If you don't mind connected to lawless, extremely risky almost-anarchy freedom sites, using a vpn and using public wifi , a different antennae every day.. then here are databases of ONION sites for use with a TAILS bootable usb stick using tor:
MASSIVE SHADY LIST thousands of 'no rules' sites, updated weekly
extremely shady massive Onion link list :
https://onions.danwin1210.me/onions.php?cat=3&pg=1&lang=en
https://onions.danwin1210.me/onions.php?addr=mcxxg6td57hc4gup&pg=0&lang=en
https://onions.danwin1210.me/onions.php?addr=mcxxg6td57hc4gup&pg=0&lang=ja
[thousands of darkest tor sites, organized. Attacked by many nations' Fed LEAs often]
Onion 2021 announcements of not so scary sites :
https://www.reddit.com/r/onions/
THOUSANDS of dark net sites can be found using those database searches above.
personally, stay away. You really normally dont want to use those thousands of onion tor social boards unless you are a security expert and know how to never expose your equipment to javascript hacks, chromium hacks (lots of them), webrtc hacks, man-in-middle ssl hacks, and other hacks you need to be aware of that can root your machines, and break out of your virtual machines.
Tor ? Tails? nope!!!! They for years had hidden backdoors proven if you read the release notes of TAILS TAILS too? Yup, Even the famous https://tails.boum.org/
...had WebRTC enabled by accident (or by mossad on purpose) in past versions of TAILS, and if you read ALL THE CHANGE NOTES OF ALL VERSIONS you will learn I am telling the truth on the one little note they fessed up.
https://www.exploit-db.com/exploits/44403/
https://blog.ipvanish.com/webrtc-security-hole-leaks-real-ip-addresses/
https://thehackernews.com/2015/02/webrtc-leaks-vpn-ip-address.html
https://www.reddit.com/r/VPN/comments/2tva1o/websites_can_now_use_webrtc_to_determine_your/
That is NOT the only weakness in Tor browser, there were other non-WebRTC leaks!!!! Javascript (required for poal.co) and (required for Cloudflare) had exploits in summer 2019 that leaked endpoint IP addresses, and even allowed kernel level OS alteration on Mac OS using TAILS!!!!!! Many years of tails exploits prior too.
NO large web browser should EVER be trusted not to divulge IP addresses over VPN
Anyone trusting using TAILS along with its graphical browser, is a patsy. The rest are in prison already if they were criminals.
Only use text messaging , not a graphical web browser, when using TAILS, or tor services and VPNs! No fancy web browsers!
Even better, use a "one time visit" concealing gait and face (attach heavy ankle weight to one leg), to a coffee shop.
A good virtual machine to hide another virtual machine inside exists just for privacy.
Remember TOR/TAILS often runs unstoppable javascript using exploits by FBI, such as the infamous recent noscript vulnerability!...
https://www.netsparker.com/blog/web-security/noscript-vulnerability-tor-browser/
javascript code can cause lots of problems for your anonymity, and even root your machine , as in summer of 2019.
HTML5 fingerprints and indestructible cookies also thwart SOME VPN users too :
25% of sites fingerprint you using javascript (dead voat's CloudFlare did and others, require javascript to connect)
2020.08 : A quarter of the Alexa Top 10K websites are using browser fingerprinting scripts! https://www.zdnet.com/article/a-quarter-of-the-alexa-top-10k-websites-are-using-browser-fingerprinting-scripts/
Brave chrome browser deadly in 2021!:
- 1> 2021 Brave copied hard drive hardware IDs:
Brave chrome browser got caught leaking machine-id in Windows of Your Drive serial number!
Brave hashes it - which is better than nothing, but (((they))) know the key to the hash and have no excuse for tracking your hardware for Feds.
