Introduce darknet free vpn and anonymity services1. Darknet and deep web are the hidden side and don't seen side of the Internet for General users
and maybe for most professional users in the world.for browsing in the Internet and any move in
the this Great Network of course we need to protect our privacy and keep ourselves secure best
as we can, for this there are many privacy protect services such as premium vpn services and
free services and proxies in the Internet and we just see many advertising of them in the
everywhere on the Internet ,but actually and honestly most of these services provide from some
companies with some special purposes and of course it's not protect ours privacy i think its
surveillance system and its gathering users information and activities logs and maybe sell them
and maybe analyze them to use in marketing purposes and we have to be careful what we have
to use and how we have to do it, let's know more about some better service we have to use for
protect our privacy and little anonymity in the Cyber World.
1 - TOR Project
From Wikipedia:Tor is free software for enabling anonymous communication. The name is
derived from an acronym for the original software project name "The Onion Router".Tor directs
Internet traffic through a free, worldwide, volunteer overlay network consisting of more than
seven thousand relays
to conceal a user's location and usage from anyone conducting network
surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced
back to the user: this includes "visits to Web sites, online posts, instant messages, and other
communication forms.Tor's use is intended to protect the personal privacy of users, as well as
their freedom and ability to conduct confidential communication by keeping their Internet
activities from being monitored.
Tor does not prevent an online service from determining when it is being accessed through Tor.
Tor protects a user's privacy, but does not hide the fact that Tor is being used. Some websites
restrict what is allowed when using Tor. For example, Wikipedia limits the edits that can be
made through Tor.
Of course it's not a good idea use Tor for browsing bcuz its have a little speed and
performance problem and some websites can not works good when we use that bcuz they need
to save and use cookies and tor by default revent from cookie saving ,but it's great for dark web
browsing and deep web browsing and also for testing and maybe penetration testing and
offensive tasks use,and it's good for that jobs and …
But its have weakness too just like every software and protocol and networks :
Like all current low-latency anonymity networks, Tor cannot and does not attempt to protect
against monitoring of traffic at the boundaries of the Tor network (i.e., the traffic entering and
exiting the network). While Tor does provide protection against traffic analysis, it cannot prevent
traffic confirmation (also called end-to-end correlation).
In spite of known weaknesses and attacks listed here, a 2009 study revealed that Tor and the
alternative network system JonDonym (Java Anon Proxy, JAP) are considered more resilient to
website fingerprinting techniques than other tunneling protocols.
The reason for this is that conventional single-hop VPN protocols do not need to reconstruct
packet data nearly as much as a multi-hop service like Tor or JonDonym. Website fingerprinting
2. yielded greater than 90% accuracy for identifying HTTP packets on conventional VPN protocols
versus Tor which yielded only 2.96% accuracy. However some protocols like OpenSSH and
OpenVPN required a large amount of data before HTTP packets were identified.Researchers
from the University of Michigan developed a network scanner allowing identification of 86% of
live Tor "bridges" with a single scan.
http://torproject.org/
2 - Riseup VPN Services
This Darknet Services are in to different model, Black VPN and RED VPN and RED vpn are
available for all platforms and all people but black vpn are for limited platform and under
development for all platforms and its have specific software to connect to that ,
For use both of this vpn’s we have to create free account in this websites in this address :
https://account.riseup.net/user/new
RED VPN :
When you connect to the internet through the VPN Red you are bypassing any firewalls on your
local network. Your computer will get its own IP address on the open internet. This is great,
because that way your computer can communicate freely with others without getting blocked.
However, bypassing the local firewall also means that your computer is more vulnerable to
attack.
Its used OPEN VPN protocol and location are in the “Western US “ and this is steps and info
we need to connect to it :
https://riseup.net/en/vpn/vpn-red
In that link you get download config file and import in your openvpn client and just connect with
yous riseup account you’ve created before .
Its support 3 ports to connect “80,443,1194” and support both of UDP and TCP protocols and
you can change anytime you want in to change direct from config file .
Black VPN:
Same as i told in top its need to use specific application to use this VPN , you have to get this
url first :
https://black.riseup.net
And after that you have to download BitMask application from this website:
https://bitmask.net/
And its now just support linux and android platforms but another OS is under developing
3. 3 - Autistici/Inventati
Autistici was born in 2001 from an encounter of individuals and collectives of the autonomous
anti capitalist movement who were interested in technology and active in the fight for digital
rights.
Another website providing free anonymity vpn service are this but for use this service you have
to provide your purposes for using vpn and answer few question from owners of this website
bcuz they are providing this service for limited people and not just for all general users
And first of anything you have to request from a mail account from this website to use vpn
service and answer to them questions on this page :
https://www.autistici.org/u/services/
After that if you accepted you got openvpn config and key and certificate files to use and its
work all platforms and have great anonymity and have a great speed and stability
More on the way ...