Question

In: Computer Science

Describe how one supposedly gains access to information on the Dark Web and Deep Web. Describe...

Describe how one supposedly gains access to information on the Dark Web and Deep Web. Describe Onion Routing and how it applies to the Dark Web.

need reference or citation!

Solutions

Expert Solution

The information provided below is only for educational purposes. Hacking is illegal, crime, unofficial, informal, and is against law. Any hacking activities to be carried out on a system, computer, device, mobile device, server, network, website, etc. must require written authorization of the owner of the system, computer, network, server, etc., providing his/her permission to do so for a genuine reason, in a written statement with his/her authorization clearly defined and stated in it. Please note that most of the network traffic, content, websites, information, data, communications, and transactions available and carried out on the Dark Web and Deep Web are illegal and unlawful and are bad and crime on the users' part. Deep web content may not mostly be illegal as its content are available behind a paywall or would require sign-in details such as username and password for authentication purpose. The deep web may refer to content its owners have blocked web crawlers from indexing them, as these content could be genuine, authentic, legitimate, and could be serving only internally specific to a company, an organization, or a network. Even most of the dark web is used not used for illicit intentions and purposes in spite of its notorious and negative name.

How one supposedly gains access to information on the Dark Web and Deep Web:
Please note, the dark web is only a part of the deep web. One could access information on the Dark Web and Deep Web using the Onion Routing technique, specifically and technically using software such as The Onion Router (TOR) web browser accessing anything on the Internet available on the deep web that is not indexed by, and, hence, not accessible through a search engine such as Google. Both, dark and deep web could be accessed through the TOR web browser software using it and accessing such a web anonymously. Here, in this example of using the TOR web browser, the users' web page requests are routed by the TOR browser through a series of proxy servers that are operated and managed by volunteers in thousands, worldwide, rendering users' IP address untraceable and unidentifiable. The TOR web browser functions like magic. The outcome of using the TOR browser with its network is like a dark web that is unreliable, unpredictable, and very slow. Also, even dark web search engines exist. There are dark web sites for surfing, browsing, and exploring. These websites end with .onion unlike .com, or .co, indicating it is a special-use Top-Level Domain (TLD) suffix that is designated with an anonymous hidden service that can be reached through the TOR network. The only web browser software that has appropriate proxy settings will be able to access these websites.

Using TOR, which uses the onion routing technique that encrypts data which is then gets transmitted through a series of network nodes that are called onion routers. Each router "peels" away from a single layer, that uncovers the data's or the message's next destination. Thus, the sender or the source computer remains anonymous, as each intermediary is aware of only the location of the immediately preceding and succeeding nodes.

Onion Routing:
It is a method to communicate anonymously over a computer network, such as the public Internet. Layers of encryption are used to encapsulate messages to be communicated. As an analogy, the layers of an onion. It is basically an Internet-based system preventing eavesdropping, sniffing, and traffic analysis breaches and attacks. It protects users' messages and communications from tracking and surveillance. It is used for circumventing or bypassing censorship. It thus is basically used for security and specifically to provide confidentiality, integrity, privacy, availability, accessibility, and anonymity online. It is a significant technological technique. It is used to hide information, data, messages, or communications. An example of a tool or software using Onion Routing is The Onion Router (TOR) web browser.

How Onion Routing applies to the Dark Web:
Using the onion routing technique, one could access the Dark web safely, securely, with privacy, anonymity, and freedom online, without being monitored and without being under surveillance. However, onion routing can be also be misused by bad people, actors, attackers, or hackers to navigate the underground illegal and hidden Internet to access illegal content, websites, files, carry out transactions, communications, etc., on the Dark Web.


Related Solutions

Principles, Cyber security: The Deep Web and The Dark Web - A description of a dark...
Principles, Cyber security: The Deep Web and The Dark Web - A description of a dark net, the Surface Web, the Deep Web and the Dark Web. Are any of these terms synonymous? Do they all exist? What is the purpose of those that truly exist? need reference or citation for these questions
how large quantities of deep yellow orange or dark green foods impact retinal levels
how large quantities of deep yellow orange or dark green foods impact retinal levels
Describe an ecosystem and a food web in that ecosystem. Specifically detail how ONE of the...
Describe an ecosystem and a food web in that ecosystem. Specifically detail how ONE of the four biogeochemical cycles (hydrologic, carbon, nitrogen, or phosphorus) works in your ecosystem. Include sources, sinks and processes that move the nutrient in your ecosystem. You should also include how energy flows through the ecosystem.
describe how to develop a web of causation
describe how to develop a web of causation
accounting information must be relevant and also faithful representation a) how can this supposedly turn out...
accounting information must be relevant and also faithful representation a) how can this supposedly turn out to be a balancing act(juggling both relevance ans faithful representation) b) give an example of an accounting concept where relevance exists but lacks faithful representation
Research information on how Python is used for Web applications and accessing resources on the Web?...
Research information on how Python is used for Web applications and accessing resources on the Web? Please help me for short discussion. Thanks in advance.
Computer/Network Security How do you implement write access through web server?
Computer/Network Security How do you implement write access through web server?
steps on how a physician  can access a patient health information from radiologist from one network to...
steps on how a physician  can access a patient health information from radiologist from one network to another network location through EHR
Describe the various neural pathways involved in picking up a penny in the dark and how...
Describe the various neural pathways involved in picking up a penny in the dark and how do these pathways work? I know the pathways are motor, sensory, and integrative, but I need help piecing it all together. Thanks
What is web caching? (4) b) Describe how Web caching can reduce the delay in receiving...
What is web caching? (4) b) Describe how Web caching can reduce the delay in receiving a requested object. (4) c) Are there benefits for web caching other than reducing the delay? (2
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT