Episode Transcript
The dark web is where humanity's darkest secrets hide.
Illegal marketplaces, unimaginable crimes, and things society tries to erase all thrive here, often without consequence.
Some sites were short lived, some highly profitable, and some so disturbing even seasoned investigators couldn't handle them.
And the people behind them rarely ever face punishment.
And today, we're skipping the Silk Road and the stories you've heard 100 times over.
Instead, we're diving into some unknown dark web websites.
Make sure to like the video and subscribe to the channel.
And we're starting with one that is beyond disgusting, pink.
And I can't say the other word because of YouTube's guidelines.
So pink crystal, think about the Breaking Bad substance they cooked up.
So yeah, pink crystal, in 2015, the world's biggest adult content website, you know, the one, implemented a method for people to report revenge videos on their site.
From that point on, if you came across some illicit content of yourself, which I imagine is horrifying, one click will take it off the website.
But not every website is so inclined to help you.
In fact, some have made a business out of it.
Revenge videos became a prevalent problem in the early 2000s.
Before then, it wasn't unheard of.
Many people were caught sharing illicit photos of their exes.
But the difference is these incidences were isolated, often shared among close friends.
Which is gross to say, but that's like Max 20 people.
Your standard loser didn't have the resources to humiliate their acts on the macro.
But when the 2000s rolled around, people had more reach.
Social media, chat, forums, emails, cell phones and cell phone cameras.
Gone were the days of professional adult videos.
Now anyone could make one.
And worse, anyone could share it.
Not with a couple of people, but with countless thousands now.
With every bad breakup loomed the possibility that private images or videos could be leaked onto the Internet.
And I hate to say this, but there's a ton of people who couldn't care less about consent.
In fact, they enjoy non consensual exposure now.
Thankfully this stuff doesn't survive on the surface web anymore.
Most adult websites have safeguards in place to prevent it, but the dark web has no such rules.
For the purposes of this video, I can't say the actual name of the website, so we'll refer to it as Pink Breaking Bad Crystal, or Pink Crystal for short.
Pink Crystal was a website dedicated to revenge videos.
It was built in a similar way to 4 Chan, designed as an image board where users could post illicit photos.
But like we just discussed, none of these photos were posted consensually.
In fact, some of them weren't even acquired consensually.
I'm not sure of the actual details, but essentially Pink Crystal users would hack into people's accounts and steal their intimate photos.
One example is a woman named Shelby, I won't say her last name for privacy reasons, who actually sued Pink Crystal.
She was a college student at the time, living in Texas and enjoying an uneventful life, but her days of peace were about to come to an end.
According to court documents, Pink Crystal somehow gained access to Shelby's private photos, ones that had never been shared with anyone, and posted them.
When Shelby found out, she was horrified.
Obviously she contacted the administrators to take it down and they not only refused, they harassed her.
How you might ask?
Well, they had a Twitter page where they would post about people who were being exposed.
I'm not joking.
These people were demented.
They would take non consensual videos, post the links to Twitter and then tag the person's social media pages, rallying their fan base to go harass these women.
Shelby received death threats, threats of assault, and by the time she had discovered the images, it was too late.
The damage was done.
Previously, she had dreams of joining law enforcement of her own eminence.
The dream was made impossible by Pink Crystal.
To make matters worse, the lawsuit failed.
In similar cases, the defendant often receives a settlement from the people who operate the website, and those people typically receive jail time because revenge videos are criminal.
But there was a problem with Pink Crystal.
No one knew who was operating it.
To this day, no known person has ever been charged for the indecency allowed on Pink Crystal.
When an official investigation began, they tried to track down the owners when they discovered that whoever was running it was functionally untraceable.
Domain registration, admin accounts, operator records all purposefully obscured how well the host company, Cats Global Media, offered a service to register untraceable domains.
Even they couldn't figure out who these people were.
After the attempted lawsuit, Pink Crystal was under heavy scrutiny.
Before then, they operated on the surface web.
But after a public backlash, the cowards retreated to the dark web to avoid a shutdown.
Now, normally, a shutdown wouldn't matter too much.
After all, they're just sick people looking for a rush.
But Pink Crystal was different.
Pink Crystal was monetized.
Most of the time these kinds of websites run banner ads and pop ups, so even though we don't know an exact figure, we can use similar websites like Is Anyone Up to approximate their earnings?
