Downloading TOR
The Onion Router (TOR) achieves this by routing your connection through a series of worldwide nodes making your original identity almost untraceable. You should note that your ISP will be aware that you are using TOR however they will not be able to see what you were viewing. I would suggest that you download the latest version of the TOR browser bundle as it requires no configuration and can be used with no extra knowledge. Remember to always keep your TOR browser updated to the latest version to ensure your security while browsing on the deep web.– https://www.torproject.org/projects/torbrowser.html.en
Downloading a VPN (Virtual Private Network)
Using a VPN with Tor Browser adds an extra layer of security and privacy. A VPN encrypts your internet traffic, which prevents the ISP from seeing that you are accessing Tor.Extra Security Steps
Now that you have TOR downloaded, open the TOR browser and disable javascript, just click the blue “S” icon in the top left next to the address bar and then select “Forbid Scripts Globally”. This is a requirement after it came to light that the FBI had inserted some malicious javasript code into several pages served by popular deep web sites. As a result the FBI were able to trace the IP address of users that viewed the pages while having javascript enabled.Choosing Your Preferred Market
Once you are on the deep web there is a multitude of markets for you to choose from, gone are the glory days of Silk Road however several marketplaces have stepped up to fill the void left by Dread Pirate Roberts and his libertarian dream. In 2024 the deep web is not what it used to be, alot of the sites have been taken down by the police in the last few years which has meant alot of the vendors have moved to encrypted messaging apps or there own personal dark net sites.Status | Name | Url |
---|---|---|
🟢 | Nexus Market | http://nexusaz2extoiszfrbhklvnhq5leh3n6yvd2njktxxptqr3xulzsb4qd.onion |
🇦🇺 | Abacus Market | http://abacusjovcecknviyskrct7v6pzexnrolpbz2y54nt2siv3osz72ymad.onion |
🟢 | Ares Market | http://ares7gbfoiogk3xru767ajhd25muhsxauke7ojevvust2naa65v55did.onion |
🟢 | WeTheNorth Market | http://hn2pawftru6xs3e2fokgwx6ts67cjroadhnphaou7rzgezntkklcv6yd.onion |
🇸🇪 | Flugsvamp 4.0 | http://fs4iskr6m2pfrjmsrbl4q2yqmmiab3slpyaunl5trlsc4gp2jd24n3id.onion |
🟢 | MGM Grand Market | http://duysanz33xjlaheyrncyphl3liiqdjyckvg2tespc3meg3drx4z6nlqd.onion |
🟢 | Cypher Market | http://6c5qacovqh2z4ra4q55q7io73rnqmxo2aarzheagcvyvoaltf54p7qqd.onion |
🟢 | Incognito Market | http://inco6ltobxukcvwud3mro6xbfzqrv76s7guhnvelrjgtserxbkxlu4ad.onion |
How To Buy Bitcoin / Any Crypto
The next step is probably the most difficult of all, some people have no idea how to buy crypto but as long as you read the following information you will never be in that situation. First of all you will want to head over to Paybis and create an account. One major advantage of using Paybis is that as soon as you complete the 5 minute verification you can buy any type of crypto you want The user interface is very easy to use and the support staff are excellent.- Choose the crypto you would like.
- Select the currency that you want to pay with.
- Select your preferred payment method.
- Choose to store your crypto on Paybis / Enter your external wallet address
- Once the transaction is complete you will receive your crypto.
- When you have your crypto, you can send it to whatever darknet market you desire.
Using Encryption To Keep Your Address a Secret
Now that you have everything set up I highly recommend you learn the basics of using encryption. This will greatly reduce any chance for the police to do anything about you buying drugs online, it is not necessary but you should use it. When you order from your chosen vendor or send him a private message, that information will be stored in the marketplace’s database. The marketplace server may be hacked or seized by law enforcement in the future, and you don’t want your private messages with any sensitive data, such as your name and home address, easily viewable by anyone who gets access to the database. The solution to this is to use PGP, if you look on vendor pages the vast majority of them will request that you use encryption. A quick overview of PGP is that both you and the seller have a public and private key. You will use the vendors public key to encrypt your message when you send sensitive data over to them. The vendor will then use their private key, which they keep secret, to decrypt the message. This means that only the vendor will be able to see any of your sensitive information even if the site is compromised. I am not going to go into depth on PGP in this article however I will link out to some more in depth guides.PGP Tutorial For Newbs (Gpg4Win)