The Intellectual Dark Web – Defining What It Means

The Intellectual Dark Web

Over the years there has been a gradual shift from the dogmatic acceptance of political and moral views that have put hidden chains on the feet of citizens of this generation. Political and moral views have plagued the world for several years, limiting what people can do and how people can behave in society. People are stigmatized all over the world for doing what most will call “political defiance” or just simply following their hearts and passion. This is where Intellectual Dark Web comes into play.

In the time of oppression, tyranny and general oppression to those who will not simply subject to established morals and political views of the society, a change has come. There is a new shift, a new kid in the block that has the capacity to combat the revered bully (this political injustice) and help create a society where individuals can live free.

There is a movement that has been expanding for many years now, although new to many people it is growing very fast in fame and popularity. There is a name for this movement— it is called “The Intellectual Dark Web.”

Read more about the Dark Social and How you can Track it!

The Intellectual Dark Web was devised by the renowned Financier and mathematician—Eric Weinstein. He put a name on this group, not to expose them (they are not obscured) but to know this group of intellectuals.

What is the Intellectual Dark Web?

What is the Intellectual Dark Web

This bears no similarities with the actual Dark Web that incorporates concealed internet networks or users and has no requirement for sophisticated software.  This group is not hidden; This is a heterogeneous group of intellectuals from students to professors and professionals in different fields. The Intellectual Dark Web consist of individuals who have a different mindset from the one that the political society has instilled in a lot of us.

This group of individuals; Biologists, neuroscientist, Sports commentators, comedians, journalists, entrepreneurs, and physiologist share a common belief. They believe that “political correctness” stifles their ideas and so they see the already established political views that limit individuals and rid them of their personal choices as their enemy.

The ideas of the Intellectual Dark Web

Intellectual Dark Web rebels

What is the Intellectual Dark Web and what precisely are the thoughts that have made individuals like Eric Weinstein, Dave Rubin, Tim Ferriss, Jordan Peterson, Joe Rogan, Sam Harris and Ben Shapiro

Into what an ongoing New York Times profile portrayed as scholarly “rebels” (intellectual renegades)? As indicated by the Times author Bari Weiss, most underscore the natural contrasts among people, an inclination that free discourse is “under attack,” and a dread that identity politics can bring peril to the US.

The Intellectual Dark Web: What People Think

An audience of Harris’ digital broadcast may add to the rundown a vociferous barrier of the legitimacy of hereditary clarifications for IQ contrasts between racial clusters, a supporter of Peterson’s recordings may demand the loathsome impact of “postmodern neo-Marxism” on school grounds, and an aficionado of Ben Shapiro may add an incredulity toward the truth of “transgenderism.”

The Intellectual Dark Web considers itself to be a partnership that resists grounded political classifications so as to protect these thoughts against the crawling impact of thought control. This directs us to another vital definition of the term Intellectual Dark Web, the proposal that its thoughts are dubious, as well as especially inventive in our political minute. On the off chance that the Intellectual Dark Web excites the annoyance of specific pundits in the media, it is for similar reasons that new advances in the web age are “troublesome.”

It would take a certain level of forgetfulness, in any case, not to see that these type of polemics over political rightness are definitely not new: they have existed for something like 30 years, as far back as a strikingly comparative arrangement of media discusses based on school grounds started in the late 1980s and mid-1990s.

At the finish of the Reagan years, political rightness turned into a most loved terror of traditionalist learned people, who trusted that school teachers had locked onto illiberal or authoritarian ideas of equality, and were teaching their understudies with an incendiary perspective of American culture. The present “Intellectual Dark Web” provocateurs once in a while name these ancestors, who in the relatively recent past possessed a comparative place in national media discusses. In any case, the examination recommends that the “renegade” thoughts of these figures are really a settled organization in American talk: an establishment whose house is on the political right.

The Intellectual Dark Web as of today

What is the Intellectual Dark Web and what is evidently so novel about the “Intellectual Dark Web”? It isn’t only its astute utilization of video channels like YouTube or Patreon, however its case to be diverse and trans-partisan. It has turned out to be run of the mill for the individuals from this club when they show up openly — on the web broadcasts of Harris or Joe Rogan, for instance, or on the YouTube channels of Dave Rubin and Peterson— to stretch decidedly both their ideological partitions and their regard for the scholarly ideas that they accept enable them to defeat them. In his prelude to their dialog on his show, for instance, the liberal Harris distinctively lauded the convectional Shapiro for his readiness to discuss him in spite of their differences on inquiries, for example, religion and “free or unrestricted will.” But this kind of collegial discussion will, in general, be a sideshow for where individuals from the heterogeneous group (Intellectual Dark Web) collectively concur.

The primary fascination of Shapiro and Harris’s discussion was not their Ethical hurly-burly, but rather their display of unanimity against the left-wingers that had assaulted both of them. Even with the politically right left, and to a minor degree the neo-extremist far right, these masterminds mean to introduce themselves as protectors of “motive,” “truth,” and “certainties.” This connection to sane standards — not to gatherings or clans — directs them now and again to portray themselves as another political focus.

What is the Intellectual Dark Web teaching us?

Intellectual Dark Web teaching us

On a basic level, these Intellectual Dark Web publicists are right; that motive and discipline have a place with neither right nor left. In any case, a closer look into the real ideas set forward with regards to these qualities, these–as far as anyone knows moderate crusaders against political accuracy may share more similarities with preservationist ancestors than this group care to admit. In spite of the fact that it is unlike political “tribalism,” as one author penned it in the web-based magazine Quillette — the nearest thing there is in comparison to the Intellectual Dark Web — the campaign tends to consider dissidents, progressives, and liberals as its essential enemies.

Be that as it may, not exclusively do these scholars contradict themselves “to one side,” extensively, they reuse the neoconservative arraignment of “postmodernism” so as to clarify the reason for this left adoption by political rightness or correctness.

Jordan Peterson has been the most intense advertiser of this thought, having expressed on endless events that the contemporary left determines its thoughts and strategies from a mix of post-structuralism and Marxism prepared in the US’ colleges: a hypothesis of class battle rethought as a battle to the death between racial, ethnic, including sexual personality clusters.

This theory of post-structuralism and Marxism mix proposed by Peterson is not unanimously accepted by his allies in full. In any case, in different structures all through the diverse open stages of the “Intellectual Dark Web,” you can see endless reiterations of the thought that radical or leftist school educators outfitted with perilous speculations from the Old Continent are transforming cohorts of youthful progressives into foes of the liberal democracy. In a few renditions of this holdback, the Intellectual Dark Web goes more distant than their neoconservatives’ predecessors, whose paeans to customary school educational program frequently had little ramifications outside the grounds.  

What does VPN stand for? Are you using VPN? You should start today!

What is a VPN?

It is well known that the internet is not a safe place to be due to the number of different hackers and troublemakers who are ready to capitalise on errors in your system and hack your PC and steal your identity while you are streaming that free video online. Not only this, but the government agencies are also very keen to track your online activities and your personal information. This puts you in a situation where the “bad” and “good” guys are also monitoring you and are curious in your online behaviour.

VPN to protect data

For many years now your privacy is at risk, and if you are following the news, you probably heard about CAMBRIDGE ANALYTICA case, which is a great example of “good” guys selling your data. Between all this, you all are well aware that the public internet is very much prone to get your identities and data stolen. This is the case with cafe’s, public libraries and sometimes even public transport.

We live in a world where everyone is willing to know what you are doing online and is trying to breach your privacy all the time, and this is where and when the time to think about VPNs (Virtual Private Networks) come in to play. Once you start using them, you are taking a first step of minimizing the risk of your identity and data being tracked and using the internet becomes safer and allows you to sleep at night.

So what does VPN mean and how does VPN work?

What does VPN stand for?

VPN – a Virtual Private Network, is a protected and secure tunnel between two or more devices.What does VPN stand for?

You are accessing the internet via your system that connects you to a server (it is usually a website). So, when you are connected to that server (aka website), at that point your internet activity is accessible to hackers and the agencies.

On the other hand, when you use a VPN, it establishes another connection (a middleman) that involves a private server (VPN). In this case, your connection is routed through the private server which keeps your online activity and personal information hidden. In simple terms, you have got yourself a new server by using a VPN which is a buffer between you and the website.

So now, all you do on the internet passes through that server which is a powerful gateway that opens a new path to access the public internet. So if anyone is looking forward to recording what is being done by you, they will trace you to an anonymous server, not your original location. Which of course means that your identity is now protected.