- 2> 2021 Brave Browser Was Exposing Addresses in Tor Mode for Months to Feds and Mossad on other end!!!:
SOURCE:
https://www.coindesk.com/brave-browser-leak-exposed-user-domain-info-months
https://archive.is/2usdt
- 3> 2021 Brave Browser leaked .onion internal lookup addresses OUTSIDE machine to ISPs port 53 public DNS for Feds to see where you surf! :
SOURCE:
https://www.reddit.com/r/netsec/comments/lndfms/more_in_comments_brave_browser_leaks_your_tor/
https://archive.is/gbw97
The Brave kikes were probably paid millions to put in other backdoors into Brave for Feds or Mossad. It may have been unknown to management and bribes paid to engineers.
Fanboys of Brave are indistinguishable from paid jew JIDF defenders of Brave and Mossad.
For normal daily web browsing use this privacy browser : https://github.com/gab-ai-inc/defiant-browser
Do not trust it on TAILS though.
using TAILS? use HiddenVM too
ASTOUNDING NEW FREE TOOL!! HiddenVM - Use any desktop OS without any traces! Hides your TAILS install completely! Laptops secure at coffeeshops,libraries, etc from Feds copying it! Cannot be figure out after confiscation!
HiddenVM – Use any desktop OS without leaving a trace , Hides your TAILS install completely!
https://github.com/aforensics/HiddenVM
https://news.ycombinator.com/item?id=22492343
There are many reasons why you may want to use HiddenVM.
whonix OS! inside HiddenVM, for TAILS on a USB, for coffeeshops or libraries: ...
I SUGGEST if you do not need OSX or Windows, to install Whonix secure Tor anonymization and TAILS inside your HiddenVM !!!
https://www.whonix.org/
So in summary : use a visa vanilla 100 dollar gift card bought with cash from a store you visited once, face obscured, to buy a prepaid 15 month account at EXPRESSVPN.COM. Then use EXPRESSVPN.COM only outside your home on public wifi, and use it with a usb stick you boot from on your laptop with HiddenVM operating system VM and inside HiddenVM install www.whonix.org, and use updated tor tails in www.whonix.org.
TL;DR: TOR and TAILS still risky, but adding EXPRESSVPN.COM and adding HiddenVM and whonix.org, is 99.99% safe, if you avoid Brave browser.
Thanks for the info. Really great stuff.
I have a question though.
I've never used Tor or looked at any onion sites on the dark web.
Is there any reason to?
I just want real news and info on what's going on. I don't have anything particularly edgy to say and no need to talk with anyone privately.
That being the case, is there anything I need to know that I can't already see on the clear web. Like have you ever seen some article that made you go "wow this blows my mind, I wouldn't have seen this anywhere else".
I'm guessing no, and there's no point in me using the darkweb.
If EVERYONE used the Dark web often, then Jews would have a harder time shutting down sites like poal.co in the future, if it too were on an onion link path. So in that regard, more normies are needed.
Right now, over 80% of the "only on" Dark web is illegal stuff in various countries.
If you never use the dark web, you can not be framed and setup by feds for looking at a thumbnail image of 48 by 48 pixels that another fed uploaded, to entrap people.
stay the hell away, unless all normal free speech sites start getting closed by democrat FBI goons.
Holy shit, bro, you are a gem of an autist
Great! Thanks.
Also zerone- zerotalk in the p2p section. I2p and freenet.
will remember :
https://zeronet.io/
https://github.com/HelloZeroNet/ZeroNet
Decentralized Open, free and uncensorable websites using Bitcoin crypto and the BitTorrent network
https://github.com/HelloZeroNet Decentralized forum, ZeroTalk , ZeroMe
.zil web addresses : Avoid DNS alone, and use .zil web addresses on a Blockchain End Internet Censorship : https://www.castlecrypto.gg/blockchain-domain-names-eth-zil/ https://unstoppabledomains.com/
Freenet is a peer-to-peer platform for censorship-resistant communication. https://freenetproject.org
I2P Anonymous Network : The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design https://geti2p.net/en/
(post is archived)