Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Going Dark: The Internet Behind The Internet
NPR ^ | May 25, 2014

Posted on 05/26/2014 12:49:19 PM PDT by Mean Daddy

The average computer user with an Internet connection has access to an amazing wealth of information. But there's also an entire world that's invisible to your standard Web browser.

These parts of the Internet are known as the Deep Web. The tools to get to there are just a few clicks away, and more and more people who want to browse the Web anonymously are signing on.

Fans of the series House of Cards might recall the Deep Web being worked into the plot of latest season. The character Lucas, a newspaper editor who was trying find a hacker, gets a little crash course from one of his reporters:

"Ninety-six percent of the Internet isn't accessible through standard search engines. Most of it's useless but it's where you go to find anything and everything: child porn, Bitcoin laundry, narcotics, hackers for hire ..."

(Excerpt) Read more at npr.org ...


TOPICS: News/Current Events
KEYWORDS: deepweb; internet; tor
About fell out of my chair seeing this was a NPR article.
1 posted on 05/26/2014 12:49:19 PM PDT by Mean Daddy
[ Post Reply | Private Reply | View Replies]

To: Mean Daddy

NSA planted article. “Hey, all you dissidents and terrorists ... over here, it’s safe.” Love, PT


2 posted on 05/26/2014 12:58:58 PM PDT by NonValueAdded (Operating out of weakness? Imagine if he was working from a position of strength!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mean Daddy

What’s the status of us “giving” control of internet to Chinese?


3 posted on 05/26/2014 1:06:54 PM PDT by CincyRichieRich (Living in the midst of a silently coup.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: NonValueAdded

Edward Snowden’s going to release a list of Americans spied on...


4 posted on 05/26/2014 1:10:32 PM PDT by GOPJ (Someone explain why {the MSM} uses the term liberal to describe totalitarian sociopaths? BruceinOz)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Mean Daddy

Odd article. Why would any normal person want access to child porn, money laundering, or drug gangsters?


5 posted on 05/26/2014 1:24:32 PM PDT by Cicero (Marcus Tullius)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cicero
that's not what the article is about..
6 posted on 05/26/2014 1:44:57 PM PDT by Chode (Stand UP and Be Counted, or line up and be numbered - *DTOM* -vvv- NO Pity for the LAZY - 86-44)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Mean Daddy

If I were going to use this, I’d get a cheap $350.00 Windows machine and use it for nothing else. Too much can go wrong.


7 posted on 05/26/2014 2:06:00 PM PDT by libstripper
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cicero
. . . normal person . . . .

That's the point. These aren't normal people. They are people looking for, or looking to provide, illicit, dangerous servics and products. People who will kill anyone you want for $5,000, or who will provide services to people with serious, deadly STDs because they also have serious, deadly STDs, are there. The drug cartels looking to find people they want to kill, are there, asking for help in finding their targets. People willing to do things or asking for things you don't even want to think about, are there.

I only know these things because of a report done by one of our local newscasts. I wouldn't go on the deeper internet for anything in the world.
8 posted on 05/26/2014 2:25:12 PM PDT by righttackle44 (Take scalps. Leave the bodies as a warning.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: righttackle44

What hath Al Gore wrought?


9 posted on 05/26/2014 3:04:45 PM PDT by OldNewYork
[ Post Reply | Private Reply | To 8 | View Replies]

To: Mean Daddy; rdb3; Calvinist_Dark_Lord; JosephW; Only1choice____Freedom; amigatec; Still Thinking; ..

10 posted on 05/26/2014 3:16:18 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mean Daddy

The CIA and FBI are probably all over it


11 posted on 05/26/2014 3:18:21 PM PDT by GeronL (Vote for Conservatives not for Republicans)
[ Post Reply | Private Reply | To 1 | View Replies]

To: NonValueAdded

Nah! TOR networks are as secure as you can get.

The best analogy I can muster is like this:

The Internet as we know is like a four-course meal. You can pick your amuse bouche, you dabble in others; you pick your meat and cut and how you want it cooked; you pick your dessert. The difference is that there are menus all over (i.e. Google, Bing, Yahoo) that tell you what you’re eating, and the cooks in the back (i.e. anyone monitoring Internet traffic) know how to cook your meals and deliver the same food consistently.

TOR is like a soup. Every ingredient is thrown in, nothing is measured, it’s all by taste or “feel.” There could be too much salt in one batch, too little in another, and there are thousands of chefs just adding what they think would be good. There’s no consistency.

TOR traffic cannot be sniffed or deciphered the same as the Internet. You could get a couple of packets from a secret document, but you’ll never find all of it. You also don’t know from where it came nor to where it’s destined. The only entities that know are the sender and the receiver. That’s it.

TOR is an exciting but terrifying place. There’s a lot of stuff that’s just downright awful about it, but for the safety of my data and my privacy, I take the good with the bad.


12 posted on 05/26/2014 3:55:00 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: GeronL

TOR was developed by the Navy to securely send and receive traffic without revealing the sender. You can bet your bottom dollar that the government is out there using it, but I can tell you personally that they can’t decipher it all.

TOR traffic is over 70% of active web traffic at any time.


13 posted on 05/26/2014 3:56:30 PM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: libstripper

No, what you need is a virual machine and Tor.


14 posted on 05/26/2014 4:11:42 PM PDT by The Antiyuppie ("When small men cast long shadows, then it is very late in the day.")
[ Post Reply | Private Reply | To 7 | View Replies]

To: rarestia
TOR networks are as secure as you can get.

