Mage arena guide

You can’t map a sense of humor. Anyway, what is a fantasy map but a space beyond which There Be Dragons? On the Discworld we know that There Be Dragons Everywhere. mage-arena-guideThey might not all have scales and forked tongues, but they Be Here all right, grinning and jostling and trying to sell you souvenirs. ― Terry Pratchett, The Color of Magic

Deep web

The “deep web” is a catch-all term for an assortment of internet-connected stuff that is not listed in search results of major search engines, like Twitter or Facebook posts, links buried many layers down in a dynamic page, or results that sit so far down the standard search results that typical users do not find them. The “deep web” also contains data found in websites, databases, and other sources only accessible through a custom query directed at individual websites. The latter data is housed in different systems, with different structures, at different physical locations. Some people call it the invisible web, but that’s a lie. There are (still) search engines of it.

[linkview show_cat_name=”0″ cat_name=”Deep Web”]


Social P2P processes are interactions with a peer-to-peer dynamic. Peers can both be a device or a human. The term comes from the P2P distributed computer application architecture which partitions tasks or workloads between peers. This application structure was popularised by file sharing systems and runs all the way to distributed searching.


[linkview show_cat_name=”0″ cat_name=”Tunneling”]

File sharing:

[linkview show_cat_name=”0″ cat_name=”File sharing”]

Distributed search:

[linkview show_cat_name=”0″ cat_name=”Distributed search”]

P2P has inspired new structures and philosophies in many areas of human interaction. Its human dynamic affords a critical look at current authoritarian and centralized social structures. Peer-to-peer is also a political and social program for those who believe that in many cases, peer-to-peer modes are a preferable option.

[linkview show_cat_name=”0″ cat_name=”P2P”]


Darknet: An anonymizing overlay network, usually running over the internet. Some have layers on top of the usual network protocol stacks, some use (partly) new stacks …

Darknets deliberately hide from the prying eyes of clearnet search engines. They cloak themselves in obscurity with specialized software that attempts to guarantee encryption and anonymity between users, as well as protocols or domains that average netizens will not likely stumble across.

Your chances of finding these networks, much less specific content, are low unless someone already in the know points you in their directions (or you are working for NSA or other such agency or company contracted by governments).


Onionland is the biggest darknet hiding inside the anonymity-protecting Tor network. Clicking heels is not enough. You have to install tor or the tor browser bundle:

[linkview show_cat_name=”0″ cat_name=”Tor”]

Or use one of the fine anonymising operating systems with tor or tor browser pre-installed to go to onionland:

[linkview show_cat_name=”0″ cat_name=”Anonymous Operating Systems”]

Not only can you now access sites in onionland, Tor sets up a socks proxy to the normal internet, allowing you to send any application’s connection anonymously through the Tor network. Any connections made through Tor will be anonymised but not confidential unless you use end to end encryption in the application itself, like SSL/TLS for web browsing, or an SSH tunnel. Torrenting is discouraged as it uses up too much bandwidth.

Onionland is constantly changing, hidden services appear and vanish on a daily basis and even the directories themselves change address on occasion, and you have to track down new locations in Onionland or in the clearnet subreddit.

We warned There Be Dragons Everywhere Here: Dragons and Gender Bias…huh?
[linkview show_cat_name=”0″ cat_name=”Onionland”]

Tor allows clients and relays to offer hidden services. That is, you can offer a web server, SSH server, etc., without revealing your IP address to its users. In fact, because you don’t use any public address, you can run a hidden service from behind your firewall.

The Tor network relies on volunteers to donate bandwidth. The more people who run relays, the faster the Tor network will be. If you have at least 2 megabits/s for both upload and download, please help out Tor by configuring your Tor to be a relay too.

[linkview show_cat_name=”0″ cat_name=”Tor use”]


I2P is an anonymous overlay network – a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is available on desktops, embedded systems (like the Raspberry Pi) and Android phones.

[linkview show_cat_name=”0″ cat_name=”I2P”]

I2P is end to end encrypted and (unlike tor) separate from the clearnet; connections through i2p are confidential and anonymous. It works similarly to Tor hidden services, except that in i2p there are no exit nodes and all internet applications can be forwarded including ed2k, Gnutella, and torrents (but you cannot connect to non-I2P torrent swarms) and torrenting is encouraged.

Applications available already provide the full range of typical Internet activities – anonymous web browsing, web hosting, chat, file sharing, e-mail, blogging and content syndication, newsgroups, as well as several other applications under development.

[linkview show_cat_name=”0″ cat_name=”I2P use”]

I2P can also be used to set up an “underground” distributed library of knowledge that we wish to protect from censorship with TAHOE-LAFS.

[linkview show_cat_name=”0″ cat_name=”I2P Tahoe-Lafs”]

Attacks on darknet (sites)

Tor does not have a single threat model. It provides various degrees of protection against local observers, malicious node operators, observers of the deeb web, etc. The usual stated adversary in security analyses is one that owns a fraction c/n of the relays, as well as some clients and destinations. With all of these the adversary can do anything feasible, generate traffic, drop traffic, violate protocols, etc. The adversary is usually assumed to also observe some, but definitely not all, of the Internet connections between relays, clients, and destinations from observers at ASes, IXPs, ISPs, etc. This type of adversary is either passive or may drop, replay, or induce timing signatures and traffic passing over it. Adversaries for i2p are similar.

And there are specifics related to the different approaches to propagating network information tor and i2p use. Afaik, Tor currently distributes information about all the nodes in the network to each client before it begins communicating using about a dozen directory authorities and a system of mirrors while i2p uses a modified DHT. The 2013 surveillance revelations revealed that the NSA widely uses a socalled man-on-the-side attack to infect targets with malware through its QUANTUM program.

[linkview show_cat_name=”0″ cat_name=”Darknet attacks”]
Tip: If you are in a country with a monopolised ISP industry in collusion with government (like egypt) you will also want your ISP not to know you are using tor. In which case you can flash a router and install a vpn on it.

You can protect yourself somewhat from the most common type of attack (exit nodes that can have been hijacked or are run by government agencies) by chaining.

Chaining is tunnelling one type of (encrypted) traffic through another. If you set up a VPN in a Virtual Machine (VM) and route that traffic through a tor proxy on your host, a tor exit node can see only encrypted traffic. You can read how to make VPN’s more secure and more on chaining combinations of traffic (including Tor) here.

cGaN Tor

cGAn I2P

Leave a Reply

Your email address will not be published. Required fields are marked *