Darknet Discussions E04: Trump vs Biden, Op. Onion Peeler, Archetyp Lotto, King Odua
Hey everyone, welcome back to our channel! In today's episode, we're talking about some of the biggest news stories and political controversies making waves right now. We have Roach joining us to discuss Trump's latest promise to release Ross Ulbricht if he gets elected. Is this a genuine move to appeal to libertarians, or is there more to the story?
We'll also explore the complexities of Ross Ulbricht's case, diving into the legal battles and the broader implications for justice and fairness in our legal system. There’s a lot to unpack here, and we want to shed some light on the issues that matter most.
We then move on to discuss the current political landscape, focusing on the qualifications and performance of our leaders. There's a lot of frustration and debate about who is running the country and the decisions they're making. We share our thoughts and invite you to join the conversation.
This episode is packed with insights, reactions, and thought-provoking discussion. Whether you're into politics, legal dramas, or just want to stay informed, you'll find something interesting here.
Don't forget to like, subscribe, and hit the notification bell so you don’t miss any updates. We'd love to hear your thoughts in the comments below. Thanks for watching, and we'll see you next time!
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00:00 - Introduction
00:00:26 - Ross and Trump
00:01:30 - Federal Cases
00:03:50 - Ross's Case
00:04:50 - Legal Precedents
00:12:16 - Darknet Market
00:16:28 - Federal Law
00:19:15 - Cybercrime
00:19:45 - Legal System and Cybercrime
00:20:07 - Comparison of State and Federal Laws
00:23:53 - Discussion on Incarceration
00:24:25 - Hacking Charges
00:25:38 - Lottery Win in the Darknet
00:26:48 - Discussion on Hacking Forums
00:29:24 - Suspicion on Breach Forums
00:36:59 - Operational Security Mistakes
00:39:47 - Common Sense and Online Security
00:39:47 - Consequences of Messing with the Military
00:40:18 - Ease of Modern Technology
00:41:11 - Complacency and Security
00:41:53 - Risks of Selling Property You Don't Own
00:42:52 - Importance of IP Addresses
00:43:26 - IP Blacklisting and Proxies
00:44:33 - Phone Emulators and Fraud
00:44:54 - Cons of Selling Property
00:44:54 - Dangers of Impersonation
00:46:19 - Consequences of Cyber Attacks
00:47:33 - Unlikely Bucket List
00:49:12 - Graceland Auction Scam
00:49:51 - Consequences of Fraud
00:51:54 - Value of Unique Targets
00:53:38 - History of Selling Property You Don't Own
00:53:38 - Consequences of Cons
00:57:09 - New Fence
00:57:58 - Introduction and Childhood Memories
00:58:07 - Early Fascination with Security
00:58:46 - Car Theft Techniques
01:01:44 - Passion for Physical Security
01:01:52 - Discussion on Cryptocurrency
01:03:35 - Story of King Otter
01:06:30 - Cryptocurrency in the Feds
01:10:53 - Discussion on Darknet Vendors
01:12:35 - Closing Remarks
#freeross #darknet #darkweb #truecrimecommunity
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
Welcome to "Darknet Discussions," the podcast that gets into the shadows of the internet to bring you the most intriguing, enlightening, and sometimes unsettling stories from the dark web. Hosted by seasoned darknet aficionados, each episode of "Darknet Discussions" explores the intricate dynamics of darknet markets, cybersecurity threats, and the digital underworld. Join us as we interview experts, discuss the latest trends in cybercrime, and shed light on the technologies that operate beneath the surface of everyday internet use. Also, we occasionally go off on a tangent about something completely unrelated.
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://www.linkedin.com/in/sam-bent/
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
15
views
Archetyp - Darknet Drugmarket Analysis
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:07 Introduction
04:50 Marketplace Overview
05:12 Marketplace Overview: Stats
07:19 Marketplace Overview: Anti-Phishing Jail
09:46 Marketplace Overview: Registration and Entry
10:20 Dashboard Navigation
14:42 Marketplace Functionality
15:11 Marketplace Functionality: Vendor Filter
15:26 Marketplace Functionality: Category Filter
15:55 Marketplace Functionality: Source And Destination Filter
16:55 Marketplace Functionality: Minimum Amount and Unit Amount Filter
17:03 Marketplace Functionality: Price Range Filter
17:20 Marketplace Functionality: Search Term Filter
18:14 Payment and Transactions
19:01 Payment and Transactions: Classic Wallet vs. Direct Pay System
20:22 Payment and Transactions: Escrow and FE Listing MechanismS
21:29 Finalize Early
22:05 Security and Privacy
22:38 Security and Privacy: Pretty Good Privacy (PGP) for Sensitive Details
24:17 Security and Privacy: Automatic Encryption of Shipping Details as a Fail-Safe
27:18 Community Engagement and Resources
28:21 Community Engagement and Resources: Forum
30:53 Community Engagement and Resources: Multilingual Forum
31:29 Community Engagement and Resources: ArcheWiki: The Encyclopedia of the Underworld
32:43 Community Engagement and Resources: The Role of the Community in Support and Knowledge Sharing
34:30 Vendor Interaction and Analysis
35:01 Vendor Ratings and Listings
36:13 Vendor Ratings and Listings: Sales and Open Disputes
36:54 Vendor Ratings and Listings: Last Active Status
37:36 Vendor Ratings and Listings: Placing Orders and Extending Auto-Finalize Times
39:04 Vendor Ratings and Listings: Comprehensive Vendor Profiles and Feedback Systems
40:00 Support and Rules
40:28 Support and Rules: Support System
41:59 Support and Rules: Market rules
42:41 Support and Rules: Community Behavior and Ethics
43:17 Entertainment and Engagement
43:41 Entertainment and Engagement: Bets
44:15 Entertainment and Engagement: Deadpool
44:57 Entertainment and Engagement: ArcheDice
45:27 Operational Reliability
46:00 Operational Reliability: Downtime Management and Communication
48:09 Operational Reliability: Stability and Responsiveness
48:58 Conclusions and Personal Impressions
50:28 Final Recommendations
52:23 Suggestion #1: Bug Bounty Program
53:17 Suggestion #2: Real-Time Support
53:45 Suggestion #3: Community Input
54:15 Suggestions #4: Expand Transparency
54:53 Suggeston #5: Vendor Verification
55:25 Suggestion#6: Transparency in Disputes
56:00 Suggestion #7: Vendor Prerformance Metrics
56:39 Suggestion #8: Customization and Personalization
57:05 Suggestion # 9: Regular Security Audits
57:28 Suggestion #10: Implementing a Repuation System for Buyers
58:17 Suggestion #11: The Purge
58:40 Suggestion #12: Vendor Risk Ratings
59:06 Closing
#darknet #darkweb #tor #archetyp #monero #crypto
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin...
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@UCUP5UhD6cMfp...
AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Ben...
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
4
views
Darknet Discussions E01: ASAP Admin, Milky, Federal Prison
🎧 Welcome to the very first episode of "Darknet Discussions." I’m thrilled to kick off our journey into the deep and often misunderstood world of the darknet. Joining us today is Roach, a seasoned expert with a wealth of knowledge and experience in navigating and managing darknet sites.
🔒 In today's episode, we'll explore a range of fascinating topics that reveal the complexities and nuances of the darknet. Here’s a sneak peek at what we're discussing:
The Return of the ASAP Admin 🎭
Hear Roach’s perspective on the surprising reappearance of a well-known market admin and what it signals for the future of darknet markets.
Drone Drops and Darknet Deliveries 🚁
Discover the innovative yet challenging method of drone deliveries in the darknet sphere. What does this advancement mean for security and privacy?
Community Reactions to Market Changes 🌍
Learn about how the darknet community reacts to significant events like market shutdowns and administrative comebacks.
Navigating the Darknet Safely 🛡️
Roach shares essential tips for safely exploring the darknet, providing valuable advice for both newcomers and seasoned users.
This episode is filled with insightful discussions that shed light on the shadowy corners of the internet.
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:00:11 Introduction and Roach's Background
00:00:52 Discussing the ASAP Admin's Return
00:03:38 Discussing the Octopus Video
00:07:07 Discussing Milky's Situation
00:12:50 Discussing the Difference Between State and Federal Prisons
00:18:11 Prison Politics and Dynamics
00:18:51 The Impact of the Prison System
00:20:29 The Difference between State and Federal Prisons
00:21:12 Case Study: Monopoly
00:21:27 Institutionalization and Snitching
00:21:36 The Reach of the U.S. Federal System
00:21:58 The Transfer Process
00:21:58 Prison Transfers and Con Air
00:22:47 Prison Grievance System
00:27:32 The Consequences of Filing Grievances
00:30:31 The Reality of Prison Life
00:33:43 The Expectations and Challenges in Prison
00:37:54 Discussion on Prison Life
00:39:51 Discussion on Gangs and Allegiances
00:41:00 Discussion on Drug Trafficking
00:43:16 Discussion on Incarceration Rate
00:44:06 Discussion on Prisons in Other Countries
00:44:39 Discussion on Cypher Closing with Exit Scam
00:49:49 Discussion on Archetype Hitting 420,000 Users
00:54:06 Discussion on BTC Operator Pleads Guilty
00:57:50 Decentralized Exchanges
00:58:41 Dark Net Criminals vs Regular Criminals
00:58:59 Restitution and Prison Jobs
01:00:14 Dark Net vs Real Life
01:00:53 Evolution of Dark Net
01:02:22 Bitcoin vs Other Cryptocurrencies
01:03:07 Cannabis Industry Evolution
01:03:38 THCA and Legal Loopholes
01:04:58 Rival Affiliate Sentence
01:05:52 Disparity in Sentencing
01:07:02 Fraud in the Hood
01:08:03 Sentencing and Judges
01:08:05 Federal Sentencing Guidelines
01:17:21 Prison Life and Work
01:17:48 Prison Hustles
01:18:25 Prisoners' Intelligence and Adaptability
01:18:49 Prison Environment
01:19:38 Prisoners' Legal Hustles
01:21:41 Future Projects
01:24:45 Interviews and Humanizing Darknet Characters
01:27:19 Closing Remarks
01:27:46 Darknet News
#darknetmarket #darknet #darkweb
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
Welcome to "Darknet Discussions," the podcast that gets into the shadows of the internet to bring you the most intriguing, enlightening, and sometimes unsettling stories from the dark web. Hosted by seasoned darknet aficionados, each episode of "Darknet Discussions" explores the intricate dynamics of darknet markets, cybersecurity threats, and the digital underworld. Join us as we interview experts, discuss the latest trends in cybercrime, and shed light on the technologies that operate beneath the surface of everyday internet use. Also, we occasionally go off on a tangent about something completely unrelated.
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://www.linkedin.com/in/sam-bent/
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
3
views
1
comment
The Rise and Fall of Incognito Market Admin Pharaoh: OSINT & Federal Sentencing
Over the past few months, I've been covering the saga of Incognito Market in detail. From exit scams to extortion, the infamous admin known as Pharaoh has been at the center of it all.
In this video, I recap the events leading up to Pharaoh’s arrest. We begin with the Incognito Market exit scam, where Pharaoh robbed all its buyers, leading to a significant uproar. But the story didn’t end there. Pharaoh then turned to extorting darknet vendors, demanding additional fees even after the exit scam.
On April 1st, after seeing Pharaoh’s announcement to start extorting darknet buyers, I felt compelled to warn the community. My video titled "Don't Pay the Ransom: Incognito April Buyer Extortion Imminent" aimed to protect buyers from his threats. The community's reaction was a mix of anger and determination, hardening against future attacks.
The most recent development? Pharaoh, the principal administrator of Incognito Market, has finally been caught and is now in federal prison at Brooklyn MDC. His capture was made possible through stupidity on his part.
Pharaoh’s attempt to hide his identity wasn’t enough. His social media profiles, including Twitter, Medium, GitHub, and LinkedIn, provided a treasure trove of information. From analyzing his tweets to examining his professional background, we pieced together his activities and connections.
Law enforcement’s investigation uncovered extensive evidence against Pharaoh, including controlled buys of counterfeit medications and records of all transactions on Incognito Market. The charges he faces are severe, including continuing criminal enterprise, distribution of controlled substances, narcotics importation, money laundering, and selling adulterated medication.
The potential sentences are staggering, with the most severe charge potentially leading to life imprisonment. Adding to his woes are upward departures in sentencing, which could significantly increase his prison time due to factors like his leadership role, use of special skills, and obstruction of justice.
