We asked ‘The Brain’, which told us that “The dark web is a hidden part of the internet that requires special software, like the Tor browser, to access and provides a high degree of anonymity. It is a small, intentionally concealed part of the “deep web” (all non-indexed content) and has a reputation for hosting illegal activities like drug and weapons sales, though it is also used for lawful purposes like anonymous communication for journalists and dissidents.”
If the text is complicated, then take a look at the “Illustrated” picture.

And while the indications of the surface, showing Online Media Platforms, the fact that somewhere, sometime or another these too, use parts of the Deep Web territories. In a more detailed explanation, we find that “The Dark Web is a concealed part of the internet, distinct from the “Surface Web” (the part indexed by search engines like Google) and the “Deep Web” (content not indexed by search engines, such as email and online banking). What is not common knowledge, however, is that anything on the Surface Web is vulnerable to “Exposure”; everything from your Mobile Text Messages, emails, Tweets, even your private – supposed “End-to-End Encryption” – WhatsApp and Messenger conversations are “Exposed”. This is great for Homeland Security – which Britain has adopted from the US – for the pre-emptive operations of finding evidence that is considered “Terrorism”, “Hate”, “Treachery”, or even calling you’re PM a so-and-so, where immediate deployment of a thousand Government Agents arrest those who have dared speak aloud in private. As for the others, arrest is sometimes not the first option.
Trackers and Stick-Bots
When you sign into the “Surface Internet”, and believe me, you really do. Opening any “Digital Market” that you have downloaded ‘Micro Sales’ from either “Google Play” or “Microsoft Market Place”, proves that you have downloaded that “App” or “Program”. Having a “Google Account” and, or “Microsoft Account” – which is universal – you have signed up to the 2 of most “Exposed” corporations in the world. Between these 2 companies, your deep and intimate “Personal Information” sits behind ‘Firewalls and Algorithms’ that cypher and decode into ‘usable data’. For you, this is ‘Password Protected’ “Sign In” and “Security Settings”, though you don’t really have ‘control’ over your “Security” unless you have a reputable VPN and Antivirus Software. Using a FREE VPN, you’re better off remaining in your world of allowing “SCAMMERS” to rip you off.
Regardless of what people tell you: You cannot access the dark web with standard browsers like Chrome or Safari. It requires specific software, known as a dark web browser or overlay network, to access sites on it. At the moment, there are more than 200 ‘Overlay’ browsing apps that use sophisticated software protocols to remain “Web Silent”, many of these you are simply make you a ‘GHOST’ and your data is crushed with the force of the M82 Black Hole.
Imagine freedom unbound that, if you are very careful, can give you more useful information in a day than Facebook, X and Instagram can give you in a month. The software used to access it encrypts and routes internet traffic through multiple servers, making it difficult to trace a user’s identity and location. NOTE: Using this integrated ‘software’ while on any “Surface Browser” does exactly what it says on the box (provided you get one of the most secured VPN’s), but it can cause problems with certain websites that may be important to you; online shopping sites such as ASDA, Morrison’s, Argos, those kinds of shopping sites may ‘restrict use’ while using a VPN. As for Amazon, well, there are a few glitches due to Bezos not believing in Data being kept from their Bots and their Algorithm Fact Finders. So, check before you continue on a website that does not allow the use of VPN’s, and I’m betting you’ll be very surprised on those that do.
When people ask me questions about the “Internet” and how anyone can get onto the DW (Dark Web), it sometimes turns into a very drawn-out tuition lesson. The mistakes that some of these people make is not “knowing your enemy”, which is the “data handlers that sell and exchange your personal data for their own financial advantage”, to coin one example I was given by a qualified Technician working for Openreach.
Although the DW has been painted in a very dark picture, a place where you can put your life in danger, or at the least be “Hacked” and or “Ripped-off” of your life savings, it is worth knowing that rarity of this is only found when you ‘navigate’ the DW without any sense or purpose. If you just want to poke around and take a first-time look, then it is safe to say your visit may be uneventful. If it is to seriously take into account that you will learn a lot more from the ‘Private Forums’ and ‘Billboards’, then respecting the DW is highly advised. Due to its anonymity, it is a marketplace for illegal goods and services such as stolen data, drugs, and weapons. This of course, only applies to the deeper layers of the DW, where the ‘rite of access’ is having been given ‘passwords’ or an ‘encryption key’ to enter. Finding any site during your visit that openly visible to you, are more likely to be ‘spook sites’ or ‘information feeder sites’ that capture as much information from you as they can. While other parts of the DW are to provide total invisibility. It is the anonymity it provides that is also used for purposes such as secure communication for journalists, political dissidents, and whistleblowers.
So now, here’s the ironic part – Some government agencies also use the dark web for specific activities that require anonymity. Far from being the most shocking, but by far the most surprising. Global Agencies around the world deep diving in the DW, where in all shape and form, are the enemy of this triadulated behemoth void of Zeros & Ones, to initiate in ‘Programs’, ‘Testing’ and even partake in ‘Criminal Activity” anonymously.
While ‘Conspiracy Theorists’ claim that the presence of governments is to ‘Capture and Control’ the DW, and others actually believe that there is no other way of remaining a ‘GHOST’, the fact of the matter is that there is. UNDERNET. An electronic way of “Deep Diving” the DW without the need of using any of the conventional ways and means of yesterday.
