Skip to main content

DARKNET AND TOR (PART-I)

WHAT IS DARKNET?


Search engines like GOOGLE and BING generally returns millions of pages even for the simplest of keywords typed. This part of internet is the visible part. But there exists, within the countless websites, an Internet that is beyond the scope of normal search engines and general browsing, this is called Darknet, Deepnet, Invisible Web or Hidden Internet.

The websites on Darknet are anonymous i.e you cannot tell who is the owner of the website when visiting them. Websites on the Darknet are accessed through the TOR(The Onion Router) Network. The basic concept behind TOR Network is to include so many nodes that it is virtually impossible to trace where the data is going or where is it coming from.

Darknet webpages have the domain name .onion which is different from normal domain names which is the reason that these webpages cannot be accessed through normal web browsers. These domain names are created by Onion when you host your anonymous websites using the Onion or TOR Network. Thus, the DNS servers do not have a clue of what they are and you will get a site not found error if you try to access one of the websites on the Darknet through normal web browsers. Only the Onion servers know how to resolve these domain names.


Who uses Darknet? Is it Dangerous? Should I use it?

Journalists who want to work without the possibility of getting jailed for speaking out the truth or whistleblowers who want to expose the truth without the fear of getting caught use this network.
People who sell banned drugs and weed, Assassins offering their services, Hackers.


Most commonly the darknet is used by Hackers and criminals to hide their real identity from the government. You will find all sorts of material on the darknet from child pornography to hackers for hire, live torture sessions to illegal drug markets, assassins for hire, illegal ammunation markets, illegal passports and visa markets, illegal credit cards etc, this is why the darknet is considered dangerous.

On the other hand there are a lot of forums and online communities where you can learn more and more by asking and posting anonymous questions and there is a possibility of your query being resolved by anonymous people. As long as you surf normally on the Darknet without opening any sort of malicious link or any sort of illegal purchasing market you are safe on Darknet.

If you are a type of person who doesn't want the government to know what your are surfing on the internet, Darknet is for you, if you are a privacy conscious person this is it for you. But remember anonymity cannot be confused with security. Not saying that Tor(The network through which the Darknet is accessed) is not secure, it's just that you have to be smart while using the Darknet.

It is recommended not to use the Darknet until and unless you know how to use it properly and safely. Because one bad move can put you in trouble. Be cautious of what you open and surf on the Darknet.

What is TOR? How does TOR Work?


TOR is an Internet networking protocol designed to anonymize the data relayed across it. Using the Tor Network will make it difficult if not impossible for government and hackers to see what you are doing on the internet. They also won't be able to tell which country you are in by analyzing your data traffic which is a benefit for jounalists, whistleblowers and business people.


The TOR Network runs through the computer servers of thousands of volunteers spread throughout the world. Then, the unlike case with normal internet connections, Tor strips away the packet's header, which is a part of the addressing information that could be used to learn things about the sender such as operating system from which the message was sent. 


Finally, Tor encrypts the rest of the addressing information and it is then routed through many of these servers, called relays, on the way to it's destination.


The basic concept behind TOR Network is to include so many nodes that it is virtually impossible to trace where the data is going or where is it coming from.





How can I access the Darknet?


Darknet can be accessed through the TOR Network. You can visit torproject.org  to download the official TOR browser. Just follow throught the installation steps to setup the browser and you are good to go.


Who owns TOR?

The U.S. Naval Research Laboratory sponsored the development of onion routing in the 1990s, and Tor itself was developed by Navy and independent researchers in 2002.
Today, Tor's original creators continue to support and update the protocol under the Tor Project, an independent, nonprofit organisation that is partly funded by various arms of the U.S. government.
The Tor protocol is open-source, meaning anyone can view the code and incorporate it into their own software. The Tor protocol and its implementation in the Tor Browser Bundle have also been extensively peer reviewed, which means that many researchers have examined them to make sure they offer the strongest possible security.



In the PART-II post I will be discussing about how to use the darknet securely and do's and don'ts while using the TOR network.





Comments

Popular posts from this blog

Darknet and TOR (Part-II)

As I explained in the previous post, dark web is a deep ocean of webpages and resources containing all sorts of information and stuff. You can nearly find anything and everything there, but sometimes people come across stuff they shouldn't be seeing or using and that's what makes it imperative to use the dark web in a safe manner so that you don't harm yourself and your computer network. As I already explained that dark web is a place of resources but along with that you have to be very careful while using it and one should definitely follow some of the recommended security measures so as to ensure data safety and integrity. Normally people are way too careless while using the darkweb and don't keep in mind certain things that they are not supposed to do and end up compromising their computers. One has to keep in mind that along with normal and good people there are always hackers and hacker groups sitting on darkweb trying to exploit any vulnerable machine they ca

What is a VPN? Why you should use one? What are the best VPN options out there?

What is a VPN? A Virtual Private Network (VPN) allows the user to extend a private network over a public network thus allowing the users to send and receive data securely even on unsecured public connections. VPN basically creates a tunnel between the user and the internet through which all the data is sent and received, thereby encrypting the data. Why you should start using one? It secures your computer’s internet connection to guarantee that all of the data you are sending and receiving is encrypted and secured from prying eyes.       2. It gives the user complete privacy by hiding their real IP address.      3. Some VPN services also provide DNS leakage protection which is actually one very good security feature to go for.     4. It helps the user to  bypass Regional Restrictions on data, for example the user can watch netflix content of some other nation or he/she can open a website which he/she earlier was unable to.    5. It keeps the use