Dread is back...kind of.
Today, Hugbunter made an eagerly anticipated announcement on the dreads subreddit r/dreadalert around 12 AM EST. This news is sure to cause a stir within the darknet community, which has been in a state of flux and without a centralized gathering place for the past two months. As previously noted on the same subreddit, Hugbunter had hinted that the next announcement would be regarding the site's return, and indeed, the site is now up and running. However, it's worth noting that access to the site is not yet available to everyone.
While the site is up it is not available for the general public currently. It's under what hugbunter has called “Privite testing”.
basically, like any company or software production dread is being put into a beta state for a select group of people to evaluate and for both hugbunter and paris to have a chance at fine-tuning their production server before it is opened up a little bit more. It means that if we go by the announcement dread is getting very close to opening up publicly.
Hugbunter Said that they will be running private testing in multiple stages over the next few days. Essentially this will be so that all the fine-tuning can be out of the way for the actual reopening of dread.
Different Darknet market admins and hidden service admins have been invited back to do testing. The next group of people to be invited back will be advertisers and individual subreddit moderators.
Hugbunter further stated That all advertisers will have a 3-month extension.
either way, For me it was a really great thing to wake up this morning and see that a new message from hugbunter was available that showed some kind of progress. No doubt at this point a lot of people have actually given up hope on ever seeing the darknet forum ever come back. I for one am definitely excited to see what changes have taken place. I've known hugbunter, now for about 7 years. Granted a good portion of those years, I was either in federal prison or dealing with litigation regarding it. That said I have never known him to be a liar or not truthful in regards to any updates or situations that have occurred.
The fact that it took this long to get dread into a position where there can be private testing of the site, to me means that there are probably an absolutely ridiculous amount of updates and new features that we will be seeing. Aside from that, I know there is a whole new add-on to the dread infrastructure. You heard me right I said infrastructure not Darknet forum or website. Unfortunately, that last part is not something I can talk to you about right now. I've promised to keep my discussion with hugbunter close to the chest. I have a video that has actually been ready to release for well over a month at this point. It regards this exact topic.
In any case what are your thoughts on all of this? what's your favorite subDreadit?
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:15 Who is Dread back for?
00:49 Dread's second open beta
03:22 My thoughts on Hugbunter
05:33 endscreen
#dread #hugbunter #reddit #tor #darknet #deepweb
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
In "Deep Dot Darknet " I do my best to answer the questions you have given me, be it on email, social media, or YouTube. Most of the time, these questions are regarding the Darknet, hacking, particulars of being a Darknet vendor or other InfoSec or OpSec-related questions.
I had started the "Deep Dot Darknet " series to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case, thank you all for taking the time to submit questions as well as watching, liking, and subscribing!
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST:
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://bit.ly/doingfedtimelinkedin
EMAIL:
ksllc27@gmail.com
KEYBASE:
https://keybase.io/doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
TIKTOK:
https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
114
views
Selective Scammers, Darknet Vendor Research, EXIF Danger, and Winning EVERY Darknet Dispute
I wanted to share my personal thoughts and advice on the topic of buying from Darknet vendors. As a general rule, I advise against purchasing anything from the Darknet, as it can be risky and potentially illegal.
That being said, if you decide to buy from Darknet vendors, it's important to be cautious and research. In this video we will talk about how to do that. What to look for, and how to test the darknet vendor BEFORE buying from them.
Once you have found a vendor that you think may be a good fit, I suggest asking them questions to test their responsiveness and customer service. It's important to be patient and give them some time to respond, but if they are unresponsive or provide poor customer service, it may be best to move on to another vendor.
I discuss how to win in a dispute, remove EXIF data, and have undeniable proof against the vendor in a dispute between you and them when actually disputing on the darknet market (if they rip you off).
#scam #darknet #tor #deepweb
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:03 Ozo's Question: "Recommended Vendors?"
00:29 Why I don't recommend specific Darknet vendors
00:54 DIY - How Darknet vendors are found, verified, and decided upon
01:50 How I check out Darknet Vendors
02:17 Be careful of vendors who are selective scamming!
03:40 How to win in a dispute with a Darknet vendor
05:17 The Meta Data you system viewer does not show you.
06:07 Your name, and other info is not just in pictures...
06:17 How the feds found an anonymous hacker - exif tool
07:14 Handling a dispute with a vendor the right way
07:58 The best way to expose a darknet vendor
09:37 Avoiding getting ripped off on a darknet market
09:59 Researching Darknet Market Vendors
12:52 Conclusion
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
In "Deep Dot Darknet " I do my best to answer the questions you have given me, be it on email, social media, or YouTube. Most of the time, these questions are regarding the Darknet, hacking, particulars of being a Darknet vendor or other InfoSec or OpSec-related questions.
I had started the "Deep Dot Darknet " series to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case, thank you all for taking the time to submit questions as well as watching, liking, and subscribing!
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST:
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://bit.ly/doingfedtimelinkedin
EMAIL:
ksllc27@gmail.com
KEYBASE:
https://keybase.io/doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
TIKTOK:
https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
142
views
Bisq getting away from KYC: aka KYC Free #shorts
Tired of KYC, and having to show 50 different ID's or complete 10 different steps in order to buy crypto? Use Bisq.
#shorts #bisq #kyc #bitcoin #crypto
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
In Tech Tip, we do cool stuff and try to keep the boring stuff to a minimum.
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST:
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://bit.ly/doingfedtimelinkedin
EMAIL:
ksllc27@gmail.com
KEYBASE:
https://keybase.io/doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
TIKTOK:
https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
26
views
I2P Easy installer vs I2P Installer fixing java errors, etc
#I2P #invisibleinternet #ddos #darknet #deepweb
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Intro
00:30 What's the point of this I2P video?
00:43 2x I2p Installers, different names, sizes and looks
02:43 I2P install wizard
03:40 New, correct I2P install finished.
04:00 Right and wrong installers for I2P
04:45 conclusion
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
In Tech Tip we do cool stuff and try to the bearing stuff to a minimum.
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST:
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://bit.ly/doingfedtimelinkedin
EMAIL:
ksllc27@gmail.com
KEYBASE:
https://keybase.io/doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
TIKTOK:
https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
32
views
Bisq getting away from KYC: aka KYC Free #shorts
Tired of KYC, and having to show 50 different ID's or complete 10 different steps in order to buy crypto? Use Bisq.
#shorts #bisq #kyc #bitcoin #crypto
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
In Tech Tip, we do cool stuff and try to keep the boring stuff to a minimum.
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST:
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://bit.ly/doingfedtimelinkedin
EMAIL:
ksllc27@gmail.com
KEYBASE:
https://keybase.io/doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
TIKTOK:
https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
28
views
ChatGPT vs ChatGPT + Speed Test - 3 rounds
To compare the performance of ChatGPT and ChatGPT Plus, we will be conducting a benchmark test that measures the processing time for a set of prompt-response pairs. The results of the benchmark test will provide a comparison of the processing time for both models, but it is important to note that these results may not be representative of the performance of the models in all scenarios.
In conclusion, OpenAI's ChatGPT and ChatGPT Plus are both powerful language models that are capable of generating human-like responses. While both models are fast, the actual difference in processing time between the two models will depend on the specific use case and the hardware and software environment they are running in. The suitability of a model for a specific use case will depend on a variety of factors, including the model's accuracy, response time, and the complexity of the task it is being used for.
#openai #chatgpt #ai
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:05 ChatGPT vs ChatGPT + Test 1
00:29 ChatGPT vs ChatGPT + Test 2
01:05 ChatGPT vs ChatGPT + Test 3
01:56 Wrap up of ChatGPT vs ChatGPT +
02:59 Conclusion
03:11 Endscreen
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
In techtip we talk about IT, Infosec, and general nerd'ly stuff. :)
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST:
https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE:
https://www.doingfedtime.com
FACEBOOK:
https://www.facebook.com/doing.fedtime/
TWITTER:
https://twitter.com/DoingFedTime
LINKEDIN:
https://bit.ly/doingfedtimelinkedin
EMAIL:
ksllc27@gmail.com
KEYBASE:
https://keybase.io/doingfedtime
AMAZON AUTHOR PAGE:
https://bit.ly/DoingFedTimeAmazon
TIKTOK:
https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
24
views
I2P Dedicated Server, Easy, Remote Install Walkthrough
Do you want to contribute to the I2P Project without costing you anything but a little time? Want to create your own remote server from scratch? Do these things for free while helping a decentralized and nonprofit anonymity network? Then this is the video for you!
We will be using Digital Ocean, not because they are sponsoring this video (they are not) but because it's easy to use and flexible.
ALL COMMANDS ARE INSIDE OF THE PINNED POST AS CHAPTERS!
I know in the video, I say the steps are in the description but I could not fit them all in here!
I2P (Invisible Internet Project) is a free, open-source, decentralized, and anonymous overlay network that allows for secure and private communication over the internet. It uses end-to-end encryption, unlike Tor. The I2P network provides a secure layer that encrypts and protects internet traffic and shields the users' online identity and activities from prying eyes.
The I2P network is designed to enable anonymous and secure communication, allowing users to communicate freely without fear of surveillance or censorship. This makes it a popular choice for privacy-conscious users, journalists, activists, and individuals who require secure and private communication. The network is easy to install and use and integrates with various applications, including email, instant messaging, file sharing, and more.
With its focus on security, privacy, and freedom, I2P is an ideal solution for anyone looking to protect their online identity and activities from prying eyes. Whether you're concerned about government surveillance or malicious adversaries or just want to maintain your privacy online, I2P offers a robust and reliable solution that is accessible to everyone.
Overall, I2P is a must-have for anyone looking to take control of their online privacy and security, and enjoy a more secure and private internet experience.
The best part is it's FREE! Support the I2P Network today, install it, and let it run; that's all you have to do!
#i2p #invisibleinternetproject #diy #server
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
In Tech Tip we do cool stuff and try to the bearing stuff to a minimum.
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST: https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin...
EMAIL: ksllc27@gmail.com
KEYBASE: https://keybase.io/doingfedtime
Playlist for the Deep Dot Darknet Series: https://www.youtube.com/playlist?list...
AMAZON AUTHOR PAGE:
https://www.amazon.com/stores/Sam-Ben...
TIKTOK: https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
46
views
I was wrong, sorry - Deep Dot Darknet
So, it turns out I was wrong. One thing I have to say that I love about all of you is that I at the end of the day learn about the same amount from you all as you do from me I think!
Mike Jones, was kind enough to (gently) point out that Prestium was NOT the first I2P native OS. Something I did not know. My over-excitement got the best of me, and I did the video in less than 6 hours when I found the OS.
I said in the video, and in the thumbnail, that it was the "worlds first" natively run I2P OS. That was my mistake, and I wanted to correct it.
Sorry, everyone.
I don't operate with a script. I like to respond to your questions as naturally as possible. As a result, sometimes, I go off-topic.
#I2P #Prestium #operatingsystem
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
In "Deep Dot Darknet " I do my best to answer the questions that you have given me, be it on email, social media, or here on youtube. Most of the time, these questions are regarding the Darknet, hacking, particulars of being a darknet vendor or other InfoSec or OpSec related questions.
I had started the "Deep Dot Darknet " series to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case thank you all for taking your time to submit questions as well as watching, liking and subscribing!
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST: https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin...
EMAIL: ksllc27@gmail.com
KEYBASE: https://keybase.io/doingfedtime
Playlist for the Deep Dot Darknet Series: https://www.youtube.com/playlist?list...
AMAZON AUTHOR PAGE:
https://www.amazon.com/stores/Sam-Ben...
TIKTOK: https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
This video does not endorse or encourage any illegal or unethical activity. The creator and individuals featured in this video do not condone or encourage any illegal or unethical activity. If you choose to follow the information provided in this video, you do so at your own risk and are solely responsible for any consequences that may result.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
25
views
Harm Reduction = Dread's Goal - Deep Dot Darknet
In this episode of Deep Dot Darknet, we discuss Sam B's question, which is not really understandable.
Discover the truth behind the Darknet in this informative video. Explore the reliability of reviews for vendors, the challenges facing the Darknet, the migration from Tor to I2P, and the reasons behind the lack of motivation to create a new forum.
Learn about the significant impact of the loss of Dread and the importance of harm reduction in the Deepweb. Stay informed and stay safe in the world of the Darknet. Watch now!
I don't operate with a script. I like to respond to your questions as naturally as possible. As a result, sometimes, I go off-topic.
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:15 Sam B's Question: Not really understood.
00:36 My interpretation of the question
00:52 Are there reliable reviews for darknet vendors?
01:54 Rough times for the darknet
02:36 Tor to I2P migration
03:25 No motivation to create an alt dread aka darknet forum
04:39 Dread: you don't know what you have till it's gone
06:50 Harm reduction on the darknet and deepweb
#tor #I2P #anonymity #dread #hugbunter
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
In "Deep Dot Darknet " I do my best to answer the questions that you have given me be it on email, social media, or here on youtube. Most of the time these questions are in regards to the Darknet, hacking, particulars of being a darknet vendor or other InfoSec or OpSec related questions.
I had started the "Deep Dot Darknet " series, to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case thank you all for taking your time to submit questions as well as watching, liking and subscribing!
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST: https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin...
EMAIL: ksllc27@gmail.com
KEYBASE: https://keybase.io/doingfedtime
Playlist for the Deep Dot Darknet Series: https://www.youtube.com/playlist?list...
AMAZON AUTHOR PAGE:
https://www.amazon.com/stores/Sam-Ben...
TIKTOK: https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
This video does not endorse or encourage any illegal or unethical activity. The creator and individuals featured in this video do not condone or encourage any illegal or unethical activity. If you choose to follow the information provided in this video, you do so at your own risk and are solely responsible for any consequences that may result.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
92
views
How It All Began... cwade12c & Doingfedtime
Today cwade12c, one of my oldest friends (to a point were I consider him family) will be having a discussion about life/liberty/and how we got started in infosec/hacking.
This will be my first live, so expect issues! Should be fun. :)
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA (cwade12c)☆-----☆-----☆-----☆-----☆
YOUTUBE: https://www.youtube.com/c/cwade12c
TWITTER: https://mobile.twitter.com/cwade12c
WEBSITE: https://haxme.org/forum/
FACEBOOK: https://www.facebook.com/cwade12c/
GITHUB: https://github.com/cwade12c
KEYBASE: https://keybase.io/cwade12c
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA (DoingFedTime) ☆-----☆-----☆-----☆-----☆
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin...
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@UCUP5UhD6cMfp...
AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Ben...
22
views
Darknet Demystified - E003 - Bad Darknet Vendor OpSec Case Study: TrustedTraphouse
In today's podcast of Darknet Demystified we are going to discuss the various Operational Security fails and information security fails that a Darknet vendor and his two accomplices made, which ended up leading to their identification and arrest. throughout the podcast, we will also discuss in depth various topics of why what they did was wrong and what they should have done instead.
We will be discussing topics such as Darknet vendors attempting to extort their clients and how that will always backfire on them. we will be talking about controlled deliveries how they work and how you can defeat them. in addition we will also be discussing by having multiple identities as a Darknet vendor on the Darknet is completely useless if you mirror these accounts with the same information.
We will also discuss how the feds Outsource much of the time their investigation to third-party companies who do things like blockchain analysis for them.
In addition to all the above will also be discussing how there were third parties involved that were currently incarcerated in federal prison and how the defendants lacking any security whatsoever had discussions with these individuals knowing that the phone calls were recorded and still disseminated a ton of incriminating evidence because they thought their 10th-grade code would be enough to prevent the feds from being able to link them to a darknet vendor account.
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Intro
00:43 OpSec Vs InfoSec
04:58 The defendants in the case
10:00 Darknet vendors and PII
14:26 The main reason why Darknet vendors should not save information
18:00 Repercussions for a Darknet Buyer
18:24 Controlled Deliveries
21:12 Law Enforcement - not your BFF
24:43 United States Attorneys Tricks
28:04 Crypto Exchanges
31:33 Talking about the "clothing" business on recorded federal prison phone lines
32:11 Christopher Fleet
35:10 Using a 10th grader encoding in conversations
39:34 What's Next for Rick
41:43 Conclusion
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
The Darknet Demystified podcast discusses a ton of different topics.
Welcome to Darknet Demystified, a podcast hosted by Sam Bent, an ex-darknet vendor and market admin, author, paralegal, DefCon speaker, nerd, pirate, and agorist. With over a decade of experience in the darknet under various aliases such as DoingFedTime, 12189082 (BOP ID), 2happytimes2, Killab, and many others, Sam brings a wealth of knowledge and insight to the world of hacking, cybersecurity, exploits, and the darknet subculture.
In this podcast, Sam will delve into the latest developments and trends in the darknet, provide expert analysis on the current state of the darkweb and its evolution. He will also share his experiences as a darknet vendor and market admin, giving listeners an inside look into the workings of the darknet, its culture and the people who inhabit it.
In addition to the podcast, Sam runs the youtube channels Doingfedtime, all hacking cons, and 2happytimes2, where he shares information and tutorials on hacking, cybersecurity, and the darknet.
Whether you're a beginner or an experienced hacker, Darknet Demystified is the perfect podcast for anyone looking to gain a deeper understanding of the darknet, stay informed on the latest developments, and learn how to stay safe and secure while navigating the digital world. Available on all major podcast platforms, Tune in to Darknet Demystified where the darknet is demystified and the truth is uncovered. With Sam Bent's expert analysis and in-depth understanding of the darknet, you'll gain valuable insights and knowledge to help you navigate the complex and ever-changing world of the darknet.
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST: https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin...
EMAIL: ksllc27@gmail.com
Playlist for the Deep Dot Darknet Series: https://www.youtube.com/playlist?list...
AMAZON AUTHOR PAGE:
https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
TIKTOK: https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only.
This video does not endorse or encourage any illegal or unethical activity. The creator and individuals featured in this video do not condone or encourage any illegal or unethical activity. If you choose to follow the information provided in this video, you do so at your own risk and are solely responsible for any consequences that may result.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
234
views
Worlds First I2P by default Live OS: Prestium
In this video, we take a look at the world's first live Linux distribution that runs the I2P anonymity network by default. This distribution, called "Prestium" is designed to provide users with a secure and private online experience.
I2P, or the Invisible Internet Project, is a network that allows users to communicate anonymously and securely. It is built on top of a peer-to-peer network and uses various forms of encryption to protect user's data. The I2P network is particularly useful for people who are concerned about their online privacy, as it makes it difficult for anyone to track their online activity.
Prestium is based on a popular Linux distribution, and is designed to be easy to use for people who are new to Linux. It comes with a variety of pre-installed software, including the I2P router and a number of anonymous communication tools and things that you may need (like PGP software) by default.
To get started with Prestium, all you need is a computer with a DVD drive or a USB drive. You can either burn the ISO image to a DVD or create a bootable USB drive. (use etcher for this!) once you have done that, you can boot your computer from the DVD or USB drive, and you will be presented with a live desktop environment. Today I show you me setting it up and running it in a virtual set up using virtual box.
Overall, Prestium is an excellent choice for anyone who wants to protect their online privacy and experience the benefits of the I2P network. It's easy to use, comes with a variety of useful tools and features, and it's completely free to use. Whether you're a privacy-conscious individual or a business looking for a secure way to communicate, Prestium is definitely worth checking out.
Links:
https://www.virtualbox.org/wiki/Downloads
https://www.reddit.com/r/Prestium/
https://www.reddit.com/r/i2p/
https://www.reddit.com/u/Opicaak
Github with .torrent file (download the .torrent and run it):
https://github.com/DoingFedTime/Prestium
Prestium release on Github (with HTTP mirrors):
https://www.reddit.com/r/Prestium/comments/10b2hw5/tiny_release_prestium_121_new_i2pd_and_librewolf/
Donations for Prestium:
Prestium's Monero address: 45ZLqYJ8iKt1mE2xarmW8oAkFgY9QYT8ab1RFGc99pn2Gg5PDXii5vDCtg6NXiBdgKfRpTbDrKvUJFiwfkyuNLCMP25QgMZ
☆-----☆-----☆-----☆-----☆ CHAPTERS ☆-----☆-----☆-----☆-----☆
00:00 Introduction
00:08 I was wrong
00:24 I2P operating system released (when I saw it) a few days ago.
01:05 torrent download link for the OS on the seedbox I bought
01:27 Welcome to Pristium, worlds first I2P Live Disk .
02:10 Disclaimer
02:41 Introducing Opicaak the creator of Prestium
03:12 Prestium Subreddit
03:35 Prestium Creators resonse to me
05:13 The main event, the worlds first I2P Live Disk OS
05:24 Create a new virtual machine
06:13 Starting the VM!
06:45 Logging into Prestium
07:11 Changing the resolution
07:52 I2P controls and browser start up
08:34 Checking running services
08:46 Going to Youtube on I2P
09:24 Visiting the I2P website in I2P
10:33 I2P jump services
11:13 w3schools on I2P
14:06 Graceful shutdown.
15:23 conclusion and thoughts
15:47 Endscreen
#tor #I2P #anonymity #privacy #LiveOS
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
In "Operational Security or OpSec " playlist I do my best to answer the questions that I have in relation to various technologies and general things.
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@UCUP5UhD6cMfpN4vxW3FYJLQ
Playlist for the Deep Dot Darknet Series:
https://www.youtube.com/playlist?list=PLUc6uuGl4Y3clxiFzVodtaIi6xNaNjmjz AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
☆-----☆-----☆-----☆-----☆ LEGAL STUFF☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
79
views
Darknet Demystified - E002 - Google Alerts, ChatGPT Malware, Feds get owned, BART cops get hacked
In this video, we dive deeply into information gathering and online security. We discuss configuring your information gathering using tools like Google Alerts, and RSS feeds. We explore the often overlooked issue of federal government trash OpSec and the consequences that can arise from poor online security practices.
