Episode Transcript
Available transcripts are automatically generated. Complete accuracy is not guaranteed.
(00:00):
Beneath the surface of the Internet lies a hidden world, a
place where anonymity breeds some of the darkest, most
dangerous corners online. This is the dark web, a digital
shadow land filled with secret marketplaces, forbidden forums,
and sites most people will neverhear about.
These websites aren't just mysterious, they're terrifying.
(00:22):
In this video, we're diving deepinto the most terrifying dark
web websites, the ones law enforcement fears, hackers
exploit, and ordinary people wouldn't dare to set foot on.
Please like and subscribe. It helps more than you know.
And now let's get into some terrifying dark web websites,
(00:42):
Cracked Nold, Selex and Stark RDP.
Do you need cracked software, hacked accounts, tools to take
down a website? Well, for years sites like
Cracked, Nold, Selex and Stark RDP where they go to hubs for
online crime running wild in plain sight.
Although on January 29th, 2025 they disappeared.
(01:05):
Operation Talent, a massive international sting led by the
FBI and Europol shut them down overnight.
Raids, arrests and millions in damage.
Here's how it went down. Operation Talent was a multi
state operation involving serious coordination and efforts
between multiple global law enforcement agencies of several
different countries, namely the United States, Romania,
(01:28):
Australia, France, Germany, Spain, Italy and Greece.
This operation, like I said, wastargeted on the following sites,
Cracked, NOLLED, SELEX, and Stark RDP.
These sites specialized in providing users with crack
software such as Adobe products or video games as well as
selling information and illegal cybercrime services.
(01:52):
These services could be anythingfrom only fans leaks to even
taking down entire websites doxing people and it could even
go as far as blowing up routers.These cyber criminals from all
around the world would advertisetheir services where they
provide people with only fans leaks for free or even paid at
times paid high balance PayPal accounts etcetera.
(02:13):
These sites operated for years without being caught.
That was until the 29th of January 2025.
The following banner was uploaded on all of these sites.
This banner as fake as it looks is completely real.
The operation resulted in the following two people were
arrested in Spain, 7 different properties were searched, 17
(02:35):
servers were seized, 50 different electronic devices
were seized, and over €300,000 were seized in cash and crypto,
according to seizure warrants unsealed today.
The Cracked Marketplace has beenselling stolen login
credentials, hacking tools and servers for hosting malware and
stolen data, as well as other tools for carrying out
(02:56):
cybercrime and fraud. Since March 2018, Cracked had
over 4 million users listed. Over 28 million post advertising
cybercrime tools and stolen information, generated
approximately $4 million in revenue and impacted at least
17,000,000 victims from the United States.
One product advertised on Cracked offered access to
billions of leaked websites, allowing users to search for
(03:19):
stolen logging credentials. This product was recently
allegedly used to sex, tort, andharass a woman in the Western
District of New York. Specifically, a cyber criminal
entered the victim's username into the tool and obtained the
victim's credentials for an online account.
Using the victim's credentials, the subject then cyberstalk the
victim and sent demeaning and threatening messages to the
(03:41):
victim. The FBI Nold had been in
operation since 2016 and had over 5 million active users.
It had advertised several cybercrime tools, stolen login
details, stolen IDs, detailed guides on fraud, and much, much
more. The site saw over $1 million in
yearly revenue, with one ad claiming to have the names and
(04:02):
Social Security numbers of over half a million American
citizens. The site operated on the
Clearnet, but on several other channels such as Telegram, where
the staff had confirmed the takedown moments after it had
happened, they claimed. It was a sad day indeed for our
community. Son, an active admin of the
site, had been arrested, allegedto have performed escrow
functions on the site and that his services would be used to
(04:24):
complete transactions which involved stolen ID and
credentials. He's been charged with
conspiracy to traffic and passwords and information,
conspiracy to solicit another person for the purpose of
offering an access device or selling information regarding an
access device, and conspiracy topossess, transfer, or use a
means of identification of another person with the intent
(04:46):
to commit or to aid and abet or in connection with an unlawful
activity that is a violation of federal law.
Put simply, he's in a shit load of trouble if convicted, facing
up to 30 years in prison for allhis charges.
Some users online, however, believed these takedowns never
stick, speculating that the domains are already back up
(05:06):
somewhere else. RIP.
I'm sure they will be back up within the week on new domains
or sometimes even the same domain.
Yeah this or it just means it's some other sites turn.
These takedowns are kind of useless lol.
Some others, however, believe that these hacking forms were
simply just scams. Meh, in a way, hacking forms
have been basically dead for years.
(05:29):
A new one will come and continueto just be a scam.
Like these were all scams. But according to the FBI, this
takedown did make a huge impact.Russian anonymous marketplace
Silk Road has had many successors, but none have had
the longevity of RAMP, also known as Russian Anonymous
(05:49):
Marketplace. Inspired by the Silk Roads model
of anonymous cryptocurrency based e-commerce, it was a
marketplace used to sell substances.
It offered one of the widest variety of narcotics on the
entire dark web, but with one key difference.
It only served Russian speaking clientele.
After the OG marketplace of the Silk Road was shut down, many
(06:10):
clones popped up and were quickly shut down by
authorities. The biggest of them, Silk Road
2, lasted exactly 1 year to the day after Silk Road got shut
down. For comparison, Ramp lasted
nearly five years from September2012 when it was launched, until
July 2017. It was actually less of an eBay
style marketplace and more of a Craigslist forum where buyers
(06:32):
and sellers would find one another.
Then, once a connection has beenmade, most users leave the forum
and go to the other side, such as Off the Record, to finalize
the deal. Off the Record messaging is a
cryptographic protocol that is basically an encrypted, fully
secure version of the instant messaging apps we use today.
It provides something known as deniable authentication.
(06:54):
In short, that means that the people communicating can be sure
of who the person is while messaging them, but it cannot
later be revealed to another third party, in this case
police. While Ramp does provide an
escrow system similar to Silk Road, most sellers and buyers
prefer to use off the record messaging and then paying
Bitcoin or with the Russian payment service QIWI.
(07:17):
Sellers are known to be very cautious on the site, triple
sealing the substances or even going as far as to delivering
them to a dead drop where the buyer can go pick it up from.
Buyers can also leave reviews onthe seller's pages, with one
particularly happy seller leaving the follower view on a
seller's page in the nose. It is without foreign flavor and
(07:39):
is not bitter and sent, and it does not burn.
So how do people at Ramp make money?
Simply, they charge the top buyers a certain fee for their
own private sections on the forums, $300 a month.
For another $700.00 a month you can pay for your very own banner
advertising your product. And if you are really serious
(07:59):
about this and you want to sell some of the most potent
substances to the extremely demanding Moscow market, you
have to pay $1000 a month in order to sell from their
restricted quota list. The side administrator, also
known as Dark Side, agreed to aninterview with Wired conducted
on ramps very own private messaging system On tour.
Dark Side stays completely anonymous, not even revealing
(08:21):
his gender and his location set as a Galaxy far, far away.
He does apparently speak good English though, and share
details. In the above, he claimed that it
made over $250,000 a year, but compared to its predecessors
that is much less. But also compared to its
predecessors, it stayed up much longer.
According to Dark Side 6 figuresis just a regular income in the
(08:44):
local area he stays in, whereverthat is.
He says. I can be perhaps considered a
rich guy for a local, though. You can't live well on your
legal salary here. We ain't dollar millionaires,
just upper middle class guys whodo their job and feed their
families. He is also supposedly planning
to expand the site to include a payment system like Silk Road
had, or even cater to the English audience like similar
(09:06):
sites did at the time. So how did it survive so long
when during that time a Silk Road clone would be seized every
other week? It may simply be that the
Western authorities didn't want to target it.
It caters mainly to a Russian audience and is also speculated
to be hosted in Russia, where authorities usually turn a blind
eye to online crime. In Darkseid's own words, we
(09:30):
never mess with the CIA. We work only for Russians and
this keeps us safe. We can't the whole world and
remain safe. The site is also extremely
primitive because it doesn't have its own payment system or
any complex features, so it is hard to hack.
Ramp also focuses exclusively onsubstances, banning the sale of
(09:50):
weapons, stolen credit cards, counterfeit documents, and even
legal, which is much more restrictive than similar sites.
It also did not tolerate any political discussion at all.
Dark Side said that the politicsattract extra attention and that
they did not want that at all. While it did suffer from
frequent DDoS attacks, it would always come back up until July
(10:12):
2017, when Russian police confirm the news, they had
officially shut down the largestremaining dark net market.
In the same month, two other online substance markets similar
to RAMP, Alphabet and Hanza, also went down.
Even though many believe that law enforcement ignored RAMP,
that was apparently not the caseas Russian authorities released
(10:32):
the following statement to a Russian news agency.
As a result of the activities carried out in July 2017, the
largest Russian language tradingplatform, RAMP, Russian
Anonymous Marketplace, the largest in the Russian language
segment, was terminated. The MVD has permanently
implemented a set of measures aimed at identifying and
(10:53):
suppressing the activities of members of criminal groups
engaged in the distribution of synthetic substances, potent
substances and precursors in a non contact way using the
Internet. The main efforts are aimed at
suppression of substance supply channels and elimination of
organized groups and criminal communities engaged in their
sale. Dark OD If the dark web had a
(11:17):
Wall Street, Dark OD was its Stock Exchange, a high stakes
marketplace for the world's top hackers bought, sold and traded
illegal goods like stolen identities, hacking tools and
bot Nets. It didn't look like much from
the outside, just another hiddenforum, but behind the scenes it
was a slick, highly organized operation.
(11:37):
If you wanted to hire someone tobreak into an e-mail, grab
stolen credit cards, or control a massive army of hijacked
computers, Dark Code was the place to be.
This wasn't some messy underground chat room.
It was a polished marketplace where cyber criminals dealt in
secrets and malware as casually as people buy apps on their
phones. Professional, efficient, and
(11:59):
dangerous compared to its competitors, Dark Code was
generally regarded as the most dangerous by authorities, as it
had the largest group of criminal hackers and represented
the biggest threat to data safety.
In fact, a prominent attorney, David Hickton, said that Dark
Code was the most sophisticated English speaking forum for
criminal computer hackers in theworld, which represented one of
(12:23):
the gravest threats to the integrity of data on computers
in the United States. You can see the scale and impact
this dark web criminal form had.Started in 2009 by coder named
Acerdo, it was originally created to sell their bot called
Butterfly Bot. If you're active in the
cybersecurity space, you might know this bot as Mariposa, which
(12:44):
was a botnet used for denial of service attacks that was
discovered in 2008. It would install itself onto
unprotected computers and start monitoring for sensitive
information and then would propagate into other computers.
After the computer is fully infected it would contact the
malicious actors server and serve as a bot for their
purposes. For example, AD DOS attack it
(13:06):
cost an estimated 10s of millions of dollars to remove
and over 800,000 individuals personal data was stolen.
By the end of 2009, US authorityseized control of the bot
network, but unfortunately the owners took it back and launched
a revenge attack which actually knocked out Internet
connectivity for many Canadian universities and government
(13:26):
agencies. The following year in Spain, the
suspected leader of the group that created the botnet was
arrested along with two others. The creator of Butterfly Bots
where this all started, Acerdo, also known as Matzias Skornik,
was arrested in Maribar, Slovenia, but was released due
to lack of evidence. Around this time, Machaz gave up
(13:47):
control of the Dark Ode Forum toKrim, who created an exploit kit
named Crime Pack that was sold in the early days of the forum.
Machaz was arrested again in October of 2011 and finally
convicted in December 2013 in Slovenia for creating a
malicious computer program for hacking information systems,
assisting in wrongdoings and money laundering.
(14:10):
With nearly five years in prisonto look forward to, you would
think that Mad Jazz was done with the Internet.
However, just a year later he founded Nice Hash, a
cryptocurrency mining marketplace.
He was detained yet again in 2019 in Germany when the FBI
reopened the Mariposa botnet case with new charges.
Anyway, back to the main topic. After Mad Jazz started selling
(14:32):
his bots, the form grew very popular and turned invite only.
Existing members were given invites who they could give to
whoever they want and this only made Dark Code a more exclusive
and trustworthy forum. A few years later, in 2012, a
new access model would be announced.
There were now 2 layers to the membership.
Level 0, also known as Fresh Fish, was given to the new
(14:56):
members after they were invited by another member and were
vetted with an interview with the admin.
The next level up was Level 1. To gain trusted access, you
would have to prove yourself andthen you could access the real
meat in the Level 1 marketplace.Further on, the system was
revised to ban fresh fish from inviting people.
Level 2 was created for the highly trusted members.
(15:19):
With Darko becoming such a hot spot, it stumbled upon the bane
of many forums trolls. You might think that the invite
only model would have avoided this problem, but that only
works if all the members really care about the site.
This is a criminal form after all, and like most criminals,
money can easily sway their allegiance.
There was always somebody willing to give you an invite
(15:40):
for some quick cash, and researchers would exploit this
and gain easy access at the site.
Obviously, the four moderators didn't sit and watch and began
implementing measures such as mass demoting accounts and
banning strangers, and even targeting researchers directly.
Hackers were becoming wary, withresearchers becoming common.
And then in 2013, the downfall began.
(16:04):
A user named Special First was voted as admin.
They had a rather extreme strategy for rooting out
researchers. Even though they ban people who
invited them, researchers alwayscame back and Special first
would start handing out bands toanyone with even the slightest
suspicion. Soon Darko consisted only of
security researchers, the FBI ina very small selection of actual
(16:26):
hackers who were highly trusted.Of course, a marketplace can't
function without buyers, and Special first started basically
removing the exclusivity of the sites and spamming invites on
regular hacking forums. They even went as far as sending
messages to mailing lists from old hacking forms and even
posting in the comments of the cybersecurity researchers blogs
themselves. The heyday of Dark OD was
(16:48):
clearly over, and just a couple years later the site was shut
down for good. Codenamed Operation Shrouded
Horizon, the FBI, along with lawenforcement agencies from 20
different countries, seized the sites and arrested several
members. Over a period of 18 months.
They collected evidence for a variety of crimes, including but
not limited to conspiracy to commit computer fraud,
(17:10):
conspiracy to commit wire fraud,conspiracy to commit money
laundering, conspiracy to commitbank fraud, conspiracy to send
malicious code, spamming, identity theft, and racketeering
and extortion around the world. Around 70 people were arrested,
but this is obviously only a fraction of the users, and many
(17:31):
of Darko's frequent visitors arestill out there just two weeks
after a shutdown. However, the site relaunched on
the Tor network with supposedly increased security, although
shortly after it was hacked and the database leaked.
Docspin. Many of you are probably active
on various social media online and follow a few Internet
(17:52):
celebrities. They usually stay anonymous
because they want to protect their privacy against the many
followers they have. However, sometimes that
celebrity might irk the wrong person or get on the wrong side
of a particularly vengeful community, and they might dox
them as a kind of petty revenge.If you don't know what doxing
is, it's basically revealing personal information such as
(18:13):
their name, address, banking information without the person's
permission. Obviously this is dangerous and
also illegal, as the Internet isn't exactly known for
containing the most mentally stable individuals.