#darknet #darknetmarket #truecrimecommunity
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00:00 - Introduction
00:00:13 - Incognito Market's Exit Scam
00:00:25 - Extortion of Darknet Vendors
00:01:01 - Pharaoh's Extortion of Darknet Buyers
00:01:54 - Observations and Impact
00:02:25 - Community Reaction and Lessons Learned
00:03:06 - Pharaoh's Real Identity Revealed
00:04:19 - Current Status of Pharaoh
00:04:30 - Pharaoh's Social Media Presence
00:09:11 - Pharaoh's LinkedIn Profile
00:09:43 - Pharaoh's Google Maps Activity
00:14:52 - Pharaoh's Skills and Background
00:16:24 - Hidden in Plain Sight
00:17:29 - Incognito Market's Timeline and Impact
00:18:13 - Controlled Buys and Evidence
00:18:52 - Counterfeit Medications
00:19:38 - Potential Sentences
00:22:19 - Understanding Federal Sentencing Guidelines
00:24:32 - Aggravating Factors
00:25:50 - Potential Upward Departures
00:31:32 - Impact on the Dark Net
00:32:30 - Dark Net Market Resilience
00:33:36 - Farrow's Greed and Consequences
00:34:31 - Warning to Other Dark Net Market Admins
00:34:53 - Farrow's Future and Possible Outcomes
00:35:34 - Incognito Market Status
00:35:59 - Conclusion and Audience Engagement
#darknetmarket #darknet #darkweb
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://www.linkedin.com/in/sam-bent/
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
5
views
Darknet Discussions E02: LocalMonero, Benzo Boy, Haveno, DoxBin
Welcome back, everyone! In Episode 2 of our podcast, we thoroughly discuss your feedback and suggestions. Here’s a quick rundown of what we covered:
Viewer Feedback Highlights
🎬 Feedback and Improvements: We heard you loud and clear! Many of you suggested improving the flow of our episodes with smoother transitions and cutting down on stock video usage. We're working on it!
🗣️ Addressing User Comments: Roach and I had a blast reading your comments. One standout was from @TBA1998, who humorously compared our darknet experiences. We also discussed the importance of originality and why we chose the name for our show.
Hot Topics
🍺 Debate on Drug Legalization: This debate sparked a lot of interest. We explored the historical impact of alcohol prohibition and its parallels to current drug policies.
💊 Discussion on Benzo Boy: We delved into the case of "Benzo Boy," a darknet vendor facing legal repercussions. His light sentence raised eyebrows and led to discussions about potential cooperation with authorities.
📉 Closing of LocalMonero: The shutdown of LocalMonero has significant implications for the darknet community. We introduced Haveno, a promising new decentralized platform that aims to fill the void left by Monroe.
⚖️ Challenges in Darknet Business: We talked about the various challenges faced by those operating in the darknet, from maintaining anonymity to handling the complexities of decentralized exchanges.
Financial and System Control
💸 Decentralized Exchanges and Government Control: We discussed the rising tension between decentralized financial systems and government regulations, and what it means for the future of financial independence.
🏠 Alternative Housing and Corporate Structure: Explored alternative housing solutions and how they relate to achieving financial independence away from traditional corporate structures.
💼 Unwanted Business Partners and Government Spending: Addressed the burden of taxation and financial enslavement, emphasizing how government spending impacts individual financial freedom.
🔍 Asset Forfeiture and Police Robbery: Highlighted the increasing issue of asset forfeiture and how it often leads to more property being taken by police than by actual criminals.
Darknet Innovations
🔒 Decentralized Finance and Power: Examined the potential of decentralized finance to redistribute power away from centralized authorities.
🕵️ Anonymity and Threat to Power: Discussed how anonymity in financial transactions poses a significant threat to traditional power structures.
📢 Whistleblowers and Corporate Threats: Delved into the risks faced by whistleblowers and the corporate threats that often follow their revelations.
Market Manipulation and Security
📈 Market Manipulation and Threats: Talked about recent instances of market manipulation and the threats faced by individuals who disrupt traditional financial systems.
🔄 Haveno and Decentralized Trading: Introduced Haveno, a new platform for decentralized trading, and discussed its potential to revolutionize the market.
🚨 Ransomware and False Accusations: Addressed the issue of ransomware and the false accusations that sometimes accompany such attacks.
🇷🇺 Discussion on Russian Operators: Highlighted the differences between Russian and Western darknet operators, and the unique challenges faced by each group.
🌐 Discussion on Doxbin and Exit Scams: Explored the operations of Doxbin and the prevalence of exit scams within the darknet.
00:00:00 - Introduction
00:00:19 - Feedback and Improvements
00:01:46 - Addressing User Comments
00:02:51 - Debate on Drug Legalization
00:04:09 - Discussion on Benzo Boy
00:15:15 - Closing of LocalMonero
00:16:34 - Challenges in Darknet Business
00:19:47 - Decentralized Exchanges and Government Control
00:20:37 - Financial Independence and System Control
00:21:39 - Taxation and Financial Enslavement
00:23:02 - Alternative Housing and Corporate Structure
00:23:11 - Unwanted Business Partners and Government Spending
00:24:28 - Asset Forfeiture and Police Robbery
00:24:50 - Decentralized Finance and Power
00:25:10 - Anonymity and Threat to Power
00:25:40 - Whistleblowers and Corporate Threats
00:27:10 - Market Manipulation and Threats
00:28:18 - Haveno and Decentralized Trading
00:31:37 - Challenges and Future of Haveno
00:35:18 - Ransomware and False Accusations
00:38:42 - Discussion on Operation Kronos
00:39:01 - Discussion on Real Admins
00:39:20 - Discussion on Ransom Payments
00:39:41 - Discussion on Real Threats
00:40:31 - Discussion on Russian Operators
00:40:31 - Discussion on Doxbin
00:40:31 - Discussion on Exit Scams
00:41:06 - Discussion on Russian Market Admins
00:41:18 - Discussion on Western Operators
00:41:26 - Discussion on Russian Dark Net Markets
00:55:38 - Discussion on Getting Caught
#darknetmarket #darknet #darkweb
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
20
views
Darknet Discussions E03: Incognito Darkweb Admin, SuperMarket PapaBear Running, Fed. Sentencing
CaptainBLackBeard - King of Pirate Radio:
https://redcircle.com/shows/CaptainBlackbeard
https://endchan.org/CaptainBlackbeard/
🎬 Welcome to another episode of Darknet Discussions! In today's video, we're diving into the dramatic events surrounding the arrest of Pharaoh, the notorious admin of Incognito Market.
