What is the deep web ? Watch where you click!
Table of contents:
- What is the deep web ?
- Special browsers: TOR is essential
- What can we find on the Deep Web
- Virus
- Accessing the Deep Webes illegal?
- What is the difference between the Deep Web and the Dark Web?
- Why are some sites left out of search engines?
- Is it possible to break the anonymity of the Deep Web?
The Internet is made up of content teams connected to each other through a network of cables scattered throughout the world. Through this network, any machine can be reached from which its address is known. On the web, this address is a protocol called TCP / IP. The IP gives a unique number to a computer (or router) as if it were a postal code. What is the deep web?
Before answering this question, we will continue with the above. That is, instead of using numbers, the use of name servers (DNS servers) was chosen, machines that have a list with the matches between the IP and a nominal address. Thus, web browsers access name servers and all content that gives access permission.
Index of contents
What is the deep web ?
In summary, the Deep Web would be, then, everything that is available on the machines and that is not identified with a DNS, nor by the search engines.
However, the data and identity of the machine of the person accessing the Deep Web are not inviolable. People confuse Tor browser a lot with anonymous browsing. It has the objective of making it difficult to identify the IP of where one is . In theory it would be anonymous, but the navigation is not encrypted and can be tracked anyway.
Originally, the Deep Web were "invisible" sites, pages that, for whatever reason, did not appear in search engines, especially Google. They were pages that, to be found, needed the use of various search mechanisms together, in addition to additional tools and individual research tools for each site.
We recommend reading our guide for beginners in Linux.
The common internet (or "Surface", which means "Surface") is just the tip of the iceberg, that is, there is much more hidden content than what you see when you search for something in a web search engine.
Therefore, the Deep Web is not exactly recent, but it became very popular lately because of the strange things that can be found in it, such as cannibalistic forums, "human dolls", pedophilia and other things that anyone with a minimum of common sense could not google. It is for this reason that we are going to explain what it is and what we can find there.
Special browsers: TOR is essential
It is not only the TOR browser that has access to the Deep Web, but also I2P and Freenet, which are also quite popular. In addition to them, the Linux operating system is also widely used for the security it offers.
Other lesser-known options are Netsukuku, Funkfeuer, Freifunk, OneSwarm, GnuNet, Phantom, GlobaLeaks, RetroShare, Namecoin, OpenNIC, Dot-P2P, AnoNet2, Guifi, dn42, CJDNS, FreedomBox, Telex, Osiris, Omemo, Project Byzantium and Hyperboria just to name a few. TOR is most popular for allowing you to be "invisible" on the Deep Web, but even Chrome and Firefox do that.
What can we find on the Deep Web
The Deep Web itself is not bad. After all, it is mainly used for downloading series, movies, books, manuals and other kinds of "weird" information, and in the midst of all this, a lot of pornography and weird stuff. But how does it differ from the normal internet? Actually, the Deep Web is just a more advanced way of searching for things , and if you're not a normally disturbed person, you won't find anything disturbing there.
It can also host websites with personal content, pages whose owners have decided not to include in search engines for any reason, pages that never received links from other sites (because they were only shared by e-mail, for example) and also spaces for the exchange of illegal content, such as piracy. Since these sites often provide large files for download, it is not always practical to keep this content on the common internet.
The Deep Web, by providing anonymity mechanisms, is attractive to political activists, hacktivists, and cybercriminals, as well as people seeking to share content that has been censored. With police actions that brought down child sexual abuse sites from the common web, some of that content was also made available to the Deep Web.
While the Dark Web is also known for offering virtual stores of prohibited or inaccessible merchandise, including drugs (licit and illicit) and weapons.
Virus
If you are using an encryption browser and looking for things you shouldn't, what do you think is the possibility that a hacker has left their viruses to catch their victims? Soaring.
But once again, if you are not behind inappropriate content, do not fill in dubious forms, and do not download anything without making sure that the source is trustworthy, the probability of infecting your PC is low, although higher than in the common network. And, as we have said, the Deep Web has all kinds of hackers, compared to a greater part of surfers who are ordinary people, just curious.
Accessing the Deep Webes illegal?
With erroneous claims, such as that the FBI is behind the one who accesses the Deep Web or that all the content that is available there is illegal, people create taboos and a disproportionate fear with the content found on the net, which, as we said, it is much more manipulated by you than by others. Just by accessing the Deep Web, your screen fills up with somewhat strange photos? It's not like that. Each one finds what they are looking for. And if you are not looking for anything strange, you will not see anything unpleasant.
So, if you have always been curious, but very afraid, do as we teach you: download the TOR, search for something you would search for in Google and notice the difference between the results, it may not be so great.
What is the difference between the Deep Web and the Dark Web?
Based on the purest definitions, a Deep Web site does not have its content on search engines and therefore cannot be found, except where the website address is known.
The Dark Web is one of the sites that exist mainly on anonymous networks and that require appropriate programs to enter it. Facebook, for example, has a version of its service on the Dark Web. However, the primary means of access is not this. But there are other sites that exist exclusively on that Dark Web and cannot be accessed without the use of programs such as Tor, I2P and Freenet.
WE RECOMMEND YOU Chromecast is back on AmazonWhy are some sites left out of search engines?
Search engines like Google first need to find a website. This normally occurs with links. When a page that Google already knows places a link to another page, Google follows this link and goes on to include this page in its search.
We recommend reading three tricks to enter blocked websites without Proxy or VPN.
However, even if there is a link to the page, it can still be blocked by search engines. This can be done over the network (by blocking the network's IP addresses from search engines) or through the use of mechanisms offered by search websites themselves that allow a website to indicate the type of content it can be indexed.
A website can easily determine that the indexing of your pages is prohibited and, in this case, it will not appear in the most common search engines.
Is it possible to break the anonymity of the Deep Web?
Generally speaking, yes. But the techniques require certain advanced technological resources and sometimes a little luck.
One of them is getting control of a large number of intermediate systems in the network. If the number of controlled systems is large enough, the interested party can make some connection between the user and the content they access. This is a medium-term operation, since access must be controlled for a long time until the connections can be made without depending on luck.
Another means, which has been widely used by the FBI, is the installation of spyware. The police authority does this after obtaining authorization from the courts to take control of a service available on the anonymous network.
Once you can control the website, a special code is placed on the page to try to infect users with viruses and report the information to the FBI. This, however, depends on vulnerabilities in the software of the potential investigated, which may not always be easy to explore.
This technique was used on a website with images out of place, for example. The FBI was criticized for temporarily keeping the site on the air rather than immediately withdrawing it, but the US court held that the move was necessary to gather more information about the page's visitors.
We recommend reading about the 5 myths about VPN.
What do you think about the Deep Web? Have you tried to enter? If so, what have you found in it? We hope it is of your interest. If you want to know more information… there are many more details on google and do they explain everything in greater depth?
Samsung will pay you if you exchange your galaxy note 7 for a galaxy s7 or s7 edge
Solutions offered by Samsung to the battery problem of the Galaxy Note 7 that makes some terminals are exploding literally.
Are you going to buy a Chinese mobile? this interests you
The keys to buying a Chinese mobile. Find out what you should look to buy a Chinese mobile, everything you need to know to do it successfully.
Deep web, dark web and darknet: differences
Differences between Deep Web, Dark Web and Darknet. We analyze what Deep Web, Dark Web and Darknet are and what are all the differences between these concepts.