Research Of Levels Of Web: Dark Web And Deep Web

Table of Contents

Summary

No, this is not correct. An abstract is a brief summary of a document, usually at the beginning, that gives an overview of what the document is about. A paraphrase is a restatement of a text or passage, using different words.

An opening

What is the definition of Surface Web?

What is the Deep Web?

What’s the Deep Web?

Deep Web Security: How safe is it?

What is Darkweb?

Is the Dark Web Safe?

Silk Road

AlphaBay

Hansa

The Tor Network is a system that enables online users to browse the Internet anonymously. It protects users’ privacy and data by routing their traffic through a series of encrypted relays. It also provides access to websites and services that are blocked by certain governments.

Bitcoin

In conclusion

Citing

Summary

The world is constantly evolving and globalized. This allows for information exchange amongst millions. Some documents are private while others are classified. Information Technology has long been concerned about privacy and security.

There are many strategies and innovations that can be used to accomplish this. One is to classify web into three levels. Deep web refers to the web that is not indexed in standard search engines.

There has been confusion about the difference between Deep web and dark web. Although it isn’t known how large the deep web is, it is believed to cover 96% of the internet world. This means that only 4 percent is on the surface web. The deep web is not accessible to the public. It mostly contains account and database information. Dark web is another web layer that is hidden beneath Deep web. This web can be accessed with regular browsers, unlike Deep web. Tor browser is the special tool needed to access Dark web. Tor browser is well-known for its anonymity when surfing the internet. But it’s not completely secure. There are many criminals trying to find loopholes or illegal activities in that world. Silk Road (AlphaBay), Hansa, and others were involved in criminal transactions. In order to hide their identities online, cryptocurrencies such Bitcoin were used as a substitute for normal currency transactions. However, the dark web can be used to disguise your identity. IntroductionIn the age of Globalization, Information Technology is becoming more complex and uncertain when it involves surfing the internet securely. There are two main types of web. One that users can access daily is called surface web. It is accessible by Google, Yahoo!, YouTube, and others. For privacy and security, there is another level called deep web. The deep web covers 96%, and is usually represented by the iceberg. Dark Web is the small area of the deep-web that is responsible for criminal activity and other illegal activities. Dark web is better because it allows for anonymity on the internet. Tor browser is a technology that hides the source of a request by randomly looping computers between the destination and the source. Crypto currencies like Bitcoins are used to make things more secure and difficult for law enforcement. What is Surface Web and what does it mean? Surface web refers only to information and websites that are easily found on the internet. Clearnet or Web is another name for it. It has greatly helped the globalization process. It has brought people closer together. It has also greatly contributed to the advancement of science, medicine, and education. In medicine, for example, remote medical care is possible. This allows doctors to be contacted remotely if they are unavailable. Online tutorials and support have also been a huge benefit to educators. In science, the web has also contributed to the exchange and development of new technology. There are still security issues and malicious content. While the surface web comprises only 4% internet, 96% of internet is known as deep web. This hidden web is not visible to the public. What is Deep Web and how can it be used? It’s also known by the names Dark net and Invisible web. This is where most confidential data is stored. These data can only be accessed by those with authority and authentic credentials. You can access bank details, private email addresses, public records, and classified documents. Etc. These web can be used to protect personal and secret information. It allows people and organizations to access the information they need. Deep web is an invisible part of the internet. The majority of the information can be found in the company database that has been password-protected with usernames and passwords. These information can only be accessed by authorized users. What is Deep Web? Deep Web includes protected and private information.

Your personal email accounts, such as Gmail and Yahoo, contain your email content. They are protected by usernames and passwords. Only authorized users have access to the account.

Your social media accounts’ content: For example, your Facebook account and profile. This information is restricted to authorized users.

Online Banking: Transactions and Online Banking are protected. Accounts can only be accessed by authorized persons.

Data that companies save on their private databases: data from companies can also be considered deep web, provided it isn’t shared with the public.

Information contained in academic and scientific databases is kept secret and classified by Governments and Agencies. This includes research areas.

Medical records: Medical records can be used for both research and privacy. The public can’t see the medical records for the famous.

Legal documents: To avoid the public’s interest, legal documents like case files and property records must be kept secret.

Many of the information found on deep web sites is private and may be misused. (Symantec Corporation, n.d.)

Deep Web Security: Is it Safe? Deep web, on the other hand, is well-known for its security due to the fact it is protected with authentication. The curious minds are constantly looking for loopholes. Dark Web is less secure than Deep Web. Because that is where all personal and authentic information happens. However, internet users should be aware that there are many vulnerabilities. It is easy to access your emails online and make banking transactions online. This is an example of how secure deep web can be. The deep web has many hidden documents and valuable information that attract cyber criminals. It is important to be aware that the deep net contains a lot of hidden information and documents of value. One way to protect yourself is to create strong passwords that are both long and contain special characters. Also, you can change your password regularly. The deep web is safe but it’s important to be safe online. (Symantec Corporation, n.d.)

What is Darkweb? Darkweb is a small segment of the internet. This is also known by the names Darknet and Tor Hidden Services. Tor browser, a special tool that hides your identity by faking the IP address or location, is needed to browse this kind of website. The anonymity is required to access dark web. This web is mostly used to illicit purposes and for nefarious and illegal activities, including drug trafficking, criminality and weapons. These illegal transactions are carried out using crypto currencies like Bitcoin. Silk Road and AlphaBay are some of the sites that are involved in criminal transactions. Hansa is another. Unfortunately, law enforcement has taken them down for criminal acts. The dark web isn’t just used by criminals. It also serves as a platform for activists, whistleblowers and other people whose goal is to protect their identities and pass on the truth. It is safe to surf the darkweb. These sites are often used for research purposes by researchers, students, and non-governmental organizations. You cannot use the Tor browsers for illegal purposes because there are government agents that spy on and filter them. Cyber threats are also possible because Tor servers make publishers and users completely anonymous. Here are some of the potential risks:

Viruses. There are many virus-laden websites. It is best to not download any files from a website you aren’t sure about.

Hackers. There are hacker forums on the dark internet. Hackers can be hired on the dark web to carry out illegal activities. Any time you browse the dark web, your device could be hacked.

Webcam hijacking. A website on darkweb might attempt to hack your webcam. Someone could hijack your webcam, which would allow them to view your activity through the camera lens. If you aren’t using your webcam it’s smart practice to cover it with tape or paper. (Symantec Corporation, n.d.)

Law enforcement, no matter how anonymous dark web users may appear, is always on the lookout for illegal transactions and activities. They are also successful in capturing criminals.

Silk RoadSilk Road is an online black marketplace, the first modern darknet and best-known for being a place to sell illegal drugs. It was operated under Tor as a hidden service, so online users could access it anonymously without being tracked. It was launched on February 11, 2011, after six months of development. There were initially only a few new seller accounts; sellers needed to buy an account through an auction. The seller accounts were subject to a fixed charge. In October 2013, Ross Ulbricht was detained by the Federal Bureau of Investigation. He was charged with being the Pseudonymous fonder of the website, “Dread Pirate Robert”. Silk Road 2.0 was created by Silk Road 2.0 administrators. It went live on 6/11/2013. The site was also closed down. On 6 November 2014, the “Operation Onymous”, the operators were taken into police custody. Ulbricht was convicted by eight U.S. Federal Courts in Manhattan of Silk Road related charges and sentenced to life without parole. (Wikipedia, n.d.)

AlphaBay. In July 2017, the United States and European law enforcement announced that they had taken down the largest dark web market. AlphaBay, a Tor-hidden service, was used to transact Bitcoin and Monero. Ethereum and other cryptocurrencies. It sold everything, hacking tools included. You could even find counterfeit products and dangerous chemicals. It was also used to laundering hundreds of million of dollars. Unfortunately, the Department of Justice was able to attribute Oregon and Florida’s overdose deaths to drugs purchased via AlphaBay. AlphaBay was home to 200,000 users and over 40,000 sellers. There were over 250,000 listings of drugs and toxic substances for sale. 100,000 listings for malware, hacking and guns were also found. Silk Road was home to 14,000 listings when it was seized. Alexandre Cases was arrested as the AlphaBay administrator and creator on July 5. A Canadian citizen living in Thailand committed suicide while in custody one week later. Cazes’ assets as well his wife’s were taken. They included homes, luxury cars, and even a Thai Hotel. According to Department of Justice, Cazes had millions of crypto from AlphaBay. (Kaspersky, n.d.)

HansaHansa operated an underground darknet market online that used a Tor-hidden service. It was predicted to rise in popularity after AlphaBay’s July 2017 closing. On July 20, 2017, it became clear that the site was infected by law enforcement over several weeks. However, this happened just after AlphaBay. After being tipped off by security researchers in 2016, Dutch police located the site’s real location. Police began monitoring every action on the site quickly and discovered that administrators had left behind IRC chat logs with their full names, home addresses, and other details. The administrators quickly moved the site on to another host. However, they managed to gain another break by tracking bitcoin transactions in April 2017, which allowed them to identify a new hosting company in Lithuania. Two German police officers arrested the administrators on June 20, 2017. The Dutch police then took full control of site and attempted to impersonate administrators. They planned to absorb any users that would come over from the AlphaBay shut down, and they worked in collaboration with the FBI. (Wikipedia, n.d.)