People get death threats or get SWAT teams called on them all
the times as some sort of prank.Of course, doxing is illegal in
(18:34):
most countries around the world,but some dark web websites don't
really follow the law. One website explicitly made for
this purpose is Docspin. Docspin was a paste bin, which
is basically a website where users can store text files and
can then share a link to allow others to view the content.
It describes itself as judge, jury, and executioner for all
(18:55):
matters relating to onion land. It first attracted major
attention when one of the site admins, known as Intanger,
hacked the Hidden Wiki. The Hidden Wiki is a sort of
strange page to the dark web that contains links to many
illegal websites. It also used to include links to
sites that provided which Intanger objected to.
And so he hacked the website andscrubbed the site clean.
(19:17):
On the docspins website he posted the following message
saying that he would support thehidden wiki if they A don't link
to sites and B allow community editing.
And Tanger said that he wants todo something good while showing
that the hidden wiki had terrible security and took its
domain as well. Some people on Reddit didn't
take this news well. Of course they weren't defending
(19:39):
existing, but instead had a problem with the inherent
censorship. One redditor wrote that it's
about keeping Tor free. Another felt like that the
supposed excuse for the kids would be used to control other
things, such as the UK's ban. The UK plan to make websites
verify the age of the user, similar to what is implemented
in some U.S. states now. But the plan was cancelled a
(20:02):
couple years later and Tanger didn't really seem to care, as
he wrote on Docspin. What I love about these
neckbeards complaining about censorship is that if someone
put their docs up, they'd be following up my inbox with
things like Take this down, Internet freedom, etcetera, and
I would just add the crying to their docs and make fun of them.
If someone added a pro NSA page to the wiki, they'll probably
(20:22):
edit it or at least spam the talk page about having it taken
down. Yet they're OK with links.
After the hack, the Hidden Wiki came back, promising to not
include any links to those websites anymore.
In an interview with The Guardian, the site's admin,
Nachash, says he does it to expose shitheads who had it
coming. One of his first targets, or
(20:43):
patient zero as he called them, was Jason Lee Van Dyke.
Van Dyke is a lawyer from Texas who represented a student from a
Texas university, was a victim of a revenge website called Pink
Meth. He attempted to sue the Tor
Project and the Trash was not happy with this, seeing it as an
attack on Tor. The Tor Project is how the
majority of dark oil websites are hosted.
(21:05):
It is a network that enables anonymous connections and
therefore hides the people who use it.
The trash was also close to those who ran Pink Meth website
and soon after Van Dyke's personal information was
uploaded to Docspin. Another person who was targeted
by the Internet was Robert Whitney, who was doxed after an
argument online when he claimed to have discovered a security
(21:25):
flaw for a coding website. People sent SWAT teams to his
house saying that they were in grave danger when in reality
nothing was happening. In one case, police were
informed that people were being held hostage at gunpoint.
Of course, the police didn't want to risk it, so they usually
do turn up heavily armed even ifthey suspect it is a prank call.
The site was eventually seized in November 2014, along with
(21:47):
several others in Operation Ominous.
Authorities did not reveal how exactly they managed to take it
down, but the main theories are that either the website had some
security issues in its code, or it was a direct attack on the
Tor network itself. However, ironically, considering
the sites no personal information of the sites admins
was found and no one was arrested, it is rather easy to
(22:08):
take back control of a seized site on the Tor network so the
docspin site could come back up anytime.
This is because the admins haven't been arrested and still
have access to the private key that controls the website and
can freely access it and do whatever they want with it.
But Nachash has no such plans apparently, as in his own words,
it's a 12 year old skid shit show and it's not worth my time.
(22:34):
Deep dot Web and dread for some of the websites we discussed
before. Some of the information sources
link to a site called Deep dot Web, but like me, if you try to
go to the site, we'll find that it no longer exists.
Deep dot Web is actually a news website dedicated mainly to the
dark web and its surrounding topics such as the Tor network,
(22:56):
cryptocurrency, and privacy. Major news about dark web
markets would be posted here first, for example, the hacking
of Silk Road, and then mainstream news outlets would
cover it. The site even included
comparisons between websites to help the confused customer
choose the best site to buy substances from.
Technically, this is not illegalas the site itself did not sell
(23:18):
any substances or have any illegal activities going on.
It was just a news site right? It's actually not even illegal
to post links to any black market sites, even if they
themselves are shady like most free news sites.
It ran ads on his website and had an affiliate marketing
system. You might see this on some
Youtubers descriptions where they post an Amazon link to some
(23:39):
product and if you buy through the link the creators get a
small percentage of it. Deep dot web had a similar
system where it would post linksto dark net markets and would
earn some revenue whenever a user bought from there.
In an investigation by Israeli police, the sites owners,
Tauberhar, an Israeli who lived in Brazil, and Michael Phan,
also of Israel, were raking in millions every year from these
(24:02):
affiliate deals. The Department of Justice
reported that 23.6% of all orders on Alpha Bay involved
deep dot web. Although that wasn't what they
were charged for. It was the common enemy of every
shady businessman in the US, thegood old IRS.
The owners were arrested for conspiracy to commit money
(24:24):
laundering and both pled guilty to their charges and were
sentenced to 97 months in prison.
Approximately 8155 bitcoins of revenue were transferred to
shell companies and then to their personal wallets.
It was worth $8.4 million then, but today it would be worth
about $890,000,000. All of it was forfeited after
(24:50):
the arrest. The website was seized by
authorities and only archives ofit exist on the Internet.
But this is the dark web, and new websites pop up after its
predecessor is shut down. Dread is a Reddit style dark web
discussion forum that is the successor of Deep dot Web.
It rose in popularity in 2018 after Reddit started banning
lots of darknet market discussion subreddits and people
(25:12):
needed a place to discuss their favorite Silk Road Cologne.
To this day it does remain online, and there's even a
dedicated subreddit for its current status.
R slash Dread Alert. One of the biggest blows to
darknet markets occurred on thissite when a prominent site known
as Wall Street Market fell. Besides was going through a
turbulent period when the ownerscommitted an exit scam on the
(25:33):
users running away with approximately $14 million worth
of crypto. Basically, an exit scam occurs
when the owner of a business runs away with the funds of
people who participated in it without ever delivering their
product or service. This scam is especially popular
in the online darknet market space as most transactions are
in crypto and you cannot charge back crypto like you can with
(25:55):
normal currencies and banks. One of the WSM moderators named
Medellin started blackmailing the site users in the middle of
this. As they were trying to leave,
they would ask for 0.05 Bitcoin,threatening to leak their
private info to law enforcement.A few days later, Medellin
apparently had had enough and posted the IP address and login
(26:16):
credentials for the WSM servers on Dread Law.
Authorities quickly latched on to this and the site was taken
down 8 days later and three werearrested.
Dread itself is not completely innocent either.
Stolen credentials are sometimessold on the site.
For example, IN2020A vendor known as Exploit dot tried to
sell KYC documents which would include ID such as driver's
(26:39):
licenses. They were selling 100 documents
for $10 and even offered bulk discounts.
In an independent investigation by CCN.
They got access to a few free samples and they seem to be
legitimate KYC verification documents for Binance, a popular
cryptocurrency marketplace. However, finance is known to
have very good security practices and supposedly no leak
(27:01):
had occurred, so they may be fake.
Dred also has in depth guides onhow to manufacture substances in
one of Dred's versions of subreddit's substance
manufacturer. You can ask questions for every
step of the process. The only rules are no sharing
personal information, no revealing the source of your raw
materials for your chosen substance, and strictly no
(27:22):
selling substances in darknet markets.
Another kind of subreddit. On this site you can find
reviews of the most popular market, so you can be sure that
you won't be getting scammed. XSS Russia is known for their
dodgy Internet, and the amount of cybercrime that takes place
there is absolutely unreal. But there are several hidden
Russian sites that have come to light recently, all of which
(27:44):
were only accessible through theTor network.
These sites specialize in ransomware, 0 day exploits, a
legal product trade, and a lot more.
One of the oldest sites is Exploit.
This website has been home to underground Black Hat hackers
since 2005. They help other users in social
engineering, finding and exploiting vulnerabilities, and
(28:05):
much more. If you don't know, social
engineering, put simply, is using information to manipulate
and lie your way to defraud someone into doing something.
Zero day vulnerabilities are vulnerabilities in company
systems which is unknown to the company themselves.
People will use these exploits until eventually someone from
the company finds out and they patch it.
(28:27):
That's when these hackers will find a new zero day
vulnerability and Exploit that seen as this was one of the
oldest hacking forms out there. To gain access you either had to
pay $100 entry fee or have a good reputation on other forms
and have a good history. This made a closed forum and
this was done to ensure the security of the site that not
(28:47):
anyone can simply come and go asthey please.
Except in 2021 Exploit faced a breach when an intruder gained
access to a server that protected the forum from DDoS
attacks. This was a targeted attack that
took down four other sites. But this then links to RAMP
which we talked about earlier. People flooded to RAMP after
Exploit and another site was taken down.
(29:08):
As mentioned before, RAMP was shut down in 2017.
But RAMP 2 point O came to life in 2021 and the only way to gain
entry you had to be reputable user of XSS or Exploit for over
2 months which is now impossibleconsidering both sites are shut
down. This turned Ramp 2 point O into
a retroactive cyber criminal community for those who could
prove they are who they say theyare, allowing only legitimate
(29:32):
individuals into the site. What is XSS?
Similar to exploit? It's a closed forum which is
more centered towards Russian cyber criminals than being
easily accessible for most cybercriminals, which was unlike RAMP
which offered the site in Russian, Mandarin and English.
To gain access to the site, you simply create a new account,
(29:52):
answer a few questions and boom,you're done.
Sounds pretty easy right? This doesn't sound much like a
closed form until adding the fact that an admin from the site
approved request to join. Depending on your credentials
and your answers to the questions they give, they can
either accept, accept, or rejectyou for any reason.
If you're granted access though,you'd be able to take part in
discussions involving credentialaccess exploits and valuable 0
(30:15):
day vulnerabilities. Lacking any security patches,
the site would go to extensive measures to protect their users.
Though if you're allowed in, IP address logging would be
disabled and you would have truly encrypted private
messaging systems. Until 2021, ransomware topics
ran rampant on the site. After all, most of these people
wanted to make a quick buck, or well, in this case, a few
(30:37):
thousand. But in 2021, these topics were
banned by the admin, likely due to the government cracking down
on sites like these, and so theytook this measure to prevent
their side from being put in thecrosshairs.
A lot of these sites have turnedto Telegram to conduct their
business. Famous for enforcing free
speech, Telegram let's almost anything and everything slide,
making it the number one place for criminals to communicate.
(31:00):
It also allows for a higher level of privacy as well.
You do have to link a phone number.
Any spoofer can be used to link a fake number and create an
account hiding literally all your info in all right guys that
wraps up some terrifying dark web websites.
This was the second installment,so if you guys haven't seen the
first one, please go check that out.
That video is doing very well, so let me know down in the
(31:22):
comments if you enjoyed this oneand if you did enjoy this one,
I'm sure you'll enjoy other videos on this channel.
So check them all out and also comment down below if you'd like
to see another installment in the dark web website series.
Thank you so much for watching me the end of the video.
Please like and subscribe help so much.
And now this was Snook and I'll see you next time.
Bye.