What is the dark web:- You must have ever heard about SURFACE WEB, DARK WEB, and DEEP WEB but do you know what is the dark web, deep web and surface web?
basically, these three together make the internet.
SURFACE WEB
Sites, web pages, and links that we can access using search engines like Google, and Yahoo are called the surface web. Suppose I want to visit a site then I will search for it on google, google will give a list of web pages relevant to my search and I will access the desired web page. A normal internet user can access a link that is part of the surface web and one interesting thing surface web covers only 4% of the entire internet.
DEEP WEB
Suppose Google has some links that the website holder refused to index, then these links will be accessed by only those people who have these links. That's why it is called the deep web because a normal person can not access these web pages or links until he/she knows about that link.
DARK WEB
Now comes the dark web, dark web consists of those web pages, and links, that are not accessible through a normal browser. Even if you can't find these sites on Google as we normally do if we don't know how to solve a question we just use google to get the solution to that question. The dark web also consists of links that are in the deep web but unlike deep web links, you need a special browser to open these links which is the TOR browser.
Why Dark Web is used:-
As we know when we do web surfing on google or other search engines these site takes our all personal information that's why an open-source community came into existence, which says that they will give full privacy during your web surfing so they created TOR.
We use VPNs to hide our privacy from our service providers (ISPs) and websites. Also, TOR uses the VPN method to provide you privacy but In Tor, there is a bunch of VPNs instead of a single VPN. These VPNs are connected one by one.
Hackers and smugglers use the dark web to do their dirty work. Illegal activities are done on the dark web but the use of the dark web is not illegal.
How TOR works:-
Let I want to visit google.com using onion routing. There are lots of VPNs on onion routing ex:- a b c........x y z and my traffic will pass through these VPNs when my traffic reaches google then google will only know z is visiting their site, and z only knows about y and, y only knows about x and this series keeps moving on until 'a'.
That's why it is difficult to backtrack real visitors to the site and this makes you anonymous from the real world. Here you can't search normal websites and links you can only open those sites which are having '.onion' extension.
Any government body in any country can't stop these sites because these sites are hosted on a hacker's computer and they don't know where the hacker is.
Dear reader, I want to try something new on my blog that's why I need your valuable help click HERE, to give your useful opinion on this blog.
Thank you so much.
72 Comments
Im excited
ReplyDeletefor what?�� dark web?��
ReplyDeleteI really like your blog.. very nice colors & theme. Did you create this website yourself or did you hire someone to do it for you? Plz reply as I’m looking to create my own blog and would like to know where u got this from. cheers
ReplyDeleteThis comment has been removed by the author.
DeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteGenerate your own targeted business sales leads with laser precision on complete auto pilot with revolutionary CBT Web Scraper and Email Extractor Software. Scrape and extract business data from Google Maps, Google SERPs, Yellow Pages, Yelp, Facebook Business Pages, Twitter, LinkedIn and custom website lists. Download the only lead generation tool you will ever need right now. Technology
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDelete