What's new in a quiet house. Deep web, an alternative entrance to a quiet home. White noise and the Templars

ABOUTdarkand deep web "quiet house".

Perhaps I finally went crazy getting to the very depths of the Internet in search of the sensational "quiet home", I studied for a long time darkAnddeepweb, for the whole trip I have accumulated more than 600 bookmarks with sites, they gave me hints for further searches, everything turned out to be not as mystical as described deepweb.

deep web as you know, the closed and sometimes mystical side of the Internet. As many have already learned, in order to start your journey to the deep web, you first need to visit dark net.

Download the Tor browser, set it up and start surfing the closed network. You need to use search engines for Tor, this is torch or evil.

Closed sites will be with the onion domain and with a misunderstood name. Sites are constantly being deleted/blocked and opened again and again.

Hacker groups, extremists, traders of illegal things create closed forums where you can accidentally get into. The darknet has all the blocked videos from the wikileaks site, it just takes time and desire to find all the videos. . Youtube for level "B" can find videos that have been blocked or restricted access.

This dark side Internet that is filled with prohibited content, everything that is blocked or deleted in clearnet, you are unlikely to be able to find it again, if something in dark net deleted, then re-created with the same content, and is permanently available.

Well, now let's move on to the main thing, how to actually get into the "quiet house", and how difficult is all this?

What is a "quiet house", according to netstalkers who are constantly looking for something in the very depths, they say that this is some place that looks like hell, it frightens with its simplicity and a lot of questions that no one can answer, but there are those who say that this is a site, opening which you will see on a white background a chat with one "anon" bot that will not write anything to you. Or you need to carry out some ceremonies, rituals and other mysticism).

I will say in advance that to find the entrance you will need Tor, i2p, and preferably an OS that will provide you with anonymity on the network, for example, tails or QubesOS (run the OS from livecd).

Those who created the map, which outlined step by step what you need to study in order to get to the very depths of the deep web, described that at the end you will need to go through special rituals, get into the “lucid dreams” OS, from reality to find a “quiet home”.

As you begin to learn all the steps, you will come across videos and sites that have been banned from sharing.

Many times I came across sites where the video caused anger and disgust, and many simply shocked with their content, and after visiting a hundred of these sites, sitting at the monitor with a twitching eye, I tried to find forums where people would be the same netstalkers so that I could distract myself from what I saw, otherwise I thought that I would "go crazy."

The level of "trash" in content that can be found in the depths of the Internet reaches the level that you just frantically click to close the browser

For example, videos are posted and broadcast where animals are killed, you can order the killing of any animal, the price will depend on which animal, and the degree of complexity of the “execution”.

For money, you can order something that is not available in regular online markets. All psychopaths post their shows there, a lot of short films, recordings from video cameras of mortuaries how necrophiles mock the corpses, what they do with sick patients in mental hospitals, how and why satanists gather for rituals.

After reviewing all this in search of a “quiet home”, you will be on the verge of a breakdown from what is actually happening in the world, how many scumbags go unpunished, killing and torturing people and then uploading videos to your site. How the government turns a blind eye to everything, and what is really happening in our world and why this network is not being closed, because it was possible to eliminate a huge number of black markets at once, to demolish all the video content that makes it clear that there are simply no number of crazy people on their heads.

After spending hundreds of hours on the closed web, researching every link, watching everything the websites bring you, your life will turn into - a closed web, food, work, sleep, a closed web. From this amount of simply insane information that you will consume daily, sleep will finally disappear, after 4 days of insomnia, starting to scour the dead forums and God-forgotten sites, you will begin to believe in everything that is written there, you will begin to believe that the Internet is not just a network carried out by wires, this is a cloud of information in which all information from the Internet is located.

Everything that was created or written on the network, everything is stored in the cloud, everything that was deleted is stored there, the cloud is a huge repository of information, like a world library, everything that seemed lost or destroyed, everything is saved. This will be your breakpoint. There are really no puzzles other than constant searching and surfing sites.

It was said about the ritual with the OS (lucid dreams) that you need to set an alarm for 3 a.m., at this time you will need to go to the browser and update those pages that took a long time to load and only a white page opened, you won’t have many of these sites, order 20pcs, and when 1 site is loaded and “Welcome” is written in the center, after which the greeting will move to the top of the site and an input field will appear below, this is the last point on the way to the "quiet home".

After going through sites that are filled with horror content, after which you are looking for a way to distract yourself, just not to think about what you saw or read, you will finally find peace in the very depths of the Internet. You will go through an informational rebirth, as I wrote above, "your life will turn into - a closed network, food, work, sleep, a closed network" and believe me, you will never return from there.

In the end, I want to say that if you are initially looking for a quiet home on the network, hoping that it will be a portal where you will have access to all levels of the Internet, then you are mistaken, a quiet home is a state when you have studied all levels of the network, when you have searched through tons information, went through informational rebirth, learned the whole truth that is hidden from us, found peace, thoughts about whether you are crazy or not will stop visiting you. The Quiet House is a kind of point of no return in real world.

Netstalking (from internet stalking) is an activity aimed at searching for hidden information in the bowels of the Internet. A netstalker, like a miner in a mine or a bum in a landfill (depending on the skills and technologies used), is trying to find a grain of gold among a pile of informational noise.

Where did it all start?

At the end of the 20th century, when computerization and internetization had not yet affected all spheres of our life, a personal computer was not a thin laptop with an apple and beautiful buttons, but a kind of shaitan machine that 90% of current computer owners could not use.

In the process of the most basic operations with a computer, numerous errors arose, but then it was impossible to find their solution simply by typing a couple of lines into Google. Solving one problem after another, individuals became so carried away by digging that instead of developing in breadth, they began to dig in depth.

By studying the principles of computers and the Web, they created a certain area inaccessible to ordinary users - the Deep Web (Deep Network, hidden Internet). Subsequently, this segment of the network found a suitable application.

darknet

The darknet is commonly understood as the lower levels of the deep web. This layer is distinguished by a high entry threshold, and the resulting high anonymity. Alternative opinion: the darknet is a network between trusted users.

How to get into the Deep Web?

Netstalkers do not ask such questions. Instead, they search for clues on their own and dive deeper.

However, we know how to satisfy your idle interest. All the necessary initial information will be presented in the article, but you will need to find the links yourself.

  1. Download and set up Tor Browser. You can also access the deep web from your phone, there is a version of Tor Browser for Android.
  2. In it, follow the link to a special Hidden Wiki directory with entry-level sites. As you dive deeper, you'll find other directories, and then another, and another... The process seems to be almost endless.

Video instruction for diving

Is it worth it?

The use of such technologies in theory, can lead to getting "on the pencil" to the special services. If that doesn't scare you, then one last word of caution: use it for research purposes only. In addition, you may regret what you see. DO NOT RECOMMEND!

Map

The researchers classified the deep web by levels, which can serve as a map for a novice netstalker.

  • Level D - basic(open and indexed search engines) Internet: social networks and in general any sites found through search engines (including where you are now). At this level, there are strange references to the lower level and hints for the transition.
  • Level C - Deep Web: systems of anonymous networks and proxy servers (Tor, I2P), closed communities. Illegal content on an unthinkable scale. hacker communities. Information about various anomalous objects and phenomena. Some search results for words from the subconscious. Allegedly secret government radio stations.
  • Level B - Dark Web: something that serves to control the top level D. Absolutely immoral content. Non-existent IP-addresses and protocols, blank pages (it is not clear what this is about). Research Forums. Youtube level B. A huge amount of useful and useless information (it is believed that level D owns only 4% of all information in one way or another available via the Internet). Something called "Void" (emptiness, abyss).
  • Level A - lower limit of the Internet: Holes, Schumann Resonance, level C control, horrific truth about mirrors, internet dead zone, Quiet House access.

The essence of what is happening at Level A is not clear to us even speculatively. Any opinion from people who understand this issue will be welcome.

quiet house

The ultimate goal of an advanced netstalker is Quiet Home. The lower limit of the deepweb.

Researchers point to the impossibility of returning from the "Quiet House" to the real world. This area is not a site, and it is not at all clear to which area of ​​\u200b\u200bbeing this place belongs.

According to the image on the left, you can get to the Quiet House not only through the Internet. Netstalkers have discovered the possibility of a transition to the Quiet House through sleep and something called "Life" (perhaps simply meaning the waking state).

We assume that the horrific truth about mirrors has something to do with this. In the proposed scheme, at each of the levels, there is the word "MIRROR" (mirror).

Project City

A certain society of people who call themselves "Doctors". They declared their goal to "cure all people." The first mention on the public internet is on an anonymous entertainment forum. Known for extremely unpleasant messages and pictures.

It was not possible to confirm the reality of the existence of this secret project.

I came across a very interesting article about the multi-level structure of the Deep Web.

If anyone has not yet heard what it is, I explain: this is a network consisting of a huge number of web pages that are not indexed by search engines. Access to these pages is possible only through a chain of encrypted connections, the nodes (entry points) of which are scattered all over the world. There are web pages that are not associated with other hyperlinks - for example, pages that are dynamically created by queries against databases. The size of the deep web is unknown and generally difficult to estimate, primarily due to the vagueness of the concept itself.

The World Wide Web is a complex multi-level structure that contains secrets and secrets that the average user does not even know about ...

There are groups of enthusiastic professionals who call themselves "Netstalkers". They explore the Web, looking for hidden corners, classified information and other secrets in it. Netstalkers divide the Network into levels.

Social media
Blogs
News
Porn
Imageboards (for those who do not know - something like chats / forums, with complete anonymity of participants)
Smallboards (almost the same as imageboards, but more thematic and with fewer participants)
ARG (Alternate Reality Games)
Gated Communities
hard porn
Collections of strange references

Tor (the same TOR ... Anonymous proxy network inside the regular Internet)
no art
Hacker communities
i2p (Another anonymous proxy network)
Dead forums (forums that have been turned off but are still online)
Freenet (Another anonymous network within the Internet, peer-to-peer)
Information about the memetic
Future sites
Two internet sects
Search results for words from the subconscious
Deep Web (Deep Web, originally the term meant pages not indexed by search engines)
The limits of brutforce netstalking
dark web
Number radio stations
Secret government radio stations

If the two upper levels are still quite objective, then the paranormal, supernatural and folklore already begin to go deeper ...

The so-called "Pass"
Research Forums
Blank pages
Defunct IPs
Void
Defunct pages
Way up, back, for the last time
Defunct protocols
We need old browsers here
Really dangerous point
You Tube for level B
random numbers
Little imageboard
Tons of useless information
Tons of useful information
valuable phrase
Limit of human possibilities
Level D control
Holes
Death
Schumann resonance
Dead zone
The Horrifying Truth About Mirrors
Level C management
quiet house

And at the very depths - Level A
About which it is generally difficult to say something, just like about the higher planes of human existence.

this diagram clearly shows the levels of which, according to the assumptions of "Netstalkers", the World Wide Web consists

And here is what the CEO of one of the leading computer security firms in Russia said in his interview on this topic:

The volume of illegal trade on the "deep web" is difficult to estimate, but some experts believe it could be in the hundreds of billions of dollars a year. There you can buy absolutely everything - from these holders plastic cards to passwords for e-mail addresses, from the skins of animals listed in the Red Book to pornography. Moreover, not only illegal traders and hackers use the "deep Internet", but also representatives of big business - to transfer confidential information to partners, journalists - to communicate with "unnamed sources", diplomats - for closed correspondence. “Hidden networks are used for anonymous, covert exchange of information, and you can meet a wide variety of audiences there - from religious fanatics to child pornography dealers. For the most part, of course, hidden networks are criminal in nature, since they are not regulated by any legislation.

