Deep Web: 5 Curious Facts You Didn'T Know About

by Janeth Kent Date: 05-08-2019 deepweb darkweb TOR internet

The 'deep web' is an Internet space where the content that does not appear in conventional search engines is hosted, due to various factors that do not have to respond to illegality. However, there is also the 'dark web', which is a small part of the 'deep web', whose contents are usually illegal. It is important to differentiate between them.

The portion of the internet that anyone knows and that is accessible through standard search engines is called 'clear web' or 'surface web'. It is made up of websites and services that we all know, such as Facebook or Twitter.

Deep web is just the opposite. In it we find 'online' content that is not publicly accessible. This term is almost always related to illegitimate activities and misinformation. But what exactly is it, how much is there of urban legend or truth about the deep web? These five facts clarify some myths about the most unknown part of the internet:

1. The vast majority of the internet is found in the 'deep web':

'Deep web' refers to all content that is not indexed by search engines such as Google, Bing or Yahoo, i.e. that is not available on pages with search results. Although the content is very difficult to track and cannot be accounted for reliably, it is estimated that 96% of the internet is in the 'deep web'. The remaining 4% corresponds to the 'surface web' or 'clearnet' and refers to the part of the internet that is indexed. In other words, the part visible to all users, such as, for example, the pages found on Google and accessed directly.

2. You have probably used the 'deep web' without knowing it:

many legal sites that are accessed every day are not indexed and belong to the 'deep web' such as bank accounts, academic journals, pages containing health information or files stored in Dropbox. The reasons why these contents are not indexed can be very varied: for security reasons, because they are private, because they are blocked or because they are too old, ephemeral or irrelevant.

3. Deep web' and 'dark web' are different things:

not all content on the deep web is illegal. In fact, there are some pages with constructive content such as DuckDuckGo (a search engine for conventional websites and exclusive deep web links). The 'dark web', however, is a small portion (equivalent to 0.01%) of the 'deep web'. To access the dark web you need a set of technologies and resources that make the connection anonymous. The purpose of the content found on the dark web is often unknown or illegal. It is the black market where weapons, drugs and personal data are sold. The most important markets for the dark web are Dream, Point and Wall Street Market. As in conventional online shops, the reputation of these sites is measured by user comments and opinions.

4. You can't accidentally access the dark web:

It should not be a cause for concern if you accidentally enter the dark web and come across disturbing pages. Access is only possible voluntarily and by accessing anonymous networks such as through the TOR kit. These networks designed to provide anonymity are called 'darknets'. To be able to navigate through them, it is necessary to know the addresses of the hidden services you want to access, sometimes helped by the TOR itself.

5. TOR was not conceived to protect criminals:

TOR is an access kit created in 2003 by the U.S. Naval Research Laboratory. In 2005 it became part of a non-profit foundation dedicated to research and education. TOR was born with the purpose of guaranteeing anonymity and privacy to people persecuted by dictatorial regimes. However, it cannot be ignored that some people take advantage of this tool to carry out illegal activities such as, for example, carrying out transactions on the black market. In other words, TOR is a kit that is used to navigate anonymously and whether it is good or bad will depend on the use made of it.

Once the parts of the Internet are known, it is important to be responsible and thoughtful when browsing any site and to keep in mind that conduct in the virtual world should be just as civic and respectful as that which is followed in the physical world every day.


Technology vector created by vectorpouch -
by Janeth Kent Date: 05-08-2019 deepweb darkweb TOR internet hits : 2411  
Janeth Kent

Janeth Kent

Licenciada en Bellas Artes y programadora por pasión. Cuando tengo un rato retoco fotos, edito vídeos y diseño cosas. El resto del tiempo escribo en MA-NO WEB DESIGN END DEVELOPMENT.


Related Posts

A Java approach: condtional structures

Hello everyone and welcome back! The previous times we have introduced the concept of variable, trying to define some basic concepts about it.  However, some situations suggest that the concept of…

Hashmap: hashing, collisions and first functions

Today we are going to study some concepts closely related to hashmaps. The concepts we are going to see are hashing and collisions. Hashing The idea of hashing with chaining is to…

Hashmap: Overflow Lists

In this short series of articles we will go to see how it is possible to create the Hashmap data structure in C. In the implementation we're going to use the…

A Java approach: variables - use case

Hello all friends and welcome back! After the introduction made on the variables, we try to analyse some critical issues that may arise in quite common situations. Let's start by analysing…

A Java approach: variables

Hello everyone and welcome back! Today we will begin a journey that will lead us to study, and possibly review, what are the basics of programming. We will start by talking…

MAME Multiple Arcade Machine Emulator: How to download and configure this arcade emulator for Windows

Despite the fact that new state-of-the-art computer games are coming out every so often, the whole retro theme is very appealing to users who are looking to relive the long…

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from…

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However,…

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our…

How to configure Tor to browse the deep web safely

Today we explain how to set up Tor to browse safely, and we'll share some links to safe sites on the deep web to get you started. Many already know that…

What is the origin of the word SPAM?

It is 40 years since the first spam e-mail was sent. Surely most of the readers of this blog had not yet been born, as well as annoying mail with which we are bombarded in…

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at…