We address the topic of ChatGPT writing malware and why it's not the end of the world, as some may believe. We then delve into the world of malware installation at the 10:52 mark and take a nostalgic look back at how it was done in the 90s.
We explore the SET Social Engineering Toolkit and how it can be used for good and evil. We also introduce the concept of "Jasager," a "yes man" type of malware, and its potential impact on online security.
We cover a real-life example of police getting owned and the subsequent sale of their data on the Darknet. We also touch on how these breaches are becoming more severe and frequent than in the past.
We share our favorite news story about cops getting owned and conclude on the importance of staying vigilant and informed in the ever-evolving landscape of online security.
#podcast #hak5 #socialengineering #passwords #darknet #chatgpt #darknetdemystified
☆-----☆-----☆-----☆-----☆ PLAYLIST DESCRIPTION ☆-----☆-----☆-----☆-----☆
The Darknet Demystified podcast discusses a ton of different topics.
Welcome to Darknet Demystified, a podcast hosted by Sam Bent, an ex-darknet vendor and market admin, author, paralegal, DefCon speaker, nerd, pirate, and agorist. With over a decade of experience in the darknet under various aliases such as DoingFedTime, 12189082 (BOP ID), 2happytimes2, Killab, and many others, Sam brings a wealth of knowledge and insight to the world of hacking, cybersecurity, exploits, and the darknet subculture.
In this podcast, Sam will delve into the latest developments and trends in the darknet, provide expert analysis on the current state of the darkweb and its evolution. He will also share his experiences as a darknet vendor and market admin, giving listeners an inside look into the workings of the darknet, its culture and the people who inhabit it.
In addition to the podcast, Sam runs the youtube channels Doingfedtime, all hacking cons, and 2happytimes2, where he shares information and tutorials on hacking, cybersecurity, and the darknet.
Whether you're a beginner or an experienced hacker, Darknet Demystified is the perfect podcast for anyone looking to gain a deeper understanding of the darknet, stay informed on the latest developments, and learn how to stay safe and secure while navigating the digital world. Available on all major podcast platforms, Tune in to Darknet Demystified where the darknet is demystified and the truth is uncovered. With Sam Bent's expert analysis and in-depth understanding of the darknet, you'll gain valuable insights and knowledge to help you navigate the complex and ever-changing world of the darkweb.
☆-----☆-----☆-----☆-----☆ SOCIAL MEDIA ☆-----☆-----☆-----☆-----☆
PODCAST: https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin...
EMAIL: ksllc27@gmail.com
Playlist for the Deep Dot Darknet Series: https://www.youtube.com/playlist?list...
AMAZON AUTHOR PAGE:
https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
TIKTOK: https://www.tiktok.com/@doingfedtime
☆-----☆-----☆-----☆-----☆ LEGAL STUFF ☆-----☆-----☆-----☆-----☆
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such. The creator of this video and any individuals featured in it shall not be held responsible for any actions or decisions made based on the information provided.
By watching this video, you acknowledge that the creator and individuals featured in it are not responsible for any actions or decisions that you may make based on the information provided. You also acknowledge that the information provided in this video may not be accurate, complete, or up-to-date, and that it is your responsibility to verify any information before relying on it.
This video does not endorse or encourage any illegal or unethical activity. The creator and individuals featured in this video do not condone or encourage any illegal or unethical activity. If you choose to follow the information provided in this video, you do so at your own risk and are solely responsible for any consequences that may result.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
254
views
Tor And I2P - A Complete Comparison of Anonymity Networks
I will be discussing the key differences between Tor and I2P, including the design and purpose of the network, the community and governance, network structure, security and anonymity, and usability. I will also be providing a detailed analysis of the strengths and weaknesses of each network, and discussing which network is best suited for different use cases and scenarios.
Tor and I2P - A Complete Comparison of Anonymity Networks is intended to be an "as complete as you can get" comparison for those out there that know nothing about I2P but may have hear a bit about tor. . As an ex-darknet vendor and market admin, author, paralegal, DefCon speaker, nerd, pirate, and agorist, I have spent over a decade navigating the darknet and have a wealth of knowledge and experience when it comes to online privacy and anonymity. In this video, I will be providing a complete comparison of two of the most popular anonymity networks: Tor and I2P.
Tor, also known as The Onion Router, is a widely adopted network that uses a series of nodes to obscure the origin and destination of data packets, making it an effective tool for protecting online privacy and bypassing censorship. I2P, on the other hand, is a lesser-known network that is optimized for peer-to-peer and low-latency applications, and uses a different routing method to obscure the origin and destination of data packets.
It's important to remember that both Tor and I2P are privacy enhancing tools, each has its own strengths and weaknesses, and the best choice for you will depend on your specific needs and requirements. I hope this video will help you understand the key differences between Tor and I2P, and how they can be used to protect your online privacy.
I also run the youtube channels Doingfedtime, all hacking cons, and 2happytimes2, where I share information and tutorials on hacking, cybersecurity, and the darknet. So be sure to check them out if you want to stay informed and up-to-date on the latest developments in the world of online privacy and anonymity.
------------------------------------- CHAPTERS -------------------------------------
00:00 Introduction
01:23 Tor and I2P: Vocabulary Differences
02:42 Tor and I2P: Routing Differences
03:47 Tor and I2P: Encryption
04:43 Tor and I2P: Design and Purpose
07:31 Tor and I2P: Community and Governance
10:21 Who funds Tor? Who Funds I2P?
11:46 Trash youtubers that are lying to you.
14:23 Tor and I2P: Network Structure
17:19 Tor and I2p: Security and Anonymity
18:20 Why I2P is better for security in a general sense
23:42 Tor and I2P: USABILITY
25:14 Whats better tor or i2p?
27:30 Other Darknets
28:42 Conclusion
#tor #I2P #anonymity #privacy #darknet
------------------------------------- PLAYLIST DESCRIPTION ------------------------------------
In "Operational Security or OpSec " playlist I do my best to answer the questions that I have in relation to various technologies and general things.
------------------------------------- SOCIAL MEDIA -------------------------------------
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@UCUP5UhD6cMfpN4vxW3FYJLQ
Playlist for the Deep Dot Darknet Series:
https://www.youtube.com/playlist?list=PLUc6uuGl4Y3clxiFzVodtaIi6xNaNjmjz AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
------------------------------------ LEGAL STUFF ------------------------------------
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such. The creator of this video and any individuals featured in it shall not be held responsible for any actions or decisions made based on the information provided.
By watching this video, you acknowledge that the creator and individuals featured in it are not responsible for any actions or decisions that you may make based on the information provided. You also acknowledge that the information provided in this video may not be accurate, complete, or up-to-date, and that it is your responsibility to verify any information before relying on it.
This video does not endorse or encourage any illegal or unethical activity. The creator and individuals featured in this video do not condone or encourage any illegal or unethical activity. If you choose to follow the information provided in this video, you do so at your own risk and are solely responsible for any consequences that may result.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
171
views
2
comments
Escaping Federal Prison, My Contraband Cellphone, 15 years as a fugitive - Deep Dot Darknet
In this episode of Deep Dot Darknet we discuss Hashcade's question:
"do you have any prison contraband stories?"
