Remember the scene in the Hollywood movie where the godfather went through a top secret network without ever meeting his pet killer face to face, or do you remember the movie 'Hacker' starring Angelina Jolie where the perpetrators committed various crimes within an unnamed network? Where would law enforcement not be able to sniff?
Apparently, these sci-fi movies on the silver screen may seem like a mess, but like the unknown network of these movies, we have a dark world of super-familiar internet.
With the advancement of information technology, the Internet has spread, and today it has become a vast ocean. In line with this, the capacity of search engines has increased. Google in particular is one of the most trusted brands in the world. Can we think of a net session without Google? Impossible!
But what is the potential of this Google?
You will be amazed to know that when you search for a topic and Google brings you millions of results, it is only 10 percent of the total information available on the Internet! In other words, Google does not know 90 percent of the total information online! He presents his results to the customer by searching only 10 percent of the elem. The remaining 90 percent will remain unknown to you forever.
According to a survey, 500 times more data is stored on the invisible web than is stored on the visible web. This visible net is actually a piece of glacier floating in the ocean and the deep web is the ocean itself!
This unknown black web is the subject of our discussion today
The Black Web can be divided into two parts, namely:
- 1. The Deep Web
- 2. The Dark Web
The Deep Web is the part of the Internet that search engines can't find, but if you know the address, you can go to this part.
And the Dark Web is that part of the Internet that you can't access in a conventional way, conventional browsers can't. To get there you need to take the help of special software.
How did this part of the Internet originate? It is impossible to say exactly.
In fact neither you nor I are alone on the internet! Your internet service provider is monitoring your every move, every download. They have your entire log and they provide it to law enforcement in case of any need. That means you have no freedom of movement!
At times, various groups on the Internet have felt the need for a system where they can conduct their activities in secret. The military, revolutionaries, hackers, and even the administration itself want a system where detectives can secretly exchange information inside themselves or bargain with criminals to get back stolen information. Moreover, there are many countries in the world where online censorship is very strict, as a result of which dissidents have to think of a system where the government cannot monitor. And this is how this unknown part originated. At the same time it has tempted those criminals who do not dare to discuss on the main net for fear of being caught.
Now the question is why search engines can't search the deep web?
This is because search engines monitor their search with a kind of virtual robot or crawler. These crawlers look at the HTML tag of the website and record the websites. Moreover, some of the sites go to the search engine to get the request. Now all the site admins who do not want their site to be found by search engines, they use the Robot Exclusion Protocol which prevents crawlers from finding or recording the sites. There are some sites that are dynamic, that is, it is possible to find the existence of such sites subject to certain conditions, but it is not possible for Crawler to do all this. There are some sites that do not have links from other sites. These are isolated sites, these also do not come in search. Moreover, search engine technology has not yet been able to leave its nest. Search engines cannot find webpages in a format other than text (such as Flash format)!
The information on the Deep Web is far superior to the information on the Surface Web. These are very well equipped and relevant. Then understand what the search engines are doing!
Now come to the funniest part of the Dark Web.
You will not be able to access all these sites with your conventional web browser. They are outside the realm of the Internet, ignoring any rules. And their addresses are so bizarre (e.g. sdjsdhsjhsuyumnsdxkxcoioiydsu67686hsjdhjd.onion) that it is very difficult for ordinary people to remember them. This part is the real invisible part of the internet. You cannot access this network without special knowledge (such as programming, networking, proxies). Another feature of this section is that they use "Pseudo Top Level Domain" instead of top level domains (e.g. com) like sites on the World Wide Web, which are second to none other than the original World Wide Web. Such domains include Bitnet, Onion, Freenet etc.
This world is the most different! Here you will find what you have never imagined in your life. Maybe you never imagined that it is possible to enter the site without a password, you will see so it is happening here every day. You will find things that can confuse your head. WikiLeaks has announced that they will release more new data this year, but you may be surprised to see that all of WikiLeaks' data has been on the Dark Web for several years now. You will see the latest editions of any book that are not available on the Surface Web due to copyright law are being exchanged here.
There is more perverted entertainment! From child pornography to various types of genital mutilation videos that are not on the Surface Web, here are the hot topics.
