How to surf dark web ? dark web surf kese karein Guide to Browsing Dark Web using TOR Browser
The world wide web, much like real life, is so massive that it would take you a lifetime to traverse every nook and cranny.
To compound that fact, by the time you were halfway done, so much more content would have been created and updated that you’d have to start all over again.
All of this is well known, but how many of you are aware that the content you usually encounter on the web is barely the tip of a massive iceberg of information?
Imagine a real iceberg
The top protrudes above the water and is visible, yet the real bulk of the iceberg is below that, unseen. The world wide web is similar, in which the regular sites we visit are the top of that iceberg. This includes common sites such as Wikipedia, Google and even the millions of blogs that come and go daily.
Beneath the water lurks the deep and dark, hidden from view for various reasons, the Dark Web. Less nefarious is the information that skims the surface of the Dark Web, in a zone called the Deep Web. That belongs to large corporates or governments and are never exposed to the public, such as medical records, government reports, financial records and such. These are kept away from search engines and behind powerful firewalls to protect them.
It’s truly in the depths of the of the dark web that things get shady – and oftentimes dangerous.
Why is the Dark Web hidden?
In the case of the deep web, since personal records, government documents and such are not meant for public view in the first place, those are understandably kept safe. However, they still are mostly connected to the Internet since much of that information forms an ecosystem for many surface web applications.
The Dark Web is slightly more complicated. This part of the world wide web is often run on networks of private servers, allowing communication only via specific means. This enables a high degree of anonymity and makes it difficult for authorities to shut down.
Unfortunately, this has led to Dark Web to become a place where many illegal activities take place.
What’s hidden in the Dark Web?
If you’ve ever heard of cybercrime, you’ll probably know that the cybercriminals of today are after more than just money. They take literally anything of value, which means credit card information, personal information and more. All of these things are commodities on the Dark Web, to be bought, sold or traded.
Aside from that, there are also business dealings that are illegal and can’t be conducted on the surface web. Almost anything can be bought on the Dark Web – for a price. The items available can include firearms, illegal drugs, illegal wildlife, or even the rental of a hitman!
Finally, there is the most depraved and undesirable of all – those who deal in the sickest and most perverse types of pornography, which is illegal is almost every part of the world.
How to Access Dark Web Websites
Warning: Before proceeding further, it is important that you understand that many things on the Dark Web are highly illegal. No matter what precautions you take, being able to stay anonymous is highly unlikely. Enter at your own risk!
1. Download and install the TOR browser
Despite its current usage as a browser that is often used to access parts of the Dark Web, TOR (aka. the dark web browser) was originally developed to help safeguard U.S. Intelligence online communication.
Today, it is one of the few ways to access .onion websites, which are located on the Dark Web.
TOR is a version of the popular Firefox web browser, modified to allow users to browse the web anonymously. The browser is designed to block or advise against user attempts to do things that might reveal their identity, such as resizing the dimensions of the browser window, for example.
While you’re waiting for TOR to download, take the time to stick a piece of dark tape over your webcam lens. You never know what might happen.
And also – check out the following introduction video by TOR.
2. Consider paying for a Virtual Private Network service
Virtual Private Networks (VPNs) are servers that you connect through to access the web. These servers help to mask your origin and may emulate locations from many other places in the world.
Although TOR masks your identity, it does not hide your location.
3. DuckDuckGo is your friend
Navigating the Dark Web is slightly different. Remember the phase that often tossed about: ‘Google is your friend’? The problem is that Google is also a massive data privacy nightmare and you don’t want that albatross hanging around your neck as you navigate the dark web.
Enter DuckDuckGo, a privacy-focused search engine that won’t keep track of everything you do – or the sites you visit.
4. Sign up for a secure email address
Now that you’re ready to go, it’s time to sign up for an untraceable email address. Gmail is out of the question, and you’ll need an email address to register for many .onion websites.
5. Dive in to the Dark Web
.onion is a domain exclusively used on the Dark Web. These are similar to regular domains, but cannot be accessed without a specialized browser like TOR.
Here are a couple of relatively harmless .onion addresses that you can try out:
DuckDuckGo Search Engine
Hidden Wiki
ExpressVPN
Alternatively, you can start your journey with a Dark Web Search Engine like Ahmia.
* Note: Don't click on these links as they are pointing to .onion sites that you can't open with a normal browser.
Once you are ready to jump in – check out this huge lists of .onion websites we have curated. Some of them are relatively harmless that you can try out, others… well, let's say a new adventure awaits. Bear in mind that you may bump into strange (and again, highly illegal) things on the Dark Web. Stay safe. Be very caution of what you click or download from the Dark Web.
How to access the dark web using Tor
Using the Tor browser is simple, but knowing when to fire it up is more complicated. You could do all your browsing with Tor, though it's slower than a standard browser, something the Tor Project is working hard at to improve, says Stephanie Whited, communications director for the Tor Project. Another challenge is CAPTCHAs; because Tor behaves differently than other browsers, it's more likely to trigger the bot-hunting system, so be prepared to face more of them than usual.
Whited's rule of thumb is to use the Tor Browser instead of Private Browsing Mode or Incognito Mode. "Contrary to what most people think, these modes do not actually protect your privacy," she says. "They do not curtail the collection of your online activity by your ISP, advertisers, and trackers. They don’t prevent someone monitoring your network from seeing what websites you’re visiting. Tor Browser does."
With any security and privacy issue, it's about your threat model, which is simply what attacks or invasions you're actually worried about. "When you want to visit a site and for nobody in-between you and the site to know that you are visiting it," says Muffett, about when to use the Tor Browser. "Sure, most people think 'porn' when someone says that, but it also applies to getting some privacy when you want not to be immediately traceable: sexual health, birth control questions, foreign news, personal identity questions."
But there's more to Tor than being nearly anonymous online. "The big win of Tor for me is access — with a sprinkling of anonymity, to be sure — but that I can be stuck behind some hotel firewall, in some airport or restaurant lounge, or in a sketchy cafe is a sketchy country," Muffett says. "And if I use Tor then I have a good degree of certainty that at least the local weirdos are not looking over my digital shoulder at what I am browsing — and that when I kill my browser (unless I've bookmarked something, or saved a file) then all the data is properly cleaned-up and wiped."
VPNs are often recommended as protection in such cases, but Whited disagrees. "VPNs can be a security bottleneck," she says. "All of your traffic goes through it, and you have to trust them as if they are your new ISP. Because the backbone of our software is a decentralised network, you don’t have to trust us to browse the internet privately."
Tor isn't perfect
There's no such thing as perfectly private or secure on the internet. It's still possible to track someone's traffic pinging through the Tor nodes, though it is difficult.And, of course, people, websites and third-party trackers will know who you are if you choose to identify yourself online. "People can accidentally give that away just by posting their real name, email address, or other identifying details, in a blog comment," notes Muffett. If you do log into a site or otherwise identify yourself, the Tor Browser has techniques to limit the spread of who knows. One is "new identity"; select this in the main menu and all open tabs and windows will shut down, clearing cookies, history and Tor circuits. That means that if you've logged into a site or otherwise identified yourself, you can avoid that site from following you elsewhere. Another similar tool is the "new Tor circuit" option, which resets the circuit so you look like a new connection, making you harder to track.
There are other ways for spies, hackers or other adversaries to target Tor. Lewis points to the "first contact problem", when an attacker spots when someone moves from non-private tools to private ones, noting it's been used to identify whistleblowers. "There are a myriad of other attacks ranging from academic to within the realm of possibility for nation states or large conglomerates, but it is worth remembering that these are attacks which reduce the privacy back down to regular web browsing, and many have to be explicitly (and somewhat expensively) targeted — the more people who use these tools, the greater the cost of surveillance."
In short, even with Tor, there's no perfect anonymity online, but there are efforts to claw back our power online, says Lewis. "Understand that the web as we know it today is privacy-hostile and that nothing is foolproof, do research, support organisations and projects — like Tor Project, i2p, and Open Privacy — that are building and maintaining tools that make enforcing your consent easier."
thanks for reading this blog hope you like it!
Comments
Post a Comment