Top News

Breaking




Here's some FAQ you need to know.  * For those who have bricked their device, do visit the nearest service center to repair your phone. You can't add the Mi account in the settings the device is not bootable/ boot loop.

* For Android One users, please check out unlocking tutorial in your device subforum. You don't have to go through the procedures mentioned here.

*Bind your Mi account and remember not to logout your Mi account from your device
. Do manage your Mi account details (i.e: mobile number) here: https://account.xiaomi.com/

How to apply? (new*)


The process is simplified and the permission is granted automatically. You don't have to fill in any application form or wait for the SMS anymore. Log in and head towards http://en.miui.com/unlock . Download the Mi Unlock Tool (picture above) from the site and proceed to unlock. A waiting period and instruction will then be displayed in Mi Unlock Tool. Use your phone actively during the waiting period.

Download Mi Unlock App (new*)
Use this older version of Mi Unlock Tool if you're stuck with account application query error (hot*):

Download Mi PC Suite MiSetup3.2.1.3111_2717.zip (38.9 MB, Downloads: 136586)

1. Settings---> About phone---> MIUI Version (Keep tapping it to enable developer option).
2. Settings---> Additional settings---> Developer option and bind your approved Mi account under Mi Unlock Status. 
3. Log into the Mi account which has acquired unlocking permission on your device.4. When you logged into the Mi Unlock Tool, tap on the top right gear icon to check the update for both USB driver and Mi Unlock Tool. Make sure you're running the latest version.5. Turn off your device, press the Power button and Volume - button at the same time to enter bootloader mode.6. Log into the unlocking tool on PC with the same Mi account. Connect the device to the PC using USB cable7. Press 'Unlock' and follow the timer/ waiting period shown in Mi Unlock Tool to unlock successfully.

Note: 
1. Follow the timer/ waiting period shown in Mi Unlock Tool to unlock successfully, you'll see this sentence "Couldn't unlock the device after XXXX hours" which actually means "Please unlock after XXX hours." There is some translation issue in Mi Unlock Tool.
2. After you've successfully bound your Mi Account, do not log out the approved Mi account from your phone. Otherwise, the timer will be reset and you gotta spend more time waiting again. 
3. Use another PC (64-bit) to unlock if MI Unlock Tool fails to detect your device/ unknown error. 

If you're facing "Couldn't verify, please wait a minute or two/ No Network/86012/20091 " related errors when adding Mi Account in Mi Unlock Status. File a bug report via Settings---> Feedback,  attach the screenshot of the errors and the bug log directly from your phone. Don't spam the forum with multiple threads across subforum. 
Steps to reproduce the errori. Logout your current Mi account from your phone. ii. After you removed the account, reboot your phone.iii. Then, add and bind the account again at the developer settings---> Mi Unlock Tool so that the error is reproduced.iv. Once the error message is shown, head towards dialer and dial *#*#284#*#*.  The process will take a few minutes, once the Bug Log has been generated, locate and find them in File Explorer-->Internal Storage-->MIUI-->debug_log--> Zip file with date and time. 
Why did Mi lock the bootloader for Mi devices?
Mi is an international brand now, but it's only in few countries currently, and is still in the stage of expanding its international market. So it's difficult for users from countries where Mi is not officially sold to buy Mi phones. Many users have taken the risk of buying from an unofficial reseller. But they sometimes get fake Mi phones, or Mi phones with unofficial ROM loaded with bloatware. You guys must have seen some users asking in the forum whether their Mi phones are genuine, or that they have weird ROM version installed on their new phones. This is really bad for user experience, and it might even cause property loss if some malware are installed. This situation also exists in China market.

Another problem Mi users have often encountered is that, after their Mi phones are lost or stolen, the person who got the device could easily flash a new ROM into it, and makes it almost impossible for our users to get their phones back. In the recent MIUI developer version update, we've added a feature that needs users to enter their Mi account info to use the phone after doing a full wipe. But if an ill-intentioned person knows how to use fastboot method to flash ROMs, this will not stop him/her from gaining control of the phone.

