Skip to main content

DARK WEB!! Part — 1

 

We face different types of risks, fears in our day-to-day life, it could be a fear of war, fear of crimes, fear of animals or a fear of death, but today in this blog I will be telling you another type of fear i.e. THE FEAR OF TECHNOLOGY, here come the CYBER SECURITY & DARK WEB concepts.
You should be aware of a thing that ‘The more we progress in Science and Technology the more risk factors comes into play in our lives’.

What is Deep Web?

Over the centuries, when technology became advanced, humans built machines capable of diving into the depths of the oceans. That’s how we were able to discover the remains of the RMS Titanic. The search engine crawlers do the same work as done by the explorer submarines. They dive into the internet and take note of whatever they find.

We might have found the Titanic, but there is a lot to discover in the bottomless oceans. Similar is the case of the search engine crawlers, they haven’t identified various parts of the World Wide Web, and we call it the Deep Web.

For instance, the search engines won’t be able to access the servers and websites hosting data about some government-led secret alien mission. But the deep web isn’t as mysterious as it sounds. A private network, tagged as the deep web, can be right next to your house. It’s just the internet that isn’t within reach of standard search engine crawlers. For instance, the network maintained by some paid streaming service. It is a type of deep web or hidden web. Obviously, the search engines won’t be opting for a monthly subscription to index the catalog of such websites.

What is Darknet?

Contrary to the deep web, Darknet is better known to the people. It is an encrypted network built on top of the existing internet, and specific software or tools are required to access the darknet. It is possible, conventional protocols used on the internet might not work on the darknet.

Darknet provides anonymity to the users. One such darknet is Tor or The Onion Router. You require the Tor browser to enter into the Tor’s network.

Tor can be used to visit everyday internet websites, but it also has numerous hidden websites and services which can’t be accessed on the regular internet. Tor powers them using its protocol known as Tor Hidden Service Protocol. And the websites limited to the Tor network have a special .onion address. Due to this, Tor’s darknet is also known as Onionland.

Friend-to-Friend (F2F) networks are another kind of darknet. In this case, two familiar people communicate with each other directly over the internet. They might want to share some files over a P2P connection. Such networks, not accessible by other people, can be encrypted or password protected. So, only the concerned people have the access.

Dark Web Concept

The genuine perception of Dark Web is like, it a dark place over the internet, which is still not known properly, where all kinds of crazy & wrong stuffs go on.
In this blog I will deep drive more into knowing about The concept of Dark Web, How the contents present in Dark Web is used globally, How to use Dark Web to stay safe over internet or to maintain Privacy.

So, Dark Web doesn’t always means doing wrong stuffs over Internet, but we call it Dark Web as the things or the activities performed there can not be tracked easily, it doesn’t matter about what kind of activities you do there, let it be good or bad it is very difficult to track down.
And this is the first principal why dark web exists.

Dark Web was started around 2000 and the US Government used to fund them, and its 2022 and US Government is still funding them and google.com is also one of the top 5 funders of dark web.

Concept Of Internet?

Internet was first started by The US Government, it was created to have simple conversation or share information between 2 computers, it was connected by wires as it was easy to send data packets through it, which was referred as Web 1.0.

Concept of IP address

An IP (Internet Protocol) address is a numerical label assigned to the devices connected to a computer network that uses the IP for communication.

IP address act as an identifier for a specific machine on a particular network. It also helps you to develop a virtual connection between a destination and a source. The IP address is also called IP number or internet address. It helps you to specify the technical format of the addressing and packets scheme. Most networks combine TCP with IP.

Concept Of MAC address

In order to communicate or transfer the data from one computer to another computer we need some address. In Computer Network various types of address are introduced; each works at different layer. Media Access Control Address is a physical address which works at Data Link Layer. In this article, we will discuss about addressing in DLL, which is MAC Address.

Concept Of DNS

The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like google.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.

This publicly available sites that are stored in TLD (Top Level Domain) can be called as the Clear Web, and the rest sites that are not stored in this TLD list can be considered as the dark websites, and here the journey of DARK WEB starts.

More clearly you can say that, the things that can be searched with the help of normal search engine is clear web, and all the other things that can not be searched through the normal search engine is dark web.

Browsers For Dark Web:

There are multiple ways to visit Dark web, one of the most popular method is by using the TOR Browser.
Now it’s not illegal to use TOR Browser, as you are using it to protect your identity. Tor browser, your data goes through different Tor servers (or “nodes”). The traffic is heavily encrypted — and then slowly decoded — one layer at a time at the different nodes.
This means that, whoever is trying to identify you based on your online traffic, will just stumble on the last server your data traffic passed through (a.k.a. the ‘Tor exit node’). In other words: this browser makes it impossible — or at least very difficult — to identify Tor users.

Crimes on dark web:

As already mentioned above that, any activities you do on dark web cannot be tracked, so you can do anything.
For example, you want to read a book that is banned in your country, so there are lots of forums on dark web where you will get those books, then if you got or you want to know any sensitive information about anything can be found in dark web, or even if you want to communicate to someone by keeping your identity private you can do that on dark web.

RED ROOM:
It is a crime that is live streamed on dark web, it is a room where people are tortured and murdered for an audience of viewers via the Deep Web, the viewers sometimes voting or bidding on the form of torture to be performed.
For viewing those tortures or for bidding, those viewers have to pay using Bitcoin.

Red Room

But the concept of red room is totally fake as it is not possible to live stream on dark web, because to reach dark web the browser you will be using will be passing through several nodes and will go through several encryption, therefore the latency will be very high. I am not saying that the page don’t exists the page do exists but the concept of live streaming torture or live streaming murdering is not possible.
Generally ill minded people fall in traps of those rooms, these people are made to believe that those room exists and they make huge bitcoin payments to the room owners, then after the payment is done, you can’t find that room owner again. Now if you tell me you are going to track the payment source, it is not possible, as the payment made was through bitcoin and we know crypto payments can never be tracked.
But yes it is true that child phonography takes place in dark web, not only child phonography but several other things that is not accepted normally are taking place there.

The US Govt. not only the supports of dark web, funds the dark web but is also is heavily involved in dark web, in fact the most of the forums that are present in dark web are owned and maintained by the 3 letter agencies, without you knowing about it, in fact globally there are many intelligence agencies that owns several forums in dark web, so that they can watch everything that is happening there. And based on that there was a time when the US Government shut down majority of the embassies of the US in the Middle East, because they found on dark web that there was a conversation happening ‘how to bomb those embassies’.

Stay tuned for the next part!
Make sure to follow if you are interested to know much more things related to Cyber Security.

Comments