Fake top level domain names

Fake top level domain names have been associated with the mythos of Tor and the deep web, likely because, once you accept that there are 'hidden' .onionFile:Wikipedia's W.svg domains, what other domains could be hidden?

Someone is wrong on
The Internet
Log in:
v - t - e
Gather 'round the campfire
Folklore
Folklore
Urban legends
Superstition
v - t - e

Of course, most people don't understand how darknetsFile:Wikipedia's W.svg and custom TLDsFile:Wikipedia's W.svg operate, so they turn to the secrets of the deep web to receive information in reliable and authentic pastebin and peer-to-peer formats.

History

The notorious iceberg image featured a 'closed shell system' towards the bottom. This could either be a reference to the anime Ghost in the ShellFile:Wikipedia's W.svg, or to a misunderstanding of how darknets work. In either case, intrepid trolls continue to disseminate information about .clos, .loky, and other made-up domains.[1] The next subsequent major piece of fabrication came via a Portuguese paste in July 2013[2] that was later translated to English.[3]

clos and .loky [same as many other (.dafy, .taur, .end , .nept,...)] are domains used in private networks (often mentioned as Closed Shell System). It's very difficult to access them, but not as difficult as staying secure while accessing them. Each network has it's own different accessing method. For example to access .clos links you need to have correctly configured ChaosVPN and FreeNet and for some sites software called Clossys 4.3.3. And now for staying anonymous. There is NO internet provider granting IP address over IPv7-IPv9. It's not too long ago, when there wasn't even official IPv6 address provider. These protocols are super secret and only used by military for secret communication and by elite haxorz for things that normal people can't even imagine. Since there is no provider for these protocols, it can mean a very big risk tracking. It's highly required to use encrypted hardware. Some networks won't even let you to access it without hardware encryption. That's it. I've already told you more, than I'm supposed to. [4]

Such domain names are often associated with "deep web secrets" like red rooms, internet assassination, and so forth.

Interestingly, the Clos networkFile:Wikipedia's W.svg is actually an old networking standard, but has nothing to do with secret top level domain names.

[5]
gollark: Because they are.
gollark: I mean, *random.org* will see the requests as coming from your friend's server.
gollark: Er, no, you're still wrong.
gollark: So if you get the quota of your computer, that'll be wrong.
gollark: Thing is, your friend's server is what it'll see all the requests as coming from.

References

This article is issued from Rationalwiki. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.