Deep vs Dark Web, Privacy, Tor History & Config 01 of 03


Hey everybody and welcome to my three part
introductory video on the dark web! Today I’ll be covering quite a few things. First we’ll begin by discussing the the
differences between the deep and dark web. After that I’m going to cover how the dark
web–predominately Tor in this video–is used, a brief history on how it was created, an introduction to one of the more famous
events associated with it, and finally both a high and somewhat low level
analysis on how Tor is configured, how traffic travels through it, how encryption works within it, And how all of this differs from the open
web. I’ll also explain why darknets like Tor
are not one hundred percent anonymous and how the anonymity of criminals and other
users can be and has been compromised in the past. Exciting times ahead! So get comfortable, listen up, and hopefully
you’ll walk away with some shiny new knowledge on the dark web! So let’s get started! People often confuse and use the terms Deep
and Dark Web interchangeably; however, there is a considerable difference
between the two! For starters, the deep web consists of anything
that is not indexed by your standard public search engines (Google, Bing, Yahoo, etc.). The data accessible via these mediums lives
on what is know as the open or visible web– that thing many of us access every day! However, the deep web is very different. In general, the information found here is
not nearly as nefarious–or as exciting–as it may sound, or what people tend to
think. The deep web consists of many things which
may be considered uninteresting to most internet users, such as the term papers you have stored on
Google Drive, non-publicly posted social media interactions
with your grandma, court records, or corporate intranet systems. Which, while some of these may contain private
or sensitive information, much of this data is likely uninteresting and not in the
least bit top secret. The deep web isn’t some mysterious passageway–like
the wardrobe into Narnia–but designed to keep people out. There is simply no need to index or make much
of this type of information public-facing. For example, databases also live on the deep web! Many of the websites that you access on a
daily basis likely utilize some sort of database to organize information. And this information can vary from something as innocuous as a collection
of political survey responses to the much more sensitive user logins, hashed, and salted passwords and far too often, clear-text passwords and other personally
identifiable information–also known as PII–about site users. On another note, sites that don’t protect
themselves against certain types database of attacks, run the risk of this information being obtained and leaked by an attacker. It may not seem like such a big deal, databases, Facebook messages, court records… How much could there really be that we aren’t
seeing? A LOT! In fact, the deep web is estimated to be over
500x the size of the open internet. That is a lot of data! The dark web is a component of the deep web
consisting of darknets. The content hosted on the dark web requires
special software or browsers to be accessed. This is why the terms deep and dark web cannot
be used interchangeably–the dark web is merely a small, but very important, piece. Tor, i2p, and Freenet are the most widely
used darkets–Tor being the leader in size and popularity. Many of you may know that the dark web often
comes with it a reputation for criminal activity; however, darknets like Tor can also be used
by people living in hostile nations. Tor can allow them to circumvent firewalls
and access websites which have been censored by radical governments like Facebook! Yes, even Facebook has a .onion address and historically it has been blocked via
national firewalls in an attempt to prevent free speech. You may notice in this example that the top
level domain for this address is .onion As opposed to what you may be more accustomed
to seeing–like .com. .onion indicates that it is hosted on Tor
and cannot be accessed via a standard browser. Go ahead, give it a shot! The reason domains, known as “hidden services”
on Tor, end in .onion is a direct result of the system’s history. Initially developed in the mid-1990s by the
United States Navy for internal government communications, the Tor project was originally
known as TOR, but in all caps–or The Onion Router as a result of its configuration. Traffic is concealed in a few layers of encryption
which are stripped as it travels from node to node. Get it? Onions? Layers? Anyhow, back to how this can possibly be used
for good! In addition to free speech, the dark web can
also be used by those who need access to information about AIDS, birth control, or other content
that may be considered taboo and is also blocked in heavily religious or traditional nations. It can also be used by Law enforcement for
anonymous tipping and sting operations; the military can still use it for hidden services; and human rights activists, whistleblowers, and journalists, or others living and working
in what are known as “internet black holes” can all use Tor! Organizations like the Washington Post and
Amnesty International have also jumped onto the dark web bandwagon. In the case of the Washington Post, you can
now contact and submit information via what they have deemed “SecureDrop”. Users wanting to communicate with the publication
in a discrete manner can submit content via SecureDrop which can be accessed via the Tor
browser at their .onion address.

Comments 1

  • Nice Video Easy On The Eye. I'm no content creator or have my own channel.

    Would like to see some more on the history of Tor. Or topics of it's origins.

    As most of this stuff people already know , Mostly.

Leave a Reply

Your email address will not be published. Required fields are marked *