The US Department of Defense developed an encrypted and anonymized network in the late ‘90s. The intention behind developing this network was to operate a secure and inaccessible network that would offer absolute protection and shielding from US Government spies. However, this project grew over time to become even more prominent. This secret network was designed to be hidden from the public and could only be accessed using special software tools. Due to the robust potential in the application of this service, some researchers identified a different value proposition that led to introducing a non-profit organization focused on privacy activists for human rights and anonymity. This was named the Tor Network.
Tor network stands for "The Onion Router." The underlying technology behind the dark web can be described as a large pool of search engine un-indexed websites that are inaccessible using a regular browser. The Tor browser, which is offered as a free download, is all that you will need to access the darknet. Other than the Tor browser’s ability to bypass the many layers of encryption that guard the exchange of information in the dark web, it is also useful in providing the necessary privacy required when surfing through the dark web.
Over time, the dark web has grown to be a massive internet space that offers absolute protection and privacy from the strict, hawk-eyed governments and surveillance groups. The anonymity feature has been exploited by whistleblowers and political activists in countries with authoritarian governments to sensitize the public, leak information, and keep the government in check. As much as this is a good thing, bad guys have also taken advantage of this anonymity feature and used it to practice illegal activities over the darknet.
The internet is subdivided into three major sections: the dark web, the deep web, and the surface web. Many of us are familiar with the surface and deep web. Whenever people talk about the dark web, it is common to hear people using the terms "deep web" and "dark web" interchangeably. This practice is, however, incorrect because those two terms are not synonymous.
The deep web comprises those web pages that the search engines cannot access upon request by the user. They are hidden from the search engine for privacy reasons, among others. However, these web pages are accessible via common browsers, and they often have password restrictions and several other authorization and validation steps before accessing them. For example, anytime you sign up or log into a specific account, you access the deep web because such web pages do not show up on regular search engine results. If I were interested in knowing your bank details or what's on your Amazon wishlist, for instance, I could go to google and google your name. Although this information is on the internet, google won't and cannot show them to me.
The surface web is the topmost layer of the internet, and it consists of the web pages that show up on search engine results. Regular websites with no password restrictions, such as Geek-Computer, are all on the surface web.
It is challenging to explain this in layman's language; therefore, I’m going to emulate Daniel Prince’s (Associate Director Security at Lancaster University) visual explanation to make this easy to understand.
Imagine the entire internet as a vast forest that extends as far as you can see. In this forest, there are well-worn paths and show how to get from point A to B. These paths will symbolize popular search engines such as Google, Bing, or Yahoo Search. These paths allow internet users to access the wood from the trees in this forest if they want to remain connected. However, aside from these paths and Google-these trees also mask your vision from seeing further.
Without the help of these paths, it is practically impossible to find anything in the forest. Well, not unless you know exactly what you are looking for and where it is. Say treasure hunt. So, the only practical way to find something in this forest is to be told where to look for it. This is precisely how the dark web works.
The dark web, just like the forest, is very good at hiding things from us. It masks both identities and actions by preventing other users from telling your location, your name, and what you are doing as well. For this reason, it is quite clear why this section of the internet is a hotbed for illegal activities.
According to Deep Web Sites Links, these are some of the most popular marketplaces on the darknet.
Often in life, we distinguish a good thing from a bad one by weighing how much good it results in as opposed to evil. Arguably, everything has both good and bad effects; we have to determine which ones do us more good than harm to accept them. For example, let's look at a gun - an excellent comparison to the Tor Browser and the Dark web. Guns can be a tool of evil and are scary to many people because of what they can do. However, if we take the time to learn what they are and use them safely, we realize their good and start to appreciate them. The darknet and Tor project are no different.
Simply put, the darknet allows its users to do what they wouldn't do in broad daylight. Surprisingly, some of these things that people hide to do are very legal and appropriate.
As mentioned earlier, the darknet and Tor project is a double-edged sword. Its advantages can be exploited to facilitate malicious activities without a trace.