This video is a first-hand account of the prison experience, specifically within the context of contraband. I begins by answering a question about prison contraband and then go on to share my own experiences in regards to federal prison, contraband cellphones, and having warrents for 15 years plus. We also discuss how I got my probation violated and eventually moved to Rhode Island, where he found that there were no county jails, the hard way. I talks about how the federal government does not like warrants and how he eventually ended up back in Massachusetts after 15 years on the run, and surrendering to federal prison. I describes the bureaucracy and lack of care individuals encounter while in the federal prison system, including being "warehoused" and not receiving help from his case manager. I also describes the issue of contraband in federal prison, including how prison staff can encourage its presence. I concludes by speaking about his personal experiences with phone security for phone OpSec, and how the federal government attempted to access my phone after I was released.
I don't operate with a script. I like to respond to your questions as naturally as possible. As a result sometimes I go off topic.
------------------------------------- CHAPTERS -------------------------------------
00:31 Hashcade's question: "Prison contraband"
01:25 My phone in prison
01:40 Federal prison tells me I have warrents
02:10 Assault and battery with intent to murder
03:06 How I got my probation violated
04:33 I move to RI
05:15 No county jails in RI
06:31 Feds don't like warrants
07:37 Back in mass after 15 years on the run
08:07 surrendering to federal prison
10:45 I see my case manager
12:16 That's not my job!
14:35 No one cares, you are warehoused!
15:54 Finally make it to the prison camp after a year.
16:31 When contraband is cheaper - and less profitable.
17:17 Escaping from federal prison to visit family.
18:13 No sex offenders at the camp
20:40 Phone OpSec in Federal Prison
22:09 Feds try getting into my phone
22:43 Federal prison policy violation
23:15 Other things that were brought in
23:35 How prison staff encourage contraband
24:39 conclusion
#federalprison #contraband #prison #opsec
------------------------------------- PLAYLIST DESCRIPTION ------------------------------------
In "Deep Dot Darknet " I do my best to answer the questions that you have given me be it on email, social media, or here on youtube. Most of the time these questions are in regards to the Darknet, hacking, particulars of being a darknet vendor or other InfoSec or OpSec related questions.
I had started the "Deep Dot Darknet " series, to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case thank you all for taking your time to submit questions as well as watching, liking and subscribing!
------------------------------------- SOCIAL MEDIA -------------------------------------
PODCAST https://rss.com/podcasts/darknet/
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
TIKTOK: https://www.tiktok.com/@UCUP5UhD6cMfpN4vxW3FYJLQ
Playlist for the Deep Dot Darknet Series:
https://www.youtube.com/playlist?list=PLUc6uuGl4Y3clxiFzVodtaIi6xNaNjmjz AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
------------------------------------ LEGAL STUFF ------------------------------------
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such. The creator of this video and any individuals featured in it shall not be held responsible for any actions or decisions made based on the information provided.
By watching this video, you acknowledge that the creator and individuals featured in it are not responsible for any actions or decisions that you may make based on the information provided. You also acknowledge that the information provided in this video may not be accurate, complete, or up-to-date, and that it is your responsibility to verify any information before relying on it.
This video does not endorse or encourage any illegal or unethical activity. The creator and individuals featured in this video do not condone or encourage any illegal or unethical activity. If you choose to follow the information provided in this video, you do so at your own risk and are solely responsible for any consequences that may result.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
222
views
Darknet Demystified - E001 - Crypto Address Poisoning, New I2P version, Stolen Crypto (Podcast)
Darknet Demystified is a podcast that delves into the mysterious world of the darknets, hacking, cybersecurity and cryptocurrency. Sam Bent the host is a exDarknet Vendor and Darknet Market Admin, who has extensive IT, Infosec and OpSec experience. He is also a paralegal who litigated his way out of federal prison. He is a defcon speaker, who gave a talk on OpSec as a Darknet vendor, author and hacker. The podcast is designed to educate listeners on the various aspects of the darknet and how it is used, as well as the various technologies and tools that are used to access it. This episode is basically and introduction.
#podcast #tor #i2p #darknet #deepweb #darknetdemystified
------------------------------------- PLAYLIST DESCRIPTION ------------------------------------
The Darknet Demystified podcast discusses a ton of different topics.
Welcome to Darknet Demystified, a podcast hosted by Sam Bent, an ex-darknet vendor and market admin, author, paralegal, DefCon speaker, nerd, pirate, and agorist. With over a decade of experience in the darknet under various aliases such as DoingFedTime, 12189082 (BOP ID), 2happytimes2, Killab, and many others, Sam brings a wealth of knowledge and insight to the world of hacking, cybersecurity, exploits, and the darknet subculture.
In this podcast, Sam will delve into the latest developments and trends in the darknet, provide expert analysis on the current state of the darkweb and its evolution. He will also share his experiences as a darknet vendor and market admin, giving listeners an inside look into the workings of the darknet, its culture and the people who inhabit it.
Sam will also address the legal and ethical considerations of the darknet, as well as the importance of understanding the laws and regulations in your country before using the darknet or any anonymity tool. He will also provide tips and tricks for staying safe and secure while navigating the darknet, as well as discuss the latest news and developments in the world of hacking and cybersecurity.
In addition to the podcast, Sam runs the youtube channels Doingfedtime, all hacking cons, and 2happytimes2, where he shares information and tutorials on hacking, cybersecurity, and the darknet.
Whether you're a beginner or an experienced hacker, Darknet Demystified is the perfect podcast for anyone looking to gain a deeper understanding of the darknet, stay informed on the latest developments, and learn how to stay safe and secure while navigating the digital world. Available on all major podcast platforms, Tune in to Darknet Demystified where the darknet is demystified and the truth is uncovered. With Sam Bent's expert analysis and in-depth understanding of the darknet, you'll gain valuable insights and knowledge to help you navigate the complex and ever-changing world of the darkweb.
------------------------------------- SOCIAL MEDIA -------------------------------------
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
Playlist for the Deep Dot Darknet Series:
https://www.youtube.com/playlist?list=PLUc6uuGl4Y3clxiFzVodtaIi6xNaNjmjz AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
------------------------------------ LEGAL STUFF ------------------------------------
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such. The creator of this video and any individuals featured in it shall not be held responsible for any actions or decisions made based on the information provided.
By watching this video, you acknowledge that the creator and individuals featured in it are not responsible for any actions or decisions that you may make based on the information provided. You also acknowledge that the information provided in this video may not be accurate, complete, or up-to-date, and that it is your responsibility to verify any information before relying on it.
This video does not endorse or encourage any illegal or unethical activity. The creator and individuals featured in this video do not condone or encourage any illegal or unethical activity. If you choose to follow the information provided in this video, you do so at your own risk and are solely responsible for any consequences that may result.
The creator and individuals featured in this video shall not be held responsible for any damages or losses resulting from the use of the information provided in this video. This includes, but is not limited to, direct, indirect, incidental, consequential, and punitive damages.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
205
views
How I Started In Tech With A Wooden Leg - Deep Dot Darknet
In this episode of Deep Dot Darknet we discuss John Czech's question:
""how did you get started in tech, and what is a good first step?"
I share my personal journey of getting into tech, including my less-than-legal start as a pirate being involved in warez. I also talk about some of the good resources that are out their regarding getting started in IT with a solid foundation, including the use of sites like Coursera, Vulnhub, packetstormsecurity, and phrack. We will also discuss how to go about getting some coursera courses for free!
Here are some links to some of the sites we talk about.
Links:
https://www.coursera.org/
http://www.phrack.org/
https://news.ycombinator.com/
https://packetstormsecurity.com/
I don't operate with a script. I like to respond to your questions as naturally as possible. As a result sometimes I go off topic.