Tor NetworkTor can be installed on your computer and helps you to stay safe online. It bounces your communications around a distributed network made up of volunteers from all over the globe. This prevents anyone from monitoring your internet connection and allowing them to learn about your location. The Tor network is a collection of volunteers relays. Tor Browser, a Firefox version that addresses privacy concerns, is the preferred way to use Tor. (TOR, n.d.)

Tor stands for the Onion Router (hence the logo). It was originally a global network of servers created by the US Navy to allow anonymous internet browsing. It’s now an independent non-profit organization, whose primary goal is to study and develop online privacy software. (Klosowski, 2014)

Tor allows anonymous web surfing by using a browser tool called Tor. Tor network is made of many relay points and nodes that send encrypted data to each other. Each node decrypts the data as it passes through them. Each node only decrypts the information necessary to determine where the packet should be sent until it reaches its destination. The exit node does not know the identity of the client or server. Although Tor is not anonymous, it’s possible to identify your identity. Your identity may be exposed even though you exit the node from the Exit node. Tor has a limit on large file downloads. Because the network bounces between the relays of computers around the globe, it is slow. Tor browser allows you to navigate websites that are not blocked by search engines or that are not indexed. Tor browser is used to protect their sites from the prying eyes around the globe. Tor can also be used to conduct nefarious business and activities using Crypto currencies like Bitcoin. BitcoinBitcoin or cryptocurrency is a digital coin. It was created by Satoshi Nakamoto in 2008. Bitcoins do not exist in physical form, unlike fiat currency. Instead, bitcoins exist as code fragments in the virtual space. It hasn’t stopped people from trying to imagine how a Bitcoin might look in reality. There are many artistic renderings of bitcoins with Bs! (Bitcoin Australia, n.d.)

Bitcoin is a digital currency. It can be used in Dark Web transactions. Bitcoin’s anonymity is well-known. This is because cryptocurrency isn’t tied to Central Bank or its functions separately. It is volatile, and can fluctuate in value at any moment. The web can be divided into three levels: the surface, deep and shadow web. The surface web hosts the majority of web browsing for normal users, while the deep web stores the bulk of private files and information. The deep web encompasses most of what is not known as the dark internet. Although dark web can be used to commit criminal acts, it can also be used for legitimate and private purposes. While dark web can be used by criminals, it can also be used to hide identities and provide real information. Dark web is a brighter future for privacy rights. Bitcoin is yet another paradigm shift in how currency can be used to transact daily while keeping your privacy protected. It is important to stay safe online and be smart about the internet. Citing sources

Bitcoin is available in Australia. (n.d.). What is the definition of Bitcoin? Retrieved from Bitcoin Australia: https://bitcoin.com.au/what-is-bitcoin/

Kaspersky. (n.d.). Kaspersky For Business. Retrieved from Kaspersky: http://go.kaspersky.com/rs/802-IJN-240/images/Dark%20Web%2010172017.pdf?aliId=521973948

Klosowski T. (2014.02.22). Lifehacker. Retrieved from Lifehacker Au: https://www.lifehacker.com.au/2014/02/what-is-tor-and-should-i-use-it/

Symantec Corporation. (n.d.). Retrieved from Symantec Corporation Website: https://us.norton.com/internetsecurity-how-to-how-can-i-access-the-deep-web.html

TOR. (n.d.). Documentation. Retrieved from Tor Project: https://2019.www.torproject.org/docs/faq.html.en#WhatIsTor

Wikipedia. (n.d.). The Hansa marketplace. Retrieved from Wikipedia The Free Encyclopedia: https://en.wikipedia.org/wiki/Hansa_(market)

Wikipedia. (n.d.). An online marketplace known as Silk Road. Retrieved from Wikepedia: The Free Encyclopedia: https://en.wikipedia.org/wiki/Silk_Road_(marketplace)

Author

  • michaellang

    Michael Lang is a 33-year-old professor and blogger who is passionate about writing. He has been blogging for over 7 years and has written for various online publications. Michael is also a seasoned professor who has taught at the college level for over a decade. He is currently a professor of English at a community college in the Midwest.