A very important thing to understand is that a VPN is not a proxy. Getting this out of the way is very important, so no mistakes are done. A proxy is similar to a VPN but it is not a VPN. It also hides behind a server when you are using internet through a proxy, nevertheless, usually, the quality of the paid private proxies does not devote resources to encrypting all traffic that passes through them, and therefore can accept simultaneous connections from many more users. See a simple explanation below:

VPN and Proxy difference

The functioning of VPN: How VPN works?

As previously mentioned, VPNs offer you a very safe and encrypted gateway to access the internet without revealing your true identity. So when you are assessing internet from just anywhere in the world, any person who would be willing to track your activities will find nothing. So the answer to the question: What does a VPN do? Is:

VPNs are all about encryption where P2P (peer to peer) connections safeguards your data and connections. Just in case the snooper gets his hands on some of the data, he would not be able to access the servers due to secure encryption at both ends.

It is not the only protection of your identity; it is also allowing you to have a whole new location and a new IP address for yourself where you can access the internet without any content filters and intermediation by any of the government agencies. Even your internet service provider will have no clue about what is going on at your end. This allows you to watch Canadian Netflix, or access Linked in if you are in Russia (yes, it is banned in Russia), or use google in China.

Why VPNs are effective?

However, keeping into consideration the utility and effectiveness, VPNs are a high tech product for the people that are looking to keep their private data safe and secure. It is also well known to the people who like their online privacy to be visible only to them.

Which VPNs to use for better safety?

So now since you are aware of why a VPN is extremely necessary and how it works, it is time to introduce you to some of the famous and easy to use VPN services.

Some of these services are free while some are paid. But the one thing that is common in both of them is the quality! They both work fine. It only depends on what you are planning to use the VPN for. I will start with my favourite ones:

  • NordVPN:

NordVPN top VPN

It is one of the VPNs that serve from a lesser number of locations and just around 5000 servers. However, they make sure that their servers are not flooded while they maintain the privacy to hold their brand name and reputation strong as they position themselves as the most secure service you would ever find. Its connections are an end to end encrypted and can be used on as many as six devices in a single time. As far as the prices are concerned, its longer duration plan is very economical while the short-term ones are equally ridiculous in my opinion.

  • Express VPN:

ExpressVPN free trial

It is one of the most reliable VPNs with over 2000 servers in 148 locations that are supported on three device types. It is well known among the users for its fast speed and efficient customer support. However, it is a paid service and comes in various packages. Each of the packages has certain perks that come with it for you to choose from. You can even opt for its free trial in the start which is something I like that companies do.

  • IPVanish VPN:

IPVanish VPN service

It is known for its superb speed although it has about 1000 servers in 60 countries only and does not offer a trial (which is a pitty from my point of view). Still, it is widely known across the world for its connectivity and a well-built client support. The only drawback it has is that it is much more expensive than the other VPNs, but the point here is; here, you get what you pay for! Seriously!

  • VyprVPN:

vypr VPN security

It is the VPN service we would recommend you if you want to remove the data limits while streaming from your VPN clients. They offer unlimited data usage and are supported by 700+ servers. Not only this, VyprVPN has about 200,000+ IP addresses for its users which means you can do just about anything you wish! It even supports above 3-5 devices which is another plus in comparison with other competitors. The only issue you might have is, its monthly plan is a bit expensive especially in the case when your usage is not that big.

  • TunnelBear:

Tunnel Bear VPN

This one is one of the trending VPNs. Its 1000 servers are located around 20 countries while they are proliferating. TunnelBear is the easiest VPN to use with a free VPN as a free trial backed by 500 MB data limit tool! Regarding pricing, they offer a competitive price on all kinds of packages.

  • Ivacy

The company has servers in 50+ countries, with 1000+ servers in 100+ locations. They have a variety of uses they supports which in my understanding other companies should build their content around. I had a chance to use their VPN across my devices, and most of the time the connections was stable, nevertheless, some applications refused to connect through the recommended servers. They are a competitor in their market and can be considered as an option.

  • NameCheap VPN

This service provider I am using for many years to host my websites, buying domains, using website builders and other services they provide. Everything is working great on their end, except a little bit uneducated service support. The pricing is very competitive on the market, and the quality represents and over delivers with the prices they have.

In short, if you want to stay safe while browsing online, do use a VPN to make sure your privacy and security are both upheld.

What is Instagram Shadowban?

instagram Shadowban ban

There is a great buzz about Shadowban and people are looking for the most proper information about what is it and how it is affecting the social media presence. Today we have come up with the latest information about Instagram shadowban as well as twitter shadowban, what it is, how to get it, avoid it, and the reasons why are people getting it.

So, to know more about this, all you need is to read this article for the better understanding of the whole process.

What is Shadowban?

The term Shadowban refers to ghost banning, and sometimes as stealth banning. This banning type is affecting the online accounts that are found to be violating the rules and terms of service and conditions of a specific social media platform which regulates online community’s ethics.

You might have heard about Instagram shadowbanning and shadowbanned twitter accounts. These are the most known bans, which are affecting the users and are very frustrating because it takes you some time to realize what had happened. What to do when you get shadowbanned?


  • Instagram Shadowban
    instagram Shadowban

Before going deep into the Instagram Shadowban, it is necessary to keep in mind that Instagram has been implementing different algorithms since 2016 and as a result of this, there are accounts which have got affected and now are experiencing decreased engagement on their channels, decreased post visibility and likes.

This still does not mean that your account has been shadowbanned, it might be that the content on your account is not engaging enough. Due to all the updates Instagram releases, it has become very difficult to have engagement like it was 2 years ago.

In 2018 Instagram shadowban happens when an account has violated Instagram TOS or does not fulfil the requirements of rules and terms and services of the platform. And because botting and other violations, Instagram started filtering out those accounts more strictly and are looking even into real peoples accounts which are not satisfying their terms of service

When your account is Shadowbanned, it becomes practically invisible and blocks your ability to engage new people. In more simple words, the account will no longer be able to share your images by the use of hashtags which people who are not already following you. Research by hashtags is still a very powerful and popular way of engagement on Instagram, and by blocking all the tags on your photos is equal to yelling under water.

Your photos are still can be seen by your current followers but will they not appear in the news feeds of other people when they use your specific hashtags. This is bad news for new accounts because nowadays building a following is much harder than ever before in the history of Instagram.

How to check if your Instagram is Shadowbanned?

There is a website which allows you to check if your Instagram account was shadowbanned, of if some posts or hashtags which you have posted are shadowbanned by the community. To check:

  1. Go to Tribberr
  2. Fill in your usernameInstagram Shadowban
  3. The tool will analyze last 10 posts and checks if you have any hashtags which are banned
  4. Instagram Shadowban dexter_rullez
  5. Remove the hashtags which are affecting the post from being visible on that specific hashtag

Twitter Shadowban

twitter shadowban

A very similar case with Twitter; because they have rolled out stealth banning by merely cracking up their algorithms. So if your account is suffering from Twitter Shadowban, means that your tweets will be harder to find and will not appear on everyone’s feed who is following you. Therefore, as we have mentioned above, the reason for both platforms is a same-the violation of terms and services.

If you think that you can get more followers, or tweet replies by bots or some other manipulation, then you are wrong. The reason is now the social media platforms are securing their platforms for the purest and fair search results and user experience, and using bots, buying links, buying shares and reposts is not going to benefit you account in the long run.

How to know if my account is being Shadowbanned?

The simplest way to check whether or not shadowban has targeted your account is simply asking few people who do not follow you to check your specific photo with any hashtag or use the website I have mentioned above. We aware that sometimes the number of hashtags can also be an indication of a shadowban of your account, as abusing those to get more likes is just not going to work.

But in another case, if there any hashtags banned on your account, it must be a problem with your engagement strategy, which is most often the issue. The positive side of it is that you can work on it!

What are the reasons for Shadowbanning?

Until now Instagram and Twitter have not clearly defined what the main reasons behind shadowbans are, but according to professional internet marketers, there are more of your actions which are responsible. For example spamming people, commenting the same comment always, getting reported for something insignificant already puts you on the list of accounts to be aware of.

There are a couple of well known and popular reasons why you can get shadowbanned:

  • Using Bots and Scheduling Software

If you are using Instagram bots or software for your Instagram, then you are violating the terms and services of Instagram. Scheduling software allows posting images on your behalf regularly, follow and unfollow users, like pictures, comments on pictures etc. These actions are forcing the application to send push notifications to more users by abusing the system, and that is a violation of terms and conditions as you are exploiting the software abilities in an unethical way.