------------------------------------- CHAPTERS -------------------------------------
00:00 Introduction
00:01 John Czech's Question: "how did you get started in tech, and what is a good first step?"
00:17 My start in tech - less than legal: Shocking I know.
00:50 Getting into hacking
01:41 Hows does the new background look?
02:17 Becoming a pirate
03:07 Learning hacking: Vulnhub.com
04:00 Coursera for IT learing
04:44 Getting around paying for a cert from coursera
05:25 Packetstorm security
05:39 phrack
07:09 Conclusion
07:13 Endscreen
#phrack #IT #coursera #selfeducation #diy
------------------------------------- PLAYLIST DESCRIPTION ------------------------------------
In "Deep Dot Darknet " I do my best to answer the questions that you have given me be it on email, social media, or here on youtube. Most of the time these questions are in regards to the Darknet, hacking, particulars of being a darknet vendor or other InfoSec or OpSec related questions.
I had started the "Deep Dot Darknet " series, to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case thank you all for taking your time to submit questions as well as watching, liking and subscribing!
------------------------------------- SOCIAL MEDIA -------------------------------------
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
Playlist for the Deep Dot Darknet Series:
https://www.youtube.com/playlist?list=PLUc6uuGl4Y3clxiFzVodtaIi6xNaNjmjz AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
------------------------------------ LEGAL STUFF ------------------------------------
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such. The creator of this video and any individuals featured in it shall not be held responsible for any actions or decisions made based on the information provided.
By watching this video, you acknowledge that the creator and individuals featured in it are not responsible for any actions or decisions that you may make based on the information provided. You also acknowledge that the information provided in this video may not be accurate, complete, or up-to-date, and that it is your responsibility to verify any information before relying on it.
This video does not endorse or encourage any illegal or unethical activity. The creator and individuals featured in this video do not condone or encourage any illegal or unethical activity. If you choose to follow the information provided in this video, you do so at your own risk and are solely responsible for any consequences that may result.
The creator and individuals featured in this video shall not be held responsible for any damages or losses resulting from the use of the information provided in this video. This includes, but is not limited to, direct, indirect, incidental, consequential, and punitive damages.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
30
views
Federal Prison Vs State Prison Vs County - Deep Dot Darknet
In this episode of Deep Dot Darknet we answer Hank Hill's question:
"What is better federal prison or state prison?"
From the start, it's clear that this is a complicated and nuanced topic that a lot of YouTube channels need to cover well.
To begin, we compare the characteristics of federal prisons, examining factors such as the types of inmates you are likely to encounter and the cost per day of incarceration. We talk about the disgusting food which I actually wrote an article about here:
https://t.co/HY63vOaU1g
One aspect of this video is the discussion of the differences between isolation and quarantine in prison, and how even the staff don't understand this concept in federal prison. The consequences for this are dire.
We also delve into the issue of who exactly is serving time in federal prisons. Are they the most elite prisoners or the worst of the worst?
I don't operate with a script. I like to respond to your questions as naturally as possible. As a result sometimes I go off topic.
------------------------------------- CHAPTERS -------------------------------------
00:00 Introduction
00:14 Hank Hill's question: "Is it better to do state or fed time?"
00:25 Why other YT channels that try to answer this question suck.
04:19 Comparing federal prisons only
07:04 Who your going to meet in federal prison vs state prison
08:44 What's it cost for a federal prison per day?
10:07 nobody dies in the feds!
11:08 isolation vs quarantine
11:39 How BOP staff kill inmates, through ignorance.
14:36 Most elite prisoners or the worst?
15:20 jail vs prison
15:31 Conclusion
#federalprison #covid19 #stateprison #countyjail #healthcare
------------------------------------- PLAYLIST DESCRIPTION ------------------------------------
In "Deep Dot Darknet " I do my best to answer the questions that you have given me be it on email, social media, or here on youtube. Most of the time these questions are in regards to the Darknet, hacking, particulars of being a darknet vendor or other InfoSec or OpSec related questions.
I had started the "Deep Dot Darknet " series, to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case thank you all for taking your time to submit questions as well as watching, liking and subscribing!
------------------------------------- SOCIAL MEDIA -------------------------------------
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
Playlist for the Deep Dot Darknet Series:
https://www.youtube.com/playlist?list=PLUc6uuGl4Y3clxiFzVodtaIi6xNaNjmjz AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
------------------------------------ LEGAL STUFF ------------------------------------
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such. The creator of this video and any individuals featured in it shall not be held responsible for any actions or decisions made based on the information provided.
By watching this video, you acknowledge that the creator and individuals featured in it are not responsible for any actions or decisions that you may make based on the information provided. You also acknowledge that the information provided in this video may not be accurate, complete, or up-to-date, and that it is your responsibility to verify any information before relying on it.
This video does not endorse or encourage any illegal or unethical activity. The creator and individuals featured in this video do not condone or encourage any illegal or unethical activity. If you choose to follow the information provided in this video, you do so at your own risk and are solely responsible for any consequences that may result.
The creator and individuals featured in this video shall not be held responsible for any damages or losses resulting from the use of the information provided in this video. This includes, but is not limited to, direct, indirect, incidental, consequential, and punitive damages.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
42
views
Best Federal Law For Protecting Your Rights And Pulled Over Protocol - Deep Dot Darknet
In this episode of Deep Dot Darknet, we will be answering Maneee's question: "what was your if you get pulled over on the way to the post office protocol?"
Learn the best federal law for protecting your rights when dealing with law enforcement. In this video, we'll answer a viewer's question about what to do when getting pulled over on the way to the post office and explain why the USPS requires a warrant. We'll also discuss why you shouldn't have any issues with local police if you know your rights and the consequences of not being aware of them.
The first law we discuss is:
18 U.S. Code § 241 - Conspiracy against rights
If two or more persons conspire to injure, oppress, threaten, or intimidate any person in any State, Territory, Commonwealth, Possession, or District in the free exercise or enjoyment of any right or privilege secured to him by the Constitution or laws of the United States, or because of his having so exercised the same; or If two or more persons go in disguise on the highway, or on the premises of another, with intent to prevent or hinder his free exercise or enjoyment of any right or privilege so secured—They shall be fined under this title or imprisoned not more than ten years, or both.
The second is:
18 U.S. Code § 242 - Deprivation of rights under color of law
Whoever, under color of any law, statute, ordinance, regulation, or custom, willfully subjects any person in any State, Territory, Commonwealth, Possession, or District to the deprivation of any rights, privileges, or immunities secured or protected by the Constitution or laws of the United States, or to different punishments, pains, or penalties, on account of...
------------------------------------- CHAPTERS -------------------------------------
00:00 Introduction
00:04 Maneee's Question: "what was your if you get pulled over on the way to the post office protocol?"
02:36 Why USPS needs a warrant
04:06 Local cops should not be an issue
05:21 My favorite federal law
06:39 Bad results from not knowing your rights
07:57 Conclusion
08:03 Endscreen
#tor #deepweb #darknet #federallaw #rights
------------------------------------- PLAYLIST DESCRIPTION ------------------------------------
In "Deep Dot Darknet " I do my best to answer the questions that you have given me be it on email, social media, or here on youtube. Most of the time these questions are in regards to the Darknet, hacking, particulars of being a darknet vendor or other InfoSec or OpSec related questions.
I had started the "Deep Dot Darknet " series, to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case thank you all for taking your time to submit questions as well as watching, liking and subscribing!