What Is Undernet?
For more than 50 years now, way after the “Internet” was accidentally discovered, as were Text Message for Mobile Phone companies, there was a small ‘Black Hat Group’ working on the possibility that DATA could be transferred independent of the (traditional) internet, and that it could even be aligned with said internet, functioning as it’s very own self-contained way of entering a number of ‘Indexes’, not only to view but also to extract, without exposing “Identity” or leave any fingerprint that would normally be left to distinguish “Public Flowing DATA Traffic” and the “USER” who literally remains a ‘GHOST’.
Flaws Of ‘Undernet’
As you would expect from any “Digital Use”, there are several weaknesses to “Undernet” and its stability: Elemental Rain (moisture that carries with it an Electromagnetic Field) that is both disruptive and fatal to the ‘connection’, while ‘Brown-outs’ and ‘Black-outs’ can ‘corrupt’ the feed, also destabilize the ‘connection’. There is also the ‘grey-node’ of which is still an enigma, as well as becoming a myth of its own right.
For a long time now, both students and teachers at M.I.T have used a very sizable budget in the ‘investigation’ into the ‘Undernet’, while finding that ‘forced nodes’ like those used on the “Surface Internet” cannot be integrated within the established ways and means of ‘connection’. Meaning that the likes of ‘Firmware’, ‘Patches’ and ‘viruses’ deactivate, or simply derez into nothingness. And, while the studies – discontinued in 2022 – found ‘no viable access to the ‘internetwork’ there was no constructive use.’
Defining “Experts” With “Indie-Techs”
Whether or not the ‘Undernet’ has been accessed by M.I.T or other Government entities and, or agencies, the fact that the independent technicians, the likes of Hackers and Engineers who have continued the work have revealed, it is authentic and it is real, it just can’t be controlled or manipulated like the “Surface Web” has.
If the falling numbers of USERS on the internet, especially on the “Surface Web” front are correct, then imagine this: 2 popular car dealers are selling Ferrari’s, one of these dealers is a money grabbing, corrupt businessman who wants to make a mass profit of £3m, but there is the second dealer, a family man who just wants to make a go in life who sells his Ferrari for £1m. In the same sense, the Surface Web (Car Dealer 1) offers information and content to USERS, but you have to sign and agree to many T&C’s that you’d need a solicitor to look at before you agree. On the other hand, there is ‘Undernet’ which doesn’t have any T&C’s, no legal jargon, no “Denial of Access” because you use a VPN (which is 100% legal to own and use), and doesn’t throw Ad after Ad after Propaganda BS at you every five minutes while watching a program or playing a game.
Even to us at StaRyson, there are limitation encounters to everything we conceive, even to the point of knowledge seeking research, which tells us that ‘Undernet’ is not just a theory put on the eternal back-burner, but went on to be accomplished. Like every other piece of technology, they can be manipulated far and beyond that of any law.
What Is ‘D3ADSIL3NT’
Simply put, the ‘Burrow-Virus’ is a rogue virus program that was engineered to ‘close ports’ after an attached primary virus, probably ‘Spyware’ or ‘kamikaze’ software get into the system they are targeted to infiltrate. D3ADSIL3NT is a very… well, silent virus that anyone who has been infected with it, would be none the wiser.
The origins of D3ADSIL3NT are still unknown, though there are a plenty of ‘conspiracy theories’ out there accusing both Governments and Private Rogue Companies, as well as Financial Sectors, which is odd. For a Home Computer System, or Laptop, the virus could be used to literally siphon your private data, regardless of Firewalls, Antivirus Software or Top Cyber Security Protocols that you have running. The matter of this rogue being referred to as a “Burrow-Virus”, is because it doesn’t need to burrow out, it just needs to ‘close’ the ports in which the initial virus entered.
‘D3ADBOLT’ And ‘D3ADSIL3NT’ – What’s The Difference?
As many believe we are now into the Digital Age, by almost 50 years at least, we – meaning you and I – know only too well the basics of Home Computering, as well as all Schools, Colleges and Universities, who now insist on Tech Pads instead of books. This is a great step forward in education, as long as you understand the rules and state of play.
D3ADBOLT is different in many ways to the ‘D3ADSIL3NT’ virus that infects 90+% of ‘Commercial and Corporate’ networks, rather than Home Networks, though this is not unheard of. While being infected with the ‘D3ADBOLT’ virus, there is no way on this Gods Green Earth you’re going to be using that device again, unless you have the “Unique Encryption Key”, which will without doubt be one of a kind. Used by ruthless hackers and ejackers from around all forms of the internet, are out to get mostly ‘Soft Targets’ like information and data that will successfully give them funds to hand over the key as quickly and as quietly as possible. A lot of companies that are hit by viruses like this do not release the news to the public, and we all know why?
The safest place to be while surfing the net is using the “Surface Web”, while if having the urge to enter other parts, learn yourself the rules and behaviour to be protected against the unexpected. If you have the necessary equipment and software, then venture cautiously and know your limits. There are a few dodgy music tracks out there that once you hear them, you can definitely not unhear them. So be careful and enjoy the freedom.
Written By Marcus De Storm for HIVEQUILIBRIUM (UK)
15/10/2025 – 22:39PM