wear a cap/hat. Chances that you be caught only because of this, but this is a great step to avoid future paranoia.
Do not use a previously used laptop. We need something with no previous digital traces.
Why? Well… You can use a printer; the only idea here is you avoid writing labels by hand when sending drugs.
One thing to consider here is that if you have some super advanced printer, it can be traced, somewhat. Some printers have a “feature” which is called “tracking dots” which can lead back to the original printer. To be sure, check if your printer is mentioned in the EFF (Electronic Foundation Frontier). If you have to buy a new printer, please use cash….
Similar case as with the laptop. Do not buy it from Tim and use false credentials. Pay with cash. Get a new one, because it has no traced used data.
I personally recommend Android over iPhone as they are factory encrypted. Just do not buy a smartphone which is too old, as it might not support up to date encryption.
Put all possible passwords on your new phone which are NOT 1234 or your date of birth.
Do not use your new device for calling, it will serve as a hotspot for internet sharing. Consider it to be your modem.
Perfect case scenario, do not take your 2 phones with you when you are planning to do your dark stuff because they both can be connected to the same GSM and this might connect your criminal phone with your phone as you were at the same place at the same time.
Obviously, you should not connect your phone to your private Wi-Fi, or any other hotspot. Same goes for your laptop.
Prepaid SIM-card with internet data
Do you really need an explanation regarding why you need a prepaid SIM card? Yes? Well then… You should avoid registering your name with your new number. In some countries (like the Netherlands), you can get a free number from a guy on the street who is giving them away. Or some small kiosks in shops where they do not ask you to register.
Better option to ask someone to get the prepaid SIM card for you with the data, so you do not appear on any surveillance cameras.
Let us assume you have your phone up and running. Now forget to use it for telephone purposes. This means no calling and no text messaging from the phone because we do not want to leave a digital data trace. Even if you ordered pizza with the phone, you are giving a lead to the authorities. Never give anyone your phone number, because any connection with it can lead to revealing your true identity
BEST CASE SCENARIO:
The biggest recommendation would be to change the number on a monthly basis. The reason for that the authorities can trace the uptime (live signal) of the phone. So not only changing the SIM cards will help, but also changing the location where you are using it. When I say different places, do not make these places in walking distance from your home. Remember that you have to act like you are someone else, a new identity.
Internet connection and WIFI adaptor
Using your phone as a hotspot is an amazing way in terms of portability and ease of usage. But there are some really critical downsides to this. While using your phone as a hotspot for one purpose only, you are aligning the connection time with the time your sales account is being live while selling drugs online. Quite a nice coincidence, isn’t it?
Imagine you got caught (which you will not if you are using my methods), and the data provider sees that the data transfer was used mostly through a secured browser TOR. I mean, does not prove anything, but then we connect the being live on your sales account and being connected to TOR and we got ourselves very nice pattern to investigate.
Another great alternative would be to use open routers (which is a very hard thing here in the Netherlands). You can buy a small external WIFI adaptor which you connect to your
computer through a USB port. It makes the connection read the information from the adaptor rather than your computer, and then you connect your computer to this adaptor.
The best choice would be this adaptor which was tested by Freedom Activists.
Phone Method (Not Recommend)
Something I do not recommend but might be an option for you. You can hide your phone which is connected to a power source and has hotspot turned on and enough data. But in this case it has to be hidden pretty well, so during a raid, it will not be found, and it should be protected with a password. Wifi and phone. Both. Okay?
Drugs and Narcotics.
Well, if you would really like to use this tutorial, you probably figured out this step.
This is another very important and even crucial part you have to take into consideration because the level of stealth here has to be “Top Notch”.
Rubber gloves (disposable)
Vacuum bags and machine (this is an amazing machine)
Spirit or any other alcohol to clean your workplace after packing
Face mask (if you are selling something that requires a mask)
How do I sell drugs online?
Launch TAILS and TOR and navigate to Reddit Link where you can find all the redirecting addresses to Zion. The market is running using the latest TOR v3 protocols which means that it is a fast loading website in comparison with other markets online.
Navigate to the website -> Complete captcha -> Create an account (Register)
I really hope you still remember the OpSec lesson above and did not use your real name when creating the account. Same goes for the password, please do not make it your date of birth jeez…
User Experience on drug markets are the same as on Twitter, therefore navigate the “Sign up as a vendor”. The faster you click, the faster you will become a drug lord.
If you are not a drug lord yet, go with the “Lite Version” of the store. If you have plantations, then sign up as a regular drug seller. As mentioned above, the beautiful thing about Zion is that is works with the most anonymous currency Monero. So set up your account and pay using Monero and add Moreno to your accounts balance.
To be able to transfer Monero to your account, you have to set up a PIN which you will use when you will be cashing out from Zion. The transfers usually take a minute or two.
When you got some Monero on your account and created a PIN, we must repeat the procedure by signing up as a vendor again in the top left corner. After that finish setting up the account by filling in some information regarding your market.
Note: Enter a bitcoin addressed, as it seems to be a mandatory field by the system, even though we are going to use Monero.
If you do not have a Bitcoin wallet, use TAILS to run Electrum Wallet and create a Bitcoin Wallet and a Public Key for the Multisignature.
Enter your PGP key and complete your signing up as a vendor.
You should have received a PGP encrypted message from Zion which you have to decrypt to get the code.
Copy the code, navigate to the top left corner where you will see the Clipboard being changed to a padlock. Click on Decrypt/Verify Clipboard and enter your copied PGP code and click ok. This will decrypt the message which you will have to copy back to the Zion market.
YOUR VENDOR ACCOUNT HAS BEEN CREATED
Navigate to “Vendors Settings” on the left and continue filling in the necessary information for your online store.
Setting up an attractive profile page
Refund Policy (yes, we need it as well)
Product page setup
Encryption (PGP key)
Profile setup & Refund Policy
Include an attractive description of your shop and what you are doing, can check other profiles for inspiration.
Refund Policy is important, but most of them do not offer refunds, that is why you should offer the best product to avoid refunds being a thing.
Update your description and add a new product
Product page setup
Description of the product must be very accurate and attractive, including practical information about its use (depending on what you are selling)
Targeting must include the countries you are shipping to. A great indication can be the Language you write your description (Russian for example)
Select the relevant category for your product to be found more easily
ALWAYS requests PGP-encryption of all sensitive data and shipping address format
Do not take product pictures where you are holding it while smiling and exposing your face to the rest of the world
Never show faces in an image
Avoid reflections of people in the photo
No people in the pictures
Do not upload photos from a recognizable place or well-known background.
Do not show exposed fingers and hands to avoid fingerprints being read from the photo (yes you can do that)
Great example for inspiration would be other vendors on the market, where you can copy what suits your profile of work. As well as comparing yourself with the competitors in the same region and offering a better service, products or simply better communication (Content and Photo wise).
Select the currency and add the prices of your products in order for your buyers to transfer Monero into EUR, USD etc. Please do a competitive analysis before setting up an insanely high price. Start lower as a new vendor and increase prices over time. Gain reputation and recognition first.
In order to make it visible to the buyers, you have to activate the product by navigating to your products and in the drop-down menu above the product which says “action”.
The path: Action -> Enable -> Batch Update Products (this is useful if you have more than one products to make sure your store has all product “live”)
This is the moments of excitement of any entrepreneur where you wait for your first order to be placed. Login after some time, maybe 3-7 days and see if you received any orders from fellow clients.
If there is a sale, navigate to “1 Order to ship” where will see all the orders.
Firstly, do not click anything before you have reviewed the encrypted PGP message which the buyer should have provided. This is important because if you have a very specific shipping and the country focused business, a person might not have taken all the criteria into consideration and purchased the products anyways without you being able to ship it there.
