Friday, January 26, 2018

What is the Dark Web And Deep Web | How Do You Access It (Mysterious Guide)


dark web and deep web
Some people consider the Dark Web and Deep Web the same thing. But both of them have a lot of difference. An estimated Deep Web volume is 5 times more than the Worldwide Web we have access to. It is sometimes known as the iceberg flowing into the ocean, which is the uppermost part of the Web or Surface Web, and the Deepwater Web is part of the water.

Dark Web vs Deep Web The Deep Web is actually websites or online services that do not have access to common people. They do not even index any search engines, so they do not find any link on search engines like Google. An online database can be offered as an example of  DepWeb, in which you may have to choose some option or type Captcha to search. Since no search engines can do so, hence the data that results in selecting the option is not in the search engine handles.

 Millions of millions of web sites around the world are on which many secret services are running. The Dark Web is actually part of the Deep Web, but it is too short compared to the size of the DP.
Writing is on. Read it too


 Creating Worldwide Web Who is not familiar with Sir Tim Bernniele? The product was associated with CERN in 1980, which is the responsibility of running the world's largest chemical physics laboratory. While working in this laboratory, he presented the project called ENQUIRE in front of the concept of hyper text (linked link from one another to another).

The purpose of this project was the fast delivery of fresh information to each other for the researchers. After a few months later, after working in the syrup, Tim Bernnell employed a job employed by a private company where he got to learn about computer networks. The product was once again reconstructed in 1984 and Siran became Europe's largest computer network until 1989. Talking about this, Tim Bernnellie says,

 "I just had to consider the idea of ​​hypertext with the idea of ​​Transmission Control Protocol (TCP) and domain semi-system and consequently the Worldwide Web Was created The real reason for creating a web was frustrated because when I was working in the head, without the situation it was very difficult. Most technologies used in web-forming such as hyper text, internet, and ability to write text in multiple fonts were already made. I just had to combine them together. "

Sir Tim Burners


On August 6, 1991, Tom Bernniele's Worldwide Web brought regular scenes. Then the World Wide Web developed "tablet" at the time of coming. Millions of websites have been online in a few years. Nate started new services and life moved on a new trap. The Worldwide Web acquired a favorableity on humanity and the world switched into a computer screen. His surprises were visible around the world and for our everyday activities the Internet and especially the World Wide Web's short time went on increasing. Posts for high-speed communication were taken by emails and the main official documents that were buried in official office wardrobes, began to be digitalized.

Internet and privacy concerns David Cham had written an article titled "Security Without Identification", which was busy finalizing Tom Bernnie's Worldwide Web in 1985. In this article, he wrote in a place that "Due to computerization, people are able to monitor and control potential use of their information. Public and private institutions are already gathering personal information about people and divide them together. People have no means to know if their information is correct, old or inappropriate. They find out about it at the same time when they charge or they are denied to provide any service based on this information. "

The fear that David Cham had expressed today about three decades ago today is in the form of a terrible fact in front of us today. Google, yahoo! And companies such as Facebook keep valuable information about their customers, which are also considered to be difficult. The powerful countries have been able to make a lot of weaknesses. In the early days of the Internet and Worldwide Web, these countries had launched a spy process. But last year when the CIA 's former technical consultant Edward Snowden picked up the curtains and censorship of the secret organization, the world came into existence.

Someone did not even think that this spy work would be done on such a large scale. Atom Burnnie also saw this and looked for a law like "Great Manifesto or Magna Carta" to protect Internet users. Magna Carta is a historic law passed in 1215, in which the British emperor King John forced the public to guarantee basic freedom. This law has been guaranteed that no independent person will be arrested and imprisoned or the rights or assets will not be captured, nor will it be deported or asserted or in any other manner Will be deprived. It will be forced to be forced or sent to do so only by the people equal to that or according to the laws of the country. Legalist John John also acknowledged that his own Not by law.

October 4, 2017

As we previously mentioned, the history of the detective on the Internet is as old as the Internet itself. The U.S. government had its feeling of feelings (perhaps because they were involved in this work) that a system is needed to monitor the conversion of data on the Internet. These systems wanted to save their data and communications from the rest of the world. For this purpose, the three Naval research laboratory three employees, one of whom were mathematics and two computer scientists, presented onion routing systems. This is the middle of the 90s. The foundation of this system was the same as David Cham, in which he designed the way to avoid the electronic surveillance or monitoring / spyware of the email.


In September 2002, the project was released as TOR or The Onion Routing. But revolutionary change came when the Naval Research Laboratory in 2004 opened this project open source.

The onion routing process is very interesting. It does not have direct contact between sending and receiving data, but data is delivered to destination destination by relay computers spread across the globe, which are called node or router.It is encryptied three times before sending data or say that three layers of incubation are applied like onion chilies. This data packet is then randomly selected to the selected nodes.

This list of nodes provides a special node called "Directory Node".A layer of incubation is removed when passing through each router or node. When decrypt the node data, he finds out what the data packet needs to send it forward, but he does not know if the node had given it the data packet it was the first node or the third. After passing all three nodes, the data packet reaches the exit node, where it has been completely decrypt. From there, this data packet is delivered to its destination.In December 2006 some people jointly formed an organization called The Tor Project, which raised the TOR improvement.

 The organization was financially supported by Google, Human Rights Watch, and University of Cambridge.TOR project shake the foundations of Internet sensorship and electronic surveillance.
The government that has been aging from the east to west, has tried to close some of the Internet's doors on their convictions or spying them. Both of these tasks were not possible due to TOR. Edward Snowden's cognizant CIA's secretive instructions shows how irritable because of CIA TOR because it was not due to spying and monitoring.
Dark webThe system, which was made to protect people, was also used for a very dangerous task. The law enforcement agencies are the only source of crime on the Internet to reach the crime criminals on the internet. TOR completely removes these marks. Therefore, it is extremely difficult to reach a criminal who uses TOR.

Taking advantage of the same thing, criminals have started using TOR for crime. The part of the Internet that you need for TOR to become a crime point, calls the Dark Web.The Dark Web Worldwide Web is a whirlpool where all kinds of drugs, including herbs, heroin, can be purchased, can be kidnapped, someone can kill for the killer, fake passports can be sold, Theft cards can be purchased, all types of weapons can be purchased.

 Indeed, every crime that you can imagine, what is going on on the Dark Web.Dark Web access is not a common URL but also a special type of URL, which is the extension of .onion rather than extension like .com or .net and it is especially difficult to remember. Http://2vlqpcqpjlhmd5r2.onion. These addresses find out about underground ground and other dark websites. The search engines do not get scattered near them, so only a small number of people find them.Is.It is difficult for law enforcement agencies that anyone who has a little technical information and is aware of the use of TOR, can sit in any corner of the world in a few minutes to do their own web site and anyone There is no news from ear.

The TOR project has made this work very easy. Many other ready-to-use type tools, including TOR browsers, can be downloaded from their web site, which help users keep online identities completely confidential. These websites can not be found where they are hosted, who is running them. The limit is that the police also finds out about the websites when their crimes are increasing.
The Silk Road was a good example of the Dark Web.

 There is probably no type of drug on this website that can be purchased. This website was so popular and engaging in illegal fogs that the American FBI had to push the peak peak to close it. Shortly before, access to Silk Road servers was successful and it was closed. But only a few months later, Silk Road 2 came to normal because the Silk Road maker made its source code published on another dark website. At the time the Silk Road was closed, there were several million dollars worth of worth, which the US government occupied.



0 comments:

Post a Comment


Top