To understand this, you need to understand the structure of the Internet. The global network is conventionally divided into three layers:
• Superficial, or visible. This includes publicly available, open source web
resources. That is, any sites that can be visited using a standard link and found in search engines. • Deep. Includes content that does not hit search engines. The content of private cloud storage, corporate networks and various closed databases - all this is the deep Internet. Most often, access to such resources is protected by a username and password. • Dark, darknet. This is the collective name for computer networks designed for the anonymous transfer of information. There are also services for trade, communication and content exchange, but they cannot be opened through a standard browser or found in a regular search engine. DARKNET DarkNet is a hidden network, the connections of which are established only between trusted peers, sometimes referred to as "friends", using non-standard protocols and ports. An anonymous network is a system of unconnected virtual tunnels that provide encrypted data transmission. The DarkNet differs from other distributed peer-to-peer networks in that the file sharing is anonymous (since the IP address is not publicly available), and therefore users can communicate without much fear and government interference. The hidden network architecture impedes the monitoring of users and control over the transmission of information. Therefore, the darknet can be both a weapon against censorship and a screen for crime.
In Ukraine, as in most other countries,
the use of hidden networks is allowed. But many activities on the darknet are banned. With the advent of bitcoin, which allows money to be sent anonymously, the hidden internet has become a virtual black market. In addition to legal sites, the darknet is flooded with sites selling child pornography, stolen data, drugs, weapons and other illegal goods. How the darknet works? • Hidden networks exist in parallel to each other • TOR is currently being developed by the TOR and provide anonymity by various technical Project. The project has many sponsors among ordinary users and various scientific, technological means. For example, the largest of them is built and other institutions. Continuous development and on the principles of TOR (The Onion Router), relative ease of use have made the technology or onion routing. It is an encryption and data popular. Therefore, in popular culture, the darknet is transmission technology created by the staff of primarily associated with this hidden network. the US Navy Research Laboratory. • Journalists often contact informants through TOR. • It works like this. The message is wrapped in Facebook, The New York Times and the BBC are several layers of encryption, which begs the using it to stay accessible in totalitarian countries analogy with an onion. It is then passed through despite being blocked. For this, companies have many network nodes - the so-called onion created TOR versions of their sites on routers. Each of them peels off the protective • Another relatively well-known anonymous layer to find out the next node in the chain. As a network is I2P (Invisible Internet Project). result, no intermediary sees either the content or Enthusiasts from all over the world have been the entire route of the message. Full decryption developing it since 2004. The technical basis of occurs only on the recipient's side. the project provides a higher speed than TOR, and theoretically even greater security. • The project was created in the 1990s for military purposes. But later, the authors made • However, I2P lacks the means to grow rapidly. the TOR code publicly available so that the And in the current state, the tools for using this technology would serve to protect the rights and network are not convenient and simple enough freedoms of ordinary people. Now you can use for a wide audience. In terms of the number of it to access the darknet. users, I2P is significantly inferior to TOR.the darknet. Tor How to get on • Sites of this hidden network have special the darknet? addresses in the .onion zone. If you do not know where to start your acquaintance with Connecting to a hidden network is easier the darknet, you can visit these safe resources than you might think. To enter, TOR- through TOR: browser is most often used. It can be • The directory of links to popular dark web sites The downloaded for free from the official Hidden Wiki: website of the TOR Project. http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Pag e. Once launched, the program will display • Facebook: https://facebookcorewwwi.onion. prompts to help you configure it. As soon as the browser menu opens, you can start • BBC International: surfing. https://www.bbcnewsv2vjtpsuy.onion. • Search engine:DuckDuckGo Use only the official versions of the TOR- https://3g2upl4pq6kufc4m.onion. browser and update it regularly to keep the program as stable and secure as possible. Please note: due to the peculiarities of iOS, there is no official TOR application for this operating system. Why is the darknet There are enough people on the darknet who not only offer illegal goods and services, but dangerous? also try to steal or exploit other users. Of course, such people are also present on the regular Internet. But the anonymity of hidden networks allows them to operate more effectively. Typical threats to face on the darknet:
Cyber fraud. Don't be in a hurry
to buy anything. Having received the money, the anonymous person may not fulfill his obligations. In addition, phishing is common on hidden networks - theft of accounts and cryptocurrencies using fake websites. Shock content. Psychological attacks. Due to the lack of censorship on Manipulators and psychopaths can the dark web, it is easier to stumble attack victims on the dark web upon explicit or violent content, with impunity. The most even if you are not looking for it on dangerous are capable of driving a purpose. Therefore, impressionable person with an unstable psyche to people should carefully choose suicide. resources for surfing. Hackers' actions. You can simply be hacked to steal money or personal data. At the very least, you shouldn't click on unknown links and download suspicious files. Be careful with it If you yourself intend to break the law and think that the darknet will provide you with impunity, think again. Although hidden networks are private, through carelessness or due to technical illiteracy, you can still reveal your identity. For example, it is enough to accidentally download a Trojan from the darknet or leave contacts in an inappropriate place. Thanks for attention