Skip to comments.Going Dark: The Internet Behind The Internet
Posted on 05/26/2014 12:49:19 PM PDT by Mean Daddy
The average computer user with an Internet connection has access to an amazing wealth of information. But there's also an entire world that's invisible to your standard Web browser.
These parts of the Internet are known as the Deep Web. The tools to get to there are just a few clicks away, and more and more people who want to browse the Web anonymously are signing on.
Fans of the series House of Cards might recall the Deep Web being worked into the plot of latest season. The character Lucas, a newspaper editor who was trying find a hacker, gets a little crash course from one of his reporters:
"Ninety-six percent of the Internet isn't accessible through standard search engines. Most of it's useless but it's where you go to find anything and everything: child porn, Bitcoin laundry, narcotics, hackers for hire ..."
(Excerpt) Read more at npr.org ...
NSA planted article. “Hey, all you dissidents and terrorists ... over here, it’s safe.” Love, PT
What’s the status of us “giving” control of internet to Chinese?
Edward Snowden’s going to release a list of Americans spied on...
Odd article. Why would any normal person want access to child porn, money laundering, or drug gangsters?
If I were going to use this, I’d get a cheap $350.00 Windows machine and use it for nothing else. Too much can go wrong.
What hath Al Gore wrought?
The CIA and FBI are probably all over it
Nah! TOR networks are as secure as you can get.
The best analogy I can muster is like this:
The Internet as we know is like a four-course meal. You can pick your amuse bouche, you dabble in others; you pick your meat and cut and how you want it cooked; you pick your dessert. The difference is that there are menus all over (i.e. Google, Bing, Yahoo) that tell you what you’re eating, and the cooks in the back (i.e. anyone monitoring Internet traffic) know how to cook your meals and deliver the same food consistently.
TOR is like a soup. Every ingredient is thrown in, nothing is measured, it’s all by taste or “feel.” There could be too much salt in one batch, too little in another, and there are thousands of chefs just adding what they think would be good. There’s no consistency.
TOR traffic cannot be sniffed or deciphered the same as the Internet. You could get a couple of packets from a secret document, but you’ll never find all of it. You also don’t know from where it came nor to where it’s destined. The only entities that know are the sender and the receiver. That’s it.
TOR is an exciting but terrifying place. There’s a lot of stuff that’s just downright awful about it, but for the safety of my data and my privacy, I take the good with the bad.
TOR was developed by the Navy to securely send and receive traffic without revealing the sender. You can bet your bottom dollar that the government is out there using it, but I can tell you personally that they can’t decipher it all.
TOR traffic is over 70% of active web traffic at any time.
No, what you need is a virual machine and Tor.
You forgot the /sarc tag, right?
In a related story: Govt. Workers Surf Port on Job
There are people stupid enough to believe that 'the givernment' would not just ignore such a place, but suggest where you might find it.
Such people are ratings bonanza material for self-righteous liberal media whores like Geraldo, Dan Rather, Diane Sawyer, etc.
Thanks for the ping.
I *AM* interested, however, in money porn, drug laundering, and child gangsters.
Interesting... Tor: Overview
Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.
But also they claim:
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.
You believe everything the media tells you?
I used TOR to skip past my work’s security firewall (FR was blocked) to read FR when I had free time. Slipped right through ;^)
OT, but I FINALLY found a perfect music player (for Linux).. Qmmp... looks and feels like WinAmp (even uses WinAmp skins).. ..no skips since it goes straight through ALSA (doesn’t go through Pulse) :) (sound is excellent ;^))
Note that it IS possible to detect that you are using such a program. Depending on how large your employer is, what their resources are, and how interested they are, there are other ways of finding out what you are up to (keyboard capture, screen monitoring, etc).
Public School (Japan)... No corporate secrets they have to worry about ;^)
Not even sure Japan knows what TOR is yet.
By what measure are you defining security, Shadow? TOR is much more secure with regards to obfuscation than unencrypted Internet traffic. Certainly you’re better off with securing transactions via SSL/TLS, but if you want to be “anonymous,” TOR is the way to go. I meant secure inasmuch as anonymous. I think it’s pretty well understood that TOR is not for the meek or stupid.
When one has control over an exit node, one can sniff packets, compare them to other packets on other nodes you control, and put together a reasonable idea of what is going on. While TOR *may* be safe from individuals, it most certainly is not safe from the US.
Ah, okay. I wasn’t thinking from that angle. I run my own exit nodes along with several very close techie friends, so we know our data routes. You are correct, however, if the government runs an exit node that’s masquerading as “secure,” they can intercept the data. If it’s encrypted, however, they’re SOL without the private keys or at least an asymmetric key or hash.