Professional Documents
Culture Documents
Humanity at War
Never share your identities with anyone else even though you do it
through social media. Sharing identities through social media have the
most likely to “open personal doors’, which mean everyone can read and
position you with their most possible plans and actions. Reading
someone’s likes and dislikes, for example, is easily identified and stored
in digital internet traces. You cannot erase each and every single trace
of what you did in the Internet. Once you release your identity such
eating habits, personal preferences to travel tourism places, personal
views about life and death, and many other related spotlights in human’s
personality. Everything in the web can be accessed through specific
software, configurations, or authorization. It is similar to human’s
personality which can be identified, either physical or metaphysical
authorization. Who possibly can access it?
Dark web where the most possible world wide web containing tons of
human’s syndicate to operate political dissidents, violate banking
systems, or keep medical conditions secret is the Internet world part of
deep web that modern humanity must anticipate from any possible
misuse and misconduct. The web has been characterized as a high
degree of anonymity for those who are involved in. Therefore, whoever
operates the transactional communication through dark web, they are
difficult to be identified as everyone has specific encrypted codes to
maintain their privacy and freely express their viewpoints.
Common search engines known as the surface web, such as Google or
Yahoo cannot show the communication of the deep web as the public
search engines are indexed by netizen publicly. The deep web operated
by governments, organizations, or hackers, however, rests below the
surface and accounts for 90% of all websites. As long as we, as ordinary
people, browse the Internet through Google, Yahoo, or any other similar
common search engine, we only access the websites in 10% of all
websites we have ever visited.
When the dark web is inevitably abused by someone who commits
crimes, privacy through dark web to its users is easily violated and
stolen. Hackers, who are able to violate and steal people’s identities,
such as private photos, medical records, and financial information can
share those identities with others in the dark web, which is out of our
1|Page
Week 11 Reading Between the Lines
Supervised by Muchamad Adam Basori
2|Page