💻 Over the past few months, we’ve been closely following Incognito Market, particularly focusing on its exit scams and extortion schemes. Pharaoh's bold attempts to extort darknet vendors and buyers after robbing them through an exit scam have shocked the community.
🚨 Recently, Pharaoh was finally caught at JFK Airport, sending ripples through the darknet ecosystem. The charges against him are severe, including continuing criminal enterprise, narcotics conspiracy, and money laundering. He faces potentially life in prison, reflecting the serious consequences of his actions.
💸 This arrest has had a significant impact on the darknet community. Shortly after Pharaoh’s capture, another market admin, scared by the news, decided to exit scam, further shaking up the scene. The community's reaction has been a mix of shock and a renewed sense of vigilance.
🔍 This case highlights the importance of operational security and the far-reaching consequences of failing to uphold it. Pharaoh's downfall serves as a stark reminder of the risks involved in running darknet markets.
🛡️ In addition to this, we’ve seen increased instability in the Tor network due to DDoS attacks. The Tor community is working hard to strengthen security, but they need more volunteers to host relays and nodes to keep the network robust.
🎉 On a lighter note, Archetyperecently celebrated its fourth birthday, demonstrating resilience in the face of numerous market closures. It’s great to see the community come together and support one another during these turbulent times.
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00:00 - Introduction
00:00:20 - Shoutout to Captain Blackbeard
00:01:13 - Discussion on Federal Sentencing
00:01:20 - Discussion on Darknet News
00:01:27 - Pharaoh's Arrest
00:02:59 - Pharaoh's Charges
00:06:33 - Supermarket Market Exit Scam
00:12:25 - Discussion on Darknet Market Admins
00:19:04 - Discussion on Hidden Marketplaces
00:19:48 - Discussion on Antim
00:20:24 - Discussion on Second Pharaoh
00:21:02 - Discussion on Archetypes
00:21:11 - Discussion on Dread Six
00:21:17 - Discussion on White House Exit
00:22:42 - Discussion on Dishonorable Exit
00:23:56 - Discussion on Theft
00:28:07 - Discussion on Shopping
00:30:31 - Discussion on DDoS Attacks
00:33:48 - Discussion on Tourzon Market
00:36:18 - Discussion on Ethereum Blockchain Attack
00:38:33 - Introduction and Data Breach
00:40:01 - Steps to Take After Data Breach
00:41:56 - Potential Misuse of Breached Data
00:46:26 - Discussion on I2P and Tor
00:51:38 - Cake Wallet and Cryptocurrency
00:52:31 - Closing Remarks
#darknetmarket #darknet #darkweb
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
Welcome to "Darknet Discussions," the podcast that gets into the shadows of the internet to bring you the most intriguing, enlightening, and sometimes unsettling stories from the dark web. Hosted by seasoned darknet aficionados, each episode of "Darknet Discussions" explores the intricate dynamics of darknet markets, cybersecurity threats, and the digital underworld. Join us as we interview experts, discuss the latest trends in cybercrime, and shed light on the technologies that operate beneath the surface of everyday internet use. Also, we occasionally go off on a tangent about something completely unrelated.
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://www.linkedin.com/in/sam-bent/
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
8
views
RISAA, the NSA, And The DEATH of YOUR Privacy Rights
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
#RISAA #privacy #surveillance #law #infosec #section702 #FISA
In today’s video, we're taking a hard look at the latest big brother move from our government—the Reforming Intelligence and Securing America Act, or as it’s infamously known, RISAA. If you thought your privacy was thin before, this new law is like a wrecking ball smashing through whatever little was left.
So, what's this all about? RISAA was supposed to just renew some old surveillance rules, but guess what? It's turned into a free-for-all on our personal conversations. Now, the government doesn’t even need a good reason to snoop through your emails or listen in on your calls—all in the name of national security, of course.
But here's the kicker: this isn't just about watching bad guys—it's about watching everyone. Imagine every place you go, from coffee shops to gyms, turned into mini spy hubs. Sounds like a plot from a dystopian movie, right? Well, it’s our reality now.
In this video, I'm breaking down how RISAA got passed with hardly anyone noticing and what it really means for us regular people. They've dressed this disaster up as a privacy reform, but don’t be fooled—it’s anything but safe.
Stick around because this is more than just a rant. It’s about staying aware and knowing how deep the rabbit hole goes when it comes to our so-called security laws. Don’t forget to hit that like and subscribe button if you value what we’re doing here. Let’s dive in and see exactly how deep this mess goes!
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
BTC:
bc1qgp45lsv2g7f7sl9gcxvpnzv5tevgrp4wz7utwk
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://www.linkedin.com/in/sam-bent/
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
00:00 Intro
00:24 Nobody is talking about RISAA
00:35 What is RISAA anyway?
00:56 FISA Section 702
01:29 How RISAA was marketed
02:25 Congress can't be spied on, but you can.
03:05 Everyone is a spy provision
03:57 What does this mean for you and me?
04:00 Rampant government surveillance
04:19 Chilling effects on free speech
05:14 When they passed RISAA
05:43 They hypocrisy of RISAA and China
05:58 The death of the 4th Amendment
06:07 The Patriot Act
06:23 NSA Bulk Collection of Data
06:46 FISA Amendment
07:02 Patriot Act Renewal
07:23 USA Freedom Act
07:50 RISAA Act
1
view
The Nemesis Darknet Market Takedown Story
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
In this updated analysis, we specifically critique the actions of a darknet administrator threatening to release buyer addresses to coerce payment from vendors. Such threats demonstrate a profound misunderstanding of legal standards for prosecution, which require concrete evidence beyond mere addresses or accusations. The reliance on these threats highlights a lack of ethical integrity and a misguided belief in the power of intimidation over legal substance.
The historical context of cyber law further undermines the administrator's position. In previous legal proceedings, courts have consistently required substantial evidence linking an individual directly to criminal activities. Mere insinuations or possession of information found on the darknet have not sufficed for convictions, reflecting a judicial acknowledgment of the need for incontrovertible proof. This precedent exposes the futility of the administrator's threats as a legally unsound and ineffective strategy.
Critically, the administrator's approach not only misinterprets legal realities but also erodes the foundational trust within the darknet community. By exploiting fear without a legitimate legal basis, the administrator acts in a manner that is both ethically reprehensible and strategically flawed. This behavior highlights the importance for individuals within these communities to remain informed about their legal protections against such baseless threats.
#tor #exitscam #incognito #darknet #darknetmarket
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
TIKTOK:
https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:11 The situation
01:06 Active extortion and robbery
01:49 This why built in encryption is not good.
03:19 Insanity
04:13 Scared darknet vendors
06:45 Darknet vendors getting robbed multiple times over....foolishness.
11:04 Weak Darknet Vendors
#cybercrime #darknet #tor #darkweb #extortion
6
views
The Downfall of Cypher Darknet Market
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
In this updated analysis, we specifically critique the actions of a darknet administrator threatening to release buyer addresses to coerce payment from vendors. Such threats demonstrate a profound misunderstanding of legal standards for prosecution, which require concrete evidence beyond mere addresses or accusations. The reliance on these threats highlights a lack of ethical integrity and a misguided belief in the power of intimidation over legal substance.
The historical context of cyber law further undermines the administrator's position. In previous legal proceedings, courts have consistently required substantial evidence linking an individual directly to criminal activities. Mere insinuations or possession of information found on the darknet have not sufficed for convictions, reflecting a judicial acknowledgment of the need for incontrovertible proof. This precedent exposes the futility of the administrator's threats as a legally unsound and ineffective strategy.
Critically, the administrator's approach not only misinterprets legal realities but also erodes the foundational trust within the darknet community. By exploiting fear without a legitimate legal basis, the administrator acts in a manner that is both ethically reprehensible and strategically flawed. This behavior highlights the importance for individuals within these communities to remain informed about their legal protections against such baseless threats.
#tor #exitscam #incognito #darknet #darknetmarket
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
TIKTOK:
https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:11 The situation
01:06 Active extortion and robbery
01:49 This why built in encryption is not good.
03:19 Insanity
04:13 Scared darknet vendors
06:45 Darknet vendors getting robbed multiple times over....foolishness.
11:04 Weak Darknet Vendors
#cybercrime #darknet #tor #darkweb #extortion
2
views
My most interesting cellie in federal prison
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
In this updated analysis, we specifically critique the actions of a darknet administrator threatening to release buyer addresses to coerce payment from vendors. Such threats demonstrate a profound misunderstanding of legal standards for prosecution, which require concrete evidence beyond mere addresses or accusations. The reliance on these threats highlights a lack of ethical integrity and a misguided belief in the power of intimidation over legal substance.
The historical context of cyber law further undermines the administrator's position. In previous legal proceedings, courts have consistently required substantial evidence linking an individual directly to criminal activities. Mere insinuations or possession of information found on the darknet have not sufficed for convictions, reflecting a judicial acknowledgment of the need for incontrovertible proof. This precedent exposes the futility of the administrator's threats as a legally unsound and ineffective strategy.
Critically, the administrator's approach not only misinterprets legal realities but also erodes the foundational trust within the darknet community. By exploiting fear without a legitimate legal basis, the administrator acts in a manner that is both ethically reprehensible and strategically flawed. This behavior highlights the importance for individuals within these communities to remain informed about their legal protections against such baseless threats.
#tor #exitscam #incognito #darknet #darknetmarket
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
TIKTOK:
https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:11 The situation
01:06 Active extortion and robbery
01:49 This why built in encryption is not good.
03:19 Insanity
04:13 Scared darknet vendors
06:45 Darknet vendors getting robbed multiple times over....foolishness.
11:04 Weak Darknet Vendors
#cybercrime #darknet #tor #darkweb #extortion
7
views
2
comments
Making Green and Grey Dragon - Deep Dot Darknet
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
In this updated analysis, we specifically critique the actions of a darknet administrator threatening to release buyer addresses to coerce payment from vendors. Such threats demonstrate a profound misunderstanding of legal standards for prosecution, which require concrete evidence beyond mere addresses or accusations. The reliance on these threats highlights a lack of ethical integrity and a misguided belief in the power of intimidation over legal substance.
The historical context of cyber law further undermines the administrator's position. In previous legal proceedings, courts have consistently required substantial evidence linking an individual directly to criminal activities. Mere insinuations or possession of information found on the darknet have not sufficed for convictions, reflecting a judicial acknowledgment of the need for incontrovertible proof. This precedent exposes the futility of the administrator's threats as a legally unsound and ineffective strategy.
Critically, the administrator's approach not only misinterprets legal realities but also erodes the foundational trust within the darknet community. By exploiting fear without a legitimate legal basis, the administrator acts in a manner that is both ethically reprehensible and strategically flawed. This behavior highlights the importance for individuals within these communities to remain informed about their legal protections against such baseless threats.
#tor #exitscam #incognito #darknet #darknetmarket
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
TIKTOK:
https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:11 The situation
01:06 Active extortion and robbery
01:49 This why built in encryption is not good.
03:19 Insanity
04:13 Scared darknet vendors
06:45 Darknet vendors getting robbed multiple times over....foolishness.
11:04 Weak Darknet Vendors
#cybercrime #darknet #tor #darkweb #extortion
5
views
Incognito Darknet Admin Extorts Darknet Vendors: With Nothing - Many Cave.
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
In this updated analysis, we specifically critique the actions of a darknet administrator threatening to release buyer addresses to coerce payment from vendors. Such threats demonstrate a profound misunderstanding of legal standards for prosecution, which require concrete evidence beyond mere addresses or accusations. The reliance on these threats highlights a lack of ethical integrity and a misguided belief in the power of intimidation over legal substance.
The historical context of cyber law further undermines the administrator's position. In previous legal proceedings, courts have consistently required substantial evidence linking an individual directly to criminal activities. Mere insinuations or possession of information found on the darknet have not sufficed for convictions, reflecting a judicial acknowledgment of the need for incontrovertible proof. This precedent exposes the futility of the administrator's threats as a legally unsound and ineffective strategy.
Critically, the administrator's approach not only misinterprets legal realities but also erodes the foundational trust within the darknet community. By exploiting fear without a legitimate legal basis, the administrator acts in a manner that is both ethically reprehensible and strategically flawed. This behavior highlights the importance for individuals within these communities to remain informed about their legal protections against such baseless threats.
#tor #exitscam #incognito #darknet #darknetmarket
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
TIKTOK:
https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:11 The situation
01:06 Active extortion and robbery
01:49 This why built in encryption is not good.
03:19 Insanity
04:13 Scared darknet vendors
06:45 Darknet vendors getting robbed multiple times over....foolishness.
11:04 Weak Darknet Vendors
#cybercrime #darknet #tor #darkweb #extortion
1
view
Breachforums 3.0 and USDoD's Bold Promise to the Community - A New Community
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
In this updated analysis, we specifically critique the actions of a darknet administrator threatening to release buyer addresses to coerce payment from vendors. Such threats demonstrate a profound misunderstanding of legal standards for prosecution, which require concrete evidence beyond mere addresses or accusations. The reliance on these threats highlights a lack of ethical integrity and a misguided belief in the power of intimidation over legal substance.
The historical context of cyber law further undermines the administrator's position. In previous legal proceedings, courts have consistently required substantial evidence linking an individual directly to criminal activities. Mere insinuations or possession of information found on the darknet have not sufficed for convictions, reflecting a judicial acknowledgment of the need for incontrovertible proof. This precedent exposes the futility of the administrator's threats as a legally unsound and ineffective strategy.
Critically, the administrator's approach not only misinterprets legal realities but also erodes the foundational trust within the darknet community. By exploiting fear without a legitimate legal basis, the administrator acts in a manner that is both ethically reprehensible and strategically flawed. This behavior highlights the importance for individuals within these communities to remain informed about their legal protections against such baseless threats.
#tor #exitscam #incognito #darknet #darknetmarket
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
TIKTOK:
https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:11 The situation
01:06 Active extortion and robbery
01:49 This why built in encryption is not good.
03:19 Insanity
04:13 Scared darknet vendors
06:45 Darknet vendors getting robbed multiple times over....foolishness.
11:04 Weak Darknet Vendors
#cybercrime #darknet #tor #darkweb #extortion
3
views
Paying Darknet Employees & USPS Cool Down Periods - Deep Dot Darknet
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
In this updated analysis, we specifically critique the actions of a darknet administrator threatening to release buyer addresses to coerce payment from vendors. Such threats demonstrate a profound misunderstanding of legal standards for prosecution, which require concrete evidence beyond mere addresses or accusations. The reliance on these threats highlights a lack of ethical integrity and a misguided belief in the power of intimidation over legal substance.
The historical context of cyber law further undermines the administrator's position. In previous legal proceedings, courts have consistently required substantial evidence linking an individual directly to criminal activities. Mere insinuations or possession of information found on the darknet have not sufficed for convictions, reflecting a judicial acknowledgment of the need for incontrovertible proof. This precedent exposes the futility of the administrator's threats as a legally unsound and ineffective strategy.
Critically, the administrator's approach not only misinterprets legal realities but also erodes the foundational trust within the darknet community. By exploiting fear without a legitimate legal basis, the administrator acts in a manner that is both ethically reprehensible and strategically flawed. This behavior highlights the importance for individuals within these communities to remain informed about their legal protections against such baseless threats.
#tor #exitscam #incognito #darknet #darknetmarket
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
TIKTOK:
https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:11 The situation
01:06 Active extortion and robbery
01:49 This why built in encryption is not good.
03:19 Insanity
04:13 Scared darknet vendors
06:45 Darknet vendors getting robbed multiple times over....foolishness.
11:04 Weak Darknet Vendors
#cybercrime #darknet #tor #darkweb #extortion
3
views
Quitting - Deep Dot Darknet
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
In this updated analysis, we specifically critique the actions of a darknet administrator threatening to release buyer addresses to coerce payment from vendors. Such threats demonstrate a profound misunderstanding of legal standards for prosecution, which require concrete evidence beyond mere addresses or accusations. The reliance on these threats highlights a lack of ethical integrity and a misguided belief in the power of intimidation over legal substance.
The historical context of cyber law further undermines the administrator's position. In previous legal proceedings, courts have consistently required substantial evidence linking an individual directly to criminal activities. Mere insinuations or possession of information found on the darknet have not sufficed for convictions, reflecting a judicial acknowledgment of the need for incontrovertible proof. This precedent exposes the futility of the administrator's threats as a legally unsound and ineffective strategy.
Critically, the administrator's approach not only misinterprets legal realities but also erodes the foundational trust within the darknet community. By exploiting fear without a legitimate legal basis, the administrator acts in a manner that is both ethically reprehensible and strategically flawed. This behavior highlights the importance for individuals within these communities to remain informed about their legal protections against such baseless threats.
#tor #exitscam #incognito #darknet #darknetmarket
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
TIKTOK:
https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:11 The situation
01:06 Active extortion and robbery
01:49 This why built in encryption is not good.
03:19 Insanity
04:13 Scared darknet vendors
06:45 Darknet vendors getting robbed multiple times over....foolishness.
11:04 Weak Darknet Vendors
#cybercrime #darknet #tor #darkweb #extortion
11
views
Convicts Vs Inmates And White Collar Criminals
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime Ever wondered about the origins of 'canary.txt' and canary files? 🕊️ Delve deep with me as I trace its roots back to an old-school mining practice and its significance in today's digital age. I'll also shed light on my prolonged absence and what's been keeping me from the camera 🎥. Uncover how canary files have become an unwritten code in the Darknet and why they are crucial for operational security. Dive into this intriguing mix of history, technology, and my life updates.
#tor #canary #opsec #infosec #darknet
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:20 Origin of Canary.txt
00:32 Mining Background of the Canary Text File
00:50 Digital Adaptation of the Canary Concept
01:40 Darknet's Adoption of the Canary Concept
02:30 History Repeating Itself
02:55 Transition to Main Video Content
03:50 Reasons for Absence
04:19 Personal Life Updates
04:56 Upcoming Content
05:18 Conclusion
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
BTC:
bc1qgp45lsv2g7f7sl9gcxvpnzv5tevgrp4wz7utwk
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST:
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://bit.ly/doingfedtimelinkedin
EMAIL:
ksllc27@gmail.com
KEYBASE:
https://keybase.io/doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
TIKTOK:
https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
4
views
Octopus [Darknet Vendor] Responds to Mental Outlaw
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
In this updated analysis, we specifically critique the actions of a darknet administrator threatening to release buyer addresses to coerce payment from vendors. Such threats demonstrate a profound misunderstanding of legal standards for prosecution, which require concrete evidence beyond mere addresses or accusations. The reliance on these threats highlights a lack of ethical integrity and a misguided belief in the power of intimidation over legal substance.
The historical context of cyber law further undermines the administrator's position. In previous legal proceedings, courts have consistently required substantial evidence linking an individual directly to criminal activities. Mere insinuations or possession of information found on the darknet have not sufficed for convictions, reflecting a judicial acknowledgment of the need for incontrovertible proof. This precedent exposes the futility of the administrator's threats as a legally unsound and ineffective strategy.
Critically, the administrator's approach not only misinterprets legal realities but also erodes the foundational trust within the darknet community. By exploiting fear without a legitimate legal basis, the administrator acts in a manner that is both ethically reprehensible and strategically flawed. This behavior highlights the importance for individuals within these communities to remain informed about their legal protections against such baseless threats.
#tor #exitscam #incognito #darknet #darknetmarket
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
TIKTOK:
https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:11 The situation
01:06 Active extortion and robbery
01:49 This why built in encryption is not good.
03:19 Insanity
04:13 Scared darknet vendors
06:45 Darknet vendors getting robbed multiple times over....foolishness.
11:04 Weak Darknet Vendors
#cybercrime #darknet #tor #darkweb #extortion
3
views
ISP vs VPN: Log Collection - Deep Dot Darknet
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
In this updated analysis, we specifically critique the actions of a darknet administrator threatening to release buyer addresses to coerce payment from vendors. Such threats demonstrate a profound misunderstanding of legal standards for prosecution, which require concrete evidence beyond mere addresses or accusations. The reliance on these threats highlights a lack of ethical integrity and a misguided belief in the power of intimidation over legal substance.
The historical context of cyber law further undermines the administrator's position. In previous legal proceedings, courts have consistently required substantial evidence linking an individual directly to criminal activities. Mere insinuations or possession of information found on the darknet have not sufficed for convictions, reflecting a judicial acknowledgment of the need for incontrovertible proof. This precedent exposes the futility of the administrator's threats as a legally unsound and ineffective strategy.
Critically, the administrator's approach not only misinterprets legal realities but also erodes the foundational trust within the darknet community. By exploiting fear without a legitimate legal basis, the administrator acts in a manner that is both ethically reprehensible and strategically flawed. This behavior highlights the importance for individuals within these communities to remain informed about their legal protections against such baseless threats.
#tor #exitscam #incognito #darknet #darknetmarket
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
TIKTOK:
https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:11 The situation
01:06 Active extortion and robbery
01:49 This why built in encryption is not good.
03:19 Insanity
04:13 Scared darknet vendors
06:45 Darknet vendors getting robbed multiple times over....foolishness.
11:04 Weak Darknet Vendors
#cybercrime #darknet #tor #darkweb #extortion
3
views
Grooming my 18-inch beard (NOT WHAT YOU THINK) and addiction - Deep Dot Darknet
In this video I am answering Serendipity's question: "How did you find out you had an addicitive personality?"
In addition I also answer Serendipity's question regarding my beard, how it's groomed, who grooms it, etc.
I get kind of personal in this video. Along with me talking about my beard, I also discuss my life, addiction, and pain in general.
#beard #beards #addiction
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Intro
00:04 Serendipity's question: "How did you find out you had an addicitive personality?"
00:24 My beard
06:15 addiction
08:15 Fires, cannabis and Ciggs.
09:41 Robbing the store down the street
11:32 cigarettes as suicide
12:32 Living in New Bedford
14:25 Running with the wolfs
15:44 Moving to Woonsocket, RI
16:50 What I do now: Nothing.
17:40 Quitting Ciggs.
18:44 Conclusion
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
In "Deep Dot Darknet " I do my best to answer the questions that you have given me, be it on email, social media, or here on youtube. Most of the time, these questions are regarding the Darknet, hacking, particulars of being a darknet vendor or other InfoSec or OpSec related questions.
I had started the "Deep Dot Darknet " series to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case thank you all for taking your time to submit questions as well as watching, liking and subscribing!
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
My Site: DoingFedTime.com
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://www.linkedin.com/in/sam-bent/
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. ☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
BTC:
bc1qgp45lsv2g7f7sl9gcxvpnzv5tevgrp4wz7utwk
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
1
view
New Tor Bridge: WebTunnel Explained & Happy World Day Against Cyber Censorship
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
In today's special episode, we’re shining a light on World Day Against Cyber Censorship, observed annually on March 12th. This day marks a global commitment to fighting online censorship and promoting the unalienable right to free expression online. But this isn’t just any commemoration; we’re diving into the groundbreaking initiative by the Tor Project - WebTunnel - a beacon of hope for internet users in censorship-heavy regions.
The Genesis of WebTunnel In an era where digital privacy is constantly under siege, the Tor Project announced WebTunnel, a revolutionary bridge for the Tor network. This innovation is crucial for users in areas where internet access is heavily censored, providing a discreet doorway to unrestricted web browsing.
But what exactly is a "bridge" in the context of Tor, you ask? It's essentially a hidden entry point that helps users connect to the Tor network, bypassing any surveillance or censorship attempts by governments or ISPs. Why WebTunnel Matters WebTunnel is not just another tool; it's a statement against oppressive regimes that seek to control and surveil the internet. By disguising Tor traffic as regular HTTPS web traffic, WebTunnel ensures that anyone monitoring your internet usage would merely think you're browsing conventional websites.
This level of obfuscation is critical in places where only approved internet traffic is allowed, making WebTunnel an essential tool for maintaining online freedom and privacy. Joining the Fight Against Censorship Setting up a WebTunnel bridge significantly contributes to the global fight against internet censorship.
The Tor Project has made it straightforward for anyone willing to donate bandwidth and support the cause. This collective effort is a testament to the power of community and technology in battling censorship and promoting a free and open internet. A Word of Caution: While the allure of complete online anonymity and privacy is strong, it's crucial to understand the risks and necessities specific to your situation.
Tools like WebTunnel are vital for those in high-risk environments but might not be necessary for every internet user. Continually assess your personal or organizational threat model before diving into the use of advanced privacy tools. The Broader Battle for Digital Freedom As we explore the functionalities and importance of WebTunnel, don't forget the bigger picture – the ongoing struggle for a censorship-free internet. Despite the advancements in technologies like WebTunnel, the effectiveness and accessibility of these tools can vary significantly across different regions, highlighting the ongoing challenges in the fight for digital rights.
#tor #webtunnel #torproject #torbridges
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
TIKTOK:
https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:00 Intro to Cyber Censorship Day
00:15 Origin of Cyber Censorship Day
00:56 WebTunnel Announcement
01:20 Understanding Tor Bridges
02:00 WebTunnel's Role
02:35 Censorship Challenges
06:35 Setting Up WebTunnel
07:55 Censorship's Ongoing Challenge
08:27 Obtaining & Using WebTunnel
10:59 Closing
4
views
I2P DDoS Attacks, notbob and zzz - Deep Dot Darknet
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
Today will be talking about how the recent DDoS attacks are being handled from the developers and people who are helping shape I2P. notbob is a I2P veteran who owns and hosts the site notbob.i2p, which is basically an index for other I2P sites. Think of it as Tor Taxi, or Dark.Fail for the I2P network.
I'll be going through some of his comments and a detailed breakdown of how it's being handled and what people are doing to try to improve the network and make it more resilient. In addition, we'll also be covering some of his suggestions to help prevent you from having to deal with too much downtime on I2P (spoiler alert use I2P+).
In addition, I will also be covering a possible new series that I may be covering. In this series, I will be talking to people with who I am highly secretive and value their privacy above all else. These would be individuals like notbob, Opicaak the creator of Prestium, if he or she says yes, and Hugbunter, among others.
We will also be taking a look at how Tor is funded.
#I2P #invisibleinternet #ddos #tor #darknet #deepweb
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Intro
00:03 I2P DDoS attacks
00:35 notbob's I2P Site
01:10 Secure interviews
01:35 My goal with this channel
03:45 notbob's take on the I2P DDoS Attacks
05:20 Disclaimer - disclosure authroized by notbob
06:42 zzz from zzz.i2p
08:18 My thoughts about I2P and the DDoS.
08:33 Tor's funding
09:12 A message to my subscribers and people who like this video.
09:57 Endscreen
4
views
DONT PAY THE RANSOM - Incognito April Buyer Extortion Imminent?
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ Description ☆-----☆-----☆-----☆-----☆
Hey, everyone! In today’s video, "DONT PAY THE RANSOM - Incognito April Buyer Extortion Imminent?", we're tackling a pressing issue in the darknet realm - the shift of Incognito market's admin, Pharaoh, from extorting vendors to now targeting buyers. With April Fool’s as the backdrop, we delve into why succumbing to digital extortion is a no-go, demystifying the legality around having your address known, and the real risk it poses (hint: it's less than you think).
We're here to arm you with knowledge and strategies to safeguard against these cyber threats. Understand the implications of paying ransom in the digital shadows and why it might encourage more harmful activities. Plus, get a sneak peek into our upcoming deep dive on the Nemesis Market, where we'll explore the nitty-gritty of darknet dealings in a format that mixes in-depth analysis with engaging dialogue.
Remember, knowledge is your best defense in the digital world. Don't let fear guide your decisions. Stay tuned for more content that keeps you informed and one step ahead of the game.
#tor #exitscam #incognito #darknet #darknetmarket
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin...
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@UCUP5UhD6cMfp...
AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Ben...
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Hitman by Kevin MacLeod is licensed under a Creative Commons Attribution 4.0 license. https://creativecommons.org/licenses/by/4.0/
☆-----☆-----☆-----☆-----☆ CHAPTERS☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:55 Having an address is not illegal.
02:20 What you should do if you are a darknet buyer.
03:38 Instead of paying the extortionist...
04:16 You're dealing with a known liar.
04:51 Nemesis Market Video Update.
6
views
Free From the Feds
This video shares my personal journey of completing federal probation. I discuss the day-to-day challenges, the impact on my life, and what it means to finally regain my full freedom. This is a firsthand account of navigating the complexities of the federal probation system , as well as a thank you all my great subscribers who have supported me via interaction.
#feds #probation #truecrime
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://www.linkedin.com/in/sam-bent/
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@doingfedtime
AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
Darknet Gun Dealers (95% of the time) = Feds
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
#tor #canary #opsec #infosec #darknet
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:20 Origin of Canary.txt
00:32 Mining Background of the Canary Text File
00:50 Digital Adaptation of the Canary Concept
01:40 Darknet's Adoption of the Canary Concept
02:30 History Repeating Itself
02:55 Transition to Main Video Content
03:50 Reasons for Absence
04:19 Personal Life Updates
04:56 Upcoming Content
05:18 Conclusion
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST:
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://www.linkedin.com/in/sam-bent/
EMAIL:
ksllc27@gmail.com
KEYBASE:
https://keybase.io/doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
TIKTOK:
https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
2
views
Darknet's Silent Alarm: The Secret Behind Canary.txt - Deep Dot Darknet
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime Ever wondered about the origins of 'canary.txt' and canary files? 🕊️ Delve deep with me as I trace its roots back to an old-school mining practice and its significance in today's digital age. I'll also shed light on my prolonged absence and what's been keeping me from the camera 🎥. Uncover how canary files have become an unwritten code in the Darknet and why they are crucial for operational security. Dive into this intriguing mix of history, technology, and my life updates.
#tor #canary #opsec #infosec #darknet
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:20 Origin of Canary.txt
00:32 Mining Background of the Canary Text File
00:50 Digital Adaptation of the Canary Concept
01:40 Darknet's Adoption of the Canary Concept
02:30 History Repeating Itself
02:55 Transition to Main Video Content
03:50 Reasons for Absence
04:19 Personal Life Updates
04:56 Upcoming Content
05:18 Conclusion
☆-----☆-----☆-----☆-----☆ Support ☆-----☆-----☆-----☆-----☆
BTC:
bc1qgp45lsv2g7f7sl9gcxvpnzv5tevgrp4wz7utwk
XMR:
44KNWfmHQhV5w1nsuW98jBTPxKoAomkEeTYHFU2WcwvJDaYrBDTASGPYZXFh7bu8qe6a11azJ1WC9ingZ1T8PW4gQtqYHra
CashApp
$doingfedtime
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST:
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://bit.ly/doingfedtimelinkedin
EMAIL:
ksllc27@gmail.com
KEYBASE:
https://keybase.io/doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
TIKTOK:
https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
1
view