DEEP/DARK WEB

The dark web is the World Wide Web content that exists on darknetsoverlay networks which use the public Internet but which require specific software, configurations or authorization to access.[2][3] The dark web forms a small part of the deep web, the part of the Web not indexed by search engines, although sometimes the term "deep web" is confusingly used to refer specifically to the dark web.[4][5][6][7][8]
The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks like FreenetI2P, and Tor, operated by public organizations and individuals. Users of the dark web refer to the regular web as the Clearnet due to its unencrypted nature.[9] The Tor dark web may be referred to as onionland,[10] a reference to the network's top level domain suffix .onion and the traffic anonymization technique of onion routing.



I'm going to open with some background, but I'll get to instructions - pinkie swear.
"Deep web" is distinct from "dark web". The "dark web" is the encrypted network that exists between Tor servers and their clients, whereas the "deep web" is simply the content of databases and other web services that for one reason or another cannot be indexed by conventional search engines.

Here be dragons
Neither the deep web nor the dark web can be indexed, but not all that cannot be indexed is the dark web. For purposes of this question, I assume you want the dark web - that much-hyped, mysterious place that the media would have you believe is a wretched hive of scum and villainy where you'd be well-served to shoot first if you hope to survive. Activists will tell you it's our last, best hope for privacy and free speech, all alone in the night.
As with most things, the truth falls somewhere in between. But you didn't come here for analysis, you came here for instructions. Fair enough.
First of all, if you want anyone who matters to take you seriously, drop the "dark/deep web" thing. What you want to access are sites using the Tor Hidden Service Protocol. It works over regular Tor (anonymity network), but instead of having your traffic routed from your computer and through an onion-like layer of servers, it stays within the Tor network. You won't know exactly what system you're accessing unless they tell you, and they won't know who you are unless they do - or unless one of you is careless.

But given that you're the one starting out and they're the ones running hidden services, they kind of have you at a disadvantage if you screw up. Fortunately, the tales of people having their lives ruined by browsing the wrong sites and being hunted by mafiosi bent on silencing them for having witnessed a mob hit inexplicably streamed online are massively overblown. At most, you might find yourself mercilessly trolled, get pizzas ordered to your door, or if you're particularly unfortunate, get Swatted.

The simplest way to start using Tor is to download the Tor browser bundle (assuming you're on Windows). You can get it at: Tor Browser. You can find installation instructions for Tor on other operating systems on the same page.
Once it's installed and launched, the browser should connect automatically to the Tor network. From there, you can use a directory of certain hidden services to get started. Some of these directories include:

These sites may contain links to illegal services and are provided for informational purposes only. If you're scammed or get yourself into trouble, your recourse against the people you've dealt with is likely to be limited at best.
Now that you know how to get your feet wet - or dirty - you might want to check out my answer to "Is it safe to browse the deep / dark web?"
Stay safe out there.





Anonymous
Anonymous

Accessing the "Deep Web" is pretty easy.  Here it is in two easy steps:
  1. Download and install TOR Browser Bundle: https://www.torproject.org/proje...

    TOR Browser Bundle is a browser configured to use the TOR relay network, which anonymizes your connection through a distributed set of relays to prevent someone from learning your physical location and allows you to use sites which are blocked.  People use it to prevent websites from tracking their IP, or people in China use it get around the Great Firewall, for example.  The browser component is actually built using the Firefox codebase, so if you have used Firefox you will find it pretty familiar.  It comes properly configured and won't install any malware or cruft on your computer, as it is written and maintained by freedom fighters, not some large corporation.
  2. Once you have TOR installed, open up the TOR browser, and go here:

    http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page

    You'll probably want to bookmark that in your TOR browser, unless you want to type in that URL each time.

That's it.  You're there.  That's "The Abyss," a sort of "Yahoo" (in the 1999 sense) to sites and points of interest around the Deep Web.  Feel like you are discovering the internet for the first time again!

Recommended: Read one of the links listed at the top of the page, entitled "How to Exit the Matrix."



Deep Web, also known as “Deepnet,” the “Invisible Web,” the “Undernet” or the “hidden Web,” are parts of the Internet that are not considered part of the “surface web,” or the portion of the World Wide Web that is indexed by conventional search engines. Many deep web sites are not indexed because they use dynamic databases that are devoid of hyperlinks and can only be found by performing an internal search query.

According to The New York Times, computer scientist Mike Bergman is credited with coining the term “deep web” in a paper titled “The Deep Web: Surfacing Hidden Value” published in The Journal of Electronic Publishing in August of 2001. In the paper, Bergman mentions that Internet business author Dr. Jill Ellsworth coined the phrase “invisible Web” in 1994 when referring to websites that were not indexed by common search engines. The paper also estimated that at the time of publication, information on the deep Web was “400 to 550 times larger than the commonly defined World Wide Web,” or approximately 7,500 terabytes of data.

On May 29th, 2001, librarian Robert Lackie launched the website Those Dark Hiding Places as a directory for sites that assist in navigating the deep Web. On January 16th, 2002, the website for Deep Web Technologies was launched, which provides the proprietary “Explorit” client for deep web searching. On March 25th, 2003, the tech news blog Campus Technology published an article with links to resources for finding information on the deep Web. On March 9th, 2004, Salon published an article which argued that deep Web search engines have the potential to “give the electorate a powerful lens into the public record.” On June 16th, 2005, Wired reported that Yahoo’s “Search Subscription” service would allow users to search some subscription sites in the deep Web. On December 18th, 2006, the Online Education Database published an “Ultimate Guide to the Invisible Web,” providing background information and tips for navigating deep Web content. On September 25th, 2008, the DeepPeep search engine was started as a project at the University of Utah, which aimed to crawl and index every database on the Internet, including the deep Web. As of January, 2012, the search engine is not available. On February 22nd, 2009, The New York Times published an article about the challenges facing the google search engine in crawling deep Web content.

Operation Darknet:
In October 2011, a group of Anonymous hacktivists launched Operation Darknet (also known as #OpDarknet), which launched a series of distributed denial-of-service (DDoS) attacks against Lolita City, a deep Web child pornography website that is only accessible via the TOR anonymous web browser.


Freedom Hosting Network:
On August 1st, 2013, the Federal Bureau of Investigations (FBI) arrested Eric Eoin Marques, a 28-year-old Irishman who owns and operates Freedom Hosting on Tor network, on charges of distributing and promoting child abuse material online. On the following day, approximately half of Freedom Hosting’s hidden services reportedly suffered from malware attacks and taken offline, many of which were suspected to host illegal activities, including the criminal hacking site HackBB, money laundering services and a vast portion of online child pornography.

Related ConceptsTOR:
The Onion Router (TOR) is an anonymous browsing client, which allows its users to browse the Internet anonymously by separating identification and routing, thus concealing network activity from surveillance. Some websites on the deep Web can only be accessed via the TOR client.


Silk Road
The Silk Road is an online black market which can only be accessed via the TOR browsing client. Many sellers on the site specialize in trading illegal drugs for Bitcoins, a peer-to-peer digital currency.


Hidden Wiki
The Hidden Wiki is a wiki database that can only be accessed via the TOR browsing client and contains articles and links to other deep Web sites, the Silk Road, assassin markets and child pornography sites.


Bitcoins
A type of currency often used in deep Web black markets is the Bitcoin, a peer-to-peer digital currency that regulates itself according to network software, with no more than 21 million Bitcoins issued in total by 2140.



What security precautions should I heed before accessing the deep web:

  1. First and most important, ask yourself why you are accessing deep web? You know accessing the deep web is not illegal, it is the sites and the content hosted that is illegal. If you want to visit a blocked website, i.e. a website blocked by your ISP or due to your geographical region, you can just use a proxy or a vpn. If you are going there to access CP or drug sites, that believe me is not worth the risk. 
  2. Read about VPN, TOR and I2P. if you dont already know read about the differences between http and https. Depending upon whether you need anonymity or privacy or both, the solutions are different. 
  3. Under no circumstances do not reveal any information about yourself or anything that will identify you. Not even the weather in the city you live. Remember: it is always sunny in the DarkNet.
  4. Do not stream videos or use Flash or JAVA. They give away your real idendity.
  5. Disable Javascript. Must!!
  6. DOWNLOAD TOR BROWSER

Comments

Popular posts from this blog

50 Facts About ISRO That Will Make You Feel Immense Proud

Artificial Intelligence ?!