Internet- Webs

The websites you visit every day represent just a small fraction of the whole internet. Beyond this “surface web” is the deep web, and within the deep web is the dark web. 

What is the Surface web: 

Surface web is the normal web which is visible for all users using internet. The websites in the surface web is indexed by search engines. Google is the great example of search engine. The user can open websites and gain information. But the interesting thing is that the surface web is only a 4% area of internet that the users used. The internet is a bigger place.

The surface web is also called as Lightnet or Indexed Web

What is the Deep Web:  Deep web is the secret web which is not visible for normal user. The deep web consist of a website or any page on the website which are not indexed by search engines. The user can only access it if he/she has a authorized person to access it and has any permission like (Url, username and password etc). Deep web is used to store most personal information like (Cloud storages, any organization personal data and military data etc). 

The Deep web is also called as Hidden Web or invisible Web

What is the Dark Web?

Now we can discuss about the most dangerous part of the internet which is called dark web or darknet. Dark Web is illegal to used. The all criminal activities are act upon on dark web. The criminal activities like drugs dealing, killing humans etc. The user can only access it if the user has Tor Browser. The Tor means The Onion Router. It can make a layers of many IPs and the user surf the internet anonymously. Many dark web websites are banned by Tor but the dark web is totally not cleared.

The writing of this article is only for knowledge. I don’t promote illegal activities and I am not responsible for any illegal activity.

The TOR Browser: The TOR browser is a web browser that anonymize your web traffic using the TOR network, Making it easy to protect your identity online. 


What is Tor?

The Tor project is a non-profit organization that conducts research and development into online privacy and anonymity. It is designed to stop people – including government agencies and corporations – learning your location or tracking your browsing habits.

Based on that research, it offers a technology that bounces internet users' and websites' traffic through "relays" run by thousands of volunteers around the world, making it extremely hard for anyone to identify the source of the information or the location of the user.

Its software package – the Tor browser bundle – can be downloaded and used to take advantage of that technology, with a separate version available for Android smartphones.

There are some trade-offs to make: for example, browsing using Tor is slower due to those relays, and it blocks some browser plugins like Flash and QuickTime. YouTube videos don't play by default either, although you can use the "opt-in trial" of YouTube's HTML5 site to bring them back.

Who created Tor?

The original technology behind Tor was developed by the US navy and has received about 60% of its funding from the State Department and Department of Defense, although its other backers have included digital rights lobbyist the Electronic Frontier Foundation, journalism and community body Knight Foundation and the Swedish International Development Cooperation Agency.

When it launched in 2002, the Tor project's emphasis was on protecting internet users' privacy from corporations rather than governments.

"We were increasingly concerned about all these websites - in the 2000/01 dotcom bubble, everyone was offering free services, and by free they meant 'we take all your information and sell it as many times as possible'," executive director Andrew Lewman told the Guardian in April 2012.

Who uses Tor?

The Tor project team say its users fall into four main groups:

Normal people who want to keep their internet activities private from websites and advertisers; those concerned about cyberspying; and users evading censorship in certain parts of the world.

Military professionals the US navy is still a key user.

Journalists- they are using for information gathering and information sending.

The Tor is also used by business executives, IT professionals and law enforcement officers as key users, with the latter including police needing to mask their IP addresses when working undercover online, or investigating "questionable web sites and services".

1 Comments

If you have any doubt, Questions and query please leave your comments

Previous Post Next Post