Thursday, January 17, 2019

What is Dark Web? Things You Should Know.

What is Dark Web?

Understanding The Dark Web

The Dark Web is comprised of websites that are visible to the public, but their IP address details are intentionally hidden. These websites can be visited by anyone on Internet, but it is not easy to find the server details on which the corresponding site is running, and it is difficult to track the one hosting the site. The dark web is the World Wide Web (www) content that exists on darknets, overlay networks that use the Internet but require specific software, configurations, or authorization to access.

The dark web ensures one’s privacy by effectively hiding the server or IP details from the public. The dark web requires special kinds of software to access. This software acts as a gateway to the dark web. The dark web includes a wide range of networks, from small, friend-to-friend/peer-to-peer networks to large, popular networks such as Freenet, Invisible Internet Project (
I2P) and Tor, operated by public organizations and individuals. Some of the categories of Web-based hidden services include:
  • Drugs
  • Fraud
  • Gambling
  • Chatting
  • Hacking
  • Hosting
  • Search
  • Anonymity
  • Whistle-blower
Most dark websites are not directly accessible via a normal search made through a search engine; they are hidden. They are accessible only if the addresses of those sites are known to the user. Some methods which hide websites from normal searches are:
  • Private Web which requires registration
  • Contextual Web varies as per IP
  • Limited access content where access is limited to certainly licensed contents
  • Scripted content which is accessible only through links generated by JavaScript or dynamically downloaded from Web servers
  • Non-HTML/text content
Almost all sites on the so-called “Dark Web” hide their identity using the Tor encryption tool. You may know Tor for its ability to hide your identity and activity. You can use Tor to spoof your location so it appears you're in a different country to where you're really located, making it much like using a VPN Service. Indeed, it multiplies the effect. To visit a site on the Dark Web that is using Tor encryption, the web user needs to be using the Tor browser. Just as the end user's IP address is bounced through several layers of encryption to appear to be at another IP address on the Tor network, so is that of the website.

The Internet is divided into 3 parts:

Dark Web

Surface Web

When you are trying to access something from search engines, it is called the Surface web. The Surface Web is the portion of the World Wide Web (WWW) that is readily available to the general public and searchable with standard web search engines. It is a normal web which is visible for all users using the internet. It is the opposite of the deep web, the part of the web not indexed by a Search Engine. Surface Web is made up of static and fixed pages, whereas Deep Web is made up of dynamic pages. Static pages do not depend on a database for their content. They reside on a server waiting to be retrieved and are basically HTML files whose content never changes. Any changes are made directly to the HTML code and the new version of the page is uploaded to the server.

Deep Web

The Deep Web refers to any website that cannot be readily accessed through any conventional search engine such as Google, Bing or Yahoo! Search. The reason for this is because the content has not been indexed by the search engine in question. Indexing is best explained through contemporary search engine Google and its robust, high-performance system of indexing. Google’s indexing methods rely largely on a process referred to as “crawling,” which is akin to a virtual spider crawling among the multitude of pages on a website that is readily accessed by clicked links. When one can access or want to fetch some information which isn’t available at search engines but at some specific locations which can be visited with some sort of authentication based passwords or anything else although stored as cloud storage like Google Drive, Dropbox etc. are known as Deep web. The hidden world of the Deep Web contains a plethora of data, information, and a wealth of possibilities, including but not limited to the following:
  • The internal sites of major companies, associations, and trade organizations
  • The school, college, and university intranet systems
  • Access to online databases
  • Password-protected websites with members-only access
  • An individual’s personal account for social media, email, banking, and more

It is worth noting that the Deep Web is not always illegal and there are plenty of activities taking place that are entirely within the context of the law. Activities such as those listed below are commonplace on the Deep Web, with a membership often comprised of in-the-know internet users well-versed in accessing the Deep Web

Also read: Understanding IoT

Dark Web

Dark web is the subset of this deep web. Accessing the Dark Web requires a certain degree of savvy internet prowess, with a required list of steps that must be taken to not only enter this enshrouded world while maintaining the utmost privacy. The Dark Web remains incredibly attractive to internet users for a wide range of reasons. The enshrouded nature and complex methodology required to access this world have effectively made it a secret world, full of salacious activity, black markets, sights, and perks limited to a select few. The share of info on the Internet is 1:24 for surface and deep web.
Listed below is a sampling of the many things to be found using Dark Web links:
  • Credit Card Numbers
  • Marijuana
  • Fake passports
  • Stolen/Hacked Accounts
  • Bitcoin/Lottery Tickets
  • Fake Coupons
    • Ricin and Other Poisons
    • Drug/Narcotics
    • Uranium

How to access Dark Web?

Tor Browser

Tor is software that provides individuals with the ability to communicate anonymously. The name Tor is actually an acronym derived from its original namesake: “The Onion Router.” Users herald Tor browsers as the ultimate means to travel through the expansive internet anonymously. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consists of more than 7000s relays. Tor doesn’t prevent an online service from determining when it is being accessed through Tor. Tor protects a user’s privacy but doesn’t hide the fact that someone is using Tor.

I2P is an anonymous overlay network – a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. I2P is used by many people who care about their privacy; activists, oppressed people, journalists, and whistle-blowers, as wells as the average person. 

Is Dark Web legal? 

Till the time there are no provisions and norms enacted in this country so you are free to use Dark Web. But before using one should check its track record. The history says that it has specifically used for black markets like drugs and other instruments or tool which are illegal in the market. Still, some of the sophisticated agencies are using it for their organizational purposes like the New York Times. The dark web was specially created for the US NAVY. All these details will help any user to understand what kind of step should be taken in order to move further with Dark web.

No comments:
Write comments

Featured Post

WhatsApp New Privacy Polices Explained - Updated

WhatsApp New Privacy Policy & Its Issues There is a constant tussle going around data privacy. The data fiduciaries and soc...