This tutorial is about getting into the deep web in a easy and more secured way.
When you access the deep web simply by downloading Tor into your computer, you are putting yourself at risk. First, you are leaving traces on your computer that you access the deep web (unless you delete and download Tor every time you want to go deeper, which is painfully annoying). Also, someone else that can reach your computer may find some unpleasant information, and you probably have some personal documents, pictures, videos, etc. that can be stolen. Thus, it’s imperative to get an operating system that resets every time it is opened which doesn’t compromise your work!
So, what we propose is to use a bootable pen running another operating system (it can be done for many operating systems but this is an in-depth Tails guide) and boot your computer directly from that pen drive. If someone tries to hack you, he probably won’t get his hands on important data.
TAILS stands for The Amnesic Incognito Live System and it is a live operating system (which means you can boot it from a pen drive) that provides its users extra layers of privacy and anonymity. Click here to read our previous article on TAILS
How to Install and Use TAILS
Step 1: Click here to go to the Tails download page and click on Download and verify via BitTorrent > Download Torrent file. Tails is currently in version 2.9.1, so we advise you to download it directly from their website, to avoid malicious intentions towards your safety.
Alternatively, you can go to the Tails main page and click on the big green button on the right, and follow the Tails Installation Assistant which is very intuitive.
If you have Firefox or Tor already installed on your computer, you can download it using a browser add-on. Otherwise, you will download the torrent file (you can use μTorrent to read this file and extract all the information later).
When your torrent has downloaded 100% of the data, you should get a folder with a .iso file. This single file is the whole operating system to install on a pen drive.
Tails’ programmers strongly advise to get 2 pen drives with 4GB each, and first download Tails on one pen as an intermediary pen, and later use that intermediary pen with a fresh operating system to clone Tails to a final pen drive. This is mandatory in case you want to store some data later in the pen drive so you don’t lose important stuff. It also allows for automatic security upgrades.
Step 2: Now that you have your .iso file, you need a software that installs it on your pen drive. Tails website’s suggestion is the Universal USB Installer which allows you to input any Linux operating system into a pen drive!
Alternatively, you can download Linux Live USB Creator, also called LiLi. However, this last one won’t recognize the latest versions of Tails and will downgrade it to version 1.5, so you may want to stick with the first option.
Run Universal USB Installer and it will ask for a pen drive to install a certain operative system. We will choose Tails, select the path of the .iso file we have just downloaded and choose our pen drive where we want to install Tails (remember this is not the final pen drive).
In step 1 inside the installer, you can press ‘T’ on your keyboard and it should direct you to Tails option.
Step 3: You will need to select the .iso file path so the installer can install that file on your pen.
Step 4: In the last step of the setup, just select the pen drive you wish to use! Select the pen, and check the “Format E:\” option which will erase all the data, so if you have any documents you want to save you might want to do a quick backup right now. Click “Create”.
Step 5: Then a confirmation popup will appear. Press “Yes”.
Then the magic will happen automatically.
Step 6: Now that you installed Tails on the first pen, shut down your computer, plug the pen drive in and reboot the computer. If you are lucky enough, your computer will automatically boot from pen drive. Otherwise, you will need to press a key to access “Boot Menu” – usually the key appears on the first screen when you start the computer and should be one of these keys: ESC, DEL, F11 or F12 – and go to “Boot Options” and press the “Boot from pen” option. If you have any questions just search here.
You can also check out this guide on Youtube showing what will appear when you boot Tails from the pen drive.
Inside Tails, we want to clone the operating system. First, you must check whether you have the latest version of Tails (currently 2.9.1 released on 2016-12-14) or not. If you do, go to the top left part of the screen and choose Applications > Tails > Tails Installer. Then just select the first option “Install by cloning”. It will run automatically and in the end, you just need to remove the USB, shut down computer, and restart from the new cloned pen. Here’s a guide that explains very well how to do it.
After you have the final pen drive ready, you may format the intermediary pen and use it as a normal pen drive!
The hard work is done, so it’s time for some recommendations
In case you are not familiar at all with the deeper levels, you should know that you are in constant danger. It doesn’t mean that every time you access it you will have your computer shut down and information stolen. It means you should be very careful with whatever you do, because on the other side of the screen there will be someone waiting for you to slip.
Our first recommendation is for you to separate personal life from your online life. Don’t mix things, don’t use the same emails, names, or whatever information. Nowadays is easy to track somebody, and even if you don’t notice, you expose your data in a lot of places, so you may want to keep your public and social life away. Also, you may want to access deep web in a public coffee-shop using Tails. It doesn’t compromise your home network and it will be harder to trace things back to you.
Bridges – We recommend you to search for Tor Bridges. The name is self-explanatory and they are used to get extra layers of anonymity. Bridges are relay nodes that are not listed in Tor directory. If your ISP (internet provider) censors freedom and filters your connections, they probably won’t be able to block all the bridges. Tor provides some bridges by default, but since these bridges are public, it is easy for your ISP to block them.
In order to get bridges, you can either (1) go to and ask for bridges (the captcha code is sometimes annoying) or (2) send an email to firstname.lastname@example.org (you must send with Gmail or Yahoo) with the text “get bridges” (don’t do this from your personal email).
You should be aware how Tor works. It is composed of nodes which serve intermediaries between you and the final website and its information retrieved. However, these nodes are being listed publicly. Also, if someone owns a great part of these nodes, they should be able to track someone through correlation. Despite the information remaining encrypted inside the Tor network, when it passes through the exit node if won’t be encrypted anymore. Since these nodes are being listed publicly and some entity may own the greater part of them, it is a secure measure to add a bridge to your connection (usually people use this when the ISP doesn’t even let you get inside Tor).
VPN – Virtual Private Network or VPN is the extension of a private network across the Internet. For example, if you work in a company and you are at home, if you enter your company’s VPN you will get access to the network as if you were inside the company’s building. This is useful when there is censorship. There are some VPN providers online which basically put you in a different country, to add extra layer of security. There are free and paid VPN’s. However, you should remember that free services make money out of somewhere (in this case, they probably will make money by selling your data to other companies. Even if they say they don’t, they might be doing it). Since this is supposed to be a guide to any random person in the internet, we will recommend a free VPN called CyberGhost which also has a paid version. Keep in mind that there nothing is 100% anonymous in a network (your computer, router, satellite and every other part participating in the process are all identified by different ID’s and serials, and it might be possible for someone to reach you).
Wallets – a lot of people accessing the deep web also use Bitcoin or other Altcoins. We won’t go into detail on this, but we can inform you that the Tails pen drive we just created has Electrum wallet included and you can manage your bitcoin transactions through it. Since your data will be wiped in the end of the session, if you wish to save a backup of your wallet (.dat file) you want to enable persistent storage in the pen.
Click here to check out TAILS’ final warnings/recommendations
Posted by: kptx