Dark web tour: A “sneak peak” into the dark web | #deepweb


The Clear Web vs. Deep Web vs. Dark Web

What is the Clear Web? 

The clear web is the surface, where we can go with our browser and everything that’s indexable by search engines. So if I click, if I go cnn.com, I’ll get to cnn.com. It’s available for everybody. It’s indexed in Google, I can search it in Google. On amazon.com everything is accessible. All the different items that are being sold, all the links are accessible from the clear web. 

What is the Deep Web?  

The Deep Web is the majority of what we call the Internet today, it’s everything that’s hidden behind some sort of login page, or anything not indexed by Google e.g. all of your email is considered Deep Web because they are behind the login page for your email account. It’s not accessible for everybody, only for a certain set of people that have credentials. It also includes domains with more exotic top level domains like.pw or.cm, which is dot Cameroon, these things are usually not indexed by Google. 

And this is where we already start seeing some “shady business. We already see some markets that are operating in the Deep Web, like credit card shops or personal information shops. There, people sell credit cards, stolen credit cards and stolen PII (personal identifiable information).  

What is the Dark Web? 

The Dark Web is a subset of the Deep Web and it’s only accessible via a special browser. Because the dark web is usually used for criminal activity, people usually use “bulletproof hosts” or “bulletproof servers”. The threat actors host their own servers with their own networks to maintain control and to reduce the potential of being traced. It’s not something that everybody can access.   

The main tool used to access the dark web, the Tor browser, was originally created by the US Navy in 2002. It was created as an anonymous communications tool for intelligence agencies to use internally. 

It was then opened up, and since then has been used by threat actors, criminals, researchers, law enforcement and so on. The network today is maintained by an organization called Tor Project. It’s a nonprofit organization that’s based in Massachusetts, and the funding is provided by donations and corporations. But, the major investor? The US government. 

How does anonymity and the Tor Browser work? 

Tor works on a random routing system, every message, every communication that you send from your endpoint, is sent and been passed along, over 7000, different routers around the world. By the time it reaches the recipient it goes through at least 50 different steps (Figure 2). It is completely randomized, and therefore creates full anonymity. 



Source link


The Clear Web vs. Deep Web vs. Dark Web

What is the Clear Web? 

The clear web is the surface, where we can go with our browser and everything that’s indexable by search engines. So if I click, if I go cnn.com, I’ll get to cnn.com. It’s available for everybody. It’s indexed in Google, I can search it in Google. On amazon.com everything is accessible. All the different items that are being sold, all the links are accessible from the clear web. 

What is the Deep Web?  

The Deep Web is the majority of what we call the Internet today, it’s everything that’s hidden behind some sort of login page, or anything not indexed by Google e.g. all of your email is considered Deep Web because they are behind the login page for your email account. It’s not accessible for everybody, only for a certain set of people that have credentials. It also includes domains with more exotic top level domains like.pw or.cm, which is dot Cameroon, these things are usually not indexed by Google. 

And this is where we already start seeing some “shady business. We already see some markets that are operating in the Deep Web, like credit card shops or personal information shops. There, people sell credit cards, stolen credit cards and stolen PII (personal identifiable information).  

What is the Dark Web? 

The Dark Web is a subset of the Deep Web and it’s only accessible via a special browser. Because the dark web is usually used for criminal activity, people usually use “bulletproof hosts” or “bulletproof servers”. The threat actors host their own servers with their own networks to maintain control and to reduce the potential of being traced. It’s not something that everybody can access.   

The main tool used to access the dark web, the Tor browser, was originally created by the US Navy in 2002. It was created as an anonymous communications tool for intelligence agencies to use internally. 

It was then opened up, and since then has been used by threat actors, criminals, researchers, law enforcement and so on. The network today is maintained by an organization called Tor Project. It’s a nonprofit organization that’s based in Massachusetts, and the funding is provided by donations and corporations. But, the major investor? The US government. 

How does anonymity and the Tor Browser work? 

Tor works on a random routing system, every message, every communication that you send from your endpoint, is sent and been passed along, over 7000, different routers around the world. By the time it reaches the recipient it goes through at least 50 different steps (Figure 2). It is completely randomized, and therefore creates full anonymity. 



Source link

——————————————————–


Click Here For The Original Source.

..........

.

.

National Cyber Security

FREE
VIEW