Is Anyone Up was a similar revenge video site, the first one to ever hit the mainstream, and because of its shutdown in 2012, we know that the owner, Hunter Moore, was making $13,000 a month on ad revenue alone.
For two more years the site continued to torment its victims from the dark recesses of the Internet until 2014 when the FBI in action with Europol, successfully shut down Pink Crystal.
Over the years, the anonymous owners have attempted to relaunch the site to no avail.
Luckily, today they are permanently offline.
The Iron Troll website has archived some Twitter posts.
All of the names and links have been redacted or are inactive, but scrolling through it's easy to see how horrible this website truly was.
I can only imagine the lasting impact it had on the people who are exposed.
And unfortunately, I'm sure there are other websites just like Pink Crystal surviving today somewhere down deep in the dark web archetype market.
Now, this might just be because I'm a YouTuber or I'm chronically online, but from my perspective, everyone and their grandma knows about the Silk Road by now.
We've talked about it before on the channel, and for the few of you who haven't heard of it, the Silk Road was a website running from 2011 to 2013 that operated as an online drug marketplace.
And frankly, I'm sick of hearing about it.
I'm sick of writing about it, and I think it ties into a problem YouTube is having when it comes to dark web material.
When the Internet was new and scary, the websites hosted on untraceable browsers seem like the most horrifying things.
But as the Internet got older, and I did too, I started to notice that most of the videos talking about dark web websites were the same old, tired, recycled ones we saw ten years ago.
It's interesting to say that something like the internet's first drug dealer marketplace hidden from the surface web feels more like history to talk about than an actual story.
And personally, I don't like covering old news, so when I came across Archetype Market, done my research, I was very excited to share it all with you.
Let's start at the beginning.
A boy is living his life in Germany.
He was young when the Berlin Wall fell, five years old and grows up in the shadow of poverty it created.
He's in close contact with drugs from an early age and begins experimenting.
When I was younger, I thought I was invincible.
I thought I was smarter than everyone else, so I skillfully ignored every warning and did what I felt like every day.
Since I was a teenager, I've tried different drugs, but I have to say that alcohol was the worst drug for me.
But this is probably also due to the environment and the circumstances.
But like any young man, he wants to create something of his own.
Him and his buddies get drunk and start thinking up ideas for a website, something new, something that would bring them out of poverty.
But it never gets anywhere.
He's stuck.
Then, at the age of 20, he began his journey with hallucinogens.
When I consumed hallucinogens for the first time, I felt like someone had just given me the gift of critical thinking.
I started to question a lot of things.
Firstly, why I'm drunk almost every day.
I realized that I'm very far from what I imagined for my future when I was still a child.
As a child, I always wanted to practice a social profession and do something good for the world and for my fellow human beings.
But at that time I actually did exactly the opposite.
I showed antisocial behavior and got on everyone's bad side as best as I could.
I think that was also my ego death.
I realized and perceived many things that I did not perceive before.
After my first trip, I wanted to do it again quickly and took four more trips within a few months.
After the 4th trip I had a new self-image and didn't want to drink alcohol anymore.
I stopped drinking alcohol overnight and haven't had a drink for over a year.
I started to focus on the goals of my childhood and of course I have also set myself some new goals.
Cue the Silk Road.
The boy now man, sees the work of Ross Ulbryke, creator of the Silk Road, and is inspired.
He starts to develop his own ideology.
They believe that drugs shouldn't be illegal.
He believes that drugs in all forms aren't necessarily evil.
They aren't good, they aren't bad, they just are.
And he begins to believe that drugs shouldn't be criminalized in Europe.
After all, it's a victimless crime.
If he created a marketplace, it would be to further his political ideal that true freedom means illicit substances are legalized.
But he doesn't like the actions of Ross Ulbricht.
It was clear to our young man here that Ross was motivated by greed.
He believed that a new website could do some good, give freedom to the people and destigmatize the industry.
All of what I just described was from a German interview conducted with our young man in 2021.
He had developed an archetypal sense of manhood.
He wanted to do what he believed was his duty.
His name was Mark Hegemeister and he founded Archetype Market, the longest running online drug marketplace ever created.
Launched in 2020, Archetype Market hit the ground running, wanting to be different from the Silk Road.
Arms trafficking wasn't allowed.
No personal listings.
It was an unadulterated online store solely for drugs.
The websites had six vetted distributors covering a couple of different bases.
I won't list what drugs were sold.