  • You are abusing Hourly Limits

Instagram has a limitation of likes, comments, messages per day. If you are abusing those limitations, then surely, you will be penalized for it. Some penalties mean that you cannot like, comments or follow others anymore. This can last to a couple of days, or in a shadowban or a ban of the account, which is, of course, everyone wants to avoid.

  • Broken Hashtags

Most of the time the platform categorizes your content by hashtags which are being used. Which is why it is essential to choose hashtags which are in a very unsaturated, not shary or grey area niche. For example, if you use an innocent hashtag #beautyblogger, then might be it can overrun with inappropriate or adult content, which can count as spam and Instagram can take notice of it and ban your account. Keep in mind that this is just an example and Instagram is not that radical, nevertheless, this is a flag which is not beneficial for your account.

popular banned hashtags

How to avoid being shadowbanned?

  • Stop using automated software and bots

It is essential to remove all kinds of bots and software to report, reschedule, and re-comment on your account posts. The reason is if you are using multiple accounts with the same bot, the chances you might get suspected when using same IP address is very high.

It is always better to have 100 followers who love you and support you than to have millions of followers who do not know you, or are bots themselves or irrelevant to your niche.

  • Take a break of 48 hours from actions from your account

Please hold on and do not get your account overloaded with a bundle of images, comments, likes, personal messages, follow and unfollows. It might be considered as spamming if you are doing more than the limit that has been defined for your account. IF your account has more than 5k, 10k, 25k, 50k, 100k of followers, the limits for actions differ.


Use Instagram responsibly, do not use bots, engage with your audience, get into a niche which can bring value to the followers and audience of your account. Do not abuse the system, because it will backfire on you sooner or later.

You can follow me on my Instagram

Top 8 violent video games

top 8 Violent video games

Every year, different gaming companies introduce different violent video games with the enhanced graphics in comparison with the previous years. The reason behind this is, now youth is more interested in playing violent games than any other genre. It is all due to very realistic and immersive graphics that attract the attention of all the gamers around the world. The games that come up on the market are now closer to reality and immersive storylines than ever before.

However, all the excitement and “hype” in the youth is due to the marketers’ using sneaky advertisements which insist on people to try the beautiful graphics at least once. They put more oil in the flame by releasing unlimited trailers, game demos, ads on every available website, and blogs which only increase the popularity and creates a crazy hype among the audience. Therefore, the more violent video games are, the larger the hype and excitement of the gamers.

Are violent video games harmful?

The thing that matters here is the concern of people toward these kinds of video games. People think that such stuff is harmful to the mental growth, behavior and the temperament of the youth. They think that these games are the reason of rising risk factor for aggressive nature. They are becoming more aggressive and these techs them brutality. The concern of parents for their children’s future is fair and justifiable. But this is one side of the story, many of us unaware of the positive effect of these violent games that are shaping the young people thoughts in a positive way.

What is the positive aspect?

Apart from the aggressive behavior, desensitization, and violent thoughts, these addicting games are famous for a good cause. According to researches, those players who are addicted to playing such stuff have shown good civic behavior. Similarly, youth who played video games, take an interest in games as a fun activity to release stress. Further, consistent studies have shown evidence that youth often turn to action and drama oriented games to reduce stress and improve mood.

In the end, games are just games!

So it will not wrong if we say that games are just the games and everyone has its taste and preferences. Some people like to dress up Barbies and some love gun violence and fighting against rivals which does not mean they will become criminals, it is just for fun, and the experience which young children get from these addicting games can never have in real-life.

Whatever we say about it or no matter how much we discuss it, in the end, these are addictive games, and the whole idea of games is entertainment, attractiveness, and fun. They made so to attract the audience, and that’s it.

Anyways, moving on to our main topic and that is a list of top violent video games. If you are one of the addictive of violent games, then here is a list to consider.

  1. Bulletstorm:

violent video games Bulletstorm

The number one on our list is Bulletstorm. Yes, this sci-fi action game is full of thrill, fun, and entertainment. It primarily focuses on players using guns, electric whip-like device, kicks to destroy the opponents. You will experience the bloodshed, gore, and mutilation by playing the game of Bulletstorm and you will get a reward each time for extremely killing enemies.

  1. Conan Exiles:Violent video games Conan Exiles

Another amazingly thrilling and action-filled video game and that is Conan Exiles. You can experience the level of brutality with beheadings and maiming. The mission of this game is to destroy your enemies. In this journey, you will face the cruelty of Conan’ world, its surroundings, and cannibalism. There will be the human sacrifice, and that’s all.

  1. Dark Souls III: The Ringed City:

Violent video games Northern Warrior in in Dark Souls III

There will be smashing of enemies into pieces; everything will look like the dome. There would be bloodshed everywhere with creatures moan and the terrifying noise of guns and medieval weapons. Yes, we are talking about Dark Souls III: The Ringed City. Just hold your breath and feel the fear of war.

  1. Dead by Daylight:

Violent video games Dead by Daylight

Dead by Daylight another violent video game that has gained massive fame due to its aggressive category, fear, and thrill. In this assailer game, a merciless killer hit the players to sacrifice them to an evil entity. All these are done with different kinds of weapons, twinge, and spike the characters. All the injured players crawl on the ground to save their lives and even hung on the hooks grimly. Admittedly, this would be the cruelest game of the year.

  1. Outlast II:

Violent video games outlast 2

Bloodshed monsters run throughout this violent and bloody gameplay, thus forcing the players to run as much as they can to save themselves from weapons and farm implements. This horrible game aims to catch the player and then torture him in a ghastly way, with different scenes of innards and the death. Moreover, the birth of the most violent Antichrist.

  1. Resident Evil 7 Biohazard:

Violent video games Resident Evil 7 Biohazard

Bloody monsters are not the only fun of this thrilling game. But the blood-packed game also offers to glorify of the player who fights against cruelty shotguns and the explosives. There will be the exchange of shots between humans and the creatures. It is the fight for victory, and for this, there will be open wounds and injuries.

  1. Sniper Elite 4:

Violent video games Sniper Elite 4

There would be no casual scene in this electrifying game but will be a shooter who will act as a sniper. So, are you ready to experience the fear of different locations? There will be a tremendous use of sharp knives, guns, explosives. All you will need is to run and hide by finding a location to conduct surreptitious attacks against dangerous Nazi Soldiers.

Admittedly, there would be no peace and nonviolent attack option; all will be just cruelty and bloodshed.

  1. PlayerUnknown’s Battlegrounds:

Violent video games Battlegrounds

You will need to show teamwork, cooperation with your other team members to win the game. You have to try your best to face each attack and give back a rapid answer in the form of explosion and shooting. Nothing could save you from enemies but to bravely fight. Each move will get a reward for you, and a single mistake can destroy everything.

These are some top violent video games on our list. Make sure to choose the game according to your stamina and mind level.

Check our article about a Mysterious Japanese Game: Yume Nikki 


What is “Dark Social” and how to track it?

What is dark social 2018

A senior editor at The Atlantic, Alexis C. Madrigal, devised a term “Dark Social”, to refer to the social sharing of content that cannot be tracked by Web Analytics Programs like Googla analytics or This means that one cannot monitor website referrals and social media activity. in 2018 Dark Social challenges marketers to trace the origins of traffic and engagement.

Through an analytic platform, you can tell if a visitor came from Facebook, Instagram or Twitter. But this isn’t possible in the case of dark social. In the past, when everything was link-based, we discovered something through links/search or by browsing via bookmarks. So, the site visitor who arrived on a site without referrer he/she had to be the direct visitor. But now it’s not the same.

Simple Sharing

Dark Social Traffic comes with no apparent evidence of a consumer visiting and interacting with the business website. But being able to detect traffic, it gives you a complete picture of your content.

Now let’s get this straight. When someone publishes a website link from his Facebook page, his/her goal is for as many of his/her customers as possible to see it. The customers can now like, comment or share it on Facebook elsewhere. This is a public social media someone uses to gain an audience and drive traffic to his/her website. This is one kind of sharing. Now let’s see another way of sharing and gathering an audience.

Dark Social Sharing

Suppose that someone finds a great blog on a website. Now instead of sharing it on his/her Facebook page, directly paste the link into a message and send it to his/her friends using Facebook messenger. Now, this link is available for their friends to click and explore. This type of sharing is known as Dark Social Sharing.


