Suited & Booted for the Dark Web: A guide for Christians in the end times pt. 1

Part 1. Using Tor to browse, transact, & host content anonymously

Draconian censorship can’t stop the word of God

Seeing how the Satanist pedophiles and trannies that run the global monetary system are going for broke trying to erect the New World Order, and force everyone to take their Mark of the Beast, a killshot genetic experiment and bioweapon, along with the accompanying vaxx passport, total surveillance, & social credit system, it only makes total sense that Christians of all people should be on the front lines of learning how to spread the gospel of Jesus Christ in a censorship resistant way.

We need to use these censorship resistant, anonymous networks to spread the gospel, communicate with each other, and create a hidden parallel Christian society that can still reach people and offer aid and comfort, despite the increasing censorship, psychological warfare, propaganda, and narrative manipulation being utilized by the enemy.

This article is aimed to give you a crash course on the main so-called darkweb protocols in use. They are Tor, I2P, Freenet, & Zeronet. All of them are free to use, multi-platform, and relatively easy to get up and running. I’ll try and explain the strengths and weaknesses of each one, and give you a basic rundown of what to expect.

This article is the first in a series, in which I will cover the various anonymous alternative networks & how to get started using them. Since I use Arch, btw, (for now), the instructions will be tailored for Arch Linux, but I’ll include a link to the project’s installation instructions, for you to use if you have a different Linux distro, or platform (like windows, or mac).

TOR – The Onion Router

From the Tor Project webpage:

The goal of onion routing was to have a way to use the internet with as much privacy as possible, and the idea was to route traffic through multiple servers and encrypt it each step of the way. This is still a simple explanation for how Tor works today.

If you’re on Arch or an Arch-based Linux distro, installing tor is as easy as opening a terminal and typing:

sudo pacman -S torbrowser-launcher

If you’re on a different Linux distro or OS, here’s the Tor downloads page.

Here’s the support page with the FAQ.

Once you’ve downloaded the Tor browser launcher, run it and it will install the Tor browser automatically, and give you the option to connect automatically, connect through a proxy or through a bridge.

A few words of warning about using Tor:

  • If you are in a country where Tor is blocked, you can configure Tor to connect to a bridge during the setup process.
  • Select “Tor Network Settings” and “Use a bridge”.
  • Don’t Torrent over Tor. (I2P is much better for Torrents)
  • Don’t add plugins to the Tor browser.
  • Don’t maximize your browser window as an opponent can use your screen size to help fingerprinting your browser.
  • Don’t run Tor on Windows or Mac because they are snitchware.
  • If you’re putting yourself at risk by using Tor(like in places where it’s illegal), use good opsec.
  • Your ISP can see that you’re using Tor but can’t see anything else, like what you’re looking at. Using a VPN prevents them from seeing you’re using Tor.

Operational Security is extremely important if you want to stay anonymous

You can learn about the varying extremes of opsec online, here & here.

What can I do over Tor that I can’t do on the clearnet?

Tor can be used to access .onion sites, which are websites run as hidden services, which are inaccessible to normal web browsers, and it can also be used to view clearnet websites, anonymously. Tor will hide your IP, block browser fingerprinting, and allow you to browse anonymously.

The shield icon to the right of the address bar allows you to choose your security settings, I always change it to the strictest setting, which has the most privacy protection.

To the right of the shield icon, you’ll see a broom icon. This broom icon can be used to create a new Tor circuit which will give you a new IP address, and kill your previous one.

Limitations of using Tor

  • Tor is slower than the clearnet. Since it routes your traffic through several relays, you may experience slower web speeds.
  • Law Enforcement/Totalitarian Regime/Agents of Antichrist can run Tor exit nodes and monitor traffic even if they don’t know exactly who it’s from.
  • Tor doesn’t encrypt data leaving through an exit node, so if you want to remain private use encryption, or a VPN.
  • Torrenting over Tor is not recommended. (I2P is much better for Torrents)
  • If you’re sharing pictures, documents, videos, etc. over Tor, make sure you strip them of any metadata that could compromise your location or identity. There are various apps which can remove metadata.
  • Using a VPN, then connecting to Tor can give you an extra layer of security by encrypting your data.

Underground Churches all over the dark web

Tor is a great tool for staying anonymous, hosting anonymous websites as hidden services, and for communicating around censorship. You must learn to use encryption on your email and use a secure messenger like XMPP (which you already have if you setup Yunohost like I showed you in this post), to truly have secure communications. This will even prevent whoever may be snooping on your exit node from discovering the contents of your messages.

Tor will allow Christians to still host their websites & forums, and online communities in a secure way, if the clearnet becomes too censored or dangerous to continue publishing about Jesus, the gospel, and your ministry. Underground churches in communist nations and other places where Christians are persecuted have long adopted this technology to continue spreading the word of God in a totalitarian climate.

It’s time that we start preparing to do the same, since the writing is on the wall with the totalitarianism being rolled out worldwide. Soon, Christianity and believers will start to be persecuted for not going along with the new world order, genocidal killshot mandates, and perpetual lockdowns.

What to watch out for on the dark web

Christians must do their best to avoid some of the more unsavory elements on the dark web, mainly online drug markets, fraud sites where hackers traffic in stolen data like credit card info, and of course, the porn sites (some of which are horrifying & illegal).

There are also tons of scam sites which will claim to offer a service and trick you into sending them Bitcoin/Monero. This is similar to the clearnet, in many regards although the bad content may be worse and more extreme than bad content on the clearnet.

Avoiding the really sketchy stuff is pretty easy to do. If you seek you will find, and if you don’t seek you won’t find for the most part. I have admittedly stumbled across some bad content accidentally in the past, but it doesn’t happen very often, much like the clearnet.

Like any tool, Tor can be used for good and bad, and what you do with it is up to YOU.

Popular & useful .onion sites

Here’s a list of some useful Tor hidden services which can help you get started and to give you an idea of the kind of content you can find on over Tor.

Bible4U Uncensored Bible

Search engines for .onion sites

Wikis & Link Lists

Transacting over Tor with Bitcoin & Monero

Bitcoin

Bitcoin wallets with built-in coinjoin

Wasabi Wallet

If you want to transact, you’ll need Bitcoin & a wallet with a mixer. Bitcoin mixing sites are risky because they can be scams which steal your money or run by feds who want to spy on you and deanonymize you.

The better choice is to use a wallet like Wasabi which has a built in coinjoin. The Wasabi mixer can’t steal your money or spy on you. You need a fair amount of Bitcoin to participate in mixes, so be warned. This is changing, and soon you’ll be able to use Wasabi to mix any amount.

Joinmarket

Joinmarket is another app for anonymizing your Bitcoin transactions, and is another fantastic option for staying private with Bitcoin. It’s only drawback is that Joinmarket is not as user-friendly as Wasabi.

Samourai Wallet

Samourai is another Bitcoin privacy wallet & the only mobile privacy wallet option with built in coinjoin. Samourai also supports Monero/Bitcoin atomic swaps. Samourai also allows users to mix much smaller amounts than Wasabi. The only drawback is that the Samourai team could possibly deanonymize you.

Sparrow Wallet

Sparrow wallet is another privacy wallet which utilizes Samourai’s whirpool coinjoin feature.

Monero, a more private alternative to Bitcoin

Monero (XMR)

Here’s a guide on how to use Monero for anonymous transactions:

Escrow for secure transactions

You never want to just send funds to an anonymous person online, so either use a dark web market which has moderators and an escrow feature in case of a dispute or use an escrow site. With escrow, you can buy your counterfeit vaccination card with confidence.

Bitcoin Escrow sites

Monero Escrow

Monero escrow is still a work in progress. Here’s some resources for those who are curious.

Decentralized exchanges & Atomic swaps

Services which let you buy/sell/trade Bitcoin, Monero, & other cryptos, anonymously.

Crash course on hosting a hidden service

In this section we will take a look at how to host your own .onion site as a Tor hidden service. You can either host a site from your PC/Laptop using localhost, or you can host your site on a home server, raspberry pi, or VPS. You can host a website, forum, email service, or other web app. Hosting a Tor site is really not very different from hosting a normal website.

Tor hidden services cannot be blocked, tracked or censored. If you to choose to go the hosted route, there are many anonymous hosting providers who accept Bitcoin or Monero on both the clearnet and on Tor. There are far too many to list, so make sure to do your due diligence before choosing one. Some could be scams, honeypots, compromised or otherwise a bad choice. Do your homework!

Here’s the official guide from the Tor Project – Set up your own .onion service

The commies over at Riseup have also made a pretty good guide – Tor Onion Services Best Practices

Here’s a video tutorial for those who don’t like to read – Host your own Tor hidden service

Wrapping up

I hope this article was informative and demystified some the information surrounding the dark web accessible over the Tor network. In part 2, I’ll discuss another anonymous network and provide a similar summary & list of resources, so stay tuned.

If you’d like to support my work

You can donate here with Bitcoin, Lightning Network, or Monero
https://runfox.tk/wp/product/donate-bitcoin-onchain-lightning-network-or-monero/

Or you can donate to my crowdfund with Bitcoin, Lightning Network, or Monero:
https://cipherassetanalysis.com/apps/4VKDJ6Yjsg24F2otzXmFv1rBzZPJ/crowdfund

You can also become a monthly Librepatron, with Bitcoin, Lightning Network, or Monero:
https://libre.cipherassetanalysis.com/

Leave a Reply

Your email address will not be published. Required fields are marked *