Secondly, click on the “Unread Message” and copy the PGP key. Navigate to the padlock in the clipboard button (just like we did previously) to decrypt and verify the PGP key.
After decryption, you should see the address to where you would like to deliver the goods.
You should see the address and move forward with the order as soon as you feel you can fulfill it.
Navigate back to the website and click “Accept Order”. Another recommendation would be to communicate with the buyer, as there might be some details which should be discussed. Use a PGP key to communicate, and never just text.
Shipping of goods and preparation:
Gloves (silicone, one use, disposable)
Workstation (easy to clean, preferably a cover to just trash)
Disposable clothes or cheap apron
Plastic bags (large trash bags)
The crucial part of the packing process is not to leave any DNA or fingerprints. By no DNA, your sneezing and coughing leave DNA traces as well, so use a mask and not clothes where your cats’ hairs are not going fall on the products.
After you will complete the packaging process wipe, clean all the fingerprints even if they are not yours, they might be from someone at your local store downstairs which will ultimately narrow the investigation which holds a risk for your business. So spray/wipe/rub the envelopes, packaging to remove all the DNA, fingerprints and grease from the KF next door. Do not, lick the stamps, ok?
Get your equipment ready!
This is your first step to perfecting the art, so keep in mind that after you will deliver your products locally and feel comfortable in what you are doing, you can start sending this out to the rest of the world. You might want to use a sponge soaked in alcohol to wipe the packaging and/or if you break a sweat.
Never go to the post office to send the package, because they have surveillance cameras which can trace back you. Pick different post box locations in your city and drop the packages there. Do not touch the packages with your hands, do not carry them around. Put them in a clean bag when you are leaving home and then just chuck them from the bag into the postbox. Can use disposable gloves if some post boxes are not easily accessible.
After dropping the products go back and login to your market and mark the order as shipped.
Zion is an amazing market which uses Escrow which might take a few days for the transaction to occur and Moreno will be transferred to your account. The process behind Escrow is secure and will transfer you the money after 3 days even if the buyer will not confirm the delivered package on his end.
If your business will explode and you will feel a little bit like El Chapo, you can pay 500$ to be able to finalize your orders as soon as the order is placed and the buyer transferred you Monero. Is it worth being credited right away? Yes. Do you want to pay half a grand for it? You decide.
Monero will automatically be transferred to your provided wallet after you reach 0.5 Monero on your account on Zion. This automatic transfer ensured that you will always get your money. If Zion shuts down tomorrow, the max amount you will lose will always be under 0.5. If you cannot wait, just click “Send immediately” and get your Monero right away.
Confraternities, first sale complete. Feeling the hype? The Adrenaline? The Possibilities? The happiness someone will get from your product?
Data removal from images
In the cybersecurity world, this is one of the first things that is getting checked when searching for a person or exposing a phishing account. Ethical hackers are looking and investigating the data which is getting saved on any image taken. In this case, you were probably taking photos of your products and uploading the images to your product pages. That image holds data which literally can lead the police right to your front door.
Any camera, digital or phone camera includes such data as resolution, date, time, camera model, and GPS location. This data is called EXIF-data. This is why you should take this step very seriously when you are uploading images to the market.
This is very easy to remove in TAILS:
Navigate to: Applications -> System Tools -> MAT (Metadata Anonymization Toolkit)
You can drag the images to the toolkit and click clean to erase the data from the images. Keep in mind that you are only able to save the images in TAILS folder “Persistent”, because that is how the OS is designed.
Every person in the world has a different style of writing. If you are writing in a non-native language, it complicated things when you want to stay anonymous, because some saying and phrases are not translatable or are used only in one language. Some languages are some prone to make specific grammatical mistakes in specific words and phrases, and it happens much more than you think.
If you thought already of a perfect sales pitch for your product, kill it, delete it. Write your text all lowercase or all caps, with no punctuation and stick to short sentences. Avoid your writing personality as well.
Should I buy a Lamborghini?
You can, but the important part of spending your money is to do it correctly. Money earned this way are not the same when you have worked at McDonald’s. Being mindful when spending this money will save you jail sentence and a lot of nerves avoiding every night paranoia. Few ways to go from here.
Cryptocurrency debit card
If you have not heard yet, this is a great business model and interesting industry to read on. Banks and separate companies now offer debit cards which can be connected to cryptocurrency exchange and directly to a bank account. This is a great way when it comes to sending your hard-earned drug money (usually Bitcoin) to a fake company address and then withdrawing the money.
This is not such an easy task to have such cards anonymously, as they 100% of time required to have it connected to an ID, passport or address. I am not saying that you cannot fake an ID, passport or an address, but we want to make it look as legit a possible. It is difficult NOT to leave a trail when transferring larger amounts, and not only difficult, it is also dangerous for our case because we are not buying 3 tons of donuts, but trying to run a narco business here.
In the Netherlands, there are a few bitcoin ATMs that give cash for Bitcoin. Might be a travel for some people, but this is a great solution if you need some quick cash.
Monero – Online exchange
There are 3 most popular cryptocurrencies which are widely used and are easy when it comes to exchanging, they are Ether, Bitcoin and of course Monero. A very practical solution for easy an fast exchange service is Shapeshift
Now I can buy a Lamborghini?
If you have everything set up and working to stay anonymous, you are pretty much welcome to spend your money any way you want. Some countries are okay with people spending specific amounts a day.
The Netherlands allows spending 10.000EUR a day with no control. You can walk around and buy yourself a lot of ice cream and nice clothes if you are into that. Do not be scared to live a little with your hard-earned money! Some people live very comfortably from cryptocurrencies humbly drinking coffee for 2.50EUR.
Is there a risk of getting caught?
We went in detail through how to keep yourself anonymous online, TAILS, TOR, Crypto, OpSec etc. And after all this, you ask if there is a risk? Well, good catch, because the answer is YES
I have never said that this business is not risky. By following the steps mentioned in this “Manual” or we may even call it “Tutorial” can mitigate the risks to a bare minimum, but there is always a risk. Statistically, you can get eaten by a shark, or drawn in the sea, or your bathtub. My point is, there are risks in everything.
Look at this manual as something educational yet be ready to go to jail if this business is something you want to commit to and live a rich life and become the next Pablo Escobar of the Internet. “Don’t do the crime, if you can’t do the time” – Urban Dictionary
Trust issues and Mitigating risks
Selling drugs online is a much safer environment than being a black person in America trying to buy roses. Biggest risk in this business comes from gang shootings, junkie hobo customers on the streets, putting your face our there and in general standing in a dark dirty corner to sell the dope. This method is a great step up and advantages which focuses on more sophisticated users.
In the online vendor community there are many discussions regarding customer trust, yet the online world we must trust blindly, yet the phenomenon of it working without having any contact with the vendors and customers can be a great example for some legal businesses. The average online customer in this industry is usually more professional than an average customer in Walmart.
How to be sure that I will not get raided?
You cannot be sure. Highest risk would be when your products is getting to or from the supplier. Imagine getting caught while holding 1000 pills of MDMA in your hands. You do not need a high IQ to understand that your place would be raided after 10 minutes after you being caught.
Operation security reminder – do not keep your equipment in your house, otherwise, next stop will be jail.
If you were working from home, you still have a chance to minimize the splash effect and your prison sentence. If you were encrypting all your devices, do not have a digital trail and kept your mouth shut, the police will have a very hard time connecting you to your sells. Being caught is not where we want to be, but this is something that can save you a life sentence.
Another Reminder – Do not run your business by paying with your own bank
This can lead to your house and might get the authorities interested in your persona, which is what we want to avoid at all cost. Which is why running your business from a different address (not your private one) is so crucial. The goal is to make the investigation a complicated as possible and keep your mouth shut.
Paranoia can be a silly thing, but sometimes it can be a lifesaver, which is if you have any suspicion of an investigation, you should have an exit strategy which you can strategically follow.
Some situations for exiting the business:
Your landlord being interrogated
Your job employees are getting interrogated
Your friends receiving strange calls or being interrogated
You see police following you or people with a headpiece
Just want to exit the game
This shortlist can, of course, be extended of you can have your own reasons to backup, but in any case, you need to have an exit strategy to avoid being backtracked later. So, do not throw away your kit into your trash bin, but if you want to do so, let it be someone else’s bin or the one far away.
Before you throw it away, clean the DNA with alcohol, remember the OpSec lesson. Better off, burn everything. The phone can be burned as well, but just drown it, or pull piece by piece apart and dump it in different bins.
Social Engineering and Public relations techniques (if caught)
Let us assume that you were caught by the authorities and are now being interrogated by them. What do you do? What do you say? Do you just spit all the information out? How much do you want to say? Well, there are a few facts and practices which are super simple and can save you from ending up in jail.
The majority of cases against criminals are constructed on the information which the criminals have provided themselves. This means that you just have to keep calm, be silent and do not incriminate yourself by acting stupid.
Some interrogation techniques can be very serious and very pushy, psychologically they can break you down, some people break in 30 min, some walk away as free people, your choice. But do remember one phrase which can save your life and repeat it again and again:
“I DO NOT ANSWER QUESTIONS”
This phrase is going to work if you are located in the western part of Europe because here you do not have to testify against your own personality which is stated in the Administration of Justice Act. If you are located in another country, please look into the possibilities of your countries act and legislations.
This chapter is very similar in logic with the “Operations Security” chapter, as you have to develop a mindset where you are not yourself, in order to do that, you should obtain some skills. People in their core are very emotional people and the exact same emotions are leading our lives and leading a lot of people to jail. Great cases which you probably heard about people confessing to the things they have not done, which is a very interesting phenomenon where the authorities break people into saying what they have not done. This is why you have to train a skill to actively fight the urge to confess to anything.
The social engineering techniques which are used by the authorities include searching for moments where he will be able to connect with you on a personal or interpersonal level. Asking generic questions and offering you a cup of coffee. Recognize the act? A good cop he is.
Recommendation: Keep your answers short and simple “Yes”, ”No” or “I do not answer questions”
This might seem as a very unnatural conversation, which it is, which is why you have to practice you Yes and No to make it as natural as possible. This is done to avoid engaging in any conversation with the authorities, which might lead to something you do not even realize. So keep is silent, short answers and be ready for unpleasant face expressions your way.
This is a very brief checklist for you to recap everything we have discussed here:
New Prepaid Phone
Cash for Purchases
DNA Removal (Alcohol)
No home WIFI accessing
Do not tell your Mom
Do not work in your home
Do not use your bank debit card
Do not use your real name anywhere
Learn the phrase “I do not answer questions”
This business can be very dangerous and stressful but at the same time extreme and monetary compensating. This can sound great to be the next Pablo Escobar, but this is as well a very boring, cheeky and diligent work, and if you are not ready to do that and take the risk, then consider this as an educational material which is being practised massively in the world. Keep in mind, using torrents is also illegal and can get you jailed, but telling your prison mates that you were jailed for a torrented “Bee Movie” is not as cool as for being the next Pablo Escobar of the internet.
Last weekend, it was reported that Uber’s self driving vehicle had struck and killed someone. Police in Arizona confirmed that a woman identified as Elaine Herzberg was crossing a street with her bicycle when a self-driving Uber car had crashed into her. Police later identified that the car was traveling at 40 miles per hour. Uber has responded swiftly by suspending its self-driving vehicle program until further actions. Despite being in an autonomous mode when the crash happened, the vehicle was reported to have had a human safety driver behind the wheel to monitor and retake control in case of an emergency. The crash has prompted different responses and will most likely affect the self-driving vehicle sector, which over the years has seen billions spent on research and development for a technology that can promise more efficient modes of transport.
“Safety” and “Progress”: A Bad Will Smith Dystopian Movie
The incident has raised many pressing questions. How safe is it to test driverless vehicles on public roads? Crashes are very unpredictable, and unless the human behind the wheel is drunk, updating their snapchat or just very tired l, then you just can’t really predict how and when a crash may occur. About 40,000 people became casualties on American roads in 2017, and about 6,000 of them were pedestrians. According to statistics, human drivers kill about 1.16 people for every 100 million miles driven on roads. Self-autonomous vehicles are not even close to having that sort of distance, but they’ve already killed one.
So what now? the words “safety” and “progress” will be thrown around quite a lot. Developers insist that their employees are perfectly trained to handle situations when needed by taking over from the self-driving software implanted in the vehicle. However, researchers continue to speculate about how imperfect that sort of technique can be when dealing with such a delicate software. The Arizona incident may have just shown the flaw in that system – a little glimpse as to what can go wrong as we step further into an AI influenced future.
The “Trolley Problem”
According to the Ryan Calo, a researcher looking into the implications of self-driving vehicles at the University of Washington, the ethical questions about self-driving vehicles can be linked to the “trolley problem” which look into the issue that the vehicle will need to choose between two potential victims in case of an incoming accident. The “trolley problem” is a thought experiment in the fields of ethics. You picture a runaway trolley barreling down the railway tracks. Ahead, on the tracks, there are 5 people tied up and they are unable to make a move. The trolley is directing towards them. You stand away from some distance and next to you is a lever. If you pull this lever, the trolley switches to a different set of tracks. However, you see that there is 1 other person tied up on that track and you presented with a dilemma:
1. Do nothing, and the trolley kills 5 people on the main track.
2. Pull the lever, diverting the trolley to the other track, but kill that 1 person.
Which is the more ethical choice?
Calo says the accident that killed the woman “may have just been prompted by the sensors not being able to pick her up”, or that the algorithm “didn’t understand what it’s seeing”. Calo also adds that those creating AI-based vehicles should really think about the potential dangers on human lives. A professor at the Arizona State University, Subbarao Kambhampati, who is a specialist in AI, claims that the incident raises serious questions about the ability of safety drivers in really monitoring systems, especially after long hours of testing and learning. Other researchers aim to look at the challenge of creating efficient communications between self-driving vehicles and pedestrians.
We have reached the moment when Bitcoin security is a myth, so if you are one of those people who is buying tickets to furry conventions, I recommend you stop, now… Forever, and generally, what is wrong with you? Anyway, bitcoin is at 145 Billion Marketcap and might be approaching a trillion dollar cap pretty soon.
It is an amazing investment opportunity for some people within the bitcoin conversation, and the other party is yelling about it being a bubble and that everyone will end up the same as bitconeeeeeeeeeeeeect.
Honestly, it is getting very hard to tell if this is going to grow or die tomorrow, but who am I to say? I do not have any clue what I am talking about most of the time. But one thing I was sure about is that Bitcoin a myth and not secure for darknet, deep web, dank net and dark web transactions.
Was Bitcoin secure before?
Bitcoin is famous for its security, but please let me tell you that bitcoin was not safe from the beginning. Why? Because the deep web markets like Silkroad was busted and 20 different markets together with it. Not that bitcoin transaction security was the fault, but no doubt it played a large role in it. At that moment Bitcoin transactions were already traced, especially when larger bitcoin transactions were involved.
Not a secret that due to darknet bitcoin transaction a large number of markets were seized. Sometimes due to lazy laundering of the owners or laundering websites being honeypots gathering transactional information from both parties. That was as well the moment when everybody started to recognize other cryptocurrencies as Zipcash, Cloakcoin, DeepOnion, and my favorite one, Monero which are trying their best to be anonymous.
Will Monero be the next secure cryptocurrency?
Maybe. If you think about it, not all crypto transactional information is publicly available, which makes one cryptocurrency much harder to trace than another. This is exactly why Monero is becoming the new favorite coin for a majority of deep web markets.
