close
    search Buscar

    How to enter the Deep web, I tell you everything

    Who I am
    Pau Monfort
    @paumonfort

    Item Feedback:

    content warning

    The deep web is an infamous digital hive of scum and evil, it is a part of the hidden web, where people around the world visit the black market and conduct encrypted activities away from prying eyes, but, like entering the Deep web. It is a kind of hidden Internet and it is very difficult to get into it, which makes many people curious.


    However, there are other, more innocent reasons for accessing the deep web. Journalists, for example, can use it as a way to communicate with whistleblowers who want to protect their identity. Internet users under oppressive regimes can access the dark web to communicate freely with the outside world. White hat programmers may want to search and study various malware to prepare for defenses. Ready then let's read together how to enter the deep web.



    How to enter the Deep web

    Warning: it is essential to pay close attention when accessing the dark web. The dangers of the deep web aren't limited to getting arrested by law enforcement for buying stolen goods. Even if you are not involved in illegal activities, there are other things to worry about, such as becoming a victim of identity theft or extortion. Browsing the deepweb can make you particularly vulnerable to such attacks by hackers and other criminals. There is also the possibility that you may come across illegal pornography or bad images.

    Check out the steps below to learn more about the deep web staying safe.


    How to access the Deep web

    1. Get started with encryption: Download Tor and the Tor browser

    Tor is the encryption program that people use to browse the deep web. While this encryption can work with several obscure browsers, the most common option is the Tor browser, because it's free and easy to use.



    But how to navigate the Deep web? These days, however, it is common practice to add Tails, which is an additional security measure to protect your IP address. We suggest you start by downloading a safe version of Tails. The Tails download should include Tor and the Tor browser as a complete package, so you'll have everything you need to get started. However, be aware that Tails requires a blank USB storage drive attached to work, so you may need to purchase an additional flash drive.


    You may also want to download and enable a virtual private network (VPN) for added security when using Tor and Tails. When you prepare to enter the underground internet, security is never too much.

    2. Prepare the computer to enter the submerged web

    You don't want anything on your computer that a hacker can take advantage of, which is pretty much everything. Then close all open apps and functions. Close any files you are working on. Unplug or hide your webcam and do the same with all of your computer's microphone settings - yes, these can be used against you. Okay, we're a little paranoid at this juncture.

    3. Deep web how to enter? Paying attention

    Without browsers like Google carefully organizing search results, the dark web is a bit cluttered, which can make it difficult to find what you're looking for. We highly recommend that you do a lot of research and know exactly where you are going before starting.



    To help with this, there are wikis that collect various dark web sites or directories which are (relatively) popular stops and good starting points. Popular options include the dirnxxdraygbifgc.onion.to directory. 

    Take a look at the sites these directories have collected and see what topics interest you. Keep in mind that the categories include absolutely everything, so stay away from bad things, like hiring goons or buying stolen goods.


    We also suggest that you search the sites you intend to visit to see what people are saying about their safety and how safe they are. Just because a site is in these directories doesn't mean it won't harm you or your computer. Never visit one of these sites directly on a normal browser - draw the line while searching.

    Once you have a clear destination in mind, close the browser (described in step 2) and open the Tor browser to visit the same directories. It's also a good idea to turn off JavaScript before you start for added security. The Tor browser is essentially a rebuilt version of the early Firefox browsers, so if you've used Firefox in the past, browsing should look familiar.

    4. Understand how transactions work before doing anything

    There are no rules in a black market, but there are some agreed trading methods so that people can trade. In the deep web, this means using cryptocurrency such as Bitcoin.

    We're not suggesting that you try to buy anything - it's another big can of worms - but if you look into a transaction, you understand you'll need a cryptocurrency to do so safely, and even then, “safe” is a prospect issue.


    Generally speaking, people who buy anything on the deep web first move Bitcoin (or their favorite cryptocurrency) from the Bitcoin exchange into a heavily secured wallet. Then, they move the coins from the wallet to the dark web. 

    Again, it is advisable to use a separate wallet solely for dark web activity and only move the coins you intend to spend into the wallet. Use a separate name and password for the wallet that you will never use elsewhere. Many people have had their exchanges and wallets hacked for lack of attention.


    5. Dark web how to enter safely

    The FBI can track people on the dark web and keeps the breadth of these capabilities a closely guarded secret, meaning you could still be prosecuted for breaking the law even if encrypted.

    However, a more immediate danger to beginners is the large number of traps and hackers on the dark web trying to steal personal information and follow any trail on your computer to find out more about you. Identity theft and blackmail are rampant. So be on the lookout, don't wander around too much and don't trust any sites or contacts you find.

    6. Close everything when done

    While in the Tor browser, avoid any other activity on your computer - keep everything off. In fact, it's common advice to also avoid changing the settings (outside of the JavaScript step we mentioned) or the Tor browser window size, as this could be used to track you.

    When you are done, close the Tor browser and completely shut down / restart your computer. Be very careful when you reboot and if everything seems to be working normally, you can enable the microphone settings, webcam and other functions.

    Further Reading:

    • How to create an online passport photo
    • How to block Whatsapp, all methods
    • How to enter Recovery Mode on Samsung Galaxy A70
    • How to enter Recovery Mode on Samsung Galaxy A41
    • How to enter Recovery Mode on Samsung Galaxy A40
    add a comment from How to enter the Deep web, I tell you everything
    Comment sent successfully! We will review it in the next few hours.