The 'Deep Web' May Be x 500 Bigger Than The ‘Normal Web’

The dark web is a hidden portion of the Internet that can only be accessed using special software and is supposed to be almost 500 times bigger than the normal Internet.

TOR, or The Onion Router, is a popular anonymous browsing network used to connect to the dark web. While the dark web offers anonymity and a way to bypass Internet censorship, it is commonly associated with illegal activities such as the buying and selling of drugs and other contraband.

That may sound nefarious, but some experts argue that the dark web is also useful in circumventing Internet censorship.
While most people spend their time online on what is known as the surface web, the portion of the World Wide Web that can be accessed with standard browsers and search engines, it has become relatively easy for anyone to access the deep web.

The deep web is part of the Internet that is not found using search engines, and can be accessed only with specific software. It is estimated to be about 400 to 500 times larger than the common Internet. 

The dark web is a small subset of the deep web, and it is a series of encrypted networks that can hide users' identities and locations. The most popular of those networks is called TOR, or The Onion Router, which was developed initially for government use before it was made available to the general public.

"When people typically refer to the dark web, a lot of the time they're referring to a portion of the internet that's accessible using an anonymous browsing network called TOR," Charles Carmakal, a vice president at cybersecurity firm FireEye, told CNBC's "Beyond the Valley" podcast.

One of the primary functions of the TOR network is that it allows users to access to ‘.onion’ pages, which are specially encrypted for maximum privacy.

Carmakal explained that TOR also lets users connect to normal websites anonymously so that their internet service providers cannot tell what they're browsing. Similarly, the websites will not be able to pinpoint the location of the users browsing their pages.

On the TOR browser, the connection requests are re-routed several times before reaching their destination. For example, if a user in Singapore is trying to connect to a website in London, that request on a TOR browser could be routed from Singapore to New York to Sydney to Capetown to, finally, London. According to Carmakal, a service like TOR is a useful tool for many users to bypass state censorship and crackdowns on the internet. With it, he said, they can communicate with the free world without any repercussions. The service is also used by journalists and law enforcement, he said. 

Still, the term dark web today is commonly associated with illegal activities. In recent years, a number of high-profile marketplaces on the dark web were taken down for selling drugs and other contraband, including Silk Road, AlphaBay and Hansa.

Law enforcement agencies around the world have been working hard to take down communities on the dark web that criminals use, according to James Chappell, co-founder of a London-based threat intelligence company Digital Shadows.
Hansa, for instance, police last year after authorities seized control of the marketplace. In a press release, the officials said they had collected around 10,000 addresses of buyers on the marketplace and passed them onto Europol, the European Union's law enforcement body.

"It was very interesting to see the effect this had. Initially, we thought that lots of websites would come back online, just replacing Hansa as soon as it was taken down," Chappell said." Instead, a lot of the users moved away from TOR and onto message-based services like Discord and Telegram, he said.

CNBC

You Might Also Read: 

What Is the Dark Web? Can You Access It?:

Memex – The new search tool for the Deep Web:

 

« UK Victims Lose £28m To Cybercrime In 6 Months
Britain Plots Cyber Revenge On Russia For Novichok Poisonings »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

CSR Privacy Solutions

CSR Privacy Solutions

CSR Privacy Solutions is a leading provider of privacy regulatory compliance programs for small and medium sized businesses.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

Ingalls Information Security

Ingalls Information Security

Ingalls Information Security provides network security, monitoring and forensics.

Excellium Services

Excellium Services

Excellium’s Professional Services team combines expertise and experience that complements your in-house security resources.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

Epiphany Systems

Epiphany Systems

Epiphany enhances your defensive security controls by providing you with an offensive perspective. We expose the most likely attack paths to your most critical IT assets and users.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.