The 'Deep Web' May Be x 500 Bigger Than The ‘Normal Web’

The dark web is a hidden portion of the Internet that can only be accessed using special software and is supposed to be almost 500 times bigger than the normal Internet.

TOR, or The Onion Router, is a popular anonymous browsing network used to connect to the dark web. While the dark web offers anonymity and a way to bypass Internet censorship, it is commonly associated with illegal activities such as the buying and selling of drugs and other contraband.

That may sound nefarious, but some experts argue that the dark web is also useful in circumventing Internet censorship.
While most people spend their time online on what is known as the surface web, the portion of the World Wide Web that can be accessed with standard browsers and search engines, it has become relatively easy for anyone to access the deep web.

The deep web is part of the Internet that is not found using search engines, and can be accessed only with specific software. It is estimated to be about 400 to 500 times larger than the common Internet. 

The dark web is a small subset of the deep web, and it is a series of encrypted networks that can hide users' identities and locations. The most popular of those networks is called TOR, or The Onion Router, which was developed initially for government use before it was made available to the general public.

"When people typically refer to the dark web, a lot of the time they're referring to a portion of the internet that's accessible using an anonymous browsing network called TOR," Charles Carmakal, a vice president at cybersecurity firm FireEye, told CNBC's "Beyond the Valley" podcast.

One of the primary functions of the TOR network is that it allows users to access to ‘.onion’ pages, which are specially encrypted for maximum privacy.

Carmakal explained that TOR also lets users connect to normal websites anonymously so that their internet service providers cannot tell what they're browsing. Similarly, the websites will not be able to pinpoint the location of the users browsing their pages.

On the TOR browser, the connection requests are re-routed several times before reaching their destination. For example, if a user in Singapore is trying to connect to a website in London, that request on a TOR browser could be routed from Singapore to New York to Sydney to Capetown to, finally, London. According to Carmakal, a service like TOR is a useful tool for many users to bypass state censorship and crackdowns on the internet. With it, he said, they can communicate with the free world without any repercussions. The service is also used by journalists and law enforcement, he said. 

Still, the term dark web today is commonly associated with illegal activities. In recent years, a number of high-profile marketplaces on the dark web were taken down for selling drugs and other contraband, including Silk Road, AlphaBay and Hansa.

Law enforcement agencies around the world have been working hard to take down communities on the dark web that criminals use, according to James Chappell, co-founder of a London-based threat intelligence company Digital Shadows.
Hansa, for instance, police last year after authorities seized control of the marketplace. In a press release, the officials said they had collected around 10,000 addresses of buyers on the marketplace and passed them onto Europol, the European Union's law enforcement body.

"It was very interesting to see the effect this had. Initially, we thought that lots of websites would come back online, just replacing Hansa as soon as it was taken down," Chappell said." Instead, a lot of the users moved away from TOR and onto message-based services like Discord and Telegram, he said.

CNBC

You Might Also Read: 

What Is the Dark Web? Can You Access It?:

Memex – The new search tool for the Deep Web:

 

« UK Victims Lose £28m To Cybercrime In 6 Months
Britain Plots Cyber Revenge On Russia For Novichok Poisonings »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

IGEL Technology

IGEL Technology

IGEL Technology is one of the world's leading thin client vendors. Thin clients increase data security and compliance.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Cybertekpro

Cybertekpro

Cybertekpro is a specialist insurance broker providing Cyber Liability insurance and cyber risk assessment services.

DFLabs

DFLabs

DFlabs is a pioneer in Security Automation & Orchestration technology, leveraging your existing security products to dramatically reduce the response and remediation gap.

Radiflow

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

e-Crime Bureau

e-Crime Bureau

e-Crime Bureau is a specialized company offering cyber/computer forensics, cyber security consulting services, forensic audit and investigations services and training to clients across Africa.

Polyrize

Polyrize

The Polyrize continuous authorization platform for SaaS and IaaS stops tomorrow's public cloud cyber threats, today.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.