Deep web: 5 curious facts you didn't know about

by Janeth Kent Date: 05-08-2019 deepweb darkweb TOR internet


The 'deep web' is an Internet space where the content that does not appear in conventional search engines is hosted, due to various factors that do not have to respond to illegality. However, there is also the 'dark web', which is a small part of the 'deep web', whose contents are usually illegal. It is important to differentiate between them.

The portion of the internet that anyone knows and that is accessible through standard search engines is called 'clear web' or 'surface web'. It is made up of websites and services that we all know, such as Facebook or Twitter.

Deep web is just the opposite. In it we find 'online' content that is not publicly accessible. This term is almost always related to illegitimate activities and misinformation. But what exactly is it, how much is there of urban legend or truth about the deep web? These five facts clarify some myths about the most unknown part of the internet:
 

1. The vast majority of the internet is found in the 'deep web':

'Deep web' refers to all content that is not indexed by search engines such as Google, Bing or Yahoo, i.e. that is not available on pages with search results. Although the content is very difficult to track and cannot be accounted for reliably, it is estimated that 96% of the internet is in the 'deep web'. The remaining 4% corresponds to the 'surface web' or 'clearnet' and refers to the part of the internet that is indexed. In other words, the part visible to all users, such as, for example, the pages found on Google and accessed directly.
 

2. You have probably used the 'deep web' without knowing it:

many legal sites that are accessed every day are not indexed and belong to the 'deep web' such as bank accounts, academic journals, pages containing health information or files stored in Dropbox. The reasons why these contents are not indexed can be very varied: for security reasons, because they are private, because they are blocked or because they are too old, ephemeral or irrelevant.
 

3. Deep web' and 'dark web' are different things:

not all content on the deep web is illegal. In fact, there are some pages with constructive content such as DuckDuckGo (a search engine for conventional websites and exclusive deep web links). The 'dark web', however, is a small portion (equivalent to 0.01%) of the 'deep web'. To access the dark web you need a set of technologies and resources that make the connection anonymous. The purpose of the content found on the dark web is often unknown or illegal. It is the black market where weapons, drugs and personal data are sold. The most important markets for the dark web are Dream, Point and Wall Street Market. As in conventional online shops, the reputation of these sites is measured by user comments and opinions.
 

4. You can't accidentally access the dark web:

It should not be a cause for concern if you accidentally enter the dark web and come across disturbing pages. Access is only possible voluntarily and by accessing anonymous networks such as through the TOR kit. These networks designed to provide anonymity are called 'darknets'. To be able to navigate through them, it is necessary to know the addresses of the hidden services you want to access, sometimes helped by the TOR itself.
 

5. TOR was not conceived to protect criminals:

TOR is an access kit created in 2003 by the U.S. Naval Research Laboratory. In 2005 it became part of a non-profit foundation dedicated to research and education. TOR was born with the purpose of guaranteeing anonymity and privacy to people persecuted by dictatorial regimes. However, it cannot be ignored that some people take advantage of this tool to carry out illegal activities such as, for example, carrying out transactions on the black market. In other words, TOR is a kit that is used to navigate anonymously and whether it is good or bad will depend on the use made of it.


Once the parts of the Internet are known, it is important to be responsible and thoughtful when browsing any site and to keep in mind that conduct in the virtual world should be just as civic and respectful as that which is followed in the physical world every day.


 

Technology vector created by vectorpouch - www.freepik.com
 
by Janeth Kent Date: 05-08-2019 deepweb darkweb TOR internet hits : 3609  
 
Janeth Kent

Janeth Kent

Licenciada en Bellas Artes y programadora por pasión. Cuando tengo un rato retoco fotos, edito vídeos y diseño cosas. El resto del tiempo escribo en MA-NO WEB DESIGN END DEVELOPMENT.

 
 
 

Related Posts

How to make a multilingual website without redirect

Today, we're going to talk about how to implement a simple language selector on the basic static website, without the need of any backend or database calls or redirection to…

Graphic design and its impact on Web Development

In today's article we will explain the concept of graphic design, its fundamentals and what it brings into web development. Graphic design is applied to everything visual, believe or not,…

Dark Web: the creepy side of the Internet is not as dark as believed

People who surf the Dark Web are not necessarily looking for something illegal. Most people want to protect their privacy. And according to a recent study, 93 percent only use…

A Java approach: While loop

Hello everyone and welcome back! After having made a short, but full-bodied, introduction about cycles, today we are finally going to see the first implementations that use what we have called…

A Java approach: The Cycles - Introduction

Hello everyone and welcome back! Until now, we have been talking about variables and selection structures, going to consider some of the fundamental aspects of these two concepts. Theoretically, to…

A Java Approach: Selection Structures - Use Cases

Hello everyone and welcome back! Up to now we have been concerned to make as complete an overview as possible of the fundamental concepts we need to approach the use…

A Java approach: boolean variables

The previous time, we talked extensively about Boolean variables, trying to outline the main operations that can be carried out at a practical level.  Of all the cases examined, we have…

A Java approach: condtional structures

Hello everyone and welcome back! The previous times we have introduced the concept of variable, trying to define some basic concepts about it.  However, some situations suggest that the concept of…

Hashmap: hashing, collisions and first functions

Today we are going to study some concepts closely related to hashmaps. The concepts we are going to see are hashing and collisions. Hashing The idea of hashing with chaining is to…

Hashmap: Overflow Lists

In this short series of articles we will go to see how it is possible to create the Hashmap data structure in C. In the implementation we're going to use the…

A Java approach: variables - use case

Hello all friends and welcome back! After the introduction made on the variables, we try to analyse some critical issues that may arise in quite common situations. Let's start by analysing…

A Java approach: variables

Hello everyone and welcome back! Today we will begin a journey that will lead us to study, and possibly review, what are the basics of programming. We will start by talking…

We use our own and third-party cookies to improve our services, compile statistical information and analyze your browsing habits. This allows us to personalize the content we offer and to show you advertisements related to your preferences. By clicking "Accept all" you agree to the storage of cookies on your device to improve website navigation, analyse traffic and assist our marketing activities. You can also select "System Cookies Only" to accept only the cookies required for the website to function, or you can select the cookies you wish to activate by clicking on "settings".

Accept All Only sistem cookies Configuration