Skip to main content

DARK WEB

                                                         

TABLE OF CONTENTs:

  • > What is the dark web?
  • the history of the dark web
  • > how do get on the dark web 
  • > dark web tools and services
  • > how to access the dark web safely
  • > What's for sale on the dark web
  • > is the dark web dangerous ?
  • > is it illegal to access the dark web?
  • advantages and disadvantages of the dark web
  • Introduction:
  • The websites you visit every day represent just a small fraction of the whole internet. Beyond this “surface web” is the deep web, and within the deep web is the dark web. Find out what the dark web is and how you can access it. Then get a data-monitoring tool like Avast Breach Guard to keep your personal information safe.

What is the dark web?

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

The dark web refers to content that isn’t indexed by search engines and that requires special software or authorization to access. Dark web content lives on the darknet, a part of the internet accessible only to particular browsers or through specific network configurations.
Later, Tor’s underlying code was released under a free license, and a nonprofit called the Tor Project was formed. In 2008, the Tor Browser was released, which made it easy for anyone to get on the dark web.

The history of the dark web:

The release of Freenet in 2000 is often cited as the beginning of the dark web. The thesis project of Ian Clarke, a student at the University of Edinburgh in Scotland, the Freenet was intended as a way to anonymously communicate, exchange files, and interact online.

In 2002, the dark web grew significantly when researchers supported by the US Naval Research Laboratory built and released the Tor network. At the time, the internet was still young, and tracking people was easy while staying anonymous was not. The Tor network was created to open safe communication channels for political dissidents and American intelligence operatives around the world.

Later, Tor’s underlying code was released under a free license, and a nonprofit called the Tor Project was formed. In 2008, the Tor Browser was released, which made it easy for anyone to get on the dark web.

How to get on the dark web:

The quickest way to access the dark web is to download and install Tor Browser, which will route your traffic through the Tor network and let you access the dark web. On Tor, you can type in any URL you’d like to visit, including .onion domains on the dark web.

Deep web vs dark web:

The terms “deep web” and “dark web” are sometimes used interchangeably, but they are not the same. Deep web refers to anything on the internet that is not indexed by and, therefore, accessible via a search engine like Google. Deep web content includes anything behind a paywall or requires sign-in credentials. It also includes any content that its owners have blocked web crawlers from indexing.

Medical records, fee-based content, membership websites, and confidential corporate web pages are just a few examples of what makes up the deep web. Estimates place the size of the deep web at between 96% and 99% of the internet. Only a tiny portion of the internet is accessible through a standard web browser—generally known as the “clear web”.

Dark web tools and services: 

The Into the Web of Profit report identified 12 categories of tools or services that could present a risk in the form of a network breach or data compromise:

  • Infection or attacks, including malware, distributed denial of service (DDoS) and botnets.
  • Access, including remote access Trojans (RATs), keyloggers and exploits
  • Espionage, including services, customization and targeting
  • Support services such as tutorials
  • Credentials
  • Phishing
  • Refunds
  • Customer data
  • Operational data
  • Financial data
  • Intellectual property/trade secrets
  • Other emerging threats

Ransomware-as-a-service (RaaS) kits have been available on the dark web for several services, but those offerings have become far more dangerous with the rise of specialized criminal groups like REvil or GandGeb. These groups develop their own sophisticated malware, sometimes combined with pre-existing tools, and distribute them through "affiliates". 

The affiliates distribute the ransomware packages through the dark web. These attacks often include stealing victims' data and threatening to release it on the dark web if the ransom isn't paid. 

This business model is successful and lucrative. IBM Security X-Force, for example, reported that 29% of its ransomware engagements in 2020 involved REvil. The criminal groups that developed the malware gets a cut of the affiliates' earnings, typically between 20% and 30%. IBM estimates that REvil's profits in the past year were $81 million.

How to access the dark web safely

The safest way to get on the dark web is through the Tor network. For added safety, first connect to a VPN, then use Tor in a practice known as Tor-over-VPN. Many internet service providers (ISPs) and governments may be suspicious of Tor use, and a VPN will hide your internet activity and prevent anyone from knowing that you’re using Tor.

  1. Connect to a reliable and safe VPN.

    Conceal your IP address and encrypt your internet connection with a trustworthy VPN like Avast SecureLine VPN. Though they both provide encryption, a VPN and Tor are not the same thing. A VPN will prevent your ISP and anyone else from knowing that you're downloading and using Tor Browser.

  2. Download and install Tor Browser.

    Tor Browser is a free browser that routes your traffic through the encrypted Tor network. Download Tor Browser from the official Tor Project website, because unlicensed third-party downloads may come bundled with malware.

  3. Browse the dark web with Tor Browser.

    Tor Browser will let you access the .onion domains of the dark web. Because the dark web is largely unregulated, never visit dark websites without first confirming their authenticity.

  4. Protect your identity.

    The dark website isn’t always dangerous, but many scams do exist. When communicating or making purchases over the dark web, use encrypted and anonymous email addresses and pay with an anonymous cryptocurrency wallet.

Before accessing the dark web, install strong security software to keep your device protected.

Dark web browsers

The standard dark web browser is Tor Browser, which directs your browser traffic through the Tor network so you can reach the darknet. As your traffic passes through Tor, it’s encrypted and bounced between at least three relay points, known as nodes. This helps obscure the origin of the data (and makes it hard for anyone to find your IP address). But as a result, Tor Browser will feel much slower than a normal web browser.

Dark web search engines

Surface web search engines can’t access the dark web, but specialized dark web search engines can help you find what you’re looking for. DuckDuckGo is a popular privacy-focused search engine that doesn’t track you across the web when you use it. DuckDuckGo’s dark web search engine indexes pages on the dark web, but you’ll need to open it with Tor Browser.

Other dark web search engines include Not Evil, Torch, Haystack, and Ahmia. The subreddit r/deepweb is a good starting point for asking more experienced users about how to search the dark web and deep web for the content you want. Lastly, The Hidden Wiki is a collection of dark web links — but the links may not work and may lead to dangerous websites.

Dark websites

Dark websites can be visited only with a suitable dark web browser, and most dark web URLs are strings of seemingly random letters and numbers — nothing like the easy-to-remember web addresses on the surface web.

The Hidden Wiki is a surface website offering a collection of dark web links — but the links don’t always work, and they may not be safe. Use it to get an idea of what sort of dark websites you may be interested in visiting. But before visiting any sites on the dark web, get comprehensive cybersecurity software to protect yourself from any threats you may encounter.

What’s for sale on the dark web?

Dark web marketplaces offer a range of both legal and illicit goods. Here’s a look at several of the illegal items you can buy — with prices — courtesy of Privacy Affairss Dark Web Price Index 2021

Items on the dark web

Dark web price

Cloned Visa or MasterCard with PIN

$25

Stolen online banking login, minimum balance of $2,000

$120

Hacked Coinbase account (verified)

$610

Hacked Facebook account

$65

Forged EU passport

$4,000

Android malware, 1,000 instances

$900

DDoS attack on unprotected website

$15 (1 hour) to $1,000 (1 month)

Data breaches often show up quickly on the dark web. When data brokers get hacked, the stolen data can include compromised credit cards, social security numbers, and other data, depending on what was exposed in the breach. This is a common way for identity theft and doxing attacks to occur.

The dark web marketplaces include a variety of illegal goods, including drugs, stolen goods, body parts, stolen credentials, and more.Dark web marketplaces offer a variety of illegal goods for sale.

Is the dark web dangerous?

The dark web can certainly be dangerous — with no regulation, it’s a riskier place to hang out than the surface web. Malware and scams are scattered like landmines around the dark web. And with many unfamiliar looking sites on the dark web, it’s harder to distinguish safe websites from shady ones, and easier to fall victim. Regular dark web visitors know that it’s possible to exploit the sketchy reputation of the space and the services offered. And though some dark web marketplaces offer user reviews, not all do. Lack of regulation by authorities or other users makes it easy for cybercriminals to carry out scams.

Is it illegal to access the dark web?

The legality of accessing the dark web varies from country to country. In the US, visiting the dark web is legal, though using Tor without the safety of a VPN may draw scrutiny from your ISP as well as from the government. And while visiting the dark web may be legal, using it to engage in criminal activity is definitely not.

Advantages and Disadvantages of the Dark Web:

Advantages

The dark web helps people to maintain privacy and freely express their views. Privacy is essential for many innocent people terrorized by stalkers and other criminals. The increasing tendency of potential employers to track posts on social media can also make it difficult to engage in honest discussions publicly.

Finally, the popularity of the dark web with criminals makes it a perfect way for undercover police officers to communicate.

Disadvantages

Some people will inevitably abuse the power associated with using the dark web by making it easier to engage in criminal activity. For example, the combination of the dark web and cryptocurrencies theoretically makes it much easier to hire someone to commit certain crimes.

While the dark web promises privacy to its users, it can also be used to violate the privacy of others. Private photos, medical records, and financial information have all been stolen and shared on the dark web.

More Details;

                                    https://youtu.be/MpKM_JzvapU        

                                    https://www.youtube.com/watch?v=QrwsGAs7KTw&t=0s

                                    https://www.youtube.com/watch?v=ztYEiEc9_Xs&t=0s

                             

*****************************************************************************

Comments

Popular posts from this blog

NUMBER SYSTEM CONVERSION

NUMBER BASE CONVERSION                     In our previous section, we learned different types of number systems such as binary, decimal, octal, and hexadecimal. In this part of the tutorial, we will learn how we can change a number from one number system to another number system. As, we have four types of number systems so each one can be converted into the remaining three systems. There are the following conversions possible in Number System Binary to other Number Systems. Decimal to other Number Systems. Octal to other Number Systems. Hexadecimal to other Number Systems.                                                                                                                                                                                                                                     1.BINARY NUMBER SYSTEM CONVERSION  Number System with base value 2 is termed as Binary number system. It uses 2 digits i.e. 0 and 1 for the creation of numbers. The numbers formed using these

HEXADECIMAL NUMBER SYSTEM CONVERSION

 HEXADECIMAL NUMBER SYSTEM CONVERSION           1.HEXADECIMAL NUMBER CONVERSION Number System with base value 16 is termed as Hexadecimal Number System. It uses 16 digits for the creation of its numbers. Digits from 0-9 are taken like the digits in the decimal number system but the digits from 10-15 are  represented as A-F i.e. 10 is represented as A, 11 as B, 12 as C, 13 as D, 14 as E, and 15 as F. Hexadecimal Numbers are useful for handling memory address locations. * HEXADECIMAL NUMBER SYSTEM TO BINARY NUMBER SYSTEM; Hex numbers are represented in base 16, but the binary numbers are of base 2. Hence, to convert a hexadecimal number to a binary number, the base of that number is to be changed. Follow the steps given below: Step 1:  Convert the Hex symbols into its equivalent decimal values. Step 2:  Write each digit of the Hexadecimal number separately. Step 3:  Convert each digit into an equivalent group of four binary digits. Step 4:  Combine these groups to form the whole binary n

LOGIC GATES

  LOGIC GATES                       In digital electronics, the decision making capability of the gate circuit is called logic, and a type of logic circuit that performs a specific logical operation e.g AND or OR etc is called a gate. So, the logic gates are the type of electronic circuits that makes logical decisions, and their output depends on the preset rules. The logic gates can have multiple inputs but always has a single output. A gate is just like a switch which can be ON or OFF. The ON state represents logic 1, while the OFF state represents logic 0. A gate can not only add, subtract, count, etc but can also store the information.  The most common types of the gates;                                       In Boolean Algebra, there are three basic operations,   which are analogous to disjunction, conjunction, and negation in  propositional logic . Each of these operations has a corresponding logic gate. Apart from these there are a few other logic gates as well. AND gate   (.)