------------------------------------- SOCIAL MEDIA -------------------------------------
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
Playlist for the Deep Dot Darknet Series:
https://www.youtube.com/playlist?list=PLUc6uuGl4Y3clxiFzVodtaIi6xNaNjmjz AMAZON AUTHOR PAGE: https://www.amazon.com/stores/Sam-Bent/author/B0BHX5V81S
------------------------------------ LEGAL STUFF ------------------------------------
The information provided in this video is intended for educational purposes only. It is not intended to be legal or professional advice, and should not be relied upon as such. The creator of this video and any individuals featured in it shall not be held responsible for any actions or decisions made based on the information provided.
By watching this video, you acknowledge that the creator and individuals featured in it are not responsible for any actions or decisions that you may make based on the information provided. You also acknowledge that the information provided in this video may not be accurate, complete, or up-to-date, and that it is your responsibility to verify any information before relying on it.
This video does not endorse or encourage any illegal or unethical activity. The creator and individuals featured in this video do not condone or encourage any illegal or unethical activity. If you choose to follow the information provided in this video, you do so at your own risk and are solely responsible for any consequences that may result.
The creator and individuals featured in this video shall not be held responsible for any damages or losses resulting from the use of the information provided in this video. This includes, but is not limited to, direct, indirect, incidental, consequential, and punitive damages.
By watching this video, you acknowledge that you understand and agree to these terms. If you do not agree to these terms, do not watch this video.
82
views
Getting A Job On A Darknet Market - Deep Dot Darknet
In this episode of Deep Dot Darknet I am answering 's question: Incognito Flamingo's question: Getting a job on a Darknet Market. What credentials do they look for?
Today we will be looking at how the job market works to some degree on a darknet market. How does someone go about putting in an application? Do they have CVs or Resumes? We will discuss how it actually works on darknet markets for job seekers and how the reference system works in terms of a "no trust" system that relies on verification.
Because I don't operate with a script and I simply answer the question as asked sometimes I tend to go out of scope. I think I did a bit of that in this, for that I apologize.
------------------------------------- CHAPTERS -------------------------------------
00:00 Introduction
00:03 Incognito Flamingo's question: Getting a job on a Darknet Market. What credentials do they look for?
00:23 The system for hiring on the Darknet
00:36 An example of the process of getting a new job on the darknet
02:32 How to get your first job as market staff on a darknet market
03:21 Outsiders are not welcome.
#tor #deepweb #darknet #job #blackmarket #nowhiring
------------------------------------- PLAYLIST DESCRIPTION ------------------------------------
In "Deep Dot Darknet " I do my best to answer the questions that you have given me be it on email, social media, or here on youtube. Most of the time these questions are in regards to the Darknet, hacking, particulars of being a darknet vendor or other InfoSec or OpSec related questions.
I had started the "Deep Dot Darknet " series, to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case thank you all for taking your time to submit questions as well as watching, liking and subscribing!
------------------------------------- SOCIAL MEDIA -------------------------------------
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
Playlist for the Deep Dot Darknet Series:
https://www.youtube.com/playlist?list=PLUc6uuGl4Y3clxiFzVodtaIi6xNaNjmjz
138
views
Greta Thunberg Takes Down Andrew Tate With 1 Tweet - OpSec Fails
Welcome to our latest video discussing the recent arrest of Andrew Tate and the role of social media in the investigation. In this video, we explore the events leading up to Tate's arrest in Romania, including the role of anti-mafia prosecutors and the special troops of the Gendarmerie. We also examine the viral tweet by Greta Thunberg and the impact it had on the case. But the real question is, where did Andrew Tate make his mistake? Watch the video to find out and see if you can spot it yourself. We also discuss the issue of human trafficking and the importance of using OSINT skills to combat it. Be sure to check out Tracelabs.org for more information and resources on this issue. Let us know your thoughts on the video in the comments below.
#andrewtate #opsec #osint #gretathunberg
Related Links:
Gandul: https://www.gandul.ro/
Greta Thunberg: https://twitter.com/GretaThunberg
Andrew Tate: https://twitter.com/Cobratate
Alejandra Caraballo: https://twitter.com/Esqueer_
Trace Labs: https://www.tracelabs.org/
[§&$]^_^[§&$]^_^[§&$]^_^--------------------[ CHAPTERS ]--------------------[§&$]^_^[§&$]^_^[§&$]^_^
00:00 Introduction
00:09 Andrew Tate's Arrest: The Role of Social Media and OSINT
00:34 The Events Leading Up to Andrew Tate's Arrest in Romania
01:46 How a Viral Tweet from Greta Thunberg Took Down Andrew Tate
02:57 Analysis of the Video that Led to Andrew Tate's Arrest.
07:20 Greta Thunbergs Tweet is now #6 in historys most liked
07:36 Fighting Human Trafficking with OSINT Skills: Resources from Tracelabs.org
[§&$]^_^[§&$]^_^[§&$]^_^--------------------[ SOCIAL MEDIA ]--------------------[§&$]^_^[§&$]^_^[§&$]^_^
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
107
views
Deciphering Legal Documents: Two ways to quickly determine federal law enforcement snitches - DDD
There is no such thing as a "confidential informant" - the feds may try to sell this nonsense to you, but you will NOT remain "confidential"; everything is documented. They operate by many names: rats, informants, snitches, narc, fink, stool pigeon, stoolie, squealer, and turncoat.
In this episode of Deep Dot Darknet, we are looking at two easy ways that you can learn how to spot an informant in the government's own documents. Reading legal work can be a pain, but once you catch the hang of it, it's like anything else, and typically it takes me about 7 - 10 minutes to know if someone told. We will discuss both: 1. USSG §5K1.1 Letters 2. Rule 35(b) These are the two things I look for immediately. There are many other methods, but I wanted to get these two out there as they will allow you to spot may informants right off the bat. Obviously, there are a lot more ways than this.
The federal government does try to hide the identities of its rats, but at the end of the day, it's public knowledge. https://www.ussc.gov/research/research-publications/use-federal-rule-criminal-procedure-35b §5K1.1 - SUBSTANTIAL ASSISTANCE TO AUTHORITIES (POLICY STATEMENT) Upon motion of the government stating that the defendant has provided substantial assistance in the investigation or prosecution of another person who has committed an offense, the court may depart from the guidelines. (a) The appropriate reduction shall be determined by the court for reasons stated that may include, but are not limited to, consideration of the following:
(1) the court’s evaluation of the significance and usefulness of the defendant’s assistance, taking into consideration the government’s evaluation of the assistance rendered;
(2) the truthfulness, completeness, and reliability of any information or testimony provided by the defendant;
(3) the nature and extent of the defendant’s assistance;
(4) any injury suffered, or any danger or risk of injury to the defendant or his family resulting from his assistance;
(5) the timeliness of the defendant’s assistance.
Source for above: https://guidelines.ussc.gov/gl/%C2%A75K1.1
-----------------------------------------------------------------------------
(b) Reducing a Sentence for Substantial Assistance.
(1) In General. Upon the government's motion made within one year of sentencing, the court may reduce a sentence if the defendant, after sentencing, provided substantial assistance in investigating or prosecuting another person.
(2) Later Motion. Upon the government's motion made more than one year after sentencing, the court may reduce a sentence if the defendant's substantial assistance involved:
(A) information not known to the defendant until one year or more after sentencing;
(B) information provided by the defendant to the government within one year of sentencing but which did not become useful to the government until more than one year after sentencing; or
(C) information the usefulness of which could not reasonably have been anticipated by the defendant until more than one year after sentencing and which was promptly provided to the government after its usefulness was reasonably apparent to the defendant.
