If you want to browse through a vast sea of unindexed internet, aka the Deep Web, you will have to use something called Tor, otherwise you wont be able to access the Deep Web.
So, what is Tor and why do I need it?
Tor stands for The Onion Router. Youll soon see why the onion and not some other veggie.
It provides fairly good level of online anonymity, privacy and security to the user.
If youve ever stumbled upon a 16-character alpha-semi-numeric hashes followed by .onion, and tried to open it in your regular browser; it returned the This webpage is not available result, right? This address can only be accessed by Tor browser, specially designed to provide a safe and private environment.
Tor browser bundle can be downloaded for free here https://www.torproject.org/download/download-easy.html.en. There is no need for installation; you simply extract it anywhere on your computer and run it.
If you open the extracted folder with Browser folder in it, you will notice that the actual application is called Firefox, and thats what Tor browser actually is a modified Firefox browser with a set of plugins installed.
However, if you try to install any other plugin you might compromise your anonymity online, and it is not advisable to make any changes in settings unless you know exactly what you are doing.
Dont even enable scripts or flash player, because those applications demand direct internet connection, not via Tor network, which will compromise your IP address and other information and make you an easy target for hackers.
Tor network can also be used for online chatting. Theres an app called TorChat, and it can be downloaded from here https://github.com/prof7bit/TorChat. Many journalists use it for interviews with their confidential sources or whistleblowers.
To put it briefly
Tor is essential; there are no two ways about it. If you wish to browse the deep web, you will have to use Tor. However as I mentioned, it will also protect your anonymity by passing your computer through several relays.
The main drawback that I see with it is that it can lull you into a false sense of security. For anonymous browsing, its an excellent first step, but its not the only one you need to take.
For more protection, I would strongly advise using Tor within a VPN service that allows P2P (peer to peer) networking.
Without this, while the sites you visit cant be seen, any eavesdroppers will be able to see that you are using Tor. While that is not illegal by any means, it does stand out, so you lose some of the anonymity you fought to get.
Other non-important drawbacks include not being able to run torrents over Tor, and not being able to use browser plugins.
How deep down the rabbit hole do you wish to go?
Those were really the basics of Tor browser and Tor network and these would probably suffice if you only wish to explore and experiment with it.
But if you want to know the core mechanics behind Tor network and the way it provides the anonymity and privacy, Ill be happy to get into more details about it.
Before going into any details about Tor, let me first cover how the regular internet works.
Lets say that Alvin for example wishes to send a message to Barbara, or visit Barbaras webpage. When Alvin sends his message, a data package is created,containingAlvins message, his and Barbaras IP addresses.
This data package travels directly from Alvins to Barbaras computer, making it an easy target for anyone who wishes to intercept the message or learn the information about Alvin or Barbara.
Spooky, isnt it? Even if your messages arent confidential at all; why would you allow anybody to have access to you messages? Its insane.
So, if you want to keep your privacy intact, I suggest using Tor, even for browsing that is not related to Deep Web.
How it works?
Well, as mentioned earlier, here is the detailed explanation for the choice of a veggie. Tor stands for The Onion Router and Tor Network is a series of connected routers.
When using Tor, Alvins data package would firstly be encrypted, and then sent through three routers, called nodes, before the data package reaches Barbara.
Mathematical Cryptography comes first
Remember that data package that was created when Alvin sent his message to Barbara? Now using Tor, that data package is encrypted not once, but three times.
Mathematical encryption basically means that you take a set of information, Alvins message, and together with the encryption key you put it in a box.
When opening the box without the decryption key, the message looks totally different than the original data package. It can look like some other message or like a random messed-up code.
To decrypt the code you simply put in reverse take the encrypted data package and the decryption key, put them in the box together, and you get the original message when you open the box. Simple, right?
Now, Tor takes this encrypted data package and encrypts it twice more, both times using different encryption keys.
Journey through a tunnel
As mentioned earlier, Tor is a series of routers connected to form a tunnel. Theyre a set of relays volunteering their resources to forward traffic for Tor users. Now lets see how they work.
After encrypting the data package 3 times, its ready for sendoff. Unlike regular network, the data package is not going directly from Alvin to Barbara.
Its first stop is the entry node the first router or node as they call it.
In order for the data package to reach the entry node it must be addressed to it, right? So, the package contains information about the receiver and the sender, in other words Alvin and the entry node.
Once the data package reaches the entry node its being decrypted only one time. One layer of encrypted information peels and the other will be peeled when it reaches the middle node.
Once the data package reaches the middle node the process repeats one more layer of encryption down.
It kind of reminds the onion layers, no? The package that reached the middle node contains a different set of information about the sender and the receiver: the sender is the entry node and the receiver is the middle node.
Now, Alvins message is sent to the last router, the exit node. The last layer of encryption is peeled at the exit node.
The information of the data package that exit node has received is again different. It contains info about the middle node as the sender and the receiver the exit node.
Once the message has been decrypted at the exit node, it is finally ready for Barbara.
Barbara gets the message that Alvin sent her, but the information about the sender and receiver is different.
Barbara knows it came from Alvin, because he probably signed it, but if anybody intercepts the message and tries to find out who sent it to Barbara, the data package will only give him information about the exit node as the sender.
The only possible way to reconstruct the journey of the message is to have access to all routers and have all three decryption keys.
So, now that you know how Tor works, if you still feel you need more protection, try using VPN with Tor, but thats the story for another time.
The articles and content found on Dark Web News are for general information purposes only and are not intended to solicit illegal activity or constitute legal advice. Using drugs is harmful to your health and can cause serious problems including death and imprisonment, and any treatment should not be undertaken without medical supervision.
The rest is here:
TOR Browser - darkwebnews.com
- 3 ways to browse the web anonymously - We Live Security - January 27th, 2020
- What is a Bitcoin mixer and how does it work? - CryptoTicker - January 27th, 2020
- Digital surveillance threats for 2020 - The Star, Kenya - January 18th, 2020
- Teejayx6 Will Steal Your Identityand Rap About It - WIRED - December 2nd, 2019
- Such as the struggle of the Venezuelan economy, some residents turn to a lucrative gig: Cybercrime - Herald Journalism 24 - December 2nd, 2019
- Smart users guide to the snooping game - Livemint - November 17th, 2019
- Privacy on your smartphone: how to protect your data - AndroidPIT - November 17th, 2019
- BBC News heads to the dark web with new Tor mirror - The Verge - October 27th, 2019
- The Tor Project releases Tor Browser 9.0 with several UX improvements - Neowin - October 27th, 2019
- Fraudulent Tor Browser Spies and Has Been Stealing The Bitcoins - GoodTime Nation - October 27th, 2019
- OnionShare Lets Anyone Host Anonymous Sites on the Dark Web - BleepingComputer - October 16th, 2019
- #SecTorCa: Millions of Phones Leaking Information Via Tor - Infosecurity Magazine - October 16th, 2019
- Is there anything we can do to stop someone spying on us? - Newstalk 106-108 fm - August 25th, 2017
- If you're really concerned about browser security, Incognito isn't enough - TechRepublic - August 20th, 2017
- The Daily Stormer has lost its lease, accessible only via Tor browser - The Moderate Voice - August 20th, 2017
- Tor Project 'disgusted' by Daily Stormer, defends software ethos - CNET - August 18th, 2017
- Neo-Nazi site Daily Stormer resurfaces with Russian domain following Google and GoDaddy bans - Vox - August 16th, 2017
- Tor Browser 7.0.4 Download - TechSpot - August 14th, 2017
- Debian-Based Tails 3.1 Anonymous OS Debuts with Tor Browser 7.0.4, Linux 4.9.30 - LXer (press release) - August 11th, 2017
- Tails 3.1 has been released but you'll need to do a manual upgrade - Neowin - August 10th, 2017
- China and Russia go further in squelching Internet freedom - Washington Post - August 10th, 2017
- The FBI Booby-Trapped a Video to Catch a Suspected Tor ... - Motherboard - August 9th, 2017
- Major Improvements Are Coming Soon to the Tor Browser - The Merkle - August 8th, 2017
- The Attack on Global Privacy Leaves Few Places To Turn - WIRED - August 4th, 2017
- Tor Co-Founder: There Is No Dark Web The Merkle - The Merkle - August 3rd, 2017
- Online privacy protection - Choice - CHOICE - August 2nd, 2017
- There Is Basically No Dark Web. It's Only A Few Webpages TOR Co-founder - Fossbytes - July 31st, 2017
- How to Install Tor Browser for Mac and Protect Your Online Activity - iDrop News - July 29th, 2017
- How to get around an ISP blocking a website - MyBroadband - July 26th, 2017
- Don't blame online anonymity for dark web drug deals. - Slate Magazine (blog) - July 26th, 2017
- Tor network will pay you to hack it through new bug bounty program ... - ZDNet - July 21st, 2017
- Tor Project to launch public bug bounty project - CIO Dive - July 21st, 2017
- How to access the dark web - The Daily Dot - July 20th, 2017
- Your Mailman Is a Drug Dealer. He Just Doesn't Know It. - WNYC - July 20th, 2017
