DATA DOCTORS

This is the difference between the deep web and the dark web

Nov 4, 2017, 4:42 AM

(Public Domain Photo)...

(Public Domain Photo)

(Public Domain Photo)

Q: What exactly is the deep web and how to you get to it?

Despite many representations of a nefarious underground operating out of sight, the deep web is actually mostly benign private databases and web resources not meant to be accessed by the general public.

The surface web is essentially what can be indexed by search engines, such as Google or Bing, while the deep web consists of items that can’t be accessed using a search engine through a standard web browser.

Protected internet databases, such as those for banks, anything past a login screen, such as your private files stored in the cloud and data stored by private companies, aren’t indexed by search engines. Websites can also specifically tell the search engines that they don’t want to be indexed making them relatively invisible to the average user.

Most estimates put the deep web in the 90 percent range of the entire Internet because so much of what is stored online is protected information that requires some form of authentication or knowledge of a hidden web address.

The dark web

There is a very small percentage of the deep web where secret and sometimes nefarious activity is taking place, often referred to as the dark web or the darknet. The tools used to access the dark web focus on anonymity by incorporating encryption and specialized privacy browsers, such as Tor.

Tor, also known as The Onion Router, uses a large network of relays through which to bounce internet traffic. It’s much like the layers of an onion to make it much more difficult for anyone conducting any type of surveillance to see who is doing what.

The core technology used in Tor was actually developed by the U.S. Naval Research Lab in the mid ’90s for use by the intelligence community for protecting online communications. To this day, Tor and other similar tools are used by governments, activists and whistleblowers to communicate anonymously.

The Tor Project states: “Tor users include ‘normal people’ who wish to keep their internet activities private from websites and advertisers, people concerned about cyberspying, users who are evading censorship such as activists, journalists, and military professionals.”

Using Tor alone doesn’t mean you’re completely anonymous and, for most users, the trade-off in slow performance isn’t worth the increase in privacy for daily surfing.

Tor’s dark side

Tor and other similar tools are also being used for illicit activities such as buying and selling drugs, stolen credit card numbers, stolen IDs, money laundering and more via black markets only accessible on the dark web.

One of the most famous dark web marketplaces was called Silk Road, which was shut down by the FBI in 2013. The site’s founder, Ross Ulbricht, was sentenced to life in prison without possibility of parole.

Despite law enforcements attempts to control illegal underground marketplaces, when one is shut down, two more seem to pop up.

To be fair, not all dark web resources operate in an illegal manner and much of the activity taking place is vital to our law enforcement and intelligence community’s efforts. As with any technology, it’s impossible to control its uses for only legal purposes, so as always, it’s the good with the bad.

Data Doctors

How to sync smartphones to Windows computers: Arizona tips...

Data Doctors

Tech tip for Arizonans: How to sync smartphones to Windows computers

Want to learn how to sync smartphones to Windows computers? This article from the Data Doctors explains which steps to take.

2 days ago

(Pexels photo)...

Ken Colburn, Data Doctors

Here’s what a Wi-Fi analyzer app is used for

Wi-Fi has become an essential utility for most homes and making sure the signal is adequate in high usage areas is key.

9 days ago

(Pexels File Photo)...

Data Doctors

Here are all of the pros and cons of HP’s All-In printer plan

Each brand tries to differentiate itself from the rest of the crowd by creating unique features and in HP’s case, the subscription model is their latest offering.

16 days ago

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can ma...

Data Doctors

Here are all the tips we know regarding how to spot deep fake videos

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can make detection a bit more difficult.

23 days ago

Patrick Mahomes #15 and head coach Andy Reid of the Kansas City Chiefs are recorded on a phone as t...

Data Doctors

Handy tech tips all Valley residents should use to find lost phones in a snap

Q: My phone went missing, and I haven’t been able to locate it using the Find My service, so what should I do next?

1 month ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are tips for freeing up Google storage space

Google provides a generous amount of free online storage but it can fill up quickly depending on how many of its resources you use.

1 month ago

Sponsored Articles

...

Day & Night Air Conditioning, Heating and Plumbing

Beat the heat, ensure your AC unit is summer-ready

With temperatures starting to rise across the Valley, now is a great time to be sure your AC unit is ready to withstand the sweltering summer heat.

...

DISC Desert Institute for Spine Care

Sciatica pain is treatable but surgery may be required

Sciatica pain is one of the most common ailments a person can face, and if not taken seriously, it could become one of the most harmful.

...

Collins Comfort Masters

Here’s 1 way to ensure your family is drinking safe water

Water is maybe one of the most important resources in our lives, and especially if you have kids, you want them to have access to safe water.

This is the difference between the deep web and the dark web