DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) The New Freedom of Speech an
1. DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and
Ciphers
1) The New Freedom of Speech and Privacy.
No to mass censorship and spying.
Deepweb websites
can be seen and access only in the deepweb by using a Tor like
browsers only. Make
deepweb accounts, deepweb email addresses and deepweb websites in
the deepweb
now. Your must have a “HTTPS” protocol prefix for
security thru SSL Certificate. NOT HTTP. Use VPN or Proxy
to cover your IP address and PGP keys as extra security for email and
login authentication. Use Bitcoins as a donation and payment method
without spying on you. The more professionally operated and
maintained
deepweb (Tor .onion) websites, the more secured, resilient, more
difficult to
attack, detect, track, hack and shutdown.
2) Mariana’s Web is most secret Internet than the DarkWeb. that is
accessible only by Quantum
Computers http://www.dwavesys.com/quantum-computing, Closed
Shell Systems & Polymeric Falcighol Derivation.
3)The Ideal Deepweb ebsite is Torchan
(http://zw3crggtadila2sg.onion/imageboard/
2. ) for its authentication/dialog boxes before viewing and login into the
website. The most
private and secured DeepWeb Website.
Also, The Website must have SSL Certification, VPN, Bitcoin Address
and PGP
Key. It must be private, invite-only and PGP Key Authentication and
Login
Username/Email//Password (or Paraphrase)
Protected.
*Make accounts in https://vk.com the
New Facebook and Twitter.*
A) To get access to the Deepweb or Darkweb, the Secret and Hidden
Internet: Install
deepweb browsers or one of them like
1) Tor - https://www.torproject.org/
2) Tails - https://tails.boum.org/
3) I2P - https://geti2p.net/en/
B) Deepweb Search Engine and intro:
Enjoy your deepweb adventure. The victory awaits
1) The Hidden Wiki -
3. http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
2) The Hidden Wiki Org – http://thehiddenwiki.org/
3) TorLinks - http://torlinkbgs6aabns.onion/
4) Harry 71 Deepweb Crawler -
http://skunksworkedp2cg.onion/sites_title.html
5) Hidden Answers - http://answerstedhctbek.onion/
6) http://ev3h5yxkjz4hin75.onion/wiki/index.php/Introduc..
C) Deepweb Social Media and Forum:
Better than facebook and twitter without snooping and censorship.
No phone numbers needed. Any email address
1) Galaxy 2 - http://w363zoq3ylux5rf5.onion/
2) Torbook - http://torbookntnjusnqd.onion/
3) Blackbook - http://blkbook3fxhcsn3u.onion/
4) Torchan - http://zw3crggtadila2sg.onion/imageboard/
5) 8Chan - http://oxwugzccvk3dk6tj.onion/
D) Deepweb Email and Messenging:
4. secured but use ciphers and encryption:
1) Tor box - http://torbox3uiot6wchz.onion/
2) Sigaint - http://sigaintevyh2rzvw.onion/
3) Mail 2 tor - http://mail2tor2zyjdctd.onion/
4) Lelantos - http://lelantoss7bcnwbv.onion//
5) Hidden rapport -http://jjx5ptpktk6lnycu.onion/login.php
6) Onion mail - http://iir4yomndw2dec7x.onion/
E) Bonus:
1) Bitcoin - https://www.bitcoin.com/
2) Cyber Ghost VPN - http://www.cyberghostvpn.com/en_us
3) PGP Key - http://www.gpg4win.org/download.html
4) SSL or HTTPS - https://www.instantssl.com
5) Use LINUX instead of Windows or MAC
6) Hushmail
5. 7) Protonmail
8) Fake GPS
9) Locker
10) Encrypted messaging Apps like WhatsApp and Telegram
11) RSA or rsa.com for public and private keys
12) Opera Browser
Make passwords (now Paraphrase) 30 characters long mix small and big
letters, numbers and symbols. Use manual/mechanical encryption
devices like Enigma-Caesar cipher combination
Encrypt your communications by hand or manually BEFORE using and
send to Encryption/Cipher Machines, Encryption Programs, Encryption
Apps and Internet.
