17 years living off encrypted overlay networks AMA

r/

Sup everyone, I did some AMA’s on unethical hacking, but get shit loads of dm’s about dark web. What’s real whats scams, whats the myths and so on. Can ask about anything like human trafficking, drugs, markets, private groups, honeypot, records cleaning, debt erasing, hacking, crypto loads, common scams, rug and pulls, financial fraud, hacking, loan sharks, cartels, cults etc. Seen it all.

Cheers mates

Comments

  1. Glass_Thanks9862 Avatar

    What you do for living exactly?

  2. CalCalDZ Avatar

    I’ve always wondered, if you managed to steal like 1P/Cent etc from millions of bank accounts so people wouldn’t notice it was gone, would that be the nicest way to get rich from unethical hacking/or whatever you’d call it? And would it be possible without the account flagging?

    I’m stoned I’m sorry if that doesn’t make sense. I’m not asking for advice either, I’m not smart enough for that 😂

  3. Silver-Tomorrow8586 Avatar

    Can you erase the balance on a mortgage?

  4. ElysiaTimida Avatar

    Wildest thing you have come across?

  5. Ok_Antelope_6179 Avatar

    How did you get into it?

  6. ShadowoftheCarax Avatar

    is it even possible for the average person to sucesfully find some real dark web services beyond the absolute surface? 

  7. Daneboy12 Avatar

    What is the most you’ve made in one instance? Cheers mate.

  8. No-Yak4416 Avatar

    What subcategory of hacking is your favorite or “specialty”?

    Can aspiring pen testers hope to compete with these crazy automated/ai pentesting systems you hear about coming out like every week?

  9. billding1234 Avatar

    Forgive my ignorance, but how does one make money be hacking?

  10. gav1n_n6 Avatar

    What is the most ethical way for someone of your talent to make a living?

  11. ExcitedEnergy Avatar

    How much do you earn per year, and what is your current net worth?

  12. glodde Avatar

    Is debt erasing a real thing?

  13. ComandanteMuto120 Avatar

    how easy is to hack social media and get access to whatsapp of ig?

  14. Ok-Challenge5926 Avatar

    I’m going to ask two things.

    What’s the most “fun” thing you’ve done? And what’s the most messed up thing you’ve done?

  15. OrizaRayne Avatar

    Why is it so tough to get a simple fake ID these days?
    I just want to take my 15 year old out dancing with me, which, as a parent, should be within my discretion anyway.

    But. Not only isn’t it, the whole “just get a fake ID” thing seems to be completely overrun with nothing but obvious scammers smh.

  16. SpaetzlemitKaese Avatar

    How can someone find a hacker for hire?

  17. definitelynotpat6969 Avatar

    Alright bruv, you mentioned cults so you have my attention.

    Give me the lowdown on what you meant by that in your post. I’m hungry for some new rabbit holes.

  18. retrobushwacker Avatar

    It’s a movie that basically has the same plot as this what the guy above me describes.

  19. post-apocalyptic-Joe Avatar

    Hi. Can you tell me what this means, please?: PROTOCOL-
    ICMP_Destination_Unreachable_Fragme ntation_Needed_and_DF_bit_was_set
    (CVE-2015-7759)

    3C-52-A1-EE-F5-9C

  20. Doogiechase Avatar

    I work in healthcare. It’s terrible seeing these health systems get their data hacked as it only affects the patients ultimately.

    When those hospitals pay out there’s less money for patient care, not executive bonuses… unfortunately…

  21. nugnug1226 Avatar

    Do you ever go to Black Hat / Defcon in Vegas?

  22. dingiss Avatar

    What the heck is the dark web and where is it?

  23. Turkishblanket Avatar

    what’s the best alternative to silk road now?

  24. Specialist_Hold_7629 Avatar

    How do you bypass 2FA when you hack social media account via phishing ?

  25. DrownItWithWater Avatar

    How would you rate your chances of getting caught one day?

  26. AsterEsque Avatar

    With more and more countries considering measures that limit their access to the internet, how easy or hard would it be for a group of vigilante hackers to build their own “parallel” web? Is that essentially what the Dark Web is?

  27. InternationalGap2326 Avatar

    how much money would it cost to hire someone to kill me

  28. __lot__ Avatar

    My phone dead. Got 2fa authenticator inside.

    Get new phone and now cant login to the account. I still remember the password and i still use the same email. What to do in this case? Customer support suck.

  29. BalatroGod Avatar

    I’d say my extreme privacy cautions were warranted based on these replies, but I’ve been slacking recently tbh.

  30. kikiubo Avatar

    I dont know if this question is clear but ill try. If there is a network where you need to login to a domain with a login and password in order to use the network, but somehow you manage to skip the login domain and use the internet freely, will the admin notice about the extra conections? How much info can the admin know about their users (logged and extra users)?

  31. HovercraftFlimsy2154 Avatar

    How can I get started?

  32. Pleasant-Table-3920 Avatar

    Is credit score manipulation possible?

  33. Dry_Positive4256 Avatar

    What pays good in cybersecurity. I have some good experiences in reverse engineering, pwning and cryptography. Would add pentesting too, but have forgotten a lot in that.

    Most people are just looking for developers. I am myself working as a developer. The hacker itch is still there, but I really don’t see a clear path forward.

  34. jonipapa Avatar

    You ever thought about training a protégée?

  35. Dazzling-Cake2983 Avatar

    This is interesting! I’m starting postgrad in forensic accounting next month so here are my questions:

    1. What are some realistic versus exaggerated/false myths about financial fraud, hacking, and debt erasing on the dark web?
    2. What are the most common scams and financial frauds encountered on the dark web that forensic accountants should be aware of?

    Ta muchly 😋

  36. Iwouldlikepizzapls Avatar

    What does the title mean? How do you make a living and what are overlayed encrypted networks? Can you pls explain more? Thank you and cool ama. 🙂

  37. sco_aus Avatar

    Is your work ever physical, like following someone and hacking their device physically or do you do it all online? If physical, what’s the simplest way and what types of targets?

  38. orangemarbl Avatar

    In every movie,hackers dont use mouse(still no idea why)

    Do you use it or not ?

  39. coaxk Avatar

    Fellow collegue here. Let me ask you, if you have resources, knowledge, why you are not doing bounties simply? Im sure you have access to more knowledge than rest of us, especially now days with help of an AI etc, you could be making legal mills, why have you choosen frauds over that? And dont tell me its more fun(i know it is), but I guess you are grown up person and that paranoia becomes a burden you want to dismantle, isnt it?

  40. LookAtItGo123 Avatar

    Any forums you recommend checking out that discusses how these work?

  41. IraTheAuthor Avatar

    How did you get started into this? Do you think of anyone new wanted to get into it that there has been too much time between the birth of the Internet and now to gain enough knowledge to be “competitive”?

  42. Ok_Buy3347 Avatar

    Best/easiest/free website to learn “hacking” etc

  43. Jealous_Jeweler4814 Avatar

    How do I turn my crypto to usd without paying taxes?

  44. Swimming_Command_582 Avatar

    How hard it’d be to find real “debt erasing services” for a common internet user and not likely to get scammed?

  45. amiibohunter2015 Avatar

    What advice would you give common folk on how to protect their data given the infringement going on in the EU,UK,US,etc? Curious to hear your viewpoint as someone who did a former ama on unethical hacking.

  46. HonHon2112 Avatar

    What minimum security sets up should everyone have? We have so many devices and home routers, WiFi connections, internet of things, etc.

  47. Kainlow Avatar

    Can you find me all of Putri Cinta’s hardcore content? No matter how hard I look, I can’t find it anywhere online. Even her website doesn’t have it?

  48. Responsible-Set-5752 Avatar

    Is it possible to wipe all traces of my name from the internet and search engines including source media articles?

  49. BlancCass Avatar

    Do red rooms actually exist, or is there something similar?

  50. EffectivePristine709 Avatar

    For some reason, I love the way you speak laddie! Sounds like Mimir from GoW

  51. Due_Warthog725 Avatar

    What’s the worst you done to your enemies?

    Also how much shenanigans can you do with just a phone number to fuck with someone , lol >_<

  52. Sea-Frosting-50 Avatar

    sounds great.  how do you find things on the dw? It doesn’t seem very accessible with sites and forums not indexed?

  53. Entire-Illustrator-1 Avatar

    you have any thoughts about the malone lam case? check it out

  54. Opposite2 Avatar

    Is total anonymity online, a thing that an average user can achieve?

  55. arepademalditasea Avatar

    How do you get money by hacking? At some point I was interested in the whole thing but I don’t see how it can be lucrative outside of fraud and ransom

  56. Complex-Professor-56 Avatar

    Hey what is protocol 101 visa means. Is that legit or scam?

  57. bubalina Avatar

    Wait what is debt erasing !? Pardon? You can you zero out mortgage balances on the dark web? 😂🤷‍♀️

  58. TagTwists Avatar

    Do you get free netflix?

  59. Joshwastakenwastaken Avatar

    I’ve heard about logs of bank cards, PayPal accounts, crypto seedphrases, etc.

    My question is, why would someone sell these when they can just use it for themself?

    If a paypal account has $100, why sell it for $50? When you can just clean it yourself and get $100, or use a paypal to crypto service and get $90.

  60. Kennel_King Avatar

    So what’s to stop someone from setting up a service on the dw collecting fees, and never delivering?

  61. dababyfan4728 Avatar

    You got any resources to get better besides HackTheBox or TryHackMe, I’ve been on the daily grind for several months now but I feel like I’ve stagnated. This isn’t just for OP if anyone wants to answer, I’ll take anything

  62. dreggsy1971 Avatar

    Did you steal my 3000 Bitcoin years ago?

  63. No_Spirit_8455 Avatar

    Are you sober and do you think you make a lot of mistakes?

  64. Frox04IT Avatar

    How do you protect your anonymity?

  65. Complex-Ad4920 Avatar

    Honey pots..but like real honey pots. Associated with gangstalking. Heard of it?

  66. clownind Avatar

    Erase my debt and ill grant you 1 wish.

  67. phantomrogers Avatar

    Hi just curious how secure are those secure messaging apps like signal, telegram, and session? Like we all learned about WhatsApp and FB messenger but what about those special ones? Are the app easily hacked or are our messages really secure?

  68. JustAnotherRedditGal Avatar

    What is the market for 0-days like?

  69. Aggravating_Sand352 Avatar

    Can you or anonymous get the Epstein Files already?

  70. Top_Winter1806 Avatar

    long shot but my sisters and i have had an internet stalker who has harassed us for years and can only get an ip address on him. the police won’t do anything despite us documenting his harassment. he knows where we all live. we tried getting help before from “hackers” but they all tell us they’ll only do it if we pay them exorbitant amounts of money before they even start. they have never given us proof that they can actually help and so we assumed they are just scammers. is there any way to know who can actually help us figure out who this person is? it’s been 10 years now and it’s so disheartening and frightening at times. we don’t know where else to go, we’re just regular people who dont know about how to find this asshole.

  71. clothesdrugsstocks Avatar

    What kind of cults?

  72. Izoliner Avatar

    Any tips on spotting a fake vs real (insider trading, debt erasing etc.) dark web groups?

  73. pumpkinspeedwagon86 Avatar

    Hello, I have entry level experience in ethical hacking/cybersecurity.

    How secure and anonymous is the Tor browser actually?