We did plan on creating our own amazing, in-depth deep web security guide for beginners. But, we found one by Jolly Roger that is better than anything we could put together.The original guide can be seen on The Hub Forums here:gttp://thehub7dnl5nmcz5.onion/index.php?topic=52.0. All credit goes to Jolly Roger who obviously put in a lot of time creating this fantastic guide.When looking for sites on the Deep Web then just go and check out our mega Deep Web Links list. It is one of the biggest lists of hidden .onion URL’s on the internet.

Donations

Jolly Roger has put in a lot of work to create this comprehensive deep web security guide for beginners. If you appreciate the work he has done, why not give a small donation…Donation Address: 1PkJ928QWC5BuQAsHoNQzRV5wfnveJSRCp

Tip for Beginners:

Before doing anything on the Dark Web or even learning about it, make sure you are protected with a VPN and Tor. The guide below goes into this, but you should be using a VPN to even read this guide or any other Dark Web related topic.The Feds are watching everything, so you are better off not letting them know you are even interested in the Dark Web. This site here goes through pretty good VPN’s and they usually have good discounts. https://topvpnsoftware.com

The Guide

INTRODUCTiON TO SECURE COMMUNICATION – TOR, HTTPS, SSL

PGP, TAILS, VIRTUAL BOX

  • PGP CONTINUED
  • WHOLE DISK ENCRYPTION AND FILE SHREDDING
  • JAVASCRIPT VULNERABILITIES AND REMOVING PERSONAL METADATA FROM FILES
  • GENERAL SECURITY PRECAUTIONS WHEN POSTING ONLINE, LEARN FROM OTHERS’ MISTAKES
  • EXIF DATA
  • RETAINING A LAWYER, HOW TO HANDLE GETTING CAUGHT OR INTERROGATED
  • COMBINING TOR WITH A VPN
  • COMBINING TOR WITH A VPN CONTINUED
  • CONNECTING TOR -> VPN FOR WINDOWS USERS
  • TRACKING COOKIES
  • LEARNING FROM OTHERS’ MISTAKES. LIBERTAS, DPR, SABU, LULZSEC
  • HOW FAR WILL LAW ENFORCEMENT GO?
  • FRAUDULENT PRIVATE MESSAGES
  • LEARNING FROM OTHERS’ MISTAKES. HOW THEY BUSTED SABU
  • LEARNING FROM OTHERS’ MISTAKES. SABU BECAME FBI INFORMANT AND BETRAYED JEREMY HAMMOND
  • WHERE YOU MIGHT CONSIDER RUNNING TO, IF YOU HAD NO OTHER CHOICE
  • SECURING YOUR ACCOUNT FROM FBI MONITORING
  • INVINCIBILITY MINDSET, FEDERAL GOVERNMENT BULLYING TACTICS
  • HOW TO CONNECT TO TOR OVER TOP OF TOR
  • HOW TO VERIFY YOUR DOWNLOADED FILES ARE AUTHENTIC
  • VERIFYING SIGNED MESSAGES WITH SIGNATURES AND SIGNING YOUR OWN MESSAGES
  • AN EXAMPLE OF REALLY BAD OPSEC – SMARTEN UP!
  • TOR CHAT
  • OBTAINING, SENDING AND RECEIVING BITCOINS ANONYMOUSLY
  • CLEARNET VS HIDDEN SERVICES – WHY YOU SHOULD BE CAREFUL
  • THEY ARE WATCHING YOU – VIRUSES, MALWARE, VULNERABILITIES
  • MONITORING YOU WITH AN ANTENNA
  • COOKIES & JAVASCRIPT REVISITED, PLUS FLASH COOKIES AND OTHER BROWSER TRACKING
  • A FEW RECOMMENDATIONS
  • COLD BOOT ATTACKS, UNENCRYPTED RAM EXTRACTION
  • THE STRENGH OF CRYPTOGRAPHY AND ANONYMITY WHEN USED PROPERLY
  • PGP/GPG Email Addresses
  • ANOTHER SCAM EMAIL – BEWARE
  • AN INTRODUCTION TO AN EXPERT ON OPSEC, PLUS MD5 & SHA-1 CHECKSUMS
  • IT IS OBVIOUS WHEN YOU ARE USING TOR
  • ARE YOU USING SAFE-MAIL.NET ?
  • YET ANOTHER EXAMPLE OF HOW STRONG CRYPTOPGRAPHY AND PROPER OPSEC CAN PROTECT EVEN PEDOPHILES
  • LOCALBITCOINS PART 1 – POLICE ARE WATCHING IT!
  • LOCALBITCOINS PART 2 – THIEVES, SCAMMERS AND COUNTERFEIT BILLS!
  • LOCALBITCOINS PART 3 – MORE SCAM STORIES
  • LOCALBITCOINS PART 4 – SELLERS BUSTED FOR MONEY LAUNDERING
  • HIDING TOR FROM YOUR ISP – PART 1 – BRIDGES AND PLUGGABLE TRANSPORTS
  • CAPABILITIES OF THE NSA
  • WHY YOU SHOULD ALWAYS BACK UP YOUR DRIVES, ESPECIALLY ENCRYPTED DRIVES
  • BITCOIN CLIENTS IN TAILS – BLOCKCHAIN AND ELECTRUM
  • Kenyan Hacker Steals Billions Through Hacking
  • 14 Tips To Online Safety And Security
  • Top Court in India Rules That Privacy Is a Fundamental Right
  • Security Tips for Online Shopping This Holiday Season
  • 1 Week with Snowden’s Preferred OS: A Look at Qubes & the Balance of Security

Tutorials Point