Based on the above two reasons, we've decided to lock the bootloader. We've also made changes to Mi Cloud's 'Find Device' function, and adjusted system update's verifying logic. By these combined methods, user data can be better protected, and user experience can also be improved.


What Mi devices are locked?Mi 4c, Redmi Note 3, Mi Note Pro, Redmi 3, Mi 4S, Mi 5 and Mi devices launched in the year 2016 onwards

How to check whether the bootloader is locked/unlocked?
-The unlocker tool will show the message of "Unlocked".- An "Unlocked" word will be shown when booting.- Advanced users can check the bootloader status via cmd
Flashing full ROM in unlocked bootloader will lock the bootloader again?No, the bootloader will remain unlocked unless you choose clean all and lock option during fastboot.
What do you need to know about unlocking?
First and foremost you can only unlock your own device. This means the unlocking tool you downloaded must be logged in with the same Mi account on your device. One Mi account could only unlock one device within 30 days
Isn't locking bootloader against Mi's 'geek' spirit?
Locking bootloader is aimed to provide a better user experience, which we've been trying to do the whole time. In the meantime, we've provided an unlocking tool for senior users who know their ways around flashing and tweaking their devices. 
The unlocking procedure will need Internet access to get the unlocking password. Also, the Mi Account logged in on the Mi phone and the unlocking tool needs to be the same. Otherwise, the unlocking request will be denied. This will ensure that ill-intentioned people will not get access to your personal data.

What will change after locking bootloader?- Locking bootloader will not affect normal OTA updates
- ROOT will be disabled if the user has enabled it before. Enabling ROOT will need to unlock bootloader
- Recovery mode is changed. Updating via Recovery will need to use Mi PC Suite
- Devices with locked bootloader cannot update using Miflash. Users need to unlock bootloader if they want to flash Fastboot ROMs.


The risks stated above do not fully cover changes which may be brought about by Mi Unlock. We will keep improving Mi Unlock in order to prevent the cases when unauthorized vendors unlock Mi devices to install third-party apps which worsen MIUI user experience and cannot to be deleted. Locked devices also provide you with high-quality security features, such as Find device, and other added-value services. We're sorry for any inconveniences our policies may cause. Please think twice before unlocking if you are not familiar with ROM flashing. 

Final note, if you don't know that much about Android, flashing, custom ROMs etc. It's not recommended for you to unlock the bootloader. It might cause serious damage to your device or personal data.

Q. What Is Dark Web?


A. It is the part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.

How To Access The Dark Web Guide

Step 1: Go and get yourself a good VPN (Virtual Private Network) here , use it ALL of the time, no matter if you are on TOR or not. This site herereviews the best VPN’s for use with TOR.
You should be taking your anonymity and security very seriously if you are visiting the Dark Net, especially if you are viewing any Darknet Markets.
Do not fool yourself and think that the ISP’s (Internet Service Providers) and Law Enforcement are not trying to track those who use Tor to access the Dark Web, they are, and they are good at it so don’t make it easy for them.
It should be brought to your attention that there was a recent Tor vulnerability which leaked your REAL IP address leading back to your real location. If you already have the Tor Browser then UPDATE it immediately. Vulnerabilities like these are happening more often to Tor.
VPN for Dark Web AccessBy using the simple VPN app, your darknet activities will be hidden from your ISP and government agencies as all of your internet usage will be encrypted. No one will even know you are using TOR, let alone browsing for darknet markets.
What’s even better is that the VPN will give you a fake IP address, in another country if you like, so even if Tor is compromised then the trace just leads back to somewhere else that can’t be linked to you.

The other benefit of using a VPN is to prevent hackers stealing your identity and or personal files and photos from your computer.
You need to use a good VPN that keeps NO LOGS, fast performance, preferably accepts bitcoin as payment, has a kill switch for DNS leaks, and is compatible with TOR.


Step 2: You can’t access the deepweb just using a common browser like Internet Explorer or Google Chrome. To get dark net access you will need to download the dark web browser called TOR browser bundle. Only get it from the official TOR website, never download it from anywhere else!
Now close all of your browsing windows and all apps connecting to the world wide web like Google Drive, Skype, OneDrive, iCloud etc.
Then open your VPN app and connect to another location other than where you are at, make sure to use the OpenVPN protocol as it is the most secure.
Open up your normal favorite browser and then download TOR
TOR Official Website: https://www.torproject.org/download/download.htmlTor Browser Download

Step 3: Install the TOR browser bundle on your PC or Mac. When the download is complete, double-click the downloaded file, choose the destination folder (the folder where you want to extract tor browser), and choose extract.
Step 4: Start TOR Browser. Open the folder where you extracted TOR browser and double-click “Start Tor Browser”. The TOR start page will open in a browser window (it’s actually a portable version of FireFox stripped down).
From here, you now have a good level of anonymity and security and you are able to gain access to .onion websites through your dark web browser.
tor-folder

Congratulations…

Next, you will want to visit a dark web site.
Now you have dark net access you should Click HERE to view the Darknet Market List so you can visit some of the best black market websites on the DeepWeb.











silkroad
Silk Road ( Dark web screenshot )

If you do want to check out some darknet markets then you should follow the guide for that specific market as it will show you step by step what to do to sign up, browse etc.
If you are looking for the biggest list of hidden deep web links go hereso you can find exactly what you are looking for. (some also call them dark web links). We have compiled one of the biggest lists of tested .onion sites on the dark net complete with a search function, website name, description, categories, site status and even a screenshot of the landing page so you can see if your site is online or dead.

Info graphic clarifies the concept of internet, surface web, deep web and dark web with examples and the metaphor of an ice berg.
Now we have shown you how to access the dark web we have some very important tips to share…

Bitcoin and Buying on the Dark Web:

If you are on the dark net to buy something, and most of us are, then you will need to use cryptocurrency to do so and Bitcoin is the most used cryptocurrency on the dark web.
Buying cryptocurrencies is another topic altogether, so we won’t go into it here but this site has made an easy to follow guide on buying bitcoin, but we will give you one GOLDEN tip on how to go under the radar and not have your crypto exchange account shut down and lose money.
NEVER send cryptocurrency directly from your exchange account (where you buy the coins) to a market or anywhere on the dark web, also never send coins directly from anywhere on the dark net to your exchange. They are onto this right away as they can tell where the coins came from and they WILL shut you down and you will be recorded in a list for sure.
You must send your coins from your exchange to a wallet (find out how to in the guides) then from the wallet to the dark web and vice-versa.

Hacking on the Dark Web:

There are a lot of dark web users that are hackers and there are even more users that want to become hackers. The dark web is the hacker’s playground, so if you don’t know what you are doing then you need to be extra careful and take the precautions we mention very seriously, like using a VPN, covering your webcam, using very good usernames and passwords etc.

Bonus Security Steps For the DarkNet:
cyber-security

Step 5: DO NOT change the TOR browser window size unless you like living dangerously. The FEDS have programs that can match identities on random things such and matching time online and other things with the browser window size, I shit you not. If you don’t change the size then it is the same as most other people.
Step 6: Please remember that TOR isn’t necessarily 100% anonymous, you should turn off JavaScript within the dark web browser settings to help.











tor-javascript-setting
Block Javascript in TOR Browser

Step 7: Disconnect your webcam or block the camera with some black tape. Hackers and governments have ways of getting into your computer and turning on the video and cameras.
You can have intimate images of you be used as blackmail or extortion, or even worse, used by the feds.











zuckerberg
Covered camera and mic?

Step 8: Disconnect your microphone or cover it with tape to muffle it good. The same goes for the microphone as the camera, the last thing you want is to be recorded saying incriminating things at home. It doesn’t even have to be while on the dark net. Even the Facebook creator Mark Zuckerberg does it as he knows the dangers.
Step 9: NEVER use your real name, photos, email, or even password that you have used before on the dark web. This is the fastest way to be tracked. Use an anonymous email account and aliases that have nothing to do with you that you have never used before.
Step 10: If you are using TOR on the dark web for anything other than looking at cute pictures of kittens, you should think seriously about your privacy and security. Jolly Roger has put together a comprehensive guide on how to stay safe on the deep web, view the guide here.
If you have read through this how to access the darknet guide and thought to yourself WTF? Then you are probably new to this and need a bit of background and information to get you up to speed. Please remember to share this post so everyone that wants to have a look on the Dark Web can do so and do it safely.

Want Tor to really work?

You need to change some of your habits, as some things won't work exactly as you are used to.
  1. Use Tor Browser
    Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor.
  2. Don't torrent over Tor
    Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire Tor network for everyone else.
  3. Don't enable or install browser plugins
    Tor Browser will block browser plugins such as Flash, RealPlayer, Quicktime, and others: they can be manipulated into revealing your IP address. Similarly, we do not recommend installing additional addons or plugins into Tor Browser, as these may bypass Tor or otherwise harm your anonymity and privacy.
  4. Use HTTPS versions of websites
    Tor will encrypt your traffic to and within the Tor network, but the encryption of your traffic to the final destination website depends upon on that website. To help ensure private encryption to websites, Tor Browser includes HTTPS Everywhere to force the use of HTTPS encryption with major websites that support it. However, you should still watch the browser URL bar to ensure that websites you provide sensitive information to display a blue or green URL bar button, include https:// in the URL, and display the proper expected name for the website. Also see EFF's interactive page explaining how Tor and HTTPS relate.
  5. Don't open documents downloaded through Tor while online
    Tor Browser will warn you before automatically opening documents that are handled by external applications. DO NOT IGNORE THIS WARNING. You should be very careful when downloading documents via Tor (especially DOC and PDF files, unless you use the PDF viewer that's built into Tor Browser) as these documents can contain Internet resources that will be downloaded outside of Tor by the application that opens them. This will reveal your non-Tor IP address. If you must work with DOC and/or PDF files, we strongly recommend either using a disconnected computer, downloading the free VirtualBox and using it with a virtual machine image with networking disabled, or using Tails. Under no circumstances is it safe to use BitTorrent and Tor together, however.
  6. Use bridges and/or find company
    Tor tries to prevent attackers from learning what destination websites you connect to. However, by default, it does not prevent somebody watching your Internet traffic from learning that you're using Tor. If this matters to you, you can reduce this risk by configuring Tor to use a Tor bridge relay rather than connecting directly to the public Tor network. Ultimately the best protection is a social approach: the more Tor users there are near you and the more diverse their interests, the less dangerous it will be that you are one of them. Convince other people to use Tor, too!

Dwonload Tor For PC (FREE)



Welcome to the Official website of Lucky Patcher app. You can download the latest version of Lucky Patcher from here.
lucky patcher
NameLucky Patcher
Current Version8.0.9
PriceFree
Size6.76 MB
DeveloperChelpuS
HostRampage Sayan
CategoryTools
Total Downloads1 Billion +
Rating4.8/5
RequirementAndroid 2.3+
Released OnJanuary 1, 2019

Read This Carefully Before Downloading!

Lucky Patcher is not a Malware, Virus or harmful app but Google may show you a warning. Disable “Play Protect” on Play Store to hide this warning. Many websites and pages share fake lucky patcher app. So, only share this page link on your blog or YouTube Videos. This is the Official site of Lucky Patcher app and you will always get original version from here. Many users face problems to Install Lucky Patcher app. So, we’ve created an Installer app to Install Lucky Patcher easily. You can download the installer from the button below.