The darknet is dead.
Somewhere between 2021 and 2022 I became obsessed with the concept of darknets, a net inside the net that was anonymous for users, the concept that the client and the server are anonymous and there's no way to find a website without the very specific and unpredictible URL was so cool to me. I like how you can host any service (not only websites, but you can also ssh to a .onion or .i2p link which is very cool), but unfortunatly the darknet concept is unpractical if you want to apply to everything
To every idiot who is going to come here and say that a darknet doesn't have to be anonymous can come to the place I am writing this blogpost and have a great taste of the dish know as "my cock".
Tor is THE darknet, everyone knows tor, everyone who is relatively not a normie and knows how to use a computer has used tor at least once, in most of the cases, just for boredom, not because they really needed to be anonymous online, they just wanted to know how the darknet is, they probably found the hidden wiki, and if they were bored enough they would have read the mythical "How to exit the matrix article on the Hidden Wiki. Thing with that article is that no one mentally sane would have do any of the steps listed there if they're not going to start a Moroccan Hash empire in Memphis, Tennesse. So newcomers to the Darknet would really thing that the darknet is indeed full of crime, and probably won't browse it again after that time, simply because in the darknet there's nothing very interesting to see for "normal people".
Then we have I2P, or as we call it: "Alternativx Tor", my personal favourite, the concept of tunnels and the fact that it supports the UDP protocol is something funny. But very sadly this darknet has, for some reason I do not understand, a Russian Diaspora who also seems to like young anime girls doing stuff. So the normal person would think again there's only CP in the darknet.
Normally, normal publishers who are not nerds won't bother on creating a .onion mirror, much less they'd even think on creating a I2P mirror for their site. So there's no really a reason for a non-nerd, non-criminal person to use Tor regulary.
And another idiot can tell me that there are criminals, pedophiles and everything you want in the clearnet, and this is indeed very true, but the difference between the clearnet and the darknet is that you don't have to do anything to browse the website. In other words, there are more people on the clearnet, and as there are more people in the clearnet, stadistically, more people will visit your website if it is in the clearnet.
Thing with idiots is that they're hard to convince, they won't isntall "The Invisible Internet Project" or "The Onion Router" without a very good reason.
I do host Tor and I2P mirror of my website, just because I can, I don't have any reason not to have them, they're funny to have. They look cool in the homepage of my website, but I don't expect people to use them, because I don't think much people are interesting on downloading another browser just to read https colon slash slash suragu dot net anonymously, you must be very paranoid if you think I geolocate every IP address I see in the http access log, the truth is that I could not care less of who visits this website, where, at what time and how many times, my website is online, there is for anyone who wants to visit it, I don't have anyone on the radar. I don't think no one sane does that.
Before I said that I loved the fact that you can create a ssh .onion service, and that is indeed very cool, but as tor is slow as shit. I don't think it's a good idea to unironically ssh to a .onion server. Patience is a virtue, but just connect to the server through an (actual) VPN1, it's practically as secure, and your ISP won't be able to read your communications, they weren't able to read the communications in the first place as ssh is a secure protocol, but there are paranoid people (or more like, idiots), who want to add another layer of encryption to the communication. I don't event think add more layers of encryption for their security, but because they have absolutely nothing better to do.
But, well, a solution for this is that, both Tor and I2P can disable
anonimity for the server, this means that the service will be a bit
faster, because it isn't redirecting its traffic through n
nodes to
anonymize itself, the client is still redirecting its traffic through
n
nodes. So it's still unpractical for ssh and stuff.
And I haven't even talked about the further configuration every
program requires to use any darknet, not to mention that most software
doesn't even have a SOCKS proxy option, so you have to workaround the
thing, passing the program through an traffic redirector, or use
torsocks
or any of that shit.
The people who still, despite everything, knowing they will never be mainstream, still writes blogs about darknets, share large linklists and overall, develops the darknets themselves has all my respect. You have to have a great patience to keep doing stuff despite the sisyphusean nature of developing a darknet.
install wireguard and do something good. ↩