Skip to content

Davey Winder

delivering award-winning technology journalism since 1991

  • home
  • about me
  • follow me on mastodon
  • privacy policy
  • Toggle search form
hooded hacker against backdrop of code

Delving into the world of the Dark Web

Posted on March 8, 2016March 8, 2016 By Davey Winder

The Dark Web treads the line between being a saviour of free speech and the most extreme of criminal marketplaces.

Invisible to search engines such as Google, the Dark Web is made possible by darknets – networks which can only be accessed with specific software and authorisation – through networks where connections are made between trusted peers. The best known, and by far the most popular, darknet is the Onion Router (Tor), which was created by the US Naval Research Labs in the 90s as an enabler of secure communication and funded by the US Department of Defense. To navigate it you use the Tor browser, similar to Google Chrome or Internet Explorer apart from keeping the identity of the person doing the browsing a secret. Importantly, this secrecy also applies to what the user is looking at. It is because servers hosting websites on the Tor network, denoted by their .onion (dot onion) designation, are able to mask their location, originally to enable government dropsites and information silos to exist without trace, that when Tor software went public in 2003, the Dark Web became a reality. This combination of hidden servers and anonymous users enables a .onion version of Facebook for those who fear being spied upon, and empowers political activists to continue protests while protected from regimes that would take away more than their liberty. Unfortunately, Tor is also used by the criminal fraternity as a dark marketplace. Using a crawler bot that scraped the .onion sites accessible to it, researchers at King’s College London recently attempted to map criminal activity on the Dark Web. The results suggested some 57 per cent of Tor sites host illegal content.

Click here to read complete article

Cybercrime Tags:Cybercrime, Hacking, investigation

Post navigation

Previous Post: RSA 2016: Ex-NSA officer admits other countries could open encryption backdoors
Next Post: PhishLabs warns of Business Email Compromise attacks

Related Articles

Big Game Hackers Smash $1 Billion Ransomware Barrier Cybercrime
New iPhone Security Warning As Malicious Lockdown Mode Trick Revealed Apple
Gmail Hackers Leave Vital Clues Behind—Check These 3 Things Now Analysis
Top 5 Ways To Thwart The Coming Black Friday Ransomware Storm Cybercrime
ChatGPT Down As Anonymous Sudan Hackers Claim Responsibility AI
New Critical Security Warning For iPhone, iPad, Watch, Mac—Attacks Underway Analysis

Categories

Post Archive

Tags

0day Analysis Android Apple Apps breach bug bounty Business Chrome crime Cybercrime Data Protection Encryption Enterprise Google Government Hackers Hacking Health healthcare industry iOS IoT iPhone Malware Microsoft News NHS Opinion passwords Phishing Privacy ransomware Research Russia Samsung threat intelligence Twitter Update Vulnerabilites vulnerabilities Vulnerability Windows Windows 10 zero-day

Copyright © 2025 Davey Winder .

×
Cookies
We serve cookies. If you think that's ok, just click "Accept all". You can also choose what kind of cookies you want by clicking "Settings". Read our cookie policy
Settings Refuse all Accept all
Cookies
Choose what kind of cookies to accept. Your choice will be saved for one year. Read our cookie policy
  • Necessary
    These cookies are not optional. They are needed for the website to function.
  • Statistics
    In order for us to improve the website's functionality and structure, based on how the website is used.
  • Experience
    In order for our website to perform as well as possible during your visit. If you refuse these cookies, some functionality will disappear from the website.
  • Marketing
    By sharing your interests and behavior as you visit our site, you increase the chance of seeing personalized content and offers.
Save Refuse all Accept all
GDPR Cookie Policy