The 'Deep Web' May Be x 500 Bigger Than The ‘Normal Web’

The dark web is a hidden portion of the Internet that can only be accessed using special software and is supposed to be almost 500 times bigger than the normal Internet.

TOR, or The Onion Router, is a popular anonymous browsing network used to connect to the dark web. While the dark web offers anonymity and a way to bypass Internet censorship, it is commonly associated with illegal activities such as the buying and selling of drugs and other contraband.

That may sound nefarious, but some experts argue that the dark web is also useful in circumventing Internet censorship.
While most people spend their time online on what is known as the surface web, the portion of the World Wide Web that can be accessed with standard browsers and search engines, it has become relatively easy for anyone to access the deep web.

The deep web is part of the Internet that is not found using search engines, and can be accessed only with specific software. It is estimated to be about 400 to 500 times larger than the common Internet. 

The dark web is a small subset of the deep web, and it is a series of encrypted networks that can hide users' identities and locations. The most popular of those networks is called TOR, or The Onion Router, which was developed initially for government use before it was made available to the general public.

"When people typically refer to the dark web, a lot of the time they're referring to a portion of the internet that's accessible using an anonymous browsing network called TOR," Charles Carmakal, a vice president at cybersecurity firm FireEye, told CNBC's "Beyond the Valley" podcast.

One of the primary functions of the TOR network is that it allows users to access to ‘.onion’ pages, which are specially encrypted for maximum privacy.

Carmakal explained that TOR also lets users connect to normal websites anonymously so that their internet service providers cannot tell what they're browsing. Similarly, the websites will not be able to pinpoint the location of the users browsing their pages.

On the TOR browser, the connection requests are re-routed several times before reaching their destination. For example, if a user in Singapore is trying to connect to a website in London, that request on a TOR browser could be routed from Singapore to New York to Sydney to Capetown to, finally, London. According to Carmakal, a service like TOR is a useful tool for many users to bypass state censorship and crackdowns on the internet. With it, he said, they can communicate with the free world without any repercussions. The service is also used by journalists and law enforcement, he said. 

Still, the term dark web today is commonly associated with illegal activities. In recent years, a number of high-profile marketplaces on the dark web were taken down for selling drugs and other contraband, including Silk Road, AlphaBay and Hansa.

Law enforcement agencies around the world have been working hard to take down communities on the dark web that criminals use, according to James Chappell, co-founder of a London-based threat intelligence company Digital Shadows.
Hansa, for instance, police last year after authorities seized control of the marketplace. In a press release, the officials said they had collected around 10,000 addresses of buyers on the marketplace and passed them onto Europol, the European Union's law enforcement body.

"It was very interesting to see the effect this had. Initially, we thought that lots of websites would come back online, just replacing Hansa as soon as it was taken down," Chappell said." Instead, a lot of the users moved away from TOR and onto message-based services like Discord and Telegram, he said.

CNBC

You Might Also Read: 

What Is the Dark Web? Can You Access It?:

Memex – The new search tool for the Deep Web:

 

« UK Victims Lose £28m To Cybercrime In 6 Months
Britain Plots Cyber Revenge On Russia For Novichok Poisonings »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Netsparker

Netsparker

Netsparker provide a web application security scanner to automatically find security flaws in your websites, web applications and web services.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

Brighter AI

Brighter AI

Brighter AI empowers companies to use publicly-recorded camera data for analytics & AI while being compliant with increasing data privacy regulations worldwide.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

CV-Library

CV-Library

Start your job search with 216,931 live UK vacancies on award-winning CV-Library. Register your CV and find local jobs near you today!

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.

Instil Software

Instil Software

Instil helps technology brands transform, innovate and disrupt their markets with category-defining software products that challenge us to think, feel and act in new ways.

Palindrome Technologies

Palindrome Technologies

Palindrome Technologies help clients defend against cyberattacks across all attack surfaces, including hardware, software, network-to-cloud, people, and emerging technologies.