Here, there is drug trafficking, and the sale of fake IDs, and the sale of access data to financial accounts of users of various banks, and child pornography, and much, much more that simply cannot legally exist on the open spaces of the public Internet. "But, in addition to openly criminal sites , there are also those resources, the existence of which the owners would not like to advertise because of the secrecy of information or the presence of commercial secrets in the data. "Closed bases, academic, government, military sources, closed bases of enterprises and organizations.

Are you familiar with hell and heaven? Do you believe in hell? No? Then I'll tell you that TD is hell. Once there, a person experiences feelings worse than death. Have you ever thought that the Internet existed 1 billion years ago?
Also no? Before the appearance of the earth, not in the form in which we see it now. It was like a huge database of information in which everything could be found... It is not clear who created it and why. There is also a version that TD is an empty chat. Completely empty. And it has only one user - Anon. This thing is much smarter than a human. But... If you write in this chat, then in response there will be only silence. There is also a rumor that some hacker groups got into the TD and did not return from there. They just got there and disappeared forever. It is not clear who took them and where. Why did the hackers do it? Under what circumstances? Nothing is known. And the unknown is scary.
Now I will tell you about the paths to the TD and the hacker groups that got there.

Paths to the Quiet House.

1. The very first way is the Internet. How to get into the TD through the World Wide Web? You just need to have strong nerves and a TOR browser (or similar). You need to solve a lot of mysteries and go a long way to the TD. Good luck!

2. The second way is Dreaming. In this method, you need to apply various rituals, and this is life-threatening. I do not recommend this way. But anyway, I'll tell you what and how:
Your plan is to get into the TD through the mirrors.
Step 1: Set an alarm for three in the morning.
Step 2: Place your laptop in sleep mode on the table near the bed.
Step 3: In the room, arrange the mirrors so that they reflect you, your laptop, an alarm clock ... Everything that is standing next to you.
Step 4: Take any storage media with you to bed. An example is a newspaper, a flash drive, a magazine.
Step 5: Think only about how once you get to the TD, you will find a library there, and there a book (newspaper, flash drive, magazine).
After the alarm rings, you will wake up. (If the alarm doesn't ring, you will die in your sleep).

3. Telephone communication. I think this method is an invention. Since he first appeared on one famous imageboard.

Hacker groups that got into Quiet House.
1. H0D - A mysterious group that went missing while studying TD. This group also studied the DeepWeb. The main goal was to get into the TD. Rumor has it they got there. The hacker group has ceased to exist.
2. Seven - another hacker group. But this grouping, in contrast to the previous one, left the TD safe and sound.
3. ISKOPASI - the most interesting grouping. Disbanded around 2009~2010. Nothing is known about her. Scanned IP addresses.

DeepWeb subsections (Most interesting).
Level B:
The so-called "Pass"
Research Forums
Blank pages
Defunct IPs
Void
Defunct pages
Way up, back, for the last time
Defunct protocols
We need old browsers here
Really dangerous point
YouTube for level B
random numbers
Little imageboard
Tons of useless information
Tons of useful information
valuable phrase
Limit of human possibilities
Level D control
Holes
Death
Schumann resonance
Dead zone
The Horrifying Truth About Mirrors
Level C management
quiet house
And at the very depths - Level A.
Among netstalkers, the place at the very bottom of level B - "Quiet House" - is of particular interest.

That's all.
At the moment - this is all the information about the Quiet House (Silent House).

With administrators of suicidal publics and find out their motives. In most of these communities, various occult symbols, videos and references to many network legends were published. Lenta.ru found out how mystical signs and letters can be associated with Satanists and myths about the dangerous depths of the Internet.