Dark Social Marketing

Using private messaging, for example, WhatsApp, Facebook Messenger, Instagram, etc. to connect with your customers is an old traditional method of sale and customer service. This can be referred to as the Dark Social way of marketing experience.

Dark Social Dominates Over Sharing Activity

According to Researches and Reports, dark social accounted for 84% of the content shared online in 2016. However, this shows it’s important for the marketers to find a better and relevant way of sharing experience.

 Well, according to a report, almost 85% of all the sharing occurs with copy/paste action of URL. However, the rest of the 15% is done with the help of the sharing button. So, it is concluded that still a significant amount of visits are unknown according to Dark Social Traffic to the marketers. The only option that left is to track the audience by tracking activity via Dark Social.

How to hunt down Dark Social Traffic

The best way to track Dark Social Traffic is to use the Google Analytics to find out the unidentified traffic.

1.   Google Analytics

Google Analytics Dark Social

The best way to perform is it by creating a new section in Google Analytics.

•   Click on Audience, then on Overview and then Add Segment

•   Now select Direct Traffic

•   This helps you only to access traffic marked as “direct.”

•   Now click on Advance which is on the top right

•   Add the pages that are super easy to keep in mind in the following format:

§ Jobs/blog/contact/about

After doing this, the results which will be displayed will be those links that consider as DARK SOCIAL TRAFFIC. Many other different tools are targeting to lessen the probabilities of traffic being checked off as “Direct” even though without acknowledging where it comes from.

2.   Add This

add this dark social

AddThis helps you to track traffic simply from Dark Social by generating a share button for your website, moreover, it also helps you to simply copy/paste the code for tracking. However, It is also probable to include sharing to more than 200 networks with this. Plus, the customization options it offers assure you that the browsing isn’t interrupted.

3. dark social is a tool that helps you analyze different kinds of shares. Once you install this tool, it allows you to copy/paste the code to site, and thus aid you to track all the copy/pasted shares by offering real-time data analysis. also offers you a cross-device sharing measurement, makes all types of sharing visible.

4. dark social

With the help of, you can have link shortening and at the same time social sharing option to track the messages that directly come from Dark Social.

Moreover, it enables the different marketers to check out the Dark Social Traffic simply by copy/pasting the URLs.

This tool enables marketers to monitor that dark social traffic from copy-paste URLs. This tool is beneficial for marketers to dig into for audience. On the other hand, it also provides visitors with an opportunity to revisit the page where they clicked through copy/past by single click.

5. dark social tracking is a popular tool which works by shortening the links and also helps as a useful assistant in tracing the dark social traffic. The best way to use this tool is by providing a abridged link to your every post and to embolden the visitor at your site to share the useful content through this link. In this way, you can have check and balance on the traffic.


With the evolution of social platforms, and the rapid change of social networks, it is getting quite difficult for the marketers to comprehend all the changes just to keep their value audience in touch and active.

With the passage of time, the users now tend to opt using mobile applications, messaging services, and private networks; however, dark social will get higher from now on.

Yes, it’s true that dark social traffic can prove as a headache for many business owners. But on the contrary, there are many tools available to detect such traffic. No doubt, it can be quite challeging to go through such tools and analyze, but we believe that marketers can easily detect and undertsand from where the traffic is coming from.

Dark social shares may be difficult to track, but this doesn’t mean that the marketers should give up on acquiring insights into their user’s behavior. Howeever, with the help of testing different tools, one can be able to find the perfect solution to detect dark social traffic by assisting you to understand consumers behavior.

Read more interesting articles about Bitcoin InsecuritySME CybersecurityDeepWeb Investigations and more here on our website.


Elon Musk Deletes His Facebook Pages

Facebook’s data breach has been the centre of attention for the last few days now. #deletefacebook has been all over Twitter over the past week and continues to dominate talking points all over the world. It was also caught up with two very big named CEO’s. Brian Acton, the Co-founder of WhatsApp – (who itself is a Facebook property when it was sold to the company for about $19 billion in 2014), tweeted the following:

Elon Musk apparently was not aware about his own company’s presence on Facebook, until the SpaceX and Tesla CEO responded to a tweet calling him out to delete the pages in regards to the sudden boycott Facebook movement.

Musk responded to the comments and in less than 20 minutes, he had taken down pages he didn’t even know he had. Both SpaceX and Tesla Facebook pages had over 2.6 million Likes and Follows, and very high engagement rates with the audience. Musk’s big statement on Facebook comes on what might just be one of the worst weeks for the social media company. Over the week, it was leaked that Cambridge Analytica (a consulting firm that closely works with data, and apparently also with United States president Donald Trump’s election campaign), had unethically gathered data from about 50 million Facebook users. People all over the world have then showed concern over the disregard for their private information. It was reported that Mark Zuckerberg had lost an estimated $5 billion in a matter of hours over the situation. On early Monday this week, politicians in the United States and the United Kingdom heavily criticized Facebook and demanded Zuckerberg to provide more explaination.

After proving in fact that he really is “the man” on Twitter, in another tweet, Musk wrote about using Instagram and that how he believes that the social media was “borderline” since Facebook’s “influence” is “slowly creeping in”, despite Instagram being owned by Facebook. Only a matter of time until both SpaceX and Tesla’s social media managers will have to go and find other platforms.

How Criminals Sell Drugs Online – Tutorial

how to sell drugs online


This is something I am committing and putting my soul into, and this article will guide you and provide step by step instructions on how you can start selling drugs online. This is of course for educational purposes, but this is legit if you decide to use it.

Why should you sell drugs online?

The logical parallel to this would be, why should you eat healthily, why should you work out, why should you smoke weed or do absolutely nothing? You do not have to do anything, you have a human right to do whatever your heart desires, or not to. As long as this does not hurt lives, does not limit freedom or damages someone else’s property. This is your (if you want, GODS) given human right.

So let us rephrase the title here a little bit. Did a voluntary exchange of good hurt anybody? I do not think so…

Why should you sell drugs online? Because there is nothing wrong in exchanging goods, even it these goods are cocaine, MDMA, LSD etc… We are grownup intellectuals who can make a decision when it comes to making a choice, and making out choice illegal (I am talking on about selling drugs online) is a crime.

You are a criminal!

A criminal is someone who takes your goods using violence, power, and authority. Let me help you here. Police, governments, laws, FBI, and even Facebook… but selling what others need and want to offer a fair exchange for it is should not be a crime.


At this moment you are probably yelling at your screen and comparing this to some other disgusting stuff you saw on “the Television” and read on some beauty blog. There are indeed some moral things you might have a conflict with, but this more about the utilitarian reasons for why you should sell drugs online.

This type of business can make the world a better and safer place. How? Imagine that you (who is probably not a drug lord) are living in a country where drugs are illegal and the only way to get some is to find a local dealer in a dark corner. Now imagine that you could order it online from someone who is a clean seller, who can even be your neighbor with 3 kids, a wife, and 12 cats?

The second scenario allows you to make a transaction without risking your life in that dark alley where you might as well get robbed, killed or beaten up by some random dude whose number you got from some online forum, or a beauty blog…

Is it safe to sell drugs online?

This is the case where a more positive than negative answer will apply. We understand that selling drugs online is not something you would brag about, therefore it is most recommended to stay one step ahead of the authorities. This indeed holds some risk, and I will try to mitigate the risks to a minimum in this article.

Key elements to stay anonymous

  1. Operations Security (OpSec)
  2. Online Security (Digital)

Anonymous Cryptocurrency Payments

In my previous article, we have discussed the end of Bitcoin Security Being a Myth, where the most recommended anonymous currency is going to be Monero. If you want to sell drugs online, then Monero is your cup of tea if you like it or not.

Monero has a hard-coded anonymity, which is why we will use ZION Market as an example because is uses Monero as the main currency.

This Guide Outline

To make this guide as understandable as possible, I will divide it into many sections and subsections with their own small tutorials and guides. It is important that you follow and dive in the steps and information, as this can save your life.

We will be using different software, so please read carefully about the installation and execution of each software.

You have to know about:

  • TAILS – This is a secure operating system which we will be using in the tutorial.
  • PGP (Pretty Good Privacy) – Read about encrypted Communication
    • Another good source from Pittsburgh University
  • Monero – A detailed guide about the coin

Even though I will try to be as straight to the point as possible with this guide, I still recommend reading much more about Operations Security and digital security in general. This is especially important if you are planning to sell drugs online. Darknet is an amazing thing, not a typical place for an everyday user, but it is monitored excessively by authorities.

Most important part of this whole guide is to stay safe, protected and secured on the interwebs. Think about yourself first. Do not know how to emphasize it even more but read more than just my guide recommended sources. This will pay off when you have your Darknet Drug Empire up and running.

Operations Security (OpSec)

This is a must know for anyone who is working cybersecurity, but in short Operations Security is a method in which you approach data and information protection. In its cor,e it is a 5 step process where you identify critical information leaks which can lead to exposing the victim if it is a person or an organization.

In other words, look at OpSec as a methodology where you as a user protect yourself and your data from being collected from different sources which if exposed can make you “visible” and approachable by authorities.

A perfect example would be the world-famous story of Ross Ulbricht and the SilkRoad. (I highly recommend reading and watching documentaries about this guy and what he did)

SilkRoad Operations Security Fail

Mr. Ross was a person behind the largest darknet drug (and not only) selling market on TOR. The market was shut down after an ongoing investigation found some traces in 2013 which lead to Ross.


  • An FBI after googling “SilkRoad” and “onion” and ended up on a forum.
  • He used the forums filter to filter the posts to 2011 (right before SilkRoad became HUGE)
  • He found a post name “A Heroin Store” and
  • Alias of the original poster was “altoid” with a link in his account
  • Link redirected to a WordPress page with instructions how to get access SilkRoad (Just like this article tells you how to sell drugs online)
  • The agent doxed the nickname and found a post where “altoid” was searching for “the best and brightest IT pro in the bitcoin community to be the lead developer in a venture-backed Bitcoin startup company.”
  • Braking point – He used his personal Gmail in the early stages of the process
how to sell drugs online

Lesson to learn

Everything you put on the internet stays here, safe and sound, and can be used against you in court. Can be traced. Can be doxed. Can be traced back to you. Let us be a few steps ahead of that.

P.S. Ross is serving a life sentence for his victimless venture.


You have to develop a mindset of being as anonymous as possible as this is very important and sometimes crucial part of survival. Keeping anonymity is important not only using different software but as well hardware.

Cannot emphasize that safety is a very crucial part of what we are doing, this indeed can cause some discomfort in terms of steps which has to be taken regarding the approach of this process. But with higher levels of comfort, you are lowering your level of security and therefore have higher risks of punishment.

If you do not mind people going through your mailbox, then this is a mindset you must change. Think of the fact that people searching your mailbox or mailman is delivering you dildo magazines which have your name on it. This is the level of concern you must have in this business. You must think in terms of no one has to know or have interest in what is in that mail, only the person it is intended for.

Your goal is to keep high levels of OpSec stay anonymous and separate your online personality with your real life so there is absolutely nothing connecting you in real life from day 0.

Operation Security Tips

  • Never use your real name (duh…)
  • Never use a name you have used before
  • Never use a nickname previously used by you or is somehow connected to you
  • Never tell anyone or login with there new credentials in front of people (be alone)
  • Never tell anyone (do I even have to mention this?)
  • Communicate using ENCRYPTED only communication
  • Never use a camera monitored public space or place to do your dirty thing

Online Security

Now when you are aware of OpSec and have the right mindset, be ready to make some investments which are going to represent everything that was mentioned earlier. You have to get a new phone. When I say new, I mean NEW, because it should have zeroed history and have no trace of the previous usage.

Never show your new device to anyone! See tips. You have to create a new identity. Are you an android user? Buy an iPhone, cheapskate…. Be different… And do not brad about it. I mean, you got the idea. Oh yeah, do not put your moms’ number on the new phone or order pizza from the new phone (do I really have to emphasize such things?).

Always use TOR and TAILS. TOR should operate on a non-persistent installation of TAILS. You probably know now that TOR is using .onion domains which are operating majority of darknet markets and are used to sell drugs online.

If you are hearing about TOR the first time and still have no clue what is TAILS, delete your internet, shut down your computer and go get some fresh air.


We need:

  • New smartphone
  • Pre-paid SIM card with internet data
  • Stock (drugs and narcotics of course)
  • Laptop
  • TAILS OS on a memory stick
  • Label Maker or printer
  • Shipping supplies (packaging, bags, tape etc)
  • Monero


Remember, you have to be someone you are not and stay anonymous and using your credit card is probably going to land you in jail pretty quick. If the police in case of something is going to trace your hardware which you were using for selling drugs online, sorry, your own fault. The goal is not to leave a digital trace. So, use cash, please. Preferably withdrawn where you were having a beer in a pub.


Nowadays laptops are pretty cheap, so go ahead and get some low-end computer and it will be enough because our software does not require a lot of computing power to run.

If your local shop will ask your name, address or phone number, give them fake information. By law, you are not required to give them your ID. They ask it for advertising data and refunds anyway.

Please do not buy your hardware from your friend Tim who works in the electronics store… We want to keep you as anonymous as possible, and better wear clothes you usually do not wear in public and wear a cap/hat. Chances that you be caught only because of this, but this is a great step to avoid future paranoia.

Do not use a previously used laptop. We need something with no previous digital traces.

TAILS OS on a memory stick

I mentioned this in the beginning but here you go

Label maker or printer

Why? Well… You can use a printer; the only idea here is you avoid writing labels by hand when sending drugs.

One thing to consider here is that if you have some super advanced printer, it can be traced, somewhat. Some printers have a “feature” which is called “tracking dots” which can lead back to the original printer. To be sure, check if your printer is mentioned in the EFF (Electronic Foundation Frontier).  If you have to buy a new printer, please use cash….


Similar case as with the laptop. Do not buy it from Tim and use false credentials. Pay with cash. Get a new one, because it has no traced used data.

I personally recommend Android over iPhone as they are factory encrypted. Just do not buy a smartphone which is too old, as it might not support up to date encryption.

Put all possible passwords on your new phone which are NOT 1234 or your date of birth.

Do not use your new device for calling, it will serve as a hotspot for internet sharing. Consider it to be your modem.

Perfect case scenario, do not take your 2 phones with you when you are planning to do your dark stuff because they both can be connected to the same GSM and this might connect your criminal phone with your phone as you were at the same place at the same time.

Obviously, you should not connect your phone to your private Wi-Fi, or any other hotspot. Same goes for your laptop.

Prepaid SIM-card with internet data

Do you really need an explanation regarding why you need a prepaid SIM card? Yes? Well then… You should avoid registering your name with your new number. In some countries (like the Netherlands), you can get a free number from a guy on the street who is giving them away. Or some small kiosks in shops where they do not ask you to register.

Better option to ask someone to get the prepaid SIM card for you with the data, so you do not appear on any surveillance cameras.

Let us assume you have your phone up and running. Now forget to use it for telephone purposes. This means no calling and no text messaging from the phone because we do not want to leave a digital data trace. Even if you ordered pizza with the phone, you are giving a lead to the authorities. Never give anyone your phone number, because any connection with it can lead to revealing your true identity


The biggest recommendation would be to change the number on a monthly basis. The reason for that the authorities can trace the uptime (live signal) of the phone. So not only changing the SIM cards will help, but also changing the location where you are using it. When I say different places, do not make these places in walking distance from your home. Remember that you have to act like you are someone else, a new identity.

Internet connection and WIFI adaptor

Using your phone as a hotspot is an amazing way in terms of portability and ease of usage. But there are some really critical downsides to this. While using your phone as a hotspot for one purpose only, you are aligning the connection time with the time your sales account is being live while selling drugs online. Quite a nice coincidence, isn’t it?

Imagine you got caught (which you will not if you are using my methods), and the data provider sees that the data transfer was used mostly through a secured browser TOR. I mean, does not prove anything, but then we connect the being live on your sales account and being connected to TOR and we got ourselves very nice pattern to investigate.

Another great alternative would be to use open routers (which is a very hard thing here in the Netherlands). You can buy a small external WIFI adaptor which you connect to your

computer through a USB port. It makes the connection read the information from the adaptor rather than your computer, and then you connect your computer to this adaptor.

The best choice would be this adaptor which was tested by Freedom Activists.

how to sell drugs online

Phone Method (Not Recommend)

Something I do not recommend but might be an option for you. You can hide your phone which is connected to a power source and has hotspot turned on and enough data. But in this case it has to be hidden pretty well, so during a raid, it will not be found, and it should be protected with a password. Wifi and phone. Both. Okay?

Drugs and Narcotics.

