Sunday 6 August 2017

Using Tor

Using Tor 

What is Tor

Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Download Tor 


Step 1:

Download the file from above link and unzip it  using winrar or any other software in Windows 
For Linux 

Unzip the package by typing

tar xzf tor-X.X.X.XX.tar.gz

Step 2:


 Just go to and open tor browser by double clicking sub directory 

Step 3:


Just wait for few seconds to load and to configure relays based on your internet speed and start browsing anonymously 
For Linux 
Entire process is similar but if you need to run as root user
Open browser with textpad 
Search for 
if [ "`id -u`" -eq 0 ]; then
complain "The Tor Browser Bundle should not be run as root.  Exiting."
exit 1
fi
Comment or delete above lines and launch browser. 
But be careful while doing so it giving elevated privilege for tor browser 
If you had any errors even in Linux version please drop me a comment I will get back to you 
 


Onion routing

Onion Routing

Onion Routing

Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes.

Data structure

In this example onion, the source of the data sends the onion to Router A, which removes a layer of encryption to learn only where to send it next and where it came from (though it does not know if the sender is the origin or just another node). Router A sends it to Router B, which decrypts another layer to learn its next destination. Router B sends it to Router C, which removes the final layer of encryption and transmits the original message to its destination.
An onion is the data structure formed by "wrapping" a message with successive layers of encryption to be decrypted ("peeled" or "unwrapped") by as many intermediary computers as there are layers before arriving at its destination. The original message remains hidden as it is transferred from one node to the next, and no intermediary knows both the origin and final destination of the data, allowing the sender to remain anonymous.

Onion creation and transmission

To create and transmit an onion, the originator selects a set of nodes from a list provided by a "directory node". The chosen nodes are arranged into a path, called a "chain" or "circuit", through which the message will be transmitted. To preserve the anonymity of the sender, no node in the circuit is able to tell whether the node before it is the originator or another intermediary like itself. Likewise, no node in the circuit is able to tell how many other nodes are in the circuit and only the final node, the "exit node", is able to determine its own location in the chain.
Using asymmetric key cryptography, the originator obtains a public key from the directory node to send an encrypted message to the first ("entry") node, establishing a connection and a shared secret ("session key"). Using the established encrypted link to the entry node, the originator can then relay a message through the first node to a second node in the chain using encryption that only the second node, and not the first, can decrypt. When the second node receives the message, it establishes a connection with the first node. While this extends the encrypted link from the originator, the second node cannot determine whether the first node is the originator or just another node in the circuit. The originator can then send a message through the first and second nodes to a third node, encrypted such that only the third node is able to decrypt it. The third, as with the second, becomes linked to the originator but connects only with the second. This process can be repeated to build larger and larger chains, but is typically limited to preserve performance.
When the chain is complete, the originator can send data over the Internet anonymously. When the final recipient of the data sends data back, the intermediary nodes maintain the same link back to the originator, with data again layered, but in reverse such that the final node this time removes the first layer of encryption and the first node removes the last layer of encryption before sending the data, for example a web page, to the originator.

One of the reasons typical Internet connections are not considered anonymous is the ability of Internet service providers to trace and log connections between computers. For example, when a person accesses a particular website, the data itself may be secured through a connection like HTTPS such that your password, emails, or other content is not visible to an outside party, but there is a record of the connection itself, what time it occurred, and the amount of data transferred. Onion routing creates and obscures a path between two computers such that there's no discernible connection directly from a person to a website, but there still exist records of connections between computers. Traffic analysis searches those records of connections made by a potential originator and tries to match timing and data transfers to connections made to a potential recipient. For example, a person may be seen to have transferred exactly 51 kilobytes of data to an unknown computer just three seconds before a different unknown computer transferred exactly 51 kilobytes of data to a particular website. Factors that may facilitate traffic analysis include nodes failing or leaving the network and a compromised node keeping track of a session as it occurs when chains are periodically rebuilt.
Garlic routing is a variant of onion routing associated with the I2P network that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis and to increase the speed of data transfer.

Exit node vulnerability

Although the message being sent is transmitted inside several layers of encryption, the job of the exit node, as the final node in the chain, is to decrypt the final layer and deliver the message to the recipient. A compromised exit node is thus able to acquire the raw data being transmitted, potentially including passwords, private messages, bank account numbers, and other forms of personal information. Dan Egerstad, a Swedish researcher, used such an attack to collect the passwords of over 100 email accounts related to foreign embassies.
Exit node vulnerabilities are similar to those on unsecured wireless networks, where the data being transmitted by a user on the network may be intercepted by another user or by the router operator. Both issues are solved by using a secure end-to-end connection like SSL or secure HTTP (S-HTTP). If there is end-to-end encryption between the sender and the recipient, then not even the last intermediary can view the original message.

Some Of Onion Links 

How to Browse Dark Web  

please Follow above  link how to browse using onionrouting i.e., dark web

 

Wednesday 2 August 2017

Drug case In hyderabad

Ex-NASA Scientist Arrested in Hyderabad for Dealing Drugs

 

An ex-scientist who used to work for US space agency NASA has reportedly been arrested on “Drug peddling” charges according to the prohibition and excise sleuths.
The culprit, 29-year-old Anish Dundoo, a US citizen happens to be an old grad of Doon School located in Dehradun. It is a reputable school which is noted for the enrollment of children of Central Ministers and people of very high pedigree. He was an employee with NASA for one year before he relocated to Hyderabad to set up a business of his own in 2012.
Anish’s apprehension came as a result of critically analyzed cell phone records obtained from 10 other narcotic peddlers who were also apprehended over the past weeks. A total of 1.2 kilos of cannabis and 16 units of LSD, a very sophisticated drug were clutched by sleuths during the arrest in his Secunderabad office.
Anish obtained his Bachelor’s degree in aerospace, aeronautical and astronautical engineering from the Cincinnati University in the US. According to reports, officials involved with the investigation stated that the culprit is presently dealing in Bitcoin trading and also had been using Bitcoins as the mode of payment for buying drugs on the Darknet. He is believed to be into other businesses aside from the Bitcoin trading.
“Highly qualified people like Anish indulging in narcotics peddling is a big shame,” said an investigating officer.
The information provided by Anish after his arrest also lead to the capture of one Ritul Agrawal, a 26-year-old businessman. He is said to be dealing in steel which happens to be a family business. According to reports, he also had graduated in business administration from a very prominent management school located in the city. He (Agrawal), too, was found in possession of narcotics. He and Anish would order the material online and pay using bitcoins/crypto currency. Agrawal was later arrested from Nampally.
“The accused have stated that these NDPS substances are delivered by courier bearing the Netherlands markings,” the officials said. Also, five people amongst those apprehended are said to be B Tech graduates who were working in the film industry, hospitality and MNCs.
With Agrawal’s arrest, the number of people arrested for their alleged participation in this row has now moved to 12. The main focus of this tumult was on narcotics peddling such as MDMA (methylenedioxy- methamphetamine) and LSD (lysergic acid diethylamide). MDMA which is also commonly known as ‘ecstasy’ or ‘molly’ is mostly used as a party drug whiles LSD is one of the most powerful drugs for mood changes. It exists in both liquid state and tablets.
Anish and Agrawal go way back to two years ago when they first met through their friends. Ritual had since been his ally in the narcotics business acting as his pusher. They both told sleuths that the parcels of drugs they received by couriers have postage markings of the Netherlands. They were brought up on the court and then sent to judicial remand afterward.
Excise sleuths arrest of Anish came as no surprise as they were still trying to catch people involved in the illegal drug trade. The city for some time now has been in the news for busting drug rackets some also including many Tollywood personalities.
The probe has revealed that the 29-year-old engineer had, in the last few months, accessed dark website ‘Lunacy’ at least eight times and ordered various quantities of narcotic drugs and psychotropic substances or NDPS (such as cocaine, LSD, MDMA), according to the officials.
With further investigations, based on their phone records, it was revealed that over hundreds of school and college students were into purchasing these drugs. “Some of the students are in 8th and 9th grade,” an official said. “The students were spending up to 4,000 per week to purchase drugs,” an investigating official said. The excise sleuths have also been getting into contact with management of about 16 colleges and 20 schools advising them to enlighten their students and staff about the dangers and implications of drug or substance abuse. They further asked the school managements to keep tabs on stores situated near their campuses. Unusual behaviors amongst students are also to be kept an eye on. All of this comes as a result of the disturbing development in this case.

FBI Sting Operation on Darkweb

Court Orders FBI Darknet Sting to be Kept Secret

 

The details of a case involving an FBI sting on the darknet have been ordered to be kept under seal by federal Magistrate Judge Paige Gossett. The sting allegedly helped bring down a plot to order a mail bomb through the darknet. It is believed to be the first case in the state of South Carolina involving the FBI and the darknet. FBI agent Matthew Desmond was questioned by attorney Jim Griffin, who represents one of the accused. Griffin asked agent Desmond about who made the bomb and where it came from, but agent Desmond declined to answer. Griffin is trying to figure out what the FBI did that would have made a South Carolina Department of Corrections inmate believe he was ordering a mail bomb. Attorney Jim Griffin told Judge Gossett that he needed to know if there was any real danger and whether or not the whole thing was made up by the FBI.
Griffin tried to show that some of the details in the case were known to the public, he pointed to a newspaper article that appeared in The State. Judge Gossett refused to make FBI agent Matthew Desmond answer Griffin’s questions. The prosecuting attorney Will Lewis agreed with Judge Gossett that records detailing what happened in the case should be sealed, keeping them from being known to the public. The judge also denied bond for one of the suspects, 21-year-old Tyrell Fears. The judge said that Fears would pose a danger to his ex-wife Shauna Bell, the intended target of the mail bomb. Fears is being charged along with two other men, 35-year-old Vance “Dank” Voulious Jr. and 31-year-old Michael Young. The three men are accused of conspiring to commit homicide with the mail bomb. A minor only identified by the initials V.M. is also part of the case, but it is not known if any formal charges are being filed.
Michael Young is currently serving a sentence of 50 years after he was convicted of murdering his ex-wife’s father, Robert Bell, while also injuring his ex-wife, Shauna Bell, in the 2011 shooting. Young is currently trying to get a new trial. Shauna Bell would be a key witness at a new trial for Michael Young. This may have been the motive for trying to kill her with a mail bomb, to eliminate her as a potential witness at a new trial. Tyrell Fears is Michael Young’s nephew.
“This should give evil people pause before they order illegal things off the Internet, because they might in fact be ordering from the government,” a source with the FBI told The State. During testimony new allegations were made, such as that Michael Young accessed the darknet from a smart phone smuggled into prison. From this illegal phone, Young is alleged to have ordered the mail bomb from the darknet. It is not known if the FBI was running a fake site that claimed to sell explosives, or if the FBI had hacked into the site. Law enforcement allege that Michael Young was also running a business importing drugs into South Carolina during his time as an inmate in prison. It is possible he was ordering drugs from the darknet using his smuggled smartphone.
The package was mailed through the US Postal Service, and was sent to the minor, known in court documents as V.M., who received the package on June 5th. V.M. signed for the package using a fake name. The package contained information on how to assemble the bomb. The bomb that the men had received was said to not be dangerous enough to harm anyone, and that it only contained small traces of RDX, a military grade explosive. At the time the FBI was monitoring the phone calls of all the men involved. V.M. gave Fears the mail bomb which had been assembled into a package and was addressed to Shauna Bell. Fears took the package to the post office and placed it into an outdoor mail collection bin. Law enforcement then seized the package. The FBI is currently prosecuting another darknet mail bomb case in the state of Georgia.