Depths of Darkweb


Yes! You read the heading right! There is more than just one dark site. With the alarming rate of increase in Cyber Security crimes, there will come a time when we might have to witness births of new dark web sites every day, if no proper measures are taken in account to reduce or prevent cyber-crime. On the contrary, every invention comes with good and bad. There is better use of Dark Web than bad. It all depends on how it is used.

This elucidates the reason for inscribing this article.


The .onion is a top level domain suffix deputing an unknown dark web service; formerly known as hidden service, which is reachable only via the Tor (Tor is a free and open-source software for enabling anonymous communication[1]) network. The .onion TLD is not present in the Internet DNS root. With the help of proper proxy software, web browsers can easily access the sites with the .onion addresses by sending requests via the Tor servers network. In simple terms, the .onion name depicts the fact that the dark web exists inside layered proxy networks.


Tor Browser is required to open all links in this article and to navigate around the dark web. Tor Link:

Top .ONION Sites

1. ProPublica: https://www.propub3r6espa33w.onion/

This site is a big win when it comes to privacy and free speech. This has managed to take the first place because it is the first dark web managed to bag a Pulitzer. Today ProPublica is one of the major publication with a .onion address.

2. Facebook’s .onion site: https://www.facebookcorewwwi.onion/

I can imagine the surprise and questions raised in your minds: Why would such a well established and reputed organisation known for its encroaching stance on privacy have a .onion address. Out of the many number of reasons, one of the major reasons I would like to point is because of the mere fact to make Facebook easily accessible in places where it is censored. The twist is that Tor Facebook can still track your activity while the website is being used with the help of your account information.

3. Torch: http://xmh57jrzrnw6insl.onion

Torch is one of the popular onion search engines. When the Torch search engine was written, its database had over 450,000 websites into its archives which included websites, platforms, onion torrent websites. Torch is one the largest database online.

4. GuerrillaMail:

This is generally preferred confidential onion mailbox used for creating unnecessary accounts. Example: Signing up for a new onion torrent account. This mailbox is a free service which doesn’t allow spam and the account can be discarded at any point of time.

5. The Hub: http://thehub7xbw4dc5r2.onion/

There are many number of Dark Web users, other than the onion version of Facebook, The Hub is another great place to find and socialize with Dark Web users. The point of discussion could be anywhere from the drug markets that can be found in Dark Web to operations around the world which the Dark Web offers.

6. Black Cloud: http://bcloud2suoza3ybr.onion/

This is one such site which offers services like file upload. It is great if you aim to store files online or share it with someone. The best part is that the files are encrypted even whilst they are stored on their servers.

7. DuckDuckGo: http://3g2upl4pq6kufc4m.onion/

This one is a good alternative for Google, where you can search for content while you are not giving away your privacy. The Duck steps ahead in terms of speed and privacy even though the search activity is not logged.

8. Blockchain for Bitcoins: https://blockchainbdgpzk.onion/

If you need to store your bitcoin anonymously, then this is the perfect site.


Kindly keep in mind that the content of this article is solely for EDUCATIONAL PURPOSES. If you choose to access the Dark Web, chances are pretty high that you could be traced by law enforcement, governments, hackers, and your internet service provider. I strictly do not encourage, nor condone any illegal activity to take place on the Dark Web, and would strongly recommend to avoid it.


A guide on how to install and use Tor Browser and Set up VPN,



4G LTE attacks

The attacks exploit design weaknesses in three key protocol procedures of the 4G LTE network known as attach, detach, and paging.


Wifi Security Protocols

In today’s world Wi-Fi has become the essential thing in our daily routine. The wireless networks are also not secure in this digital age.