There are several different procedures used to access the dark web. I will discuss the most common way, that is, using the Tor browser. Other options are available other than Tor, such as I2P, Matrix.org, Globus Secure Browser, Comodo Ice Dragon, FreeNet, and Orbot, which is Tor for Android.
Before anything, you need to connect to a VPN for security and privacy reasons. This is recommended even if you want to surf the dark web casually. After that, download and install the Tor browser from here. Using Tor over a VPN is the most popular method of accessing the dark web. Using this method, session logs such as metadata and IP addresses are not stored; your web traffic is also completely encrypted. However, it doesn't offer protection against malicious Tor exit nodes.
When you have the VPN and Tor browser all set up, fire up the Tor browser. The browser looks just like a regular browser at first sight. Here is an image of the Tor browser default homepage.
You can search for things on the darknet on the Tor browser using specific search engines like the Hidden Wiki and Grams. The Hidden Wiki will give you various .onion links to different sites on the dark web. You will get several links; some are dummy links some are true. It is a jungle in there for sure.
Other than the method described above, the dark web can also be accessed in other different ways. However, the other ways are often less secure, very complicated, and only recommended for experts who know what they are doing. Some of these methods include VPN over Tor or Surfing using Virtual Machine Software(VM).
As you try to visit the links, always remember several illegal activities have been successfully tracked by the police and arrests made. Stay safe! And don’t do anything I wouldn’t do.
People have mixed feelings regarding the darknet, and it is okay to do so. However, just like any other thing, we have to determine if it's a good or bad thing. Is it alright to use the dark web? I say, yes, it is. The darknet has demonstrated the highest level of respect for personal privacy and protection from domestic government espionage. Tor's mission to offer this level of confidentiality is noble and worth recognizing. Unfortunately, there is a price that we have to pay for this privacy. I think these negative impacts can be handled by the FBI and other law enforcement agencies worldwide, who are dedicated to overseeing the operations in the dark web.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE GEEK COMPUTER ENTITIES SHALL NOT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR PUNITIVE DAMAGES, OR ANY LOSS OF PROFITS OR REVENUES, WHETHER INCURRED DIRECTLY OR INDIRECTLY, OR ANY LOSS OF DATA, USE, GOODWILL, OR OTHER INTANGIBLE LOSSES, RESULTING FROM (i) YOUR ACCESS TO OR USE OF OR INABILTY TO ACCESS OR USE THE SITE; (ii) ANY CONDUCT OR CONTENT OF ANY THIRD PARTY ON THE SITE, INCLUDING WITHOUT LIMITATION, ANY DEFAMATORY, OFFENSIVE OR ILLEGAL CONDUCT OF OTHER USERS OR THIRD PARTIES; (iii) ANY CONTENT OBTAINED FROM THE SITE; OR (iv) UNAUTHORIZED ACCESS, USE OR ALTERATION OF YOUR TRANSMISSIONS OR CONTENT. IN NO EVENT SHALL THE AGGRESGATE LIABILITY OF THE GEEK COMPUTER ENTITIES EXCEED THE GREATER OF ONE HUNDRED U.S. DOLLARS (U.S. $100.00) OR THE AMOUNT YOU PAID GEEK COMPUTER, IF ANY, IN THE PAST SIX MONTHS FOR THE SITE GIVING RISE TO THE CLAIM. THE LIMITATIONS OF THE SUBSECTION SHALL APPLY TO ANY THEORY OF LIABILITY, WETHER BASED ON WARRANTY, CONTRACT, STATUTE, TORT (INCLUDING NEGLIGENCE) OR OTHERWISE, AND WHETHER OR NOT THE GEEK COMPUTER ENTITIES HAVE BEEN INFORMED OF THE POSSIBILITY OF ANY SUCH DAMAGE, AND EVEN IF A REMEDY SET FORTH HEREIN IS FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE.