The Ultimate Dark Web Anonymity Privacy Security

Learn how to access & use the dark net and the clear net privately, anonymously and securely

Last updated 2022-01-10 | 4.7

- 85+ videos (10+ hours) to take you from 0 to advanced in anonymity
- privacy & security.
- Anonymously access the dark net and TOR hidden services (onion services).
- Install
- configure & use anonymouse and private operating systems such as TAILS & Qubes OS

What you'll learn

85+ videos (10+ hours) to take you from 0 to advanced in anonymity
privacy & security.
Anonymously access the dark net and TOR hidden services (onion services).
Install
configure & use anonymouse and private operating systems such as TAILS & Qubes OS
Understand how cryptocurrencies work and anonymously use and handle Bitcoin & Monero.
Privately communicate using emails and instant messages.
Understand asymmetric & symmetric encryption and manually encrypt
sign
decrypt and verify data.
Anonymously obtain Bitcoint & Monero
Discover hidden services (onion services) on the darknet.
Use darknet search engines and services.
Use Qubes & TAILS from usb sticks on any computer without affecting it and without leaving any traces.
Bypass censorship & connect to TOR even if it's blocked.
Use TOR bridges and pluggable transports to bypass filters.
Understand what VPN is and how to use it with TOR.
Configure TOR for maximum security & anonymity.
Handle and share files privately and anonymously.
Use daknet email services.
Use temporary email services.
Configure & use Jabber / XMPP to communicate privately on the dark net.
Setup & use end-to-end encryption.
Understand symmetric and asymmetric encryptions.
Use PGP to encrypt and decrypt data.
Use PGP to sign and verify integrity.
Understand what is cryptocurrency and how it works.
Understand how Bitcoin and Monero work.
Anonymously obtain and use Bitcoin and Monero.
Use exchanges to convert one cryptcurrency to another.
Anonymously transfer funds using Bitcoin & Monero.
Secure your computer and your data by dividing it into a number of isolated domains.
Securely handle files (even malware/viruses) without affecting your computer.

* Requirements

* Basic IT Skills.
* No Linux
* programming or hacking knowledge required.
* Computer with a minimum of 4GB ram/memory.
* Operating System: Windows / OS X / Linux.

Description

  • 85+ videos (10+ hours) to take you from 0 to advanced in anonymity, privacy & security.
  • Anonymously access the dark net and TOR hidden services (onion services).
  • Install, configure & use anonymouse and private operating systems such as TAILS & Qubes OS
  • Understand how cryptocurrencies work and anonymously use and handle Bitcoin & Monero.
  • Privately communicate using emails and instant messages.
  • Understand asymmetric & symmetric encryption and manually encrypt, sign, decrypt and verify data.
  • Anonymously obtain Bitcoint & Monero
  • Discover hidden services (onion services) on the darknet.
  • Use darknet search engines and services.
  • Use Qubes & TAILS from usb sticks on any computer without affecting it and without leaving any traces.
  • Bypass censorship & connect to TOR even if it's blocked.
  • Use TOR bridges and pluggable transports to bypass filters.
  • Understand what VPN is and how to use it with TOR.
  • Configure TOR for maximum security & anonymity.
  • Handle and share files privately and anonymously.
  • Use daknet email services.
  • Use temporary email services.
  • Configure & use Jabber / XMPP to communicate privately on the dark net.
  • Setup & use end-to-end encryption.
  • Understand symmetric and asymmetric encryptions.
  • Use PGP to encrypt and decrypt data.
  • Use PGP to sign and verify integrity.
  • Understand what is cryptocurrency and how it works.
  • Understand how Bitcoin and Monero work.
  • Anonymously obtain and use Bitcoin and Monero.
  • Use exchanges to convert one cryptcurrency to another.
  • Anonymously transfer funds using Bitcoin & Monero.
  • Secure your computer and your data by dividing it into a number of isolated domains.
  • Securely handle files (even malware/viruses) without affecting your computer.

Course content

13 sections • 86 lectures

Introduction to Privacy, Anonymity & Security Preview 06:45

This lecture introduce you to the main topics covered in this course, you'll learn what we mean by privacy, anonymity and security, why are they related, and why we can't achieve one without the others.

Course Breakdown Preview 03:45

This lecture will give you an overview of the main sections of the course and what you'll learn in each.

Introduction to TOR Preview 06:37

TOR is the main anonymising network we use in this course, this lecture explains what TOR is, how it works and how it can improve our anonymity.

Introduction to Hidden Services / Onion Services Preview 03:55

Darkweb websites only accessible through the TOR Network are know as Hidden or Onion services.