You forgot the /sarc tag, right?

15 posted on 05/26/2014 4:27:58 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 12 | View Replies]

To: righttackle44
These aren't normal people. They are people looking for, or looking to provide, illicit, dangerous servics and products. People who will kill anyone you want for $5,000, or who will provide services to people with serious, deadly STDs because they also have serious, deadly STDs, are there. The drug cartels looking to find people they want to kill, are there, asking for help in finding their targets. People willing to do things or asking for things you don't even want to think about, are there.

In a related story: Govt. Workers Surf Port on Job

16 posted on 05/26/2014 4:32:47 PM PDT by COBOL2Java (I'm a Christian, pro-life, pro-gun, Reaganite. The GOP hates me. Why should I vote for them?)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Cicero
Odd article. Why would any normal person want access to child porn, money laundering, or drug gangsters?

There are people stupid enough to believe that 'the givernment' would not just ignore such a place, but suggest where you might find it.

Such people are ratings bonanza material for self-righteous liberal media whores like Geraldo, Dan Rather, Diane Sawyer, etc.

17 posted on 05/26/2014 4:56:38 PM PDT by IncPen (When you start talking about what we 'should' have, you've made the case for the Second Amendment)
[ Post Reply | Private Reply | To 5 | View Replies]

To: ShadowAce

Thanks for the ping.


18 posted on 05/26/2014 5:50:57 PM PDT by GOPJ (Someone explain why {the MSM} uses the term liberal to describe totalitarian sociopaths? BruceinOz)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Cicero
Odd article. Why would any normal person want access to child porn, money laundering, or drug gangsters?

Exactly.

I *AM* interested, however, in money porn, drug laundering, and child gangsters.

19 posted on 05/26/2014 5:54:01 PM PDT by Lazamataz (Early 2009 to 7/21/2013 - RIP my little girl Cathy. You were the best cat ever. You will be missed.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: NonValueAdded
"NSA planted article. “Hey, all you dissidents and terrorists ... over here, it’s safe.” Love, PT"

Interesting... Tor: Overview

Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.

But also they claim:

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.


20 posted on 05/26/2014 6:51:37 PM PDT by uncommonsense (Liberals see what they believe; Conservatives believe what they see.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: righttackle44

You believe everything the media tells you?


21 posted on 05/26/2014 6:55:39 PM PDT by Lurker (Violence is rarely the answer. But when it is it is the only answer.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: righttackle44

I used TOR to skip past my work’s security firewall (FR was blocked) to read FR when I had free time. Slipped right through ;^)


22 posted on 05/26/2014 7:27:45 PM PDT by Bikkuri (Molon Labe)
[ Post Reply | Private Reply | To 8 | View Replies]

To: ShadowAce

OT, but I FINALLY found a perfect music player (for Linux).. Qmmp... looks and feels like WinAmp (even uses WinAmp skins).. ..no skips since it goes straight through ALSA (doesn’t go through Pulse) :) (sound is excellent ;^))


23 posted on 05/26/2014 7:30:37 PM PDT by Bikkuri (Molon Labe)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Bikkuri

Note that it IS possible to detect that you are using such a program. Depending on how large your employer is, what their resources are, and how interested they are, there are other ways of finding out what you are up to (keyboard capture, screen monitoring, etc).


24 posted on 05/26/2014 9:51:15 PM PDT by The Antiyuppie ("When small men cast long shadows, then it is very late in the day.")
[ Post Reply | Private Reply | To 22 | View Replies]

To: Mean Daddy
I almost tried ToR and found virus after virus, and that was before I even installed
the app to use it. Access through ToR is trapped with all types of viruses and apps that
want access permissions to your computer. And it's undetectable? That's not even funny.
25 posted on 05/26/2014 10:00:54 PM PDT by MaxMax (Pay Attention and you'll be pissed off too! FIRE BOEHNER, NOW!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: The Antiyuppie

Public School (Japan)... No corporate secrets they have to worry about ;^)
Not even sure Japan knows what TOR is yet.


26 posted on 05/27/2014 3:39:33 AM PDT by Bikkuri (Molon Labe)
[ Post Reply | Private Reply | To 24 | View Replies]

To: ShadowAce

By what measure are you defining security, Shadow? TOR is much more secure with regards to obfuscation than unencrypted Internet traffic. Certainly you’re better off with securing transactions via SSL/TLS, but if you want to be “anonymous,” TOR is the way to go. I meant secure inasmuch as anonymous. I think it’s pretty well understood that TOR is not for the meek or stupid.


27 posted on 05/27/2014 5:42:28 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: rarestia
Just about anyone can operate an exit node on the TOR network. If this network exists, and the gov't hasn't shut it down, then you know they are running a ton of exit nodes.

When one has control over an exit node, one can sniff packets, compare them to other packets on other nodes you control, and put together a reasonable idea of what is going on. While TOR *may* be safe from individuals, it most certainly is not safe from the US.

28 posted on 05/27/2014 6:05:30 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 27 | View Replies]

To: ShadowAce

Ah, okay. I wasn’t thinking from that angle. I run my own exit nodes along with several very close techie friends, so we know our data routes. You are correct, however, if the government runs an exit node that’s masquerading as “secure,” they can intercept the data. If it’s encrypted, however, they’re SOL without the private keys or at least an asymmetric key or hash.


29 posted on 05/27/2014 7:09:04 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 28 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson