The 'Deep Web' May Be x 500 Bigger Than The ‘Normal Web’

The dark web is a hidden portion of the Internet that can only be accessed using special software and is supposed to be almost 500 times bigger than the normal Internet.

TOR, or The Onion Router, is a popular anonymous browsing network used to connect to the dark web. While the dark web offers anonymity and a way to bypass Internet censorship, it is commonly associated with illegal activities such as the buying and selling of drugs and other contraband.

That may sound nefarious, but some experts argue that the dark web is also useful in circumventing Internet censorship.
While most people spend their time online on what is known as the surface web, the portion of the World Wide Web that can be accessed with standard browsers and search engines, it has become relatively easy for anyone to access the deep web.

The deep web is part of the Internet that is not found using search engines, and can be accessed only with specific software. It is estimated to be about 400 to 500 times larger than the common Internet. 

The dark web is a small subset of the deep web, and it is a series of encrypted networks that can hide users' identities and locations. The most popular of those networks is called TOR, or The Onion Router, which was developed initially for government use before it was made available to the general public.

"When people typically refer to the dark web, a lot of the time they're referring to a portion of the internet that's accessible using an anonymous browsing network called TOR," Charles Carmakal, a vice president at cybersecurity firm FireEye, told CNBC's "Beyond the Valley" podcast.

One of the primary functions of the TOR network is that it allows users to access to ‘.onion’ pages, which are specially encrypted for maximum privacy.

Carmakal explained that TOR also lets users connect to normal websites anonymously so that their internet service providers cannot tell what they're browsing. Similarly, the websites will not be able to pinpoint the location of the users browsing their pages.

On the TOR browser, the connection requests are re-routed several times before reaching their destination. For example, if a user in Singapore is trying to connect to a website in London, that request on a TOR browser could be routed from Singapore to New York to Sydney to Capetown to, finally, London. According to Carmakal, a service like TOR is a useful tool for many users to bypass state censorship and crackdowns on the internet. With it, he said, they can communicate with the free world without any repercussions. The service is also used by journalists and law enforcement, he said. 

Still, the term dark web today is commonly associated with illegal activities. In recent years, a number of high-profile marketplaces on the dark web were taken down for selling drugs and other contraband, including Silk Road, AlphaBay and Hansa.

Law enforcement agencies around the world have been working hard to take down communities on the dark web that criminals use, according to James Chappell, co-founder of a London-based threat intelligence company Digital Shadows.
Hansa, for instance, police last year after authorities seized control of the marketplace. In a press release, the officials said they had collected around 10,000 addresses of buyers on the marketplace and passed them onto Europol, the European Union's law enforcement body.

"It was very interesting to see the effect this had. Initially, we thought that lots of websites would come back online, just replacing Hansa as soon as it was taken down," Chappell said." Instead, a lot of the users moved away from TOR and onto message-based services like Discord and Telegram, he said.

CNBC

You Might Also Read: 

What Is the Dark Web? Can You Access It?:

Memex – The new search tool for the Deep Web:

 

« UK Victims Lose £28m To Cybercrime In 6 Months
Britain Plots Cyber Revenge On Russia For Novichok Poisonings »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

Asvin

Asvin

Asvin provides secure update management and delivery for Internet of Things - IoT Edge devices.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.

Japan Cybersecurity Innovation Committee (JCIC)

Japan Cybersecurity Innovation Committee (JCIC)

JCIC is an independent and not-for-profit thinktank to establish a secure and safe digital society.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

Protectt.ai Labs

Protectt.ai Labs

Protectt.ai Labs is India’s first mobile security start up building awareness & providing solutions for mobile app, device & transaction security.

SIGLA Group

SIGLA Group

SIGLA Group specialize in the design and development of IT and OT solutions, from analysis to design, from implementation to commissioning, as well as consultancy, training and assistance.