SlideShare a Scribd company logo
1 of 9
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and
Ciphers
1) The New Freedom of Speech and Privacy.
No to mass censorship and spying.
Deepweb websites
can be seen and access only in the deepweb by using a Tor like
browsers only. Make
deepweb accounts, deepweb email addresses and deepweb websites in
the deepweb
now. Your must have a “HTTPS” protocol prefix for
security thru SSL Certificate. NOT HTTP. Use VPN or Proxy
to cover your IP address and PGP keys as extra security for email and
login authentication. Use Bitcoins as a donation and payment method
without spying on you. The more professionally operated and
maintained
deepweb (Tor .onion) websites, the more secured, resilient, more
difficult to
attack, detect, track, hack and shutdown.
2) Mariana’s Web is most secret Internet than the DarkWeb. that is
accessible only by Quantum
Computers http://www.dwavesys.com/quantum-computing, Closed
Shell Systems & Polymeric Falcighol Derivation.
3)The Ideal Deepweb ebsite is Torchan
(http://zw3crggtadila2sg.onion/imageboard/
) for its authentication/dialog boxes before viewing and login into the
website. The most
private and secured DeepWeb Website.
Also, The Website must have SSL Certification, VPN, Bitcoin Address
and PGP
Key. It must be private, invite-only and PGP Key Authentication and
Login
Username/Email//Password (or Paraphrase)
Protected.
*Make accounts in https://vk.com the
New Facebook and Twitter.*
A) To get access to the Deepweb or Darkweb, the Secret and Hidden
Internet: Install
deepweb browsers or one of them like
1) Tor - https://www.torproject.org/
2) Tails - https://tails.boum.org/
3) I2P - https://geti2p.net/en/
B) Deepweb Search Engine and intro:
Enjoy your deepweb adventure. The victory awaits
1) The Hidden Wiki -
http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
2) The Hidden Wiki Org – http://thehiddenwiki.org/
3) TorLinks - http://torlinkbgs6aabns.onion/
4) Harry 71 Deepweb Crawler -
http://skunksworkedp2cg.onion/sites_title.html
5) Hidden Answers - http://answerstedhctbek.onion/
6) http://ev3h5yxkjz4hin75.onion/wiki/index.php/Introduc..
C) Deepweb Social Media and Forum:
Better than facebook and twitter without snooping and censorship.
No phone numbers needed. Any email address
1) Galaxy 2 - http://w363zoq3ylux5rf5.onion/
2) Torbook - http://torbookntnjusnqd.onion/
3) Blackbook - http://blkbook3fxhcsn3u.onion/
4) Torchan - http://zw3crggtadila2sg.onion/imageboard/
5) 8Chan - http://oxwugzccvk3dk6tj.onion/
D) Deepweb Email and Messenging:
secured but use ciphers and encryption:
1) Tor box - http://torbox3uiot6wchz.onion/
2) Sigaint - http://sigaintevyh2rzvw.onion/
3) Mail 2 tor - http://mail2tor2zyjdctd.onion/
4) Lelantos - http://lelantoss7bcnwbv.onion//
5) Hidden rapport -http://jjx5ptpktk6lnycu.onion/login.php
6) Onion mail - http://iir4yomndw2dec7x.onion/
E) Bonus:
1) Bitcoin - https://www.bitcoin.com/
2) Cyber Ghost VPN - http://www.cyberghostvpn.com/en_us
3) PGP Key - http://www.gpg4win.org/download.html
4) SSL or HTTPS - https://www.instantssl.com
5) Use LINUX instead of Windows or MAC
6) Hushmail
7) Protonmail
8) Fake GPS
9) Locker
10) Encrypted messaging Apps like WhatsApp and Telegram
11) RSA or rsa.com for public and private keys
12) Opera Browser
Make passwords (now Paraphrase) 30 characters long mix small and big
letters, numbers and symbols. Use manual/mechanical encryption
devices like Enigma-Caesar cipher combination
Encrypt your communications by hand or manually BEFORE using and
send to Encryption/Cipher Machines, Encryption Programs, Encryption
Apps and Internet.
Uncrackable Codes and Ciphers
http://weburbanist.com/2010/05/31/cryptic-codes-11-le..
http://listverse.com/2007/10/01/top-10-uncracked-codes/
The Uncrackable Cipher Systems:
Voynich Cipher
Zodiac Killer Cipher
Beale Papers
Dorabella Cipher
D’Agapeyeff Cipher
ChaoCipher
Kryptos
Affine Cipher
Uncrackable Ancient Scripts
“To make a better uncrackable encryption and cipher Systems.”
The Manual Enigma Machine please modify it.
http://www.creativecrafthouse.com/index.php?main_page..
http://www.creativecrafthouse.com/index.php?main_page..
http://www.creativecrafthouse.com/index.php?main_page..
http://www.creativecrafthouse.com/index.php?main_page..
To modify the Manual Enigma Encryption Machines (Photo above):
Please use any writing characters or writing scripts EXCEPT LATIN
ALPHABETS Letters (Characters). The Writing Systems below:
https://en.wikipedia.org/wiki/List_of_writing_systems
Use rare languages for encrypted communication too
http://www.toptenz.net/top-10-rarest-languages.php
Then use a different Binary Code Systems by using Letters than
Numbers or Using Numbers except Zero (0) and One (1). Do them Both.
Combine with Bacon Cipher to hide the coded messages within the
plain messages. Do it (encrypt) better than the Aryan Brotherhood
Prison Gang in America. Use public and private keys that needs a year
of preparation before use the cipher system.
Aryan Brotherhood Code (Bacon Cipher and Enigma Coded texts hidden
within the Plaintexts)
The Hand written or typewriter written code book (DO NOT use of
computers, gadgets or printers in making the code books) must be
good enough for a year. The Number of Coding Methods like
public/private keys, numbers, characters, symbols, binary codes,
permutations and combinations must be HOW MANY SECONDS IN A
YEAR. Then divide them (Coding Methods) into minutes, hours, days,
weeks, months, quarters or semi annual of the the Year to make
different Coding Patterns of your choice (NEVER use 1 coding pattern
more than 1 or 2 messages to prevent code breaking). The book must
only a select trusted FEW, distribute the code book excerpts to others
weekly or monthly. You Need to make 10 more unique code books
(good for 10 years). The best is 20 code books (20 years). Do not save in
the computers with internet connection or flash drives, just Hand
written or typewriter written paper only in codes, anagrams or invisible
ink.
Mathematical skills like Algebra, Trigonometry, Algorithms, Geometry,
Calculus and Statistics is important to make public and private keys for
better encryption like RSA and PGP.
Also make a different writing paths rather than writing from horizontal
left to right (Latin Writing Path), Writing from horizontal right to Left
(Arabic Writing path). Other writing paths like skipping, diagonal,
weaving, zigzag, vertical, spiral and etc. The number of characters per
line in cipher blocks can be even or odd (17 of 20 characters per line).
The patterns of cipher blocks must NOT in a square alone; means use
diamond, circle, stripe, trapezoid and triangle hidden within the cipher
block. Add nulls within the cipher block. Make your cipher sophisticated
that the code breakers will call HOAX (means They quit) Just only to
you.
DISCIPLINE, TRUST, ALERTNESS, AWARENESS AND UNIQUENESS are
important for Successful Encryption.
The shape of the cipher block of zodiac killer cipher is square and odd
(17 characters per line).
Encrypt your messages manually with Bacon Cipher plus enigma or
other ciphers (used by Aryan Brotherhood prison Gang) before using
encryption apps like Telegram, Mail, Morse Code Telegram, Text and
Email. Modify by yourself all the time.
F) THE MOST
SECURED INTERNET/ONLINE USE LAYOUT:
F-1) USER ->Password -> PGP -> VPN –> HTTPS/SSL -> TOR/DARKWEB <-
HTTPS/SSL <- VPN <- PGP <– Password <-Website(s)
F-2) USER -> Quantum Computer, Closed Shell Systems (CSS) or
Polymeric Falcighol Derivation (PFD) -> Password -> PGP -> VPN –>
HTTPS/SSL -> Marianas’ Web <- HTTPS/SSL <- VPN <- PGP <– Password
<- Quantum Computer, Closed Shell Systems (CSS) or Polymeric
Falcighol Derivation (PFD) <-Website(s)
Buy Quantum Computers and Quantum Encryption now
athttp://www.dwavesys.com/quantum-computing

More Related Content

Viewers also liked

Viewers also liked (9)

The deepweb
The deepwebThe deepweb
The deepweb
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web5 Media Innovations From The Secret Deep Web
5 Media Innovations From The Secret Deep Web
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Cyber crime report
Cyber crime reportCyber crime report
Cyber crime report
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
5G report
5G report5G report
5G report
 
Smart quill seminar report final
Smart quill seminar report finalSmart quill seminar report final
Smart quill seminar report final
 

Similar to DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) The New Freedom of Speech an

Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure ChannelViral Parmar
 
Internet relay chat (irc)
Internet relay chat (irc)Internet relay chat (irc)
Internet relay chat (irc)Ryon Whyte
 
TESOL EVO 2020 Escape the Classroom! - Using Ciphers
TESOL EVO 2020 Escape the Classroom! - Using CiphersTESOL EVO 2020 Escape the Classroom! - Using Ciphers
TESOL EVO 2020 Escape the Classroom! - Using CiphersGraham Stanley
 
DNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloadedDNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloadedMen and Mice
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tipspgmaynard
 
Security Assessment
Security AssessmentSecurity Assessment
Security AssessmentAnil Nayak
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 

Similar to DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) The New Freedom of Speech an (20)

Password hacking
Password hackingPassword hacking
Password hacking
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Week12
Week12Week12
Week12
 
Tor Tracer
Tor TracerTor Tracer
Tor Tracer
 
Defcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
Internet relay chat (irc)
Internet relay chat (irc)Internet relay chat (irc)
Internet relay chat (irc)
 
無題 1
無題 1無題 1
無題 1
 
TESOL EVO 2020 Escape the Classroom! - Using Ciphers
TESOL EVO 2020 Escape the Classroom! - Using CiphersTESOL EVO 2020 Escape the Classroom! - Using Ciphers
TESOL EVO 2020 Escape the Classroom! - Using Ciphers
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
DNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloadedDNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloaded
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
CryptoParty Belfast July 2015 Online Privacy Tips
 CryptoParty Belfast July 2015 Online Privacy Tips CryptoParty Belfast July 2015 Online Privacy Tips
CryptoParty Belfast July 2015 Online Privacy Tips
 
Security Assessment
Security AssessmentSecurity Assessment
Security Assessment
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Hacking
HackingHacking
Hacking
 

Recently uploaded

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 

Recently uploaded (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 

DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) The New Freedom of Speech an

  • 1. DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) The New Freedom of Speech and Privacy. No to mass censorship and spying. Deepweb websites can be seen and access only in the deepweb by using a Tor like browsers only. Make deepweb accounts, deepweb email addresses and deepweb websites in the deepweb now. Your must have a “HTTPS” protocol prefix for security thru SSL Certificate. NOT HTTP. Use VPN or Proxy to cover your IP address and PGP keys as extra security for email and login authentication. Use Bitcoins as a donation and payment method without spying on you. The more professionally operated and maintained deepweb (Tor .onion) websites, the more secured, resilient, more difficult to attack, detect, track, hack and shutdown. 2) Mariana’s Web is most secret Internet than the DarkWeb. that is accessible only by Quantum Computers http://www.dwavesys.com/quantum-computing, Closed Shell Systems & Polymeric Falcighol Derivation. 3)The Ideal Deepweb ebsite is Torchan (http://zw3crggtadila2sg.onion/imageboard/
  • 2. ) for its authentication/dialog boxes before viewing and login into the website. The most private and secured DeepWeb Website. Also, The Website must have SSL Certification, VPN, Bitcoin Address and PGP Key. It must be private, invite-only and PGP Key Authentication and Login Username/Email//Password (or Paraphrase) Protected. *Make accounts in https://vk.com the New Facebook and Twitter.* A) To get access to the Deepweb or Darkweb, the Secret and Hidden Internet: Install deepweb browsers or one of them like 1) Tor - https://www.torproject.org/ 2) Tails - https://tails.boum.org/ 3) I2P - https://geti2p.net/en/ B) Deepweb Search Engine and intro: Enjoy your deepweb adventure. The victory awaits 1) The Hidden Wiki -
  • 3. http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page 2) The Hidden Wiki Org – http://thehiddenwiki.org/ 3) TorLinks - http://torlinkbgs6aabns.onion/ 4) Harry 71 Deepweb Crawler - http://skunksworkedp2cg.onion/sites_title.html 5) Hidden Answers - http://answerstedhctbek.onion/ 6) http://ev3h5yxkjz4hin75.onion/wiki/index.php/Introduc.. C) Deepweb Social Media and Forum: Better than facebook and twitter without snooping and censorship. No phone numbers needed. Any email address 1) Galaxy 2 - http://w363zoq3ylux5rf5.onion/ 2) Torbook - http://torbookntnjusnqd.onion/ 3) Blackbook - http://blkbook3fxhcsn3u.onion/ 4) Torchan - http://zw3crggtadila2sg.onion/imageboard/ 5) 8Chan - http://oxwugzccvk3dk6tj.onion/ D) Deepweb Email and Messenging:
  • 4. secured but use ciphers and encryption: 1) Tor box - http://torbox3uiot6wchz.onion/ 2) Sigaint - http://sigaintevyh2rzvw.onion/ 3) Mail 2 tor - http://mail2tor2zyjdctd.onion/ 4) Lelantos - http://lelantoss7bcnwbv.onion// 5) Hidden rapport -http://jjx5ptpktk6lnycu.onion/login.php 6) Onion mail - http://iir4yomndw2dec7x.onion/ E) Bonus: 1) Bitcoin - https://www.bitcoin.com/ 2) Cyber Ghost VPN - http://www.cyberghostvpn.com/en_us 3) PGP Key - http://www.gpg4win.org/download.html 4) SSL or HTTPS - https://www.instantssl.com 5) Use LINUX instead of Windows or MAC 6) Hushmail
  • 5. 7) Protonmail 8) Fake GPS 9) Locker 10) Encrypted messaging Apps like WhatsApp and Telegram 11) RSA or rsa.com for public and private keys 12) Opera Browser Make passwords (now Paraphrase) 30 characters long mix small and big letters, numbers and symbols. Use manual/mechanical encryption devices like Enigma-Caesar cipher combination Encrypt your communications by hand or manually BEFORE using and send to Encryption/Cipher Machines, Encryption Programs, Encryption Apps and Internet. Uncrackable Codes and Ciphers http://weburbanist.com/2010/05/31/cryptic-codes-11-le.. http://listverse.com/2007/10/01/top-10-uncracked-codes/ The Uncrackable Cipher Systems: Voynich Cipher
  • 6. Zodiac Killer Cipher Beale Papers Dorabella Cipher D’Agapeyeff Cipher ChaoCipher Kryptos Affine Cipher Uncrackable Ancient Scripts “To make a better uncrackable encryption and cipher Systems.” The Manual Enigma Machine please modify it. http://www.creativecrafthouse.com/index.php?main_page.. http://www.creativecrafthouse.com/index.php?main_page.. http://www.creativecrafthouse.com/index.php?main_page.. http://www.creativecrafthouse.com/index.php?main_page..
  • 7. To modify the Manual Enigma Encryption Machines (Photo above): Please use any writing characters or writing scripts EXCEPT LATIN ALPHABETS Letters (Characters). The Writing Systems below: https://en.wikipedia.org/wiki/List_of_writing_systems Use rare languages for encrypted communication too http://www.toptenz.net/top-10-rarest-languages.php Then use a different Binary Code Systems by using Letters than Numbers or Using Numbers except Zero (0) and One (1). Do them Both. Combine with Bacon Cipher to hide the coded messages within the plain messages. Do it (encrypt) better than the Aryan Brotherhood Prison Gang in America. Use public and private keys that needs a year of preparation before use the cipher system. Aryan Brotherhood Code (Bacon Cipher and Enigma Coded texts hidden within the Plaintexts) The Hand written or typewriter written code book (DO NOT use of computers, gadgets or printers in making the code books) must be good enough for a year. The Number of Coding Methods like public/private keys, numbers, characters, symbols, binary codes, permutations and combinations must be HOW MANY SECONDS IN A YEAR. Then divide them (Coding Methods) into minutes, hours, days, weeks, months, quarters or semi annual of the the Year to make
  • 8. different Coding Patterns of your choice (NEVER use 1 coding pattern more than 1 or 2 messages to prevent code breaking). The book must only a select trusted FEW, distribute the code book excerpts to others weekly or monthly. You Need to make 10 more unique code books (good for 10 years). The best is 20 code books (20 years). Do not save in the computers with internet connection or flash drives, just Hand written or typewriter written paper only in codes, anagrams or invisible ink. Mathematical skills like Algebra, Trigonometry, Algorithms, Geometry, Calculus and Statistics is important to make public and private keys for better encryption like RSA and PGP. Also make a different writing paths rather than writing from horizontal left to right (Latin Writing Path), Writing from horizontal right to Left (Arabic Writing path). Other writing paths like skipping, diagonal, weaving, zigzag, vertical, spiral and etc. The number of characters per line in cipher blocks can be even or odd (17 of 20 characters per line). The patterns of cipher blocks must NOT in a square alone; means use diamond, circle, stripe, trapezoid and triangle hidden within the cipher block. Add nulls within the cipher block. Make your cipher sophisticated that the code breakers will call HOAX (means They quit) Just only to you. DISCIPLINE, TRUST, ALERTNESS, AWARENESS AND UNIQUENESS are important for Successful Encryption. The shape of the cipher block of zodiac killer cipher is square and odd
  • 9. (17 characters per line). Encrypt your messages manually with Bacon Cipher plus enigma or other ciphers (used by Aryan Brotherhood prison Gang) before using encryption apps like Telegram, Mail, Morse Code Telegram, Text and Email. Modify by yourself all the time. F) THE MOST SECURED INTERNET/ONLINE USE LAYOUT: F-1) USER ->Password -> PGP -> VPN –> HTTPS/SSL -> TOR/DARKWEB <- HTTPS/SSL <- VPN <- PGP <– Password <-Website(s) F-2) USER -> Quantum Computer, Closed Shell Systems (CSS) or Polymeric Falcighol Derivation (PFD) -> Password -> PGP -> VPN –> HTTPS/SSL -> Marianas’ Web <- HTTPS/SSL <- VPN <- PGP <– Password <- Quantum Computer, Closed Shell Systems (CSS) or Polymeric Falcighol Derivation (PFD) <-Website(s) Buy Quantum Computers and Quantum Encryption now athttp://www.dwavesys.com/quantum-computing