The dark web is often portrayed as a haven for criminals – and although the image is dramatized, there is some truth to it.
The dark web is the part of the internet that is not indexed by search engines. It can only be accessed using a special browser called Tor, short for The Onion Router.
Unlike publicly accessible websites that end in .com and .org, domains on Tor end in .onion.
While you can access so-called clearnet sites on Tor, connecting an onion site to Chrome or Safari will not return results.
Tor works by routing Internet traffic through a series of volunteer-operated servers, known as relays, which scramble the data multiple times.
This process creates layers of encryption – hence the “onion” metaphor.
READ MORE ON THE DARK WEB
Each relay decrypts a single layer, revealing only the next destination and not the full routing path, thus ensuring anonymity.
Tor was released to the public as an open source project in October 2002. By the end of 2003, the network had about a dozen volunteer nodes – and it only grew from there.
The software is now maintained by the Tor Project, a non-profit organization whose mission is rooted in the values of online freedom and security.
Although the dark web is commonly described as a lawless land, the United States government has always maintained some sort of browser presence.
To give you an idea of the depth of this involvement, the US military was actually involved in the early days of Tor.
The network was originally designed for the United States Naval Research Laboratory in the mid-1990s.
The goal was to protect the online communications of U.S. intelligence agencies and military personnel by providing them with a way to transmit sensitive information without revealing their location or identity.
Dark web sites are as diverse as those on the clearnet, but some rumors are rooted in truth.
In addition to highly publicized drug markets, Tor has emerged as a place for hackers to buy and sell stolen information.
In May, a group called ShinyHunters claimed responsibility for a TicketMaster hack that exposed private data of more than 500 million account holders.
ShinyHunters attempted to sell this information for $500,000 on a shady website called BreachForums, which has disappeared and resurfaced several times.
While it’s unclear whether the group made the sale before the site was taken offline again, the breach reaffirmed how clearnet’s dark twin is more than just a fantasy.
Historically, criminals have favored the dark web for its anonymity – but that also makes it a valuable privacy tool.
For example, Tor can help civilians escape mass surveillance. Sites banned in certain countries have .onion equivalents, including Facebook and outlets like the BBC and The New York Times.
Russia has been trying to cut off access to the network for years and successfully blocked the main Tor Project website in 2021.
In China, civilians are at the mercy of the Great Firewall, which blocks access to certain foreign websites.
While Tor itself is not illegal in the country, virtual private networks are – and authorities could argue that they serve the same purpose.
In addition to ensuring personal safety, the dark web is also a place where whistleblowers can safely share tips with journalists.
WikiLeaks is perhaps the best-known whistleblower organization on the dark web.
While the group has faced much controversy, it has also exposed human rights violations at the hands of governments.
This includes leaks about US military action in Afghanistan and Iraq and a helicopter attack in Baghdad in 2010 that killed two Reuters journalists.
Using the dark web to anonymously broadcast tips proved so effective that the CIA unveiled its own onion website in May 2019.
It’s important to note that the dark web is not a lawless land either. There has been an increased police presence on Tor in recent years
Authorities often create “honeypots,” or seemingly legitimate websites, designed to catch offenders.
Many websites that offer illicit content are actually supervised by members of law enforcement who have assumed the identity of the website operators.
Many of the biggest drug markets – AlphaBay, Empire Market, White House Market and others – have fallen over the past decade.
One of the most famous websites, Silk Road, was closed by the FBI in 2013.
Creator and operator Ross Ulbricht was slapped with multiple charges, including conspiracy to commit money laundering, conspiracy to commit computer hacking, and conspiracy to traffic narcotics.
Ulbricht, who operated under the alias “Dread Pirate Roberts,” was found guilty of all charges in February 2015 and sentenced to life in prison without the possibility of parole.
The Silk Road shutdown only galvanized law supervision to go after other sites with equal enthusiasm.
White hat hackers and IT professionals have noticed an increase police presence on the network in recent years.
Cybersecurity expert John Hammond has spent much of his time on the dark web.
“I think it’s still used for government tracking or investigative opportunities, using that legal lens to see what criminals are doing,” Hammond told The US Sun.
“I see that a lot of it is fraud, or hoaxes, or things that influence primal instinct or human desires.”
Hammond noted that child exploitation sites are in full swing, although he does his best to “stay away from them” while looking for data leaks.
“Ransomware actors will attempt to publish any data stolen from a company they hacked or a business they breached,” Hammond explained.
“They use this to stake their claims – hey, we hacked these people and this is how they’re getting back at us for them not paying us X million Bitcoins or something.”
The cybersecurity researcher recalled the time he found a passport “of a real person, with their photo” – and it was this experience that made the issue “come to life” for him.
“That’s not very scary, but it kind of made me clear, like, yeah, this could be very real,” Hammond said.
He noted that some of the more extreme rumors about the dark web could be true, based on users’ search behavior.
“Maybe I’m pessimistic, but I feel like people really like horror stories,” Hammond said.
“Historically, among the Silk Road and many other dark and scary things, it had an aspect of reality.
“Seeing search engine results about live-streamed torture – it’s amazing to know that this could exist.
How to protect yourself from cyber attacks
Here’s what Mackenzie Tatananniscience and technology reporter for The US Sun, has this to say:
It’s important to keep security in mind whenever you browse the internet or log into your devices. Just because you have nothing to hide doesn’t mean you want strangers spying on your activity. (Yes, this includes your Internet service providers!)
I’m a big proponent of VPNs, or virtual private networks, which encrypt (or “scramble”) your data to make it nearly impossible to intercept.
I’m also a big fan of the Tor Browser, although I understand it’s not for everyone and can be difficult to navigate for first-time users. (I admit it’s not very practical either, considering most sites are not indexed on the dark web.)
I find some NSA tips extremely helpful and follow them personally. For example, the agency recommends installing a minimum number of apps and only those from official app stores.
In addition to saving phone storage, this is an effective security measure – most, if not all, apps will track you. While no one is truly defenseless against a bad actor, there are small steps you can take to protect yourself.
This includes turning off location services for the apps you use (preventing geolocation) and managing other settings, including which apps have access to your photos and other data, in the Settings section of your phone.
This story originally appeared on The-sun.com read the full story