There are some sites that offer home delivery of all types of drugs, from marijuana to heroin. The main users of Darknet are mainly drug addicts.
There are some sites where extremist groups are teaching how to make ammunition, some sites sell readymade weapons. Weapons like rocket launchers and mortars are also available for purchase starting from 48.
During the Arab Spring, revolutionaries used to communicate on this dark web. Darkweb has a variety of mail services, chat services where you can do a lot of things anonymously.
There are more surprises! A few days ago I entered an underground site where killer rents are available for money! What terrible, not believing? I didn't either. I entered such a site and saw the killer describing himself in this way:
“You can call me Slat. I can finish your enemy in a professional way. I'm not interested in knowing your problem with him. You just give me the money and I'll finish it. Target of at least 18 will be
the target man or a girl and I do not care
I'm pregnant women, the target is no not
my target, forcing do not
target political figures or law enforcement became a member of the extra charge
and additional charges in exchange I am full story I'll be able to sort it out like a suicide or an accident.
Within four weeks of the down payment, the work will be done. An
additional ড 5,000 travel charge will be required for a target outside the United States. Once the
work is done, I'll send you a picture of the target. "
In short, you will enter a black forest where you have to think twice before taking every step. The hacking techniques you see on the Surface Web are part of the 1% of information leaked from this Dark Web. The hackers here are very scary and they have no equal in programming, beware your mail can be hacked. Moreover, there are government agents.
But the question is, how do all these network law enforcement agencies continue to work with their noses?
To understand this, we need to think a little about such a network.
One of the networks used on the Darkweb that has become quite popular on the Surface Web is the Onion Network. Onion's Pseudo-top-level-domain is. Onion. And the address of its sites is haunted! Originally built for the US Navy, this network is now the first choice of disguised net users worldwide. You can't access Onion with your browser, so you need to download Tor browser.
Tor will hide your identity, making it almost impossible for anyone to identify your location. When you enter a site with Tor, Tor will send your request to Onion Proxy via hard encryption. Onion Proxy no longer contains the data you send, it becomes an incomprehensible script.
This time Onion Proxy will be the main internet access with this data where the onion routers of the volunteer members are waiting. This data goes through encryption again at the entrance of the Onion network before entering the Onion router. Once out of the network goes through encryption once more. Encryption takes place through several routers along the way where the encryption output on each router is the same and no router knows which data is coming from which router. Finally, when the data reaches the recipient, it returns to its original position through the decryption process. This network is called onion network because of the many layers or shells.
Now even if someone is able to steal this data while manipulating it, it will not be possible to find out who is the sender or the recipient! Because the onion routers themselves do not know it. But yes, if one can monitor both ends, one can understand the location of the sender-receiver.
Because of this incomprehensible system, all these networks are always out of the reach of law enforcement. The most popular of the black markets on the Onion Network is Silkroad, which, according to Forbes, sold for 22 million last year. And here it is not traded in conventional currency, it is traded in a kind of virtual currency called Bitcoin. Microsoft, Apple products are available here at up to 70% discount.
I support such a system in the midst of so many irregularities, why? Having an open platform is really necessary. The child who creates pornography will do his job differently if he shuts down this network. Moreover, cyber terrorists are always one step ahead of law enforcement agencies. For example, we can say that Internet Protocol বের 6 came out, but the Surface Web is still in the Internet Protocol ^ 4 of that blind period. But almost all the sites in the underground are using IP ^ 6.
Since the internet is as bad as all other human creations, we have to adapt to it. And of course I would say that once in a lifetime visit the Dark Web, otherwise you will miss the taste of the ocean like a sheltered shelter in an iceberg.
But yes, don't go too far. Remember, the government has a lot of money, so they can hire thousands of talented hackers from the Dark Web if they want to keep an eye on people like you on the Dark Web.
Some tips:
- # Must turn off JavaScript, Flash, Shockwave before entering the Dark Web. These can easily destroy your Anonymity.
- # Use paid proxy service. These are used by military agencies and their service is great.
- # If your Destination Website is hacked in any way, there is a possibility of your identity being leaked. Never use your real data for anything on the Dark Web.
Remember, you are not alone in the Dark Web like the Surface Web, there are ears on the walls here too.
Post a Comment