The Matrix Metaphor of the Deep Web

If you have ever been on the Deep Web, you already know it's a crazy place. It's notorious for it's illegal activity, Black Hat Hacking Forums, Scams, Whistle blower blogs, and pretty much anything else you could imagine. The first link on "The Hidden Wiki" of the Deep Web is "The Matrix Metaphor" and it's labeled as a nice read. After reading it through, I ascertained that it was an interesting perspective on the state of today's society. Particularly after the recent events with NSA and the If you want a full text on the article, it is posted it...


Continue reading...

Super Sophisticated Malware "Regin" has been Spying on Users for Years

Symantec has released a report on a malware under the name of "Regin". This malware has been online since 2008, and has gone undetected since then. According to Re/Code who interviewed Symantec, the origin of the malware has remained unclear. The sophistication and effort put into Regin, however, makes it clear that it was made by no basement-dwelling neckbeard from 4Chan. This is the doing of a large organization, possibly with government origins, made for espionage purposes. It is reminiscent of Stuxnet, another virus that Symantec uncovered. Stuxnet was made by the US in cooperation with Israel to sabotage the...


Continue reading...

What is a Virtual Private Network, and How do You Install a VPN?

So you've decided you want to reclaim your internet freedom by remaining more anonymous online, great! You've come to the right place. But for all those that stumbled in this article in their drunken stupor of internet curiosity, let me first explain what a VPN is, and why you should use one. In short a VPN is a Virtual Private Network (VPN, duh). It's a virtual version of the network I am assuming your already connected to, since your reading this article on the internet. This virtual private network is a group of computers networked together over the internet, the...


Continue reading...

Mobile Monitoring Applications

Mobile monitoring apps have gone worldwide due to their user-friendly usage and countless benefits. In this article we will go through the most popular monitoring apps that are now dominating in the world market. If you want to avoid being tracked, keep in mind how people may try to spy on you. You can also look into various encryption solutions, to encrypt your interaction between anyone you may contact. Cell phone Monitoring Cell phone monitoring and tracking apps are aimed to be used in three cases: parental control, employee tracking and senior tracking. The leading companies in this area are...


Continue reading...

Feds haven't actually busted 400+ Darknet Sites

Recently many websites have reported that the FBI and Operation Onymous (clever name) have seized over 400 Darknet Sites. These sites clearly have no conception how the Deep Web operates, because the FBI definitely did not seize this many sites, and they have most certainly not put a dent in the online trafficking of illicit substances and items. On November 7, the BBC reported that "Silk Road 2.0 and 400+ other sites believed to be selling illegal items including drugs and weapons have been shut down.". Other websites reported similar findings. Although the FBI did seize the Silkroad and other...


Continue reading...