Skip to main content

Dark Web

 What does Dark Web mean?

The dark Web is comprised of websites that are visible to the public, but their IP address details are intentionally hidden. These websites can be visited by anyone on Internet, but it is not easy to find the server details on which the corresponding site is running, and it is difficult to track the one hosting the site.
The dark Web concept is achievable with the help of anonymity tools. Some popular tools are Tor and I2P. The dark Web is popular for both black market and user protection, so it has both positive and negative aspects.


The dark Web ensures one’s privacy by effectively hiding the server or IP details from the public. The dark Web requires special kinds of software to access. This software acts as a gateway to the dark Web. Once the user gains access, then all the dark websites and other services can be accessed in a simple way with help of browsers.
The dark Web includes a wide range of networks, from small, friend-to-friend/peer-to-peer networks to large, popular networks such as Freenet, I2P and Tor, operated by public organizations and individuals. Some of the categories of Web-based hidden services include:
  • Drugs
  • Fraud
  • Gambling
  • Chatting
  • Hacking
  • Hosting
  • Search
  • Anonymity
  • Whistleblower
Most dark websites are not directly accessible via a normal search made through a search engine; they effectively hide themselves. They are accessible only if the addresses of those sites are known to the user. Some methods which hide websites from normal searches are:
  • Private Web which requires registration
  • Contextual Web varies as per IP
  • Limited access content where access is limited to certain licensed contents
  • Scripted content which is accessible only through links generated by JavaScript or dynamically downloaded from Web servers
  • Non-HTML/text content
  • Software where data are intentionally hidden from the regular Internet and made accessible only with special software, such as Tor, I2P, or other darknet software
  • Web archives which are archived versions of Web pages, including websites which have become inaccessible, and are not indexed by search engines such as Google
The industries which operate over the dark Web are known as darknet markets; this includes black market sales of illegal products, to stay hidden from governments and law enforcement agencies. The dark Web is also used in other ways, like communication between whistleblowers and protecting users from attacks or surveillance to ensure privacy in communication. But the dark Web is mostly used in black markets as it promises total anonymity.

Comments

Popular posts from this blog

How Secure Are You Online

Think you do enough to secure your passwords, browsing, and networking? Prove it. Not all computer security is about tin foil hats and anonymous browsing. Everyone who uses a computer has a horse in the security race. For the purpose of this post, we're breaking down online security into four essential parts: passwords, browsers, at-home Wi-Fi and networking, and browsing on public Wi-Fi. Within those categories we'll give you a checklist of everything you should do, from the bare minimum to the tin-foil-hat best.Think you've done your due diligence with your security? Jump to any of the four sections below to see how you stack up (and boost your security where you may be lacking): Password Security Checklist Browser Security Checklist Home Network Security Checklist Public Wi-Fi Security Checklist Password Security Checklist Password security has been  popping up   a lot   in the news  recently, but how much you should care is entirely depen...

Machine Learning

Machine learning (ML) is a category of algorithm that allows software applications to become more accurate in predicting outcomes without being explicitly programmed . The basic premise of machine learning is to build algorithm that can receive input data and use statistical analysis to predict an output while updating outputs as new data becomes available . The process involved in machine learning are similar to that of data mining and predictive modeling . Both require searching through data to looks for patterns actions according . Many people are familiar with machine learning from shopping on the internet and being served ads related to their purchase . This happens because recommendation engines use machine learning to personalize online ad delivery in almost real time . Beyond personalized marketing, other common machine learning use cases include fraud detection, spam filtering, network security threat detection, predictive maintenance and building news feeds. How Ma...

How To Create a Windows 10 Recovery Drive

A Recovery Drive lets you boot your system and easily access a number of recovery and troubleshooting tools to revive a failing Windows 10 system. If you haven't done so yet, you need to create a Windows 10 Recovery Drive. That way, you'll be prepared should you encounter a problem with your Windows 10 installation. In Windows 10, you can create a Recovery Drive on a USB flash drive as well as on an optical disc. While both procedures produce the same recovery tool, they are created from different user interfaces. The USB flash drive version is created using a stand-alone tool; the optical disc is created from the Backup And Restore (Windows 7) user interface. Why Microsoft didn't unify the process under one roof, I don't know. In this article, I'll show you both ways to create a Windows 10 Recovery Drive. Caveat Regardless of whether you are creating a Recovery Drive on a USB flash drive or on an optical disc, it is important to remember that a Recovery Dri...