Uncrackable Codes and Ciphers
http://weburbanist.com/2010/05/31/cryptic-codes-11-le..
http://listverse.com/2007/10/01/top-10-uncracked-codes/
The Uncrackable Cipher Systems:
Voynich Cipher
6. Zodiac Killer Cipher
Beale Papers
Dorabella Cipher
D’Agapeyeff Cipher
ChaoCipher
Kryptos
Affine Cipher
Uncrackable Ancient Scripts
“To make a better uncrackable encryption and cipher Systems.”
The Manual Enigma Machine please modify it.
http://www.creativecrafthouse.com/index.php?main_page..
http://www.creativecrafthouse.com/index.php?main_page..
http://www.creativecrafthouse.com/index.php?main_page..
http://www.creativecrafthouse.com/index.php?main_page..
7. To modify the Manual Enigma Encryption Machines (Photo above):
Please use any writing characters or writing scripts EXCEPT LATIN
ALPHABETS Letters (Characters). The Writing Systems below:
https://en.wikipedia.org/wiki/List_of_writing_systems
Use rare languages for encrypted communication too
http://www.toptenz.net/top-10-rarest-languages.php
Then use a different Binary Code Systems by using Letters than
Numbers or Using Numbers except Zero (0) and One (1). Do them Both.
Combine with Bacon Cipher to hide the coded messages within the
plain messages. Do it (encrypt) better than the Aryan Brotherhood
Prison Gang in America. Use public and private keys that needs a year
of preparation before use the cipher system.
Aryan Brotherhood Code (Bacon Cipher and Enigma Coded texts hidden
within the Plaintexts)
The Hand written or typewriter written code book (DO NOT use of
computers, gadgets or printers in making the code books) must be
good enough for a year. The Number of Coding Methods like
public/private keys, numbers, characters, symbols, binary codes,
permutations and combinations must be HOW MANY SECONDS IN A
YEAR. Then divide them (Coding Methods) into minutes, hours, days,
weeks, months, quarters or semi annual of the the Year to make
8. different Coding Patterns of your choice (NEVER use 1 coding pattern
more than 1 or 2 messages to prevent code breaking). The book must
only a select trusted FEW, distribute the code book excerpts to others
weekly or monthly. You Need to make 10 more unique code books
(good for 10 years). The best is 20 code books (20 years). Do not save in
the computers with internet connection or flash drives, just Hand
written or typewriter written paper only in codes, anagrams or invisible
ink.
Mathematical skills like Algebra, Trigonometry, Algorithms, Geometry,
Calculus and Statistics is important to make public and private keys for
better encryption like RSA and PGP.
Also make a different writing paths rather than writing from horizontal
left to right (Latin Writing Path), Writing from horizontal right to Left
(Arabic Writing path). Other writing paths like skipping, diagonal,
weaving, zigzag, vertical, spiral and etc. The number of characters per
line in cipher blocks can be even or odd (17 of 20 characters per line).
The patterns of cipher blocks must NOT in a square alone; means use
diamond, circle, stripe, trapezoid and triangle hidden within the cipher
block. Add nulls within the cipher block. Make your cipher sophisticated
that the code breakers will call HOAX (means They quit) Just only to
you.
DISCIPLINE, TRUST, ALERTNESS, AWARENESS AND UNIQUENESS are
important for Successful Encryption.
The shape of the cipher block of zodiac killer cipher is square and odd
9. (17 characters per line).
Encrypt your messages manually with Bacon Cipher plus enigma or
other ciphers (used by Aryan Brotherhood prison Gang) before using
encryption apps like Telegram, Mail, Morse Code Telegram, Text and
Email. Modify by yourself all the time.
F) THE MOST
SECURED INTERNET/ONLINE USE LAYOUT:
F-1) USER ->Password -> PGP -> VPN –> HTTPS/SSL -> TOR/DARKWEB <-
HTTPS/SSL <- VPN <- PGP <– Password <-Website(s)
F-2) USER -> Quantum Computer, Closed Shell Systems (CSS) or
Polymeric Falcighol Derivation (PFD) -> Password -> PGP -> VPN –>
HTTPS/SSL -> Marianas’ Web <- HTTPS/SSL <- VPN <- PGP <– Password
<- Quantum Computer, Closed Shell Systems (CSS) or Polymeric
Falcighol Derivation (PFD) <-Website(s)
Buy Quantum Computers and Quantum Encryption now
athttp://www.dwavesys.com/quantum-computing