Well, if you would really like to use this tutorial, you probably figured out this step.

Shipping supplies

This is another very important and even crucial part you have to take into consideration because the level of stealth here has to be “Top Notch”.


  • Envelopes
  • Rubber gloves (disposable)
  • Vacuum bags and machine (this is an amazing machine)
  • Spirit or any other alcohol to clean your workplace after packing
  • Face mask (if you are selling something that requires a mask)
  • Workspace

How do I sell drugs online?

Launch TAILS and TOR and navigate to Reddit Link where you can find all the redirecting addresses to Zion. The market is running using the latest TOR v3 protocols which means that it is a fast loading website in comparison with other markets online.

Navigate to the website -> Complete captcha -> Create an account (Register)

Zion Onion Market
Zion Onion Market

I really hope you still remember the OpSec lesson above and did not use your real name when creating the account. Same goes for the password, please do not make it your date of birth jeez…

Zion Market
Zion Market Account

User Experience on drug markets are the same as on Twitter, therefore navigate the “Sign up as a vendor”. The faster you click, the faster you will become a drug lord.

If you are not a drug lord yet, go with the “Lite Version” of the store. If you have plantations, then sign up as a regular drug seller. As mentioned above, the beautiful thing about Zion is that is works with the most anonymous currency Monero. So set up your account and pay using Monero and add Moreno to your accounts balance.

Zion Market Account Activation

To be able to transfer Monero to your account, you have to set up a PIN which you will use when you will be cashing out from Zion. The transfers usually take a minute or two.

Zion Market Account Activation

When you got some Monero on your account and created a PIN, we must repeat the procedure by signing up as a vendor again in the top left corner. After that finish setting up the account by filling in some information regarding your market.

Zion Account
Zion Account

Note: Enter a bitcoin addressed, as it seems to be a mandatory field by the system, even though we are going to use Monero.

If you do not have a Bitcoin wallet, use TAILS to run Electrum Wallet and create a Bitcoin Wallet and a Public Key for the Multisignature.

Enter your PGP key and complete your signing up as a vendor.

Zion Vendor Account

You should have received a PGP encrypted message from Zion which you have to decrypt to get the code.

Copy the code, navigate to the top left corner where you will see the Clipboard being changed to a padlock. Click on Decrypt/Verify Clipboard and enter your copied PGP code and click ok. This will decrypt the message which you will have to copy back to the Zion market.

PGP Code Decryption
PGP Code Decryption
PGP Code Decryption
PGP Code Decryption


Navigate to “Vendors Settings” on the left and continue filling in the necessary information for your online store.

Zion Vendor Account

Important Sections:


  • Setting up an attractive profile page
  • Refund Policy (yes, we need it as well)
  • Product page setup
    • Targeting
    • Product Description
    • Shipping
    • Encryption (PGP key)

Profile setup & Refund Policy

  • Include an attractive description of your shop and what you are doing, can check other profiles for inspiration.
  • Refund Policy is important, but most of them do not offer refunds, that is why you should offer the best product to avoid refunds being a thing.
  • Update your description and add a new product
Zion Vendor Account

Product page setup

  • Description of the product must be very accurate and attractive, including practical information about its use (depending on what you are selling)
  • Targeting must include the countries you are shipping to. A great indication can be the Language you write your description (Russian for example)
  • Select the relevant category for your product to be found more easily
  • ALWAYS requests PGP-encryption of all sensitive data and shipping address format
Zion Vendor Account Product Setup

Operations Security

  • Do not take product pictures where you are holding it while smiling and exposing your face to the rest of the world
  • Never show faces in an image
  • Avoid reflections of people in the photo
  • No people in the pictures
  • Do not upload photos from a recognizable place or well-known background.
  • Do not show exposed fingers and hands to avoid fingerprints being read from the photo (yes you can do that)

Great example for inspiration would be other vendors on the market, where you can copy what suits your profile of work. As well as comparing yourself with the competitors in the same region and offering a better service, products or simply better communication (Content and Photo wise).

Select the currency and add the prices of your products in order for your buyers to transfer Monero into EUR, USD etc. Please do a competitive analysis before setting up an insanely high price. Start lower as a new vendor and increase prices over time. Gain reputation and recognition first.

Zion Vendor Account Product Setup
Zion Vendor Account Product Setup

In order to make it visible to the buyers, you have to activate the product by navigating to your products and in the drop-down menu above the product which says “action”.

The path: Action -> Enable -> Batch Update Products (this is useful if you have more than one products to make sure your store has all product “live”)

Zion Vendor Account Product Page

This is the moments of excitement of any entrepreneur where you wait for your first order to be placed. Login after some time, maybe 3-7 days and see if you received any orders from fellow clients.

Zion Vendor Account Product Page

If there is a sale, navigate to “1 Order to ship” where will see all the orders.

Zion Vendor Account order

Firstly, do not click anything before you have reviewed the encrypted PGP message which the buyer should have provided. This is important because if you have a very specific shipping and the country focused business, a person might not have taken all the criteria into consideration and purchased the products anyways without you being able to ship it there.

Secondly, click on the “Unread Message” and copy the PGP key. Navigate to the padlock in the clipboard button (just like we did previously) to decrypt and verify the PGP key.

PGP key message decryption

After decryption, you should see the address to where you would like to deliver the goods.

PGP key message decryption

You should see the address and move forward with the order as soon as you feel you can fulfill it.

Navigate back to the website and click “Accept Order”. Another recommendation would be to communicate with the buyer, as there might be some details which should be discussed. Use a PGP key to communicate, and never just text.


Shipping of goods and preparation:


  • Alcohol (spray)
  • Gloves (silicone, one use, disposable)
  • Workstation (easy to clean, preferably a cover to just trash)
  • Disposable clothes or cheap apron
  • Plastic bags (large trash bags)

The crucial part of the packing process is not to leave any DNA or fingerprints. By no DNA, your sneezing and coughing leave DNA traces as well, so use a mask and not clothes where your cats’ hairs are not going fall on the products.

After you will complete the packaging process wipe, clean all the fingerprints even if they are not yours, they might be from someone at your local store downstairs which will ultimately narrow the investigation which holds a risk for your business. So spray/wipe/rub the envelopes, packaging to remove all the DNA, fingerprints and grease from the KF next door. Do not, lick the stamps, ok?

Get your equipment ready!

Laboratory work
Laboratory work

This is your first step to perfecting the art, so keep in mind that after you will deliver your products locally and feel comfortable in what you are doing, you can start sending this out to the rest of the world. You might want to use a sponge soaked in alcohol to wipe the packaging and/or if you break a sweat.

Laboratory work


Never go to the post office to send the package, because they have surveillance cameras which can trace back you. Pick different post box locations in your city and drop the packages there. Do not touch the packages with your hands, do not carry them around. Put them in a clean bag when you are leaving home and then just chuck them from the bag into the postbox. Can use disposable gloves if some post boxes are not easily accessible.

After dropping the products go back and login to your market and mark the order as shipped.

Zion is an amazing market which uses Escrow which might take a few days for the transaction to occur and Moreno will be transferred to your account. The process behind Escrow is secure and will transfer you the money after 3 days even if the buyer will not confirm the delivered package on his end.

If your business will explode and you will feel a little bit like El Chapo, you can pay 500$ to be able to finalize your orders as soon as the order is placed and the buyer transferred you Monero. Is it worth being credited right away? Yes. Do you want to pay half a grand for it? You decide.

Zion Monero Payments

Monero will automatically be transferred to your provided wallet after you reach 0.5 Monero on your account on Zion. This automatic transfer ensured that you will always get your money. If Zion shuts down tomorrow, the max amount you will lose will always be under 0.5. If you cannot wait, just click “Send immediately” and get your Monero right away.

Confraternities, first sale complete. Feeling the hype? The Adrenaline? The Possibilities? The happiness someone will get from your product?

Zion Monero Payments

Data removal from images

In the cybersecurity world, this is one of the first things that is getting checked when searching for a person or exposing a phishing account. Ethical hackers are looking and investigating the data which is getting saved on any image taken. In this case, you were probably taking photos of your products and uploading the images to your product pages. That image holds data which literally can lead the police right to your front door.

Any camera, digital or phone camera includes such data as resolution, date, time, camera model, and GPS location. This data is called EXIF-data. This is why you should take this step very seriously when you are uploading images to the market.

This is very easy to remove in TAILS:

Navigate to: Applications -> System Tools -> MAT (Metadata Anonymization Toolkit)

Clean Image Data

You can drag the images to the toolkit and click clean to erase the data from the images. Keep in mind that you are only able to save the images in TAILS folder “Persistent”, because that is how the OS is designed.

Psychoanalytical analysis

Every person in the world has a different style of writing. If you are writing in a non-native language, it complicated things when you want to stay anonymous, because some saying and phrases are not translatable or are used only in one language. Some languages are some prone to make specific grammatical mistakes in specific words and phrases, and it happens much more than you think.

If you thought already of a perfect sales pitch for your product, kill it, delete it. Write your text all lowercase or all caps, with no punctuation and stick to short sentences. Avoid your writing personality as well.

Should I buy a Lamborghini?

You can, but the important part of spending your money is to do it correctly. Money earned this way are not the same when you have worked at McDonald’s. Being mindful when spending this money will save you jail sentence and a lot of nerves avoiding every night paranoia. Few ways to go from here.

Cryptocurrency debit card

If you have not heard yet, this is a great business model and interesting industry to read on. Banks and separate companies now offer debit cards which can be connected to cryptocurrency exchange and directly to a bank account. This is a great way when it comes to sending your hard-earned drug money (usually Bitcoin) to a fake company address and then withdrawing the money.

Bitcoin Credit Card

This is not such an easy task to have such cards anonymously, as they 100% of time required to have it connected to an ID, passport or address. I am not saying that you cannot fake an ID, passport or an address, but we want to make it look as legit a possible. It is difficult NOT to leave a trail when transferring larger amounts, and not only difficult, it is also dangerous for our case because we are not buying 3 tons of donuts, but trying to run a narco business here.

Crypto ATM

In the Netherlands, there are a few bitcoin ATMs that give cash for Bitcoin. Might be a travel for some people, but this is a great solution if you need some quick cash.

Bitcoin ATM Netherlands

Monero – Online exchange

There are 3 most popular cryptocurrencies which are widely used and are easy when it comes to exchanging, they are Ether, Bitcoin and of course Monero. A very practical solution for easy an fast exchange service is Shapeshift


Now I can buy a Lamborghini?

If you have everything set up and working to stay anonymous, you are pretty much welcome to spend your money any way you want. Some countries are okay with people spending specific amounts a day.

The Netherlands allows spending 10.000EUR a day with no control. You can walk around and buy yourself a lot of ice cream and nice clothes if you are into that. Do not be scared to live a little with your hard-earned money! Some people live very comfortably from cryptocurrencies humbly drinking coffee for 2.50EUR.

Is there a risk of getting caught?

We went in detail through how to keep yourself anonymous online, TAILS, TOR, Crypto, OpSec etc. And after all this, you ask if there is a risk? Well, good catch, because the answer is YES

I have never said that this business is not risky. By following the steps mentioned in this “Manual” or we may even call it “Tutorial” can mitigate the risks to a bare minimum, but there is always a risk. Statistically, you can get eaten by a shark, or drawn in the sea, or your bathtub. My point is, there are risks in everything.

Look at this manual as something educational yet be ready to go to jail if this business is something you want to commit to and live a rich life and become the next Pablo Escobar of the Internet. “Don’t do the crime, if you can’t do the time” – Urban Dictionary

Trust issues and Mitigating risks

Selling drugs online is a much safer environment than being a black person in America trying to buy roses. Biggest risk in this business comes from gang shootings, junkie hobo customers on the streets, putting your face our there and in general standing in a dark dirty corner to sell the dope. This method is a great step up and advantages which focuses on more sophisticated users.

In the online vendor community there are many discussions regarding customer trust, yet the online world we must trust blindly, yet the phenomenon of it working without having any contact with the vendors and customers can be a great example for some legal businesses. The average online customer in this industry is usually more professional than an average customer in Walmart.

How to be sure that I will not get raided?

You cannot be sure. Highest risk would be when your products is getting to or from the supplier. Imagine getting caught while holding 1000 pills of MDMA in your hands. You do not need a high IQ to understand that your place would be raided after 10 minutes after you being caught.

Operation security reminder – do not keep your equipment in your house, otherwise, next stop will be jail. 

If you were working from home, you still have a chance to minimize the splash effect and your prison sentence. If you were encrypting all your devices, do not have a digital trail and kept your mouth shut, the police will have a very hard time connecting you to your sells. Being caught is not where we want to be, but this is something that can save you a life sentence.

Another Reminder – Do not run your business by paying with your own bank

This can lead to your house and might get the authorities interested in your persona, which is what we want to avoid at all cost. Which is why running your business from a different address (not your private one) is so crucial. The goal is to make the investigation a complicated as possible and keep your mouth shut.

Exit strategy

Paranoia can be a silly thing, but sometimes it can be a lifesaver, which is if you have any suspicion of an investigation, you should have an exit strategy which you can strategically follow.

Some situations for exiting the business:

  • Your landlord being interrogated
  • Your job employees are getting interrogated
  • Your friends receiving strange calls or being interrogated
  • You see police following you or people with a headpiece
  • Just want to exit the game

This shortlist can, of course, be extended of you can have your own reasons to backup, but in any case, you need to have an exit strategy to avoid being backtracked later. So, do not throw away your kit into your trash bin, but if you want to do so, let it be someone else’s bin or the one far away.

Before you throw it away, clean the DNA with alcohol, remember the OpSec lesson. Better off, burn everything. The phone can be burned as well, but just drown it, or pull piece by piece apart and dump it in different bins.

Social Engineering and Public relations techniques (if caught)

Let us assume that you were caught by the authorities and are now being interrogated by them. What do you do? What do you say? Do you just spit all the information out? How much do you want to say? Well, there are a few facts and practices which are super simple and can save you from ending up in jail.

The majority of cases against criminals are constructed on the information which the criminals have provided themselves. This means that you just have to keep calm, be silent and do not incriminate yourself by acting stupid.

Some interrogation techniques can be very serious and very pushy, psychologically they can break you down, some people break in 30 min, some walk away as free people, your choice. But do remember one phrase which can save your life and repeat it again and again:


This phrase is going to work if you are located in the western part of Europe because here you do not have to testify against your own personality which is stated in the Administration of Justice Act. If you are located in another country, please look into the possibilities of your countries act and legislations.

This chapter is very similar in logic with the “Operations Security” chapter, as you have to develop a mindset where you are not yourself, in order to do that, you should obtain some skills. People in their core are very emotional people and the exact same emotions are leading our lives and leading a lot of people to jail. Great cases which you probably heard about people confessing to the things they have not done, which is a very interesting phenomenon where the authorities break people into saying what they have not done. This is why you have to train a skill to actively fight the urge to confess to anything.

The social engineering techniques which are used by the authorities include searching for moments where he will be able to connect with you on a personal or interpersonal level. Asking generic questions and offering you a cup of coffee. Recognize the act? A good cop he is.

Recommendation: Keep your answers short and simple “Yes”, ”No” or “I do not answer questions”

This might seem as a very unnatural conversation, which it is, which is why you have to practice you Yes and No to make it as natural as possible. This is done to avoid engaging in any conversation with the authorities, which might lead to something you do not even realize. So keep is silent, short answers and be ready for unpleasant face expressions your way.

Brief Checklist

This is a very brief checklist for you to recap everything we have discussed here:

  • Operations Security
  • New PC
  • New Prepaid Phone
  • Memory stick
    • TOR
    • TAILS
  • Cash for Purchases
  • DNA Removal (Alcohol)
  • No home WIFI accessing
  • Do not tell your Mom
  • Do not work in your home
  • Do not use your bank debit card
  • Do not use your real name anywhere
  • Learn the phrase “I do not answer questions”


This business can be very dangerous and stressful but at the same time extreme and monetary compensating. This can sound great to be the next Pablo Escobar, but this is as well a very boring, cheeky and diligent work, and if you are not ready to do that and take the risk, then consider this as an educational material which is being practised massively in the world. Keep in mind, using torrents is also illegal and can get you jailed, but telling your prison mates that you were jailed for a torrented “Bee Movie” is not as cool as for being the next Pablo Escobar of the internet.

Uber’s Self Driving Vehicle Kills Pedestrian

Self Driving Vehicle

Last weekend, it was reported that Uber’s self driving vehicle had struck and killed someone. Police in Arizona confirmed that a woman identified as Elaine Herzberg was crossing a street with her bicycle when a self-driving Uber car had crashed into her. Police later identified that the car was traveling at 40 miles per hour. Uber has responded swiftly by suspending its self-driving vehicle program until further actions. Despite being in an autonomous mode when the crash happened, the vehicle was reported to have had a human safety driver behind the wheel to monitor  and retake control in case of an emergency. The crash has prompted different responses and will most likely affect the self-driving vehicle sector, which over the years has seen billions spent on research and development for a technology that can promise more efficient modes of transport.

Self Driving Vehicle

“Safety” and “Progress”: A Bad Will Smith Dystopian Movie

The incident has raised many pressing questions. How safe is it to test driverless vehicles on public roads? Crashes are very unpredictable, and unless the human behind the wheel is drunk, updating their snapchat or just very tired l, then you just can’t really predict how and when a crash may occur. About 40,000 people became casualties on American roads in 2017, and about 6,000 of them were pedestrians. According to statistics, human drivers kill about 1.16 people for every 100 million miles driven on roads. Self-autonomous vehicles are not even close to having that sort of distance, but they’ve already killed one.

Self Driving Vehicle
So what now? the words “safety” and “progress” will be thrown around quite a lot. Developers insist that their employees are perfectly trained to handle situations when needed by taking over from the self-driving software implanted in the vehicle. However, researchers continue to speculate about how imperfect that sort of technique can be when dealing with such a delicate software. The Arizona incident may have just shown the flaw in that system – a little glimpse as to what can go wrong as we step further into an AI influenced future.

The “Trolley Problem”

According to the Ryan Calo, a researcher looking into the implications of self-driving vehicles at the University of Washington, the ethical questions about self-driving vehicles can be linked to the “trolley problem” which look into the issue that the vehicle will need to choose between two potential victims in case of an incoming accident. The “trolley problem” is a thought experiment in the fields of ethics. You picture a runaway trolley barreling down the railway tracks. Ahead, on the tracks, there are 5 people tied up and they are unable to make a move. The trolley is directing towards them. You stand away from some distance and next to you is a lever. If you pull this lever, the trolley switches to a different set of tracks. However, you see that there is 1 other person tied up on that track and you presented with a dilemma:

1. Do nothing, and the trolley kills 5 people on the main track.
2. Pull the lever, diverting the trolley to the other track, but kill that 1 person.
Which is the more ethical choice?

Calo says the accident that killed the woman “may have just been prompted by the sensors not being able to pick her up”, or that the algorithm “didn’t understand what it’s seeing”. Calo also adds that those creating AI-based vehicles should really think about the potential dangers on human lives. A professor at the Arizona State University, Subbarao Kambhampati, who is a specialist in AI, claims that the incident raises serious questions about the ability of safety drivers in really monitoring systems, especially after long hours of testing and learning. Other researchers aim to look at the challenge of creating efficient communications between self-driving vehicles and pedestrians.

Self Driving Car

Bitcoin Security Is a Myth

We have reached the moment when Bitcoin security is a myth, so if you are one of those people who is buying tickets to furry conventions, I recommend you stop, now… Forever, and generally, what is wrong with you? Anyway, bitcoin is at 145 Billion Market cap and might be approaching a trillion dollar cap pretty soon.

It is an amazing investment opportunity for some people within the bitcoin conversation, and the other party is yelling about it being a bubble and that everyone will end up the same as bitconeeeeeeeeeeeeect.

Honestly, it is getting very hard to tell if this is going to grow or die tomorrow, but who am I to say? I do not have any clue what I am talking about most of the time. But one thing I was sure about is that Bitcoin a myth and not secure for darknet, deep web, dank net and dark web transactions.

Was Bitcoin secure before?

bitcoin security

Bitcoin is famous for its security, but please let me tell you that bitcoin was not safe from the beginning. Why? Because the deep web markets like Silkroad was busted and 20 different markets together with it. Not that bitcoin transaction security was the fault, but no doubt it played a large role in it. At that moment Bitcoin transactions were already traced, especially when larger bitcoin transactions were involved.

Not a secret that due to darknet bitcoin transaction a large number of markets were seized. Sometimes due to lazy laundering of the owners or laundering websites being honeypots gathering transactional information from both parties. That was as well the moment when everybody started to recognize other cryptocurrencies as Zipcash, Cloakcoin, DeepOnion, and my favorite one, Monero which are trying their best to be anonymous.

Will Monero be the next secure cryptocurrency?

Monero Security

Maybe. If you think about it, not all crypto transactional information is publicly available, which makes one cryptocurrency much harder to trace than another. This is exactly why Monero is becoming the new favorite coin for a majority of deep web markets.

Bitcoin and Ethereum are still the most popular deep web currencies. For a newbie or an average person who is making his baby steps into purchasing drugs the first time or trying to get the tickets to the furry convention might not have the knowledge about the options and will refer to the most simple and popular one. Almost everyone knows what bitcoin is and making this shift will take some time and awareness of it not being the secure cryptocurrency anymore.

Monero and other previously mentioned cryptocurrencies are smaller or very tiny, which makes them unconventional when it comes to implementation of the deep web markets. Deep Web markets are the same as Amazon, customers want to avoid all this unnecessary hustle of payment, we just want the drugs man…

Other cryptocurrency alternatives?

There are thousands of different cryptocurrencies which are not popular and even unheard of. This is a potential that worries me a little because all these little currencies can actually be an opportunity which can help anonymizing the transactions. Due to the low popularity of the currencies, they can avoid being under the radar yet serve their purpose.

Bitcoin Security

Another issue with these small cryptocurrencies are the usage instructions. No one really knows how they work, which again makes people drop the idea and switch to the easiest solution, bitcoin. Some of the cryptocurrencies, unlike Monero, are not widely available on most popular exchange websites. Most crypto trading websites stick to Bitcoin, Litecoin, Ethereum, Bitcoin Cash, and Monero. I was not able to find many markets or traders who would focus on cloakcoin, which is a bummer now and is an opportunity for someone who is not as lazy as I am.

The trouble with these small cryptocurrencies is not only in their purchase availability but with the tumblers. Most popular tumblers are as well working with the most common cryptocurrencies, and when you finally find a tumbler which supports unconventional crypto, you should be skeptical as these tumblers are mostly scams and are very sketchy. This is another reason why people are sticking to the easiest option that is available on the market.

Should we switch to other cryptocurrencies?

Keep in mind that when people say it is now traceable, it does not mean that all the police and FBI resources are going to be thrown to fight the 16-year-old teen who bought some weed because his state is the last in line for legalization.

Even though this is indeed a red flag and should be taken with some caution, the shift should happen sooner or later. If you think that you are the smartest and will tumble Bitcoin, then transfer it to another bitcoin wallet, then tumble and then transfer it again. Or buying bitcoin, transferring to another wallet, buying Litecoin, then back to Bitcoin, then tumbling, buying Litecoin again and buying bitcoin with it again. Got carried away here… Whatever you money laundering method is, my obvious recommendation would be switching to Monero.

What should deep web markets and vendors do?

Bitcoin SecurityIt is very obvious at this point that in order to escape taxes and buy or sell your favorite drugs on the deep web you should consider this shift in the long-term perspective. There are vendors on the dank net who have never used Bitcoin, which at this moment have already established their presence, have a reputation and recognizable brand. These vendors will highly profit from this change. Which proves the point that when something becomes mainstream, you should drop it if you want to really profit (not only in a monetary way).

Any other payment alternatives on the darknet?

While surfing the darknet, I have surfed through some vendors that were offering payment methods like PayPal, Western Union, and even Credit Cards. Well my friend, if someone actually bought something using these payment methods probably got SCAMMED, because these payment methods are just collecting easy money from noobs.

The second scenario is that these people are already in jail or are waiting to be arrested because actually purchasing something using these methods is easily traceable and will probably get you arrested.

Bitcoin security jail

When purchasing illegal stuff from the darknet, you are committing multiple felony crimes. And most of the time, you do not even have clue who are these vendors.

Thirds scenario (connected to the second), these vendors are honeypots. As these markets can be created by cops just to lure the noobs and newcomers into purchasing drugs with just a click of a button which is leaving a paper trail.


While I see the future currencies being more decentralized and more people are sharing the cryptographic ways if connecting everybody to these systems I feel that is will be very safe to use cryptocurrencies. Should be very interesting. Buy Monero, my dude.

Bitcoin Security

We are moving to more decentralized currency and time where people can create their own cryptocurrency and connect their communities and societies while being able to save up on transnational fees. I honestly think it’s going to get totally safe and I am waiting for that moment.