News

Dark web revealed – how the Internet’s dark twin fuels cybercrime and strengthens digital privacy

Share on facebook
Share on twitter
Share on linkedin
Share on pinterest
Share on telegram
Share on email
Share on reddit
Share on whatsapp
Share on telegram


The dark web is often portrayed as a haven for criminals – and although the image is dramatized, there is some truth to it.

The dark web is the part of the internet that is not indexed by search engines. It can only be accessed using a special browser called Tor, short for The Onion Router.

The dark web has long been the subject of rumors and horror stories, but it has an unexpected history with ties to the United States government

7

The dark web has long been the subject of rumors and horror stories, but it has an unexpected history with ties to the United States governmentCredit: Alamy

Unlike publicly accessible websites that end in .com and .org, domains on Tor end in .onion.

While you can access so-called clearnet sites on Tor, connecting an onion site to Chrome or Safari will not return results.

Tor works by routing Internet traffic through a series of volunteer-operated servers, known as relays, which scramble the data multiple times.

This process creates layers of encryption – hence the “onion” metaphor.

READ MORE ON THE DARK WEB

Each relay decrypts a single layer, revealing only the next destination and not the full routing path, thus ensuring anonymity.

Tor was released to the public as an open source project in October 2002. By the end of 2003, the network had about a dozen volunteer nodes – and it only grew from there.

The software is now maintained by the Tor Project, a non-profit organization whose mission is rooted in the values ​​of online freedom and security.

Although the dark web is commonly described as a lawless land, the United States government has always maintained some sort of browser presence.

To give you an idea of ​​the depth of this involvement, the US military was actually involved in the early days of Tor.

The network was originally designed for the United States Naval Research Laboratory in the mid-1990s.

Inside the Dark Web – what is it and who uses it?

The goal was to protect the online communications of U.S. intelligence agencies and military personnel by providing them with a way to transmit sensitive information without revealing their location or identity.

Dark web sites are as diverse as those on the clearnet, but some rumors are rooted in truth.

In addition to highly publicized drug markets, Tor has emerged as a place for hackers to buy and sell stolen information.

In May, a group called ShinyHunters claimed responsibility for a TicketMaster hack that exposed private data of more than 500 million account holders.

ShinyHunters attempted to sell this information for $500,000 on a shady website called BreachForums, which has disappeared and resurfaced several times.

While it’s unclear whether the group made the sale before the site was taken offline again, the breach reaffirmed how clearnet’s dark twin is more than just a fantasy.

The 'hidden' part of the internet can only be accessed through a browser called Tor, or The Onion Router. Tor is currently overseen by The Tor Project, a non-profit organization

7

The ‘hidden’ part of the internet can only be accessed through a browser called Tor, or The Onion Router. Tor is currently overseen by The Tor Project, a non-profit organizationCredit: The Tor Project

Historically, criminals have favored the dark web for its anonymity – but that also makes it a valuable privacy tool.

For example, Tor can help civilians escape mass surveillance. Sites banned in certain countries have .onion equivalents, including Facebook and outlets like the BBC and The New York Times.

Russia has been trying to cut off access to the network for years and successfully blocked the main Tor Project website in 2021.

In China, civilians are at the mercy of the Great Firewall, which blocks access to certain foreign websites.

While Tor itself is not illegal in the country, virtual private networks are – and authorities could argue that they serve the same purpose.

Although much of its image has been dramatized, the dark web serves as a hiding place for criminals looking to buy and sell stolen private information.

7

Although much of its image has been dramatized, the dark web serves as a hiding place for criminals looking to buy and sell stolen private information.

In addition to ensuring personal safety, the dark web is also a place where whistleblowers can safely share tips with journalists.

WikiLeaks is perhaps the best-known whistleblower organization on the dark web.

While the group has faced much controversy, it has also exposed human rights violations at the hands of governments.

This includes leaks about US military action in Afghanistan and Iraq and a helicopter attack in Baghdad in 2010 that killed two Reuters journalists.

Using the dark web to anonymously broadcast tips proved so effective that the CIA unveiled its own onion website in May 2019.

The dark web is more than just a criminal underworld, but a powerful privacy tool that helps civilians bypass surveillance and restrictions on their online activities.

7

The dark web is more than just a criminal underworld, but a powerful privacy tool that helps civilians bypass surveillance and restrictions on their online activities.Credit: Getty

It’s important to note that the dark web is not a lawless land either. There has been an increased police presence on Tor in recent years

Authorities often create “honeypots,” or seemingly legitimate websites, designed to catch offenders.

Many websites that offer illicit content are actually supervised by members of law enforcement who have assumed the identity of the website operators.

Many of the biggest drug markets – AlphaBay, Empire Market, White House Market and others – have fallen over the past decade.

One of the most famous websites, Silk Road, was closed by the FBI in 2013.

Creator and operator Ross Ulbricht was slapped with multiple charges, including conspiracy to commit money laundering, conspiracy to commit computer hacking, and conspiracy to traffic narcotics.

Ulbricht, who operated under the alias “Dread Pirate Roberts,” was found guilty of all charges in February 2015 and sentenced to life in prison without the possibility of parole.

One of the most notorious drug markets, Silk Road, was created by Ross Ulbright, aka "Feared Pirate Roberts," who has since been sentenced to life imprisonment

7

One of the most notorious drug markets, Silk Road, was created by Ross Ulbright, also known as “Dread Pirate Roberts,” who has since been sentenced to life in prison.Credit: Reuters

The Silk Road shutdown only galvanized law supervision to go after other sites with equal enthusiasm.

White hat hackers and IT professionals have noticed an increase police presence on the network in recent years.

Cybersecurity expert John Hammond has spent much of his time on the dark web.

“I think it’s still used for government tracking or investigative opportunities, using that legal lens to see what criminals are doing,” Hammond told The US Sun.

“I see that a lot of it is fraud, or hoaxes, or things that influence primal instinct or human desires.”

Hammond noted that child exploitation sites are in full swing, although he does his best to “stay away from them” while looking for data leaks.

Although now available to the public, Tor was created for the US Naval Research Laboratory to encrypt sensitive communications

7

Although now available to the public, Tor was created for the US Naval Research Laboratory to encrypt confidential communications

“Ransomware actors will attempt to publish any data stolen from a company they hacked or a business they breached,” Hammond explained.

“They use this to stake their claims – hey, we hacked these people and this is how they’re getting back at us for them not paying us X million Bitcoins or something.”

The cybersecurity researcher recalled the time he found a passport “of a real person, with their photo” – and it was this experience that made the issue “come to life” for him.

“That’s not very scary, but it kind of made me clear, like, yeah, this could be very real,” Hammond said.

Cybersecurity expert John Hammond says search engine results provide clues about what people are looking for, including illicit content such as live-streamed torture.

7

Cybersecurity expert John Hammond says search engine results provide clues about what people are looking for, including illicit content such as live-streamed torture.Credit: JOHN HAMMOND

He noted that some of the more extreme rumors about the dark web could be true, based on users’ search behavior.

“Maybe I’m pessimistic, but I feel like people really like horror stories,” Hammond said.

“Historically, among the Silk Road and many other dark and scary things, it had an aspect of reality.

“Seeing search engine results about live-streamed torture – it’s amazing to know that this could exist.

How to protect yourself from cyber attacks

Here’s what Mackenzie Tatananniscience and technology reporter for The US Sun, has this to say:

It’s important to keep security in mind whenever you browse the internet or log into your devices. Just because you have nothing to hide doesn’t mean you want strangers spying on your activity. (Yes, this includes your Internet service providers!)

I’m a big proponent of VPNs, or virtual private networks, which encrypt (or “scramble”) your data to make it nearly impossible to intercept.

I’m also a big fan of the Tor Browser, although I understand it’s not for everyone and can be difficult to navigate for first-time users. (I admit it’s not very practical either, considering most sites are not indexed on the dark web.)

I find some NSA tips extremely helpful and follow them personally. For example, the agency recommends installing a minimum number of apps and only those from official app stores.

In addition to saving phone storage, this is an effective security measure – most, if not all, apps will track you. While no one is truly defenseless against a bad actor, there are small steps you can take to protect yourself.

This includes turning off location services for the apps you use (preventing geolocation) and managing other settings, including which apps have access to your photos and other data, in the Settings section of your phone.



This story originally appeared on The-sun.com read the full story

Support fearless, independent journalism

We are not owned by a billionaire or shareholders – our readers support us. Donate any amount over $2. BNC Global Media Group is a global news organization that delivers fearless investigative journalism to discerning readers like you! Help us to continue publishing daily.

Support us just once

We accept support of any size, at any time – you name it for $2 or more.

Related

More

1 2 3 9,595

Don't Miss

I’ve found the best patio cleaner ever – it’s £1.50 and leaves my flagstones looking like new, just pour and brush

I’ve found the best patio cleaner ever – it’s £1.50 and leaves my flagstones looking like new, just pour and brush

IF you’re planning to spend the summer in the garden,
Source: Pearsall signs four-year rookie contract with 49ers

Source: Pearsall signs four-year rookie contract with 49ers

Source: Pearsall signs four-year rookie contract with 49ers originally appeared