After the appearance of information about suicidal publics on VKontakte, a number of media outlets stated that a certain well-organized sect operates on the Internet, calling teenagers to commit suicide and responsible for the death of 130 children. However, in reality, everything turned out to be much more prosaic. Yes, communities were indeed found on the network where mystical symbols, videos and indirect calls for suicide were published, but their creators simply wanted to become famous and lure subscribers. Moreover, many of the cryptic entries were actually VKontakte system errors and old Internet legends.

White noise and the Templars

In most of the suicidal-themed communities that became clones of the original f57 group, the mysterious symbol was actively published, which the media immediately dubbed "IT". Later, the administrator of several f57 communities, in an interview with a Lenta.ru correspondent, said that he himself came up with a strange image, borrowing it from the underwear brand V.O.V.A.

The logo of the Lithuanian brand really looks like a mystical sign from suicidal publics, but the administrator’s version did not explain the letters in the middle in any way. In addition, it soon became clear that the symbol was present on frightening videos with not very clear video sequences and strange sound effects. Some VKontakte users noted that watching videos causes suicidal thoughts in teenagers. According to rumors, one video provoked the suicide of the girl Rina at the end of November 2015, which marked the beginning of the popularization of the original group f57.

According to one version, the author of the videos was Miron Seth, the administrator of the f57 Suicide 18+ group (currently blocked by the VKontakte administration) and other communities, including the anonymous confessional "Sorrow My Soul". However, Seth himself, in correspondence with a Lenta.ru correspondent, emphasized that he added these videos to his community from closed publics where shock videos were published. The Lenta.ru correspondent failed to find the videos in these groups, and Miron Seth announced on May 20 that he was no longer present on social networks.

True, soon one of the so-called "Internet investigators", trying to establish all the circumstances of Rina's death and the popularization of the f57 groups, in correspondence with the correspondent of "Lenta.ru" suggested that the symbol is associated with the activities of mystical cults, including the "Order Oriental Templars (Ordo Templi Orientis).

This order was founded back in 1902 and was originally supposed to play the role of a Masonic academy, educating students in adherence to the occult traditions.

According to the investigator, this version is supported by the general similarity of the symbol from suicidal groups and the hexagram of the long-term leader of the order, the famous occultist Aleister Crowley. He led the cult in 1912 and proclaimed as the main idea the promotion of the religious teachings of Thelema, the main theses of which were the principles "Do your will, so be the whole law" and "Love is the law, love in accordance with the will", taken from Crowley written in 1904 year of the Book of the Law.

Lenta.ru analyzed the symbol and found several confirmations of the “Internet Investigator” theory. On images from suicidal groups, in the corner there is an inscription “divide, add, multiply and understand” (“divide, add, multiply and understand”) - one of the postulates of the “Book of the Law” associated with numerology.

The letters in the middle of the sign, most likely, do not mean the pronoun "it", but are the abbreviation O.H.O - short for Outer Head of the Order (Outer Head of the Order): this is the elected leader of the entire cult, managing the "Great Lodge", that is, high-ranking members of the order who have undergone several rites of passage. Aleister Crowley was the de facto leader of the cult from 1912, he was recognized as the Outer Head in 1923, a post he held until his death in 1947.

The video recording, which many VKontakte users cite as the reason for Rina's suicide, also speaks in favor of the "Internet investigator" theory.

The video contains images of the planet Saturn, which has become a symbol of a group of occultists that broke away from the Order of the Oriental Templars. In 1928, one of the prominent members of the cult, Eugene Grosche, disagreed with Crowley's leadership and founded his own organization, called the Brotherhood of Saturn. Various astrological beliefs became the central part of the teachings of the new cult.

Another mystery of the symbol from the f57 groups is the letters “A” and “V” turned towards each other. According to one theory, they are an abbreviation for the concept of "Viterbi Algorithm". Opened by Qualcomm co-founder Andrew James Viterbi in 1967, the algorithm allows you to decrypt special ultra-precise codes coming through a noisy communication channel. In other words, the Viterbi discovery helps to better recognize signals among interference, so it is actively used in GSM and CDMA mobile communication standards, dial-up modems and wireless networks.

Most videos contain strange sounds and noises, and the use of the Viterbi algorithm may be able to help recognize their hidden meaning. Lenta.ru correspondents have not yet been able to identify the author original videos, as well as those who published videos on VKontakte.

Quiet Home and the Deep Internet

Most posts in suicidal publics were accompanied by hashtags, and if standard designations like #f57 or #whales do not cause much surprise, then the meaning of posts like #quiethouse and #1642 was unclear until recently.

The true meaning of these hashtags was clarified to the Lenta.ru correspondent by the so-called netstalkers, a popular movement on the net, busy checking various legends about the Internet device. According to them, the modern network has several sections, but most users know only one of them - the so-called "Level D": it contains the familiar sites, social networks and blogs that the whole world uses every day.

Many users also know about the existence of "Level C", where resources are hidden, which can only be accessed through a secure Tor browser. You can also find various hacker forums, banned pornography and secret government networks, including ARPANET - a closed prototype of the modern Internet, created by the US Department of Defense in 1969 for decentralized transmission of information in case nuclear war. According to rumors, it is separated from the main network by a special security gateway.

Below are mystical levels B and A. According to rumors, B contains secret government databases and various confidential information. Some netstalkers say there's also a B-level "YouTube" where you can find every video on the planet.

At "Level A" there are allegedly mystical things like "the dead zone of the Internet" and "the horrific truth about site mirrors." There is also the peak of the Internet, which most netstalkers call the "Quiet House". According to them, this is not a website, but a kind of point of no return to the real world. Getting into the “Quiet House”, a person experiences an “information rebirth” and forever merges with the network.

These myths often serve as a theme for "alternate reality games" - unusual way entertainment among internet geeks. Usually the game is built according to the following principle: the participants are given the initial story (the so-called trailhead) and numbers, after which they need to complete certain tasks related to solving puzzles.

In 2013, 1642 became a popular online game. According to her story, some hackers explored the depths of the Internet using a personal interceptor router. One day, a hacker with the nickname 1642 stumbled upon a mysterious PROGA anomaly that destroyed entire websites and infected computers. She enslaved a hacker, and he began to spread it over the deep Internet, but he was stopped by an ally with the nickname Anzor Pasechnik. To contain 1642, he activated the secret Quiet Home Protocol and with it imprisoned PROGA at the lowest level of the Internet. Before his death, Pasechnik, who was exposed to the anomaly, nevertheless wrote a cipher code to disable the protocol. The goal of the players should have been to find parts of this code.

The game was safely forgotten after a few months, but in November 2015 it was decided to recreate it, slightly reworking the plot and calling it "Insider". As a result, the legends about the dark web were gleaned by the founders of f57 fake groups to make their publics even more mysterious. One of the first idea with the "Quiet House" and 1642 was stolen by Philip Lis, who was in a general closed chat with the organizers of the game - the so-called "Insider".

Not mysticism, but code

The very name of the publics also raised many questions from users. Most people wondered why, of all the symbols and designations, the creators of the "groups of death" chose the Latin letter f and the numbers 57, 58 and 75.

The answer to the correspondent of "Lenta.ru" was prompted by one of the netizens who actively participated in the investigation of the activities of suicidal communities. He explained that the combination of characters f57#58#f57#f57#58 causes a bug in Unicode, a character encoding standard that allows the characters of almost all written languages ​​in the world to be displayed correctly. When writing such a sequence of characters in the comments under the VKontakte entries, the encoding went astray, and users saw a hodgepodge of characters.

First time for this bug

Up