Bitcoin and Ethereum are still the most popular deep web currencies. For a newbie or an average person who is making his baby steps into purchasing drugs the first time or trying to get the tickets to the furry convention might not have the knowledge about the options and will refer to the most simple and popular one. Almost everyone knows what bitcoin is and making this shift will take some time and awareness of it not being the secure cryptocurrency anymore.
Monero and other previously mentioned cryptocurrencies are smaller or very tiny, which makes them unconventional when it comes to implementation of the deep web markets. Deep Web markets are the same as Amazon, customers want to avoid all this unnecessary hustle of payment, we just want the drugs man…
Other cryptocurrency alternatives?
There are thousands of different cryptocurrencies which are not popular and even unheard of. This is a potential that worries me a little because all these little currencies can actually be an opportunity which can help anonymizing the transactions. Due to the low popularity of the currencies, they can avoid being under the radar yet serve their purpose.
Another issue with these small cryptocurrencies are the usage instructions. No one really knows how they work, which again makes people drop the idea and switch to the easiest solution, bitcoin. Some of the cryptocurrencies, unlike Monero, are not widely available on most popular exchange websites. Most crypto trading websites stick to Bitcoin, Litecoin, Ethereum, Bitcoin Cash, and Monero. I was not able to find many markets or traders who would focus on cloakcoin, which is a bummer now and is an opportunity for someone who is not as lazy as I am.
The trouble with these small cryptocurrencies is not only in their purchase availability but with the tumblers. Most popular tumblers are as well working with the most common cryptocurrencies, and when you finally find a tumbler which supports unconventional crypto, you should be skeptical as these tumblers are mostly scams and are very sketchy. This is another reason why people are sticking to the easiest option that is available on the market.
Should we switch to other cryptocurrencies?
Keep in mind that when people say it is now traceable, it does not mean that all the police and FBI resources are going to be thrown to fight the 16-year-old teen who bought some weed because his state is the last in line for legalization.
Even though this is indeed a red flag and should be taken with some caution, the shift should happen sooner or later. If you think that you are the smartest and will tumble Bitcoin, then transfer it to another bitcoin wallet, then tumble and then transfer it again. Or buying bitcoin, transferring to another wallet, buying Litecoin, then back to Bitcoin, then tumbling, buying Litecoin again and buying bitcoin with it again. Got carried away here… Whatever you money laundering method is, my obvious recommendation would be switching to Monero.
What should deep web markets and vendors do?
It is very obvious at this point that in order to escape taxes and buy or sell your favorite drugs on the deep web you should consider this shift in the long-term perspective. There are vendors on the dank net who have never used Bitcoin, which at this moment have already established their presence, have a reputation and recognizable brand. These vendors will highly profit from this change. Which proves the point that when something becomes mainstream, you should drop it if you want to really profit (not only in a monetary way).
Any other payment alternatives on the darknet?
While surfing the darknet, I have surfed through some vendors that were offering payment methods like PayPal, Western Union, and even Credit Cards. Well my friend, if someone actually bought something using these payment methods probably got SCAMMED, because these payment methods are just collecting easy money from noobs.
The second scenario is that these people are already in jail or are waiting to be arrested because actually purchasing something using these methods is easily traceable and will probably get you arrested.
When purchasing illegal stuff from the darknet, you are committing multiple felony crimes. And most of the time, you do not even have clue who are these vendors.
Thirds scenario (connected to the second), these vendors are honeypots. As these markets can be created by cops just to lure the noobs and newcomers into purchasing drugs with just a click of a button which is leaving a paper trail.
While I see the future currencies being more decentralized and more people are sharing the cryptographic ways if connecting everybody to these systems I feel that is will be very safe to use cryptocurrencies. Should be very interesting. Buy Monero, my dude.
We are moving to more decentralized currency and time where people can create their own cryptocurrency and connect their communities and societies while being able to save up on transnational fees. I honestly think it’s going to get totally safe and I am waiting for that moment.