In this lecture you'll learn what hidden services or onion services are, how they work and how to access them.

This is what most people refer to as the dark net.

Connecting to TOR Preview 04:45

TOR is just an anonymising network, there are multiple ways to connect to it, this lecture will explain 3 different ways to do this and discuss the advantages and disadvantages of each.

Section Intro & Breakdown Preview 01:49

This lecture will give you an overview of this whole section and explain what you'll learn in it.

What is The TOR Browser? Preview 04:21

The TOR Browser is a modified version of ESR Firefox that forwards all traffic through the TOR Network.

This lecture will introduce you to the TOR browser, you'll learn what it is, its pros and cons, and how to download it on all operating systems.

Verifying & Installing TOR Browser on Windows Preview 10:20

This lecture will teach you how to properly verify the TOR Browser (to make sure that it was not modified as it got downloaded) and install it on Windows.

Verifying & Installing TOR Browser on Mac OS X Preview 10:44

This lecture will teach you how to properly verify the TOR Browser (to make sure that it was not modified as it got downloaded) and install it on Mac OS X.

Verifying & Installing TOR Browser on Linux Preview 11:17

This lecture will teach you how to properly verify the TOR Browser (to make sure that it was not modified as it got downloaded) and install it on Linux.

TOR Bridges & Pluggable Transports Preview 06:48

This lecture will introduce you to TOR bridges and pluggable transports, you'll learn what they are, how they work and how to use them to bypass censorship and connect to the TOR network even if it was blocked.

Bypassing TOR Censorship Preview 06:14

In this lecture you'll learn how to connect to the TOR network and access the dark web even if its being blocked!

Intro to Virtual Private Networks (VPN) & How to Use it with TOR Preview 11:24

This lecture will introduce you to Virtual Private Networks (VPN), you'll learn what this is, how it works, its benefits and how to use it with TOR to improve our privacy and anonymity and bypass censorship.

Configuring TOR Browser For Maximum Security & Anonymity Preview 07:31

In this lecture you'll learn the basics of the TOR browser and how to use it to change your location and access both the clear web and the dark web.

TOR Browser Security Settings & Intro to Information Theory Preview 10:29

This lecture will walk you through the different security settings that you can use with the TOR Browser and the implications of using each, it'll also introduce you to information theory and teach you how it can be used to deanonymize TOR users.

Disadvantages of Using The TOR Browser on Windows, OS X or Linux Preview 03:00

This video highlights the disadvantages of using the TOR Browser on normal operating systems such as Windows, Linux or OS X and gives you an overview of what you'll learn in this section.

What is TAILS? Preview 03:33

This lecture introduces you to TAILS (The Amnesic Incognito Live System), you'll learn what it is and how it can help improve our anonymity, privacy and security.

TAILS Installation Options Preview 05:02

This lecture will walk you through the different installation options for tails and pros and cons of each.

Installing TAILS From All Operating Systems Preview 08:40

This lecture teaches you how to flash tails to a USB stick so you can boot into it from any operating system (windows, Linux, OS X) without affecting this operating system and without leaving any traces on it.

Starting TAILS on All Operating Systems Preview 09:04

This lecture will teach you how to boot into tails (start and use tails) on all operating systems (Windows, Linux and OS X).

TAILS Basics - Part 1 Preview 05:25

This lecture will give you a basic overview of tails, the main applications, its menus, how to interact with the file system and use its work spaces.

TAILS Basics - Part 2 Preview 06:01

In this lecture you'll continue learning how to use tails, you'll learn how to change its settings, connect to networks and more!

What is Persistence & Why We Need it! Preview 05:02

Tails is a live (none-persistent) operating system, ie: it stores nothing, this lecture will teach you why this is good, why you might want to use persistence and why you need to be careful about this.

Enabling Encrypted Persistence Preview 12:14

This lecture will teach you how to enable encrypted persistence on TAILS so you can store files and some settings and not lose them after restarting the system.

Bypassing Censorship Using Bridges & Plugable Transports Preview 07:12

In this lecture you'll learn how to bypass censorship, connect to the TOR network and access the dark web even if TOR is blocked.

Using The TOR Browser on Tails Preview 07:14

TAILS enforces strict restrictions on the TOR Browser, so in this lecture you'll learn what these restrictions are, and how to work around them.

Connecting to Captive Portals Preview 08:00

TAILS does not allow you to access anything unless it is accessed through the TOR network, this can be an issue especially if you want to connect to a captive portal. This lecture will teach you how to work around this restriction.

Connecting to VPN From TAILS - Method 1 Preview 07:13

This video explains why connecting to a VPN from TAILS is a bit tricky, and shows how to connect to a VPN from TAILS using a client that supports TAILS.

Connecting to VPN From TAILS - Method 2 Preview 15:45

This video teaches you how to manually install openvpn and configure the firewall in TAILS (Ferm) to connect to any VPN provider even if it does not support TAILS.


Introduction & Breakdown of Next Sections Preview 01:58

The next sections will teach you how to carry out your day to day tasks in a more private and anonymous manner, this lecture walks you through everything that you're going to learn in the next sections.

Discovering Hidden Services Using Darknet Search Engines Preview 11:03

This lecture will teach you how to discover hidden (onion) services or dark net / dark web websites using search engines.

Discovering Hidden Services Using Listings & Onion Services Preview 06:21

This lecture shows you other methods (other than search engines) to discover darknet websites or onion services.

Creating a Fake Anonymous Identity Preview 05:41

This lecture will help you improve your opsec and teaches you how to create a fake online identity.

Using Temporary Email Accounts Preview 06:11

In this lecture you'll learn what temporary emails are, why they are useful and how to create and use them on both the clearnet and the darknet.

Using Privacy Focused Email Providers Preview 09:46

This lecture will teach you how to create and use proper private email providers to communicate in a more private and anonymouse manner.

Using DarkNet Email Providers Preview 08:58

In this lecture you'll learn how to create and use darkweb emails.

Picking The Right Email Service Preview 07:21

This lecture helps you understand the differences between the different email providers covered so far, the pros and cons of each, and why you need to learn how to use all of them.

Introduction to Jabber / XMPP Preview 08:08

This lecture will introduce you to XMPP / Jabber, you'll learn what it is, how it works and why it is more private than normal instant messaging protocols.

Setting up XMPP with Pidgin Preview 07:59

In this lecture you'll learn how to create an anonymouse XMPP account and login to it using Pidgin on TAILS.

Enabling End-to-end Encryption in Pidgin Preview 07:44

This lecture teaches you how to enable end-to-end encryption on Pidgin to encrypt all the messages you send / receive so they are useless if they get intercepted.

Verifying Contacts Preview 05:53

This lecture teaches how to verify and authenticate contacts so you're sure you're communicating with the right person and not with someone who hacked your contact.

Introduction Preview 01:00

This lecture will give you an introduction of what you'll learn in this section.

Clearing Metadata & Basic File Sharing Preview 11:09

Files contain identifying information, therefore this lecture shows you how to clear this information from files so that you can share them without leaking this information.

Sharing Files Privately & Anonymously Preview 06:47

This lecture will teach you how to share files anonymously on the darkweb using the TOR network.

Securely Removing Files Preview 05:57

Deleted files can be easily recovered, this lecture shows you how to securely delete files so it is very difficult to recover.

Securely Wiping & Encrypting Storage Devices Preview 06:26

This lecture will teach you how to properly and securely wipe and encrypt storage media.

What is Encryption & Why Its Important? Preview 02:38

This lecture you will learn what encryption is and how ti can be used to protect our privacy.

Introduction to Symmetric & Asymmetric Encryption Preview 09:02

This lecture will introduce you to the two main types of encryption; symmetric and asymmetric encryption, you'll learn what they are, how they work and the differences between them.

Generating a PGP Key Pair Preview 07:29

This lecture will teach you how to generate a PGP key pair and use it in TAILS.

Importing & Exporting Keys Preview 11:11

In this lecture you'll learn how to import, export and manage public keys in TAILS.

Encrypting & Decrypting Text Preview 07:42

In this lecture you'll learn how to manually encrypt text for a certain contact and decrypt messages sent to you.

Introduction to Digital Signatures Preview 05:56

In this lecture you'll learn what PGP signatures are and why you might want to use them.

Signing Messages & Verifying Signatures Preview 05:37

This lecture will teach you how to sign data, and verify signatures to protect file integrity.

Encrypting, Signing, Verifying & Decrypting Files Preview 10:53

In this lecture you'll learn how to do all of the above on any file type, so you'll learn how to encrypt, decrypt, sign and verify the integrity of images, PDFs......etc

Using Key Servers Preview 09:11

In this lecture you'll learn how to use PGP key servers to share and import keys.

Introduction - Why Use Cryptocurrency? Preview 02:50

This lecture will highlight the major disadvantages of using normal currencies and how cryptocurrencies can help overcome these disadvantages and protect our privacy and anonymity.

What is Cryptocurrency & How It works Preview 07:45

This lecture will introduce you to blockchain and explain to you how cryptocurrencies work in general.

Installing a Bitcoin Wallet Preview 08:53

In this lecture you'll learn what is a crypto wallet and how to install the electrum bitcoin wallet on TAILS.

Creating a Bitcoin Wallet Preview 07:18

This lecture will teach you how to create your own bitcoin wallet.

4 Ways to Anonymously Get Biotcoins Preview 08:38

There are a number of ways that you can use to get Bitcoins, most of which are not anonymous, this lecture lists 4 methods to get bitcoins anonymously.

Using Bitcoin ATMs Preview 08:31

This lecture will teach you how to find a Bitcoin ATM in your area and use it to anonymously transfer coins to your wallet.

Using P2P Services Preview 13:04

This lecture will teach you how to use peer-to-peer services to anonymously get bitcoins.

Sending & Receiving Bitcoins Preview 05:33

In this lecture you'll learn how to send and receive funds using Bitcoins.

Introduction to Mixers / Tumblers Preview 07:21

This lecture will introduce you to tumblers, you'll know what they are, how they work and how they can improve the anonymity of your transfers.

Improve Bitcoin Anonymity Using Mixers Preview 06:11

This lecture will teach you how to use mixers to increase the anonymity of your transfers.

Introduction to Monero Preview 07:54

Monero is a cryptocurrency that is designed to be untraceable, its much more private and anonymous than Bitcoin, this lecture will introduce you to this amazing cryptocurrency and teach you how to download and verify a Monero wallet.

Creating a Monero Wallet Preview 07:34

This lecture will teach you how to create a Monero wallet and sync with the Monero blockchain on TAILS.

Restoring Monero Wallet on TAILS Preview 03:40

This lecture will teach you how to restore and login to your Monero wallet from TAILS.

4 ways to Anonymously Get Monero Preview 08:55

Monero is untraceable but you have to make sure you get it anonymously, this lecture walks you through 4 methods to anonymously get Monero.

Crypto-exchanges - Converting One Cryptocurrency to Another Preview 05:11

This lecture will introduce you to cryptocurrency exchanges, you'll learn what they are, how they work and how you can use them to convert one cryptocurrency to another to improve the anonymity of your transfers.

Using a Crypto Exchanges to Increase Anonymity Preview 08:02

This lecture will teach you how to anonymously use crypto-exchanges to exchange crypt and increase the anonymity of transfers.

Conclusion Preview 03:09

This lecture will give you a summary of everything you learned so and far show you how this knowledge can be used in different situations.

What is Qubes & Why Use it? Preview 09:11

This lecture will introduce you to Qubes OS, you'll learn what it is, how it works, how it compares to TAILS and how it can massively improve our security.

Installation Options & Verifying Qubes Preview 11:58

This lecture will teach you how to properly download and verify Qubes OS to make sure that it did not get modified.

Flashing Qubes to USB Preview 03:21

This lecture will teach you how to flash Qubes OS to USB storage device so you can boot from it and install Qubes.

Preparing Computer For Qubes Preview 07:16

This lecture will show you how edit bios settings to allow Qubes OS to boot.

Installing Qubes Preview 09:51

In this lecture you'll learn how to install Qubes OS so you can use it from any computer (Windows, Linux, OS X) without affecting it.

Qubes Basics Preview 10:54

This lecture will teach you the basics of using Qubes, it'll give you an overview of the system structure, the different security domains, how to manage the virtual machines, change basic settings, connect to the internet......etc

Overview of The Security Domains in Qubes Preview 07:33

Qubes has a number of security domains or virtual machines, each designed to be used for a specific domain, this lecture gives you an overview of these domains and how they should be used.

Working With Multiple Security Domains Simultaneously Preview 10:18

In this lecture we will start using these security domains, this will help you have a better understanding of this structure, its limitations and its benefits.

Handling Files & Text Across The Different Security Domains Preview 10:32

In this lecture we'll dive deeper into using the different security domains in Qubes, you'll learn how to use multiple domains at the same time, and how to share data between them.

Installing Software to Specific Domains Preview 12:18

Due to the structure and the restrictions Qubes enforces on its security domains, installing software on it is different to what you're used to, this lecture teaches you how to properly install applications on any security domain inside Qubes OS.

Handling Malware/Viruses & Suspicious Files Securely Preview 10:45

In this lecture you'll learn how to securely handle malware / viruses , you'll learn how to open files (even if they contain malware) securely without allowing these viruses to harm your computer.

Connecting to TOR From Qubes Using Whonix Gateway Preview 10:01

This lecture will teach you how to connect to the TOR network and access the darkweb using Qubes OS.

Installing Software on Whonix Preview 10:34

Qubes OS uses special a virtual machine for accessing the dark web, therefore installing software on this VM is different, this lecture shows you how to install software on this virtual machine.