I don't want YouTube to flag me, But they sold most of the popular narcotics we see today.
Mark studied the Silk Road and learned from Ross Ulbricht's mistakes.
He made sure no communications were done from personal emails, no identifying information was on the site, and everything was deeply encoded.
He implemented A cryptocurrency called Monero for transactions to keep everything totally anonymous.
Most other drug marketplaces today are taking down quickly, but because of his efforts, Archetype Markets survived for five years, which is basically unheard of in 2025.
But it wouldn't last forever.
Europe was hot on his heels.
Agencies all over the continent were on the hunt for this new drug Lord.
Ideology are not good, intentions are not.
He needed to be taken down.
The fact of the matter is, freedom or not, people die on drugs.
Hundreds of thousands of people have lost their lives to the free minded ideology Mark Hegemeister supported and unfortunately for him, he was the top marketplace on tour.
And with that exposure came his downfall.
Operation Deep Sentinel was born.
A Sentinel is a guard, a soldier whose job is to keep watch over something and keep the people safe.
Operation Deep Sentinel was a joint effort between Europol and police agencies from 44 different countries to protect the people and clean up the dark web.
And after half a decade, they finally seized the website and arrested Mark in June of 2025.
Now let's not get it twisted.
Mark was a drug dealer, plain and simple.
His actions probably resulted in deaths, countless families being damaged or destroyed, and I only wish he would have used his passion for something else because maybe he could have done the world some good.
But today, Mark is in jail awaiting trial, and Archetype Market joins the graveyard of similar marketplaces, never to return.
Welcome to video.
Of all the entries on this list, this one is the most sickening bar none.
In June of 2015, a website launches on the Tor browser and very quickly it picked up traffic.
Their service selling videos.
Many videos.
Some had been circling around the Internet for years, some were brand new.
But the owner wanted a place to keep them all, a marketplace for sharing these videos to the widest possible audience.
And as you may have guessed by now, these videos were terrifying and about children.
Now I want to say really quickly, I read the comments.
I hear you all.
And I don't want to keep saying cheese pizza.
But unfortunately, even the more respectful term you've all been recommending gets flagged by YouTube.
I know many of you have been requesting I begin using the other term, and I want to.
I want to be as respectful as possible when covering these cases.
But unfortunately YouTube doesn't like us even using those terms.
And with that said, I think stories like these are very important to talk about.
Exposing these disgusting people is one way to help combat the problem, and the only way I can do so is by using cheese pizza as the acronym.
So I'm sorry in advance.
I'm going to try to say it as scarcely as possible.
Now, most websites that host cheese pizza are small.
It's not very often we hear about one with more than a couple thousand articles of cheese pizza material, which is crazy to say.
Obviously any cheese pizza material is terrible, but a couple thousand is unfortunately the standard.
But it doesn't typically get above that because these kinds of websites garner ridiculous attention, which is disgusting to say the least.
But law enforcement puts the boot on the neck of these sites with frequency.
Just this year, there was something called Operation Grayskull, which executed in an effort to shut down 4 dark web websites that hosted cheese pizza.
In total, 18 people were arrested, receiving 300 years of jail time altogether.
The assistant attorney general, Matthew R Galetti, had this to say.
Today's announcement sends a clear warning to those who exploit and abuse young people.
You will not find a safe haven, even on the dark web.
Thanks to the relentless determination of our prosecutors and law enforcement partners, we have exposed these perpetrators for who they are, eliminated their websites, and brought justice to countless victims.
So it's very clear law enforcement wants these people arrested, and they put a lot of effort and energy into shutting down these websites quickly.
But Welcome to Video was different.
I mean, it makes Operation Grayskull look like a shoplifting case because Welcome to Video wasn't just pushing a couple of videos.
Like I said, this was designed to be a marketplace and Welcome to Video was a very successful, very insidious marketplace.
They hosted over 200,000 videos.
Yeah, you heard me correctly.
1/4 of a million videos on one website and those numbers don't turn up overnight.
No, this website was active for years and they had an unbelievable 1.2 million registered users.
I wish I were making this up.
It makes me genuinely sick to say that out loud, but unfortunately it's true.
There were 1.2 million accounts on Welcome to Video.
Just for reference, if a podcaster on Spotify had 1.2 million followers, they'd be in the top 15 most popular podcast on Spotify.
The city of Philadelphia has a population of 1.5 million.
That's how disgustingly large that number is.
In researching this video, I also discovered that this website had memberships, which is terrifying in and of itself with most of these users having the free membership and 4000 being paid members.
Sick, absolutely sick.
A lot of these videos were acquired from another side that was shut down, called AVEs Know, but the growth that Welcome to Video saw was undeniably massive.
As more users joined, they uploaded their own materials until an unfathomable 45% of its videos were unique over 100,000.
That's unheard of, and it also means that these weren't recycled videos.
The crimes were happening live, active exploitation on the macro.
When the US government became familiar with this website, Needless to say, they wanted to catch the monsters responsible.
And that's not to say other governments weren't angry as well.
This website was a global issue and it's victims spanned continents.
But the US didn't waste a second.
Homeland Security in the IRS started working to identify them.
Thankfully, the servers for Welcome to Video weren't very secure and they were able to track the IP back to a rough location.
South Korea.
Now this was a good start, but in order to pinpoint who exactly was running the website, they'd have to dig deeper.
Now, welcome to video took payments through Bitcoin.
Bitcoin, as we all know, is an anonymous currency and most people think it's untraceable, but it isn't, not really.
You see, if you try to track any cryptocurrency from the surface, it wouldn't go anywhere.
You'd be chasing a ghost.
But this is the IRS and Homeland Security we're talking about.
And they had an idea.
The blockchain, if they could follow the transactions through the blockchain, through the dark web, by surveilling suspects with less secure networks, they'd be able to pinpoint who was receiving all the money.
And in March 2018, three years after Welcome to Video was published, which is 3 years to God damn late, South Korean resident Sun Jung Wu was arrested for creating the now infamous website along with 337 other people.
Those 337 people weren't just active users.
During the investigation, they discovered that a lot of the videos were from active crimes of exploitation and each of them was arrested.
In this process, many children were saved.
Happy ending, right?
Nope, The guy is free today.
How, you might ask?
Well, when he was convicted of the crime, South Korean courts gave him an 18 month sentence for the production and distribution of cheese pizza.
That's it.
Now, the maximum sentence for cheese pizza in South Korea was five to seven years, which is still unacceptably low, but he got a lighter sentence because he needed to support his family.
I wish I was lying.
the US attempted to extradite him so we could charge him here, but South Korea refused.
When he was released after a year and some change, they charged him with fraud for gambling with the cheese pizza money, giving him another 20-4 months for a total of 42 months or 3 1/2 years in prison.
Now keep in mind, the maximum sentence at that time in South Korea was five to seven years.
That's it.
Nothing more than a slap on the wrist.
Now, if this makes you ridiculously angry, you aren't alone.
The citizens of South Korea were absolutely infuriated by how short this monster sentence was, and eventually they took it to the Supreme Court of South Korea, who later raised the maximum sentence time from five to seven years to 29 years, which, yeah, glad they changed it.
But that doesn't detract from the fact that this man is walking free today.
He can't leave his country or he'll be rearrested, but he's free.
I have nothing else to say about this website except I'm glad it's gone and I wish the other 1.2 million people involved would face some consequences.
But today it looks like that isn't going to happen.
But at least the laws got changed in South Korea, so maybe next time more people don't have to get hurt and more people like Sun Jung Woo can be properly punished.
Carter, as you all know, the United States and Russia have been strong allies for 80 years, and nothing has ever impacted their relations negatively.
If that joke wasn't obvious, here's the plain English Our governments have been at odds since before they invented sliced bread.
And when it comes to issues online, including the dark web, neither nation sees eye to eye.
And the story we're about to cover takes this conflict to a whole other level.
We're talking about Roman Selzenev.
Now, I wasn't familiar with this man either, or his website, Carter before researching this video.
So let's discuss this man's timeline, and I'll try to fill you in as best as possible.
Roman Selzenev was born in 1984, the fourth son of Valerie Selzenev, a member of Russia's Duma.
Now, the Russian Duma is essentially the country's parliament, established in 1993.
For our US listeners, it's like the House of Representatives.
The Duma is responsible for debating and passing legislation that goes into law.
So Valerie was a big deal and still is.
Not much else is known about his early life, but being the son of a powerful figure, we can imagine he had a pretty all right childhood.
And he really liked computers.
Like a lot.
There are no official records of him until 2003, when, at the young age of 19, he began his career as a multinational hacker.
At one point in time, there was a dark web website called Carter Planet, a form for selling and trading stolen information.
Today we hear about this type of crime all the time.
Servers are infiltrated, Facebook gets a day to hack, and suddenly people are getting charged $10.00 for a drink they never bought in a country they've never visited.
Now, Roman was an expert at stealing people's information.
He would hack background check websites and retrieve their data, stuff like Social Security numbers and criminal histories, and he would then sell them on Card Planet.
He was making so much money, in fact, he hired an employee.
But there wasn't a lot of business in Social Security numbers.
No, the real money was in the plastic credit card numbers.
Roman worked with his employee to develop a software that would scan the Internet for something called MSRDP Open Ports.
Essentially he was looking for weak security on administrative networks.
Think of it like trying to break into a house.
The front door has a state-of-the-art security system, but the back door has a cheap padlock.
That cheap padlock was the MSRDP open port.
He could connect to it remotely, break the lock, so to speak, and retrieve all the data without ever getting found out.
And these networks had a financial information, specifically credit card numbers.
But there were a lot of networks to cover, lots and lots of houses, and most of them only had a couple of numbers.
Roman needed a way to sift through the worthless ones and find the money, large businesses with lots of recorded numbers.
So we contacted another hacker, Bad B, and paid him to write an automated program that would look for credit card numbers across multiple networks.
With this program, Roman and his employee scoured the Internet and after a couple of days they received their first credit card dump and he sold it to Bad B for thousands.
They operated successfully for a year, stealing thousands of credit card numbers across multiple nations.
Their target businesses, banks, financial institutions eventually developed malware that could crack even more sophisticated security, and they were raking in hundreds of thousands of dollars by the end of the year.
But in 2004, the waters were getting choppy for Roman.
In Bad B, the operators of Carter Planet realized that law enforcement had caught their scent, and they shut down the website.
Left without a way to make money, Roman looked for another home to sell his stolen goods.
That's when he discovered Carter.
Carter was the functional successor to Carter Planet, but now new and improved.
It operated like the eBay of credit card theft, with hundreds of vendors and thousands of buyers selling millions of dollars worth of stolen credit cards.
If you ever watch the news and wondered where all those stolen credit card numbers were going, this was where.
A dark web criminal syndicate orchestrating multiple $1,000,000 highs across every nation on planet earth operating on Carter and Roman was a big player.
He posted ads across the website, specifically on the card dump forum.
He had a lot of money by this point and was considered one of the most trusted thieves on the site, but he had a problem.
Hacker Bad B, his long time partner and friend, was getting jealous.
Roman was making a ludicrous amount of money using a program Bad B had devised and before long their relationship began to sour.
Friendship curdled into bitter hate and an all out war began anywhere.
Roman posted his ads bad, B posted more.
They wrestled over the sale of stolen credit cards and tried to screw the other at every opportunity, talking bad about the other and their credibility.
It was a nasty drawn out battle between the two thieves and before long they were the only real players on Carter, the two master thieves fighting for the throne.
Then in 2010, Roman caught a lucky break.
Badbee was arrested on AUS warrant in France and was extradited on charges of fraud.
The battle was won, the war was over and Roman left with no competition, was the Crown Prince of credit card fraud and for four years Roman reaped the rewards.
He travelled the world, hired more employees and was richer than ever.
The smallest estimate for how much money he made is $17 million.
He stole over 2.9 million credit card numbers for a total cumulative theft of over $169 million plucked from the pockets of everyday civilians.
That's right, he was single handedly responsible for the theft of over $169 million, making him one of the most devastating thieves in modern history until 2014.
You see, the United States were made aware of Carter about two years before Bad B was arrested.
And this time they weren't watching from the back lines, they had a front row seat.
The Secret Service had infiltrated Carter and spent years following bread crumbs to catch these criminals.
They went undercover, buying credit card dumps both from Bad B and from Roman.
Eventually they were able to track down Bad B, but Roman was more difficult.
Roman was smart.
He used multiple usernames to disguise his identity online.
He wasn't Roman Salzonev, he was NCUX track 2 Bulba.
One name was literally just Tupac.
By hiding his title it made it much more difficult to pin him down.
In fact, initially they believed Roman was actually multiple people.
But Roman made some mistakes along the way.
Firstly, across all of his aliases, the pricing never changed.
This was odd.
Most vendors had different pricing to compete with the competition.
Roman and Bad B had different pricing.
Think of it like McDonald's and Burger King.
They were trying to outdo one another to sell the most of their product.
But these aliases always had the same pricing in over the years, the Secret Service tracked his writing style in communications with each of the four personas.
All of this made it abundantly clear these weren't 4 separate hackers.
It was one man operating a multimillion dollar business with very little help.
So how did they catch him?
Well, after they buy a credit card dump, they'd collect all of the institutions that had the cards saved online.
When they did this over the 10s of thousands of instances, they were able to narrow it down to a couple of institutions.
From there, it was clear this wasn't a team effort.
Again, reinforcing the theory that this was one man.
And remember when I was talking about MSRDP open ports, the cheap padlocks that Roman used to infiltrate these institutions?
Well, Roman was remotely connecting to the networks from his personal computer, and in doing so, he left behind key information, the digital version of a physical footprint.
He left behind his IP address.
Even when he used VPN's systems for obscuring his IP address, he would reuse the same systems, hosting companies, and domains, all under the same aliases.
And with this information, the Secret Service was able to get a name and a location.
Roman sells a Neff the Maldives.
In 2014, in coordination with the Maldives government, he was arrested by local Maldivian authorities and extradited to the United States, the dark web Mecca of credit card fraud.
Carter was finally shut down, and the Crown Prince of credit card fraud was finally in custody.
But the story isn't over yet.
So far we've talked about the US interest in catching Roman, but what about his home country, Russia?
Well, although the war between the two thieves was long since over, the war between the nations was just beginning.
News broke all over the world.
the United States made another arrest on a dark web kingpin and another website shut down.
The people were safe once again.
But when Russia got word they had a different story to tell, they called it an illegal kidnapping by the United States.
According to them, Roman was their concern and their citizen, so the United States had no right to imprison him without Russian due process.
They asked where Roman was being held or where he had even been arrested, and the US refused to give up the information.
The Russian government was pissed.
To them, this was an incredible disrespect.
Eventually, through the American legal system, the Department of Justice eventually revealed that Roman had been arrested in the Maldives, and this continued to exacerbate the national conflict.
You see, the Maldives doesn't have an extradition treaty with the US and still doesn't to this day.
The government of the United States negotiated with them specifically to arrest Roman and shut down his dark web enterprise, but the Russians consider this a departure from international legal norms.
However, the US was prepared to defend itself back in 2009 when they discovered Carter.
They believed Russian citizens might be involved.
So they reached out to the FSB, which is essentially Russia's FBI, and requested assistance in capturing the criminal who would later steal hundreds of millions of dollars from basically every nation on the planet.
Roman Selzanov.
But Russia denied the request.
They refused to help.
In light of this, the US stated we had no other option.
You didn't want to arrest him, so we did so for years.
He was held in the United States awaiting trial until 2016, when Roman was found guilty of wire fraud, device fraud, credit card fraud, illegal access to protected computers in the compromise of over 2 million credit cards.
He was charged with 27 years in federal prison, but he didn't spend 27 years in prison.
Don't forget, Roman's father was a Russian politician.
This wasn't some random kid.
This was the Russian equivalent of a senator's son, and they wanted him back.
Over the years, the Russian government continued to make a stink about the arrest, calling it politically motivated and unjust.
But Russia knew they had an ace in the hole.
Russia had a couple of prisoners we wanted back, among them two journalists, a handful of activists and AUS Marine named Paul Wellen.
Wellin was arrested in 2018 in Moscow and charged with espionage, a charge the United States vehemently denied.
In fact, Paul was initially told upon his arrest in Russia that he was being detained for the express purpose of a prisoner exchange.
In exchange for these prisoners, Russia wanted a couple of people, including Roman, a business fraudster, a couple of spies and the famous Russian assassin Vadim Krasikov.
In 2024, the exchange was agreed upon and Roman was released to Russia.
When he arrived by plane in Moscow, he was met by Vladimir Putin himself and to our knowledge, he now walks free and all right guys, that wraps up some unknown dark web websites.
I really enjoyed this video.
This was a little bit different than the previous dark web websites.
Like the title even says, these were unknown.
These are a little bit more obscure.
These were more unique.
So hopefully enjoyed.
If you did find this video interesting, please like the video and subscribe to the channel.
It helps more than you know.
And if you enjoyed this video, I'm sure you'll enjoy others.
So check out some other videos on the channel.
I appreciate you guys watching.
It means the world.
Thank you so much for watching and this is Snook and I'll see you next time.
Bye.
