The dark Web refers to a part of the Internet not indexed by standard search engines like Google or Bing. It exists on darknets and overlay networks requiring access to specific software, configurations, or authorisation. The most common method of accessing the dark Web is the Tor (The Onion Router) browser, which provides anonymity to users and site operators.

Key Features of the Dark Web:

  1. Anonymity:
    • Both users and website operators can remain anonymous.
    • Websites use .onion domains that can only be accessed via Tor or similar software.
  2. Not Indexable by Search Engines:
    • Dark web content is hidden from regular search engines. Special directories or forums may provide links, but these resources are not easily searchable.
  3. Content:
    • Legitimate uses: Privacy-focused communications, journalism, forums, or marketplaces where free speech is restricted.
    • Illegitimate uses: Often associated with illegal activities such as drug sales, counterfeit documents, weapons, hacking tools, and stolen data.
  4. Accessing the Dark Web:
    • Requires specific software such as:
      • Tor Browser: Masks the user’s location and encrypts their browsing.
      • I2P (Invisible Internet Project): Aims to anonyanonymisevities like file sharing or messaging.
  5. Risks:
    • Legal Risks: In most jurisdictions, engaging in unlawful activities is punishable by law while accessing the website.
    • Cyber Threats: Users risk encountering scams, malware, or phishing.
    • Ethical Concerns: Some activities may violate ethical norms even if they are not outright illegal.
  6. Use Cases:
    • Journalists and Activists: To communicate securely and anonymously, especially in repressive regimes.
    • Whistleblowers: Platforms like SecureDrop operate on the dark Web to allow safe information sharing.
    • Criminal Activities: Illicit marketplaces like the now-defunct Silk Road have gained notoriety for illegal trade.

How Is It Different from the Deep Web?

  • Deep Web refers to all parts of the Internet that are not indexed by search engines, such as email inboxes, online banking portals, and private databases.
  • Dark Web: A subset of the deeWebeb that requires special tools to access and often focuses on anonymity.

Safety Tips:

  • Use a secure and updated Tor browser.
  • Avoid clicking on unknown links.
  • Never share personal information.
  • Use a Virtual Private Network (VPN) for added security.
  • Do not engage in illegal activities.

Tor (The Onion Router) was invented to enable secure and anonymous online communication. Its origins are deeply tied to the U.S. government and academic research, particularly for protecting sensitive communications. Here’s an overview of its invention and evolution:


Early Development (1990s)

  1. The Concept of Onion Routing:
    • Onion routing was first conceptualised in the mid-1990s by U.S. Naval Research Laboratory (NRL) researchers, specifically Paul Syverson, Michael Reed, and David Goldschlag.
    • It was developed to anonymise communications by routing internet traffic through multiple servers (nodes) and encrypting data in layers, like the layers of an onion.
  2. Purpose:
    • The original goal was to protect U.S. intelligence communications.
    • The researchers aimed to secure online communication for government officials, journalists, and other users needing privacy.

Prototype and Initial Implementation (1990s–2002)

  • In the late 1990s, the NRL developed the first functional onion routing prototype.
  • The project showed that routing traffic through multiple servers could obscure the source and destination, providing anonymity.

The Creation of Tor (2002–2004)

  1. Tor Project Origins:
    • In 2002, the onion routing project was released to the public as The Onion Router (Tor).
    • The goal was to involve a more extensive user base, making the system more robust and challenging to track. A large user base creates more “noise,” making it difficult to identify individual users.
  2. Public Release:
    • The Tor Project was officially launched in 2004.
    • The project received funding from various sources, including the U.S. Department of Defense and other government agencies, but its open-source nature allowed anyone to contribute.

Expansion and Development (2004–Present)

  1. Open Source and Collaboration:
    • Tor was made open source, allowing developers worldwide to contribute to its improvement.
    • The broader community of privacy advocates, developers, and organisations to use and enhance Tor.
  2. Funding:
    • Early funding came from the U.S. government, including the Defense Advanced Research Projects Agency (DARPA) and the State Department.
    • Over time, it received funding from organ-organisations the Electronic Frontier Foundation (EFF), the Open Technology Fund, and private donations.
  3. Tor Browser:
    • In 2008, the Tor Project launched the Tor Browser, a user-friendly application that made accessing the Tor network easier for non-technical users.
    • It included built-in privacy tools, such as blocking trackers and disabling browser fingerprinting.
  4. Use Cases:
    • While initially designed for government use, Tor quickly gained popularity among journalists, activists, whistleblowers, and privacy-conscious users.
    • It also became associated with controversial uses, such as access to the dark Web and illegal activities, although these represent only a portion of its use.

Technical Design

  • Onion Routing:
    • Data is encrypted in layers and sent through multiple nodes.
    • Each node peels off one layer of encryption, revealing the next node to which to forward the data.
    • The final node (exit node) sends the data to its destination without revealing the origin.
  • Anonymity Features:
    • No single node knows both the source and destination of the traffic.
    • Encryption prevents eavesdropping on the content of the communication.

Impact

  1. For Privacy Advocates:
    • Tor is critical for protecting online privacy and freedom of expression, particularly in repressive regimes.
  2. For Governments:
    • Tor is used by government agencies, including law enforcement, for undercover investigations and secure communication.
  3. For Controversial Activities:
    • Tor has been used for illicit activities on the dark Web, such as accessing black mWebets, leading to debates about the balance between privacy and security.

The Invisible Internet Project (I2P) is a decentralised, privacy-focused network designed to provide secure and anonymous communication over the Internet. Like Tor, it allows users to browse, share files, and communicate anonymously, but with a slightly different architecture and focus.


Key Features of I2P

  1. Anonymity:
    • I2P anonymises the identity of both the sender and receiver by routing traffic through multiple nodes.
    • It uses end-to-end encryption to protect data as it moves through the network.
  2. DecenDecentraliseditecture:
    • Unlike traditional networks, I2P is completely decentralised, with no central servers or points of failure.
    • Users contribute bandwidth to support the network.
  3. Peer-to-Peer Communication:
    • I2P is optimised peer-to-peer (P2P) activities like file sharing, hosting anonymous websites, and private messaging.
  4. Internal Sites (Websites):
    • Websites hosted within the I2P network are called Eepsites.
    • They use the .i2p domain and are only accessible through the I2P network, providing a secure alternative to traditional Internet hosting.
  5. Focus on Internal Network:
    • Unlike Tor, which is often used to access the regular Internet anonymously (via exit nodes), I2P is designed to operate primarily within its network.
    • While accessing the external Internet via I2P is possible, its primary focus is secure, internal communication.

How I2P Works

  1. Tunnels Instead of Circuits:
    • I2P creates two types of encrypted tunnels for each user:
      • Inbound tunnels: Routes incoming data to the user.
      • Outbound tunnels: Routes outgoing data from the user.
    • This separation ensures added security and anonymity.
  2. Garlic Routing:
    • I2P uses garlic routing, an enhancement of Tor’s onion routing.
    • Multiple encrypted messages (cloves) are bundled into a single packet (a garlic bulb).
    • This makes traffic analysis more challenging and reduces metadata leakage.
  3. Distributed Network Database:
    • I2P uses a distributed hash table (DHT) to maintain a decendecentralisedctory of peers and resources.
    • This ensures that the network remains operational even if some nodes go offline.

Applications of I2P

  1. Anonymous Websites (Websites):
    • Users can host websites or blogs anonymously using I2P.
    • These sites are inaccessible to regular browsers.
  2. File Sharing:
    • I2P supports P2P file-sharing protocols like BitTorrent and iMule (an anonymous eMule version).
    • It is commonly used for sharing open-source software and other data securely.
  3. Messaging:
    • I2P offers anonymous email and messaging services, such as I2P-Bote.
  4. DecenDecentralisedications:
    • Developers can build decendecentralisedications on I2P for privacy-focused use cases.
  5. Anonymous Communication:
    • Activists, journalists, and individuals in repressive regimes can use I2P to communicate securely and bypass censorship.

Differences Between I2P and Tor

FeatureI2PTor
Primary FocusInternal communication and P2P useAccess to regular Internet anonymously
Routing ProtocolGarlic routingOnion routing
Exit NodesNone (mostly internal network)Uses exit nodes for internet access
DecenDecentralisationy decendecentralisedcentrcentralisedctory
PerformanceOptimOptimisedP2P and local networksOptimOptimisedbrowsing regular websites

Advantages of I2P

  • Strong peer-to-peer performance.
  • Fully decendecentraliseducing points of failure.
  • Enhanced privacy with garlic routing.
  • Versatility for applications like anonymous hosting and file sharing.

Disadvantages of I2P

  • A smaller user base than Tor may limit anonymity and resource availability.
  • Slower speeds compared to the regular Internet due to encryption and multiple routing layers.
  • Less user-friendly compared to Tor.

I2P is an excellent tool for those prioritising anonymity and privacy, especially for internal communications and hosting. However, it is less suited for accessing the regular Internet than Tor. Would you like guidance on how to use I2P or more technical details?

Explore More

What is the World Wide Web?

What is the World Wide Web? The World Wide Web (WWW), often called “the web,” is a system of interlinked documents, media, and other resources accessible through the Internet. Created

Understanding the Structure of the Internet

Understanding the Structure of the Internet The Internet is a vast and complex network that connects billions of devices around the globe. But how does it all work? The Internet

How does Google search?

Google Search operates using an intricate system designed to index, rank, and deliver the most relevant information from the web. Here’s an overview of how it works: 1. Crawling Google