(3) Evaluating Substantial Assistance. In evaluating whether the defendant has provided substantial assistance, the court may consider the defendant's presentence assistance.
(4) Below Statutory Minimum. When acting under Rule 35(b), the court may reduce the sentence to a level below the minimum sentence established by statute.
Source for above: https://www.law.cornell.edu/rules/frcrmp/rule_35
Because I don't operate with a script and I answer the question as asked, sometimes I tend to go out of scope. I think I did a bit of that in this, and for that, I apologize. #tor #rats #informant #snitching #federalprison #legaldocuments
[§&$]^_^[§&$]^_^[§&$]^_^--------------------[ CHAPTERS ]--------------------[§&$]^_^[§&$]^_^[§&$]^_^
00:00 Introduction
00:07 Recap of question regarding Darknet vendors and if they get more time than regular drug dealers
00:15 Start of tangent
00:52 aggravating factors
01:32 why most prison consultants suck
01:53 1st way I can tell you ratted: USSG §5K1.1 Letter
02:18 Second way I can tell you told: Rule 35(b)
02:49 Where I look to figure out your an informant/rat
03:37 How rats/informants with Rule 35(b) snitch jackets try to play it in federal prison
04:28 conclusion
04:35 endscreen
[§&$]^_^[§&$]^_^[§&$]^_^--------------------[ SOCIAL MEDIA ]--------------------[§&$]^_^[§&$]^_^[§&$]^_^
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
46
views
Dreads Infamous Captchas - Deep Dot Darknet
In this episode of Deep Dot Darknet I am answering Jeff Kifferman's questions and addressing some of his statements.
We will be going over a variety of questions and answers, some of which will include things like issues with dreads infamous captchas, what would happen if everyone left Tor for I2P, how Tor has operated as a great 'beginners guide to darknets' in general terms, and why it's good to use copper stills and hopefully dispelling yet another moonshiners wives tale.
Because I don't operate with a script and I simply answer the question as asked sometimes I tend to go out of scope. I think I did a bit of that in this, for that I apologize.
------------------------------------- CHAPTERS -------------------------------------
00:00 Introduction
00:07 Jeff Kifferman's Questions and Comments
00:22 My Answer
00:59 Dread Captcha issue
01:30 If everyone left Tor and went to I2P
02:39 Tor as a beginners darknet
04:02 Copper stills are good for moonshine
06:00 Conclusion
06:20 Endscreen
------------------------------------- PLAYLIST DESCRIPTION ------------------------------------
In "Deep Dot Darknet " I do my best to answer the questions that you have given me be it on email, social media, or here on youtube. Most of the time these questions are in regards to the Darknet, hacking, particulars of being a darknet vendor or other InfoSec or OpSec related questions.
I had started the "Deep Dot Darknet " series, to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case thank you all for taking your time to submit questions as well as watching, liking and subscribing!
------------------------------------- SOCIAL MEDIA -------------------------------------
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
#tor #deepweb #darknet #dread #i2p
Playlist for the Deep Dot Darknet Series:
https://www.youtube.com/playlist?list=PLUc6uuGl4Y3clxiFzVodtaIi6xNaNjmjz
49
views
Places to talk with Dread down - Deep Dot Darknet #shorts
In this episode of Deep Dot Darknet I am answering thepap 000's question:
"What are some good forums? Dread is always offline. What do you think of the come back of alphabay, do you think it's a honeypot?"
It always sucks when Dread is down. In this short we talk about alternatives that many people are using with out trying to describe in to much detail where that actually is.
Because I don't operate with a script and I simply answer the question as asked sometimes I tend to go out of scope. I think I did a bit of that in this, for that I apologize.
#tor #deepweb #darknet #bitcoin #forum #hugbunter #dread #shorts
[§&$]^_^[§&$]^_^[§&$]^_^--------------------[ CHAPTERS ]--------------------[§&$]^_^[§&$]^_^[§&$]^_^
00:00 Introduction
00:02 thepap 000's question:" Where should I talk now that dread is down?"
00:11 My answer to dreads downtime
00:24 why I am not telling exactly were to go with dread down
00:39 conclusion
[§&$]^_^[§&$]^_^[§&$]^_^-------------[ PLAYLIST DESCRIPTION ]-------------[§&$]^_^[§&$]^_^[§&$]^_^
In "Deep Dot Darknet " I do my best to answer the questions that you have given me be it on email, social media, or here on youtube. Most of the time these questions are in regards to the Darknet, hacking, particulars of being a darknet vendor or other InfoSec or OpSec related questions.
I had started the "Deep Dot Darknet " series, to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case thank you all for taking your time to submit questions as well as watching, liking and subscribing!
Playlist for the Deep Dot Darknet Series:
https://www.youtube.com/playlist?list=PLUc6uuGl4Y3clxiFzVodtaIi6xNaNjmjz
[§&$]^_^[§&$]^_^[§&$]^_^--------------------[ SOCIAL MEDIA ]--------------------[§&$]^_^[§&$]^_^[§&$]^_^
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
33
views
Darknet Market Scammers Vs Staff - Deep Dot Darknet
In this episode of Deep Dot Darknet I am answering Irae's Question:
"Did the forum/site admins get involved when dealing with scammers?"
Scammers are definitely in no shortage on the darknet and deepweb. In this video we are discussing what some more advanced users may tend to go for, instead of opting to use a darknet market.
Because I don't operate with a script and I simply answer the question as asked sometimes I tend to go out of scope. I think I did a bit of that in this, for that I apologize.
#tor #deepweb #darknet #ISP #VPN #Scammer #admin
[§&$]^_^[§&$]^_^[§&$]^_^--------------------[ CHAPTERS ]--------------------[§&$]^_^[§&$]^_^[§&$]^_^
00:00 Introduction
00:03 Irae "Did the forum/site admins get involved when dealing with scammers?"
00:20 My answer about darknet scammers and darknet market admins response to them
00:58 more experienced people many times use private shops
01:32 No taxes!
02:47 conclusion
02:51 Endscreen
[§&$]^_^[§&$]^_^[§&$]^_^-------------[ PLAYLIST DESCRIPTION ]-------------[§&$]^_^[§&$]^_^[§&$]^_^
In "Deep Dot Darknet " I do my best to answer the questions that you have given me be it on email, social media, or here on youtube. Most of the time these questions are in regards to the Darknet, hacking, particulars of being a darknet vendor or other InfoSec or OpSec related questions.
I had started the "Deep Dot Darknet " series, to be able to address these questions in a manner that was more complete than a "yes" or "no" response that you typically find in the comments sections.
In any case thank you all for taking your time to submit questions as well as watching, liking and subscribing!
Playlist for the Deep Dot Darknet Series:
https://www.youtube.com/playlist?list=PLUc6uuGl4Y3clxiFzVodtaIi6xNaNjmjz
[§&$]^_^[§&$]^_^[§&$]^_^--------------------[ SOCIAL MEDIA ]--------------------[§&$]^_^[§&$]^_^[§&$]^_^
OFFICIAL WEBSITE: https://www.doingfedtime.com
FACEBOOK: https://www.facebook.com/doing.fedtime/
TWITTER: https://twitter.com/DoingFedTime
LINKEDIN: https://doingfedtime.com/www.linkedin.com/in/doingfedtime
EMAIL: ksllc27@gmail.com
91
views