- Want porn? Prove your age (or get a VPN) Naked Security - Naked Security - July 20th, 2017
- Suspected AlphaBay founder dies in Bangkok jail after shutdown of online black market - Washington Post - July 19th, 2017
- S. Sudan blocks Sudan Tribune website over hostile coverage - Sudan Tribune - July 19th, 2017
- Assassins and child porn; a darknet offers everything - The Slovak Spectator - July 19th, 2017
- Apple users warned of dangerous new Mac malware that steals banking credentials - ThaiVisa News - July 18th, 2017
- The best security apps to lock down your Android phone - The Daily Dot - July 14th, 2017
- Mozilla is held to a higher standard - Ghacks Technology News - July 14th, 2017
- Privacy blunder? Firefox's Get Add-ons page uses Google Analytics - Ghacks Technology News - July 13th, 2017
- Russia, China vow to kill off VPNs, Tor browser - The Register - July 11th, 2017
- How to safely search the deep web - The Age - The Age - July 11th, 2017
- ACLU's Gillmor on privacy: 'We pay for what we value' (Q&A) - The Parallax (blog) - July 10th, 2017
- What is Tor browser, and is it safe? | Komando.com - July 7th, 2017
- Darknet 101: Your guide to the badlands of the internet - CNET - CNET - July 5th, 2017
- In Reporting on North Korea, Tech Helps Break Through Secrecy - New York Times - July 5th, 2017
- How to safely search the deep web - The Sydney Morning Herald - July 5th, 2017
- How To Search The Deep Web Safely - Gizmodo Australia - July 5th, 2017
- Burleson man convicted of accessing child porn from dark website - Fort Worth Star Telegram - July 4th, 2017
- Here Brazilian Journalists Learn Privacy for Themselves and Their Sources - Brazzil.com - June 30th, 2017
- Purism aims to push privacy-centric laptops, tablets and phones to market - Computerworld - June 29th, 2017
- Brazilian site teaches journalists how to protect sources and personal data from digital attacks - Knight Center for Journalism in the Americas (blog) - June 29th, 2017
- The best ways to make your search private in 2017 - KnowTechie - June 28th, 2017
- Bill regulating online anonymizers unanimously passes first ruling in Russian Duma - Washington Times - June 24th, 2017
- The Burger King Ad That Activated Google Home Just Won A Prestigious Award - XDA Developers (blog) - June 24th, 2017
- Mozilla's new Android browser blocks ads and trackers - Boing Boing - June 22nd, 2017
- Secure OS Tails 3.0 Launches With Debian 9 Base, Redesigned ... - Tom's Hardware - June 15th, 2017
- Tails OS hits version 3.0, matches Debian's pace but bins 32-bit systems - The Register - June 14th, 2017
- Tor Browser 7.0 is released | The Tor Blog - June 10th, 2017
- Tor Browser 7.0 works harder to protect your anonymity on its own - Engadget - June 10th, 2017
- Tor Browser 7.0 released - gHacks Tech News - Ghacks Technology News - June 8th, 2017
- Tor Browser 7.0 arrives with multiprocess mode, content sandbox, and Unix domain sockets - VentureBeat - June 7th, 2017
- Wikipedians Want to Put Wikipedia on the Dark Web - Motherboard - June 7th, 2017
- What The Dark Web Is And How To Access It - Komando - June 3rd, 2017
- What is Deep Web and How is it Different from Dark Web - Guiding Tech (blog) - June 1st, 2017
- If You Think WannaCry is Huge, Wait for EternalRocks - Data Center Knowledge - June 1st, 2017
- DOJ, FBI Executives Approved Running a Child Porn Site - Motherboard - May 30th, 2017
- What is Tor, How It Works And Where to Download the Tor Browser? Everything You Need To Know - MobiPicker - May 30th, 2017
- WannaCry 2.0: EternalRocks author calls it quits - TheINQUIRER - The INQUIRER - May 28th, 2017
- Data For Sale: What Everyday Consumers Can Do To Keep Their Info Safe - Forbes - May 26th, 2017
- Fearing surveillance in the age of Trump, activists study up on digital anonymity - Washington Post - May 26th, 2017
- EternalRocks Attack Spreads While Using Same Exploit As WannaCry Ransomware - Yahoo News UK - May 23rd, 2017
- Tor browser for Android that is better than Orfox is in the works - Android Kenya (blog) - May 23rd, 2017
- Organizations Can Combat WannaCry & Jaff Ransomware With Well Instrumented DNS - Techzone360 - May 23rd, 2017
- This Spy App Can See If You've Visited Whistleblowing Sites on the Dark Web - Motherboard - May 20th, 2017
- Why Nigerian CIOs should care about the dark web - ITWeb Africa - May 20th, 2017
- A hack has put data of 17 million Zomato users at risk: Should India be worried? - DailyO - May 20th, 2017
- New Jaff Ransomware Part Of Active Necurs Spam Blitz - Threatpost - May 13th, 2017