DEV Community

Cover image for Exploring the Dark Web’s Hidden Secrets
Arun Ammisetty
Arun Ammisetty

Posted on

Exploring the Dark Web’s Hidden Secrets

Web and Internet: Understanding the Difference

When it comes to the world of technology, it is important to understand the distinction between the web and the internet. While these terms are often used interchangeably, they actually refer to different things. The internet is a global network of interconnected devices and servers that allows for the transfer of information between them. On the other hand, the web refers specifically to the collection of websites and web pages that are accessible through the internet. Understanding this difference is crucial for anyone who wants to navigate the digital world effectively.

The ARPANET, known as the Advanced Research Projects Agency Network, was a groundbreaking wide-area packet-switching network that utilized distributed control. It was also among the earliest networks to incorporate the TCP/IP protocol suite. Its primary aim was to improve computer accessibility, upgrade computer hardware, and establish a more effective communication system for military purposes.

The web is a digital platform that allows for the exchange and dissemination of data between connected devices. Its software layer acts as a facilitator, ensuring that information can be shared seamlessly across all computers within the network. This platform provides a means for individuals and organizations to share ideas and collaborate with ease, regardless of their geographic location.

The web & internet provides a diverse array of software options, including File Transfer Protocols (FTP) and email exchange protocols, that facilitate seamless transfer of files and information between computers. To access the web and interact with it, users can utilize web browsers such as Chrome, Safari, and Bing. These browsers are equipped with advanced capabilities that enable them to request pages and furnish users with pertinent information.

Coming to the point next,

What is the difference between the Deep and Dark Web?

Deep Web

  • The deep web is a term used to describe the part of the internet that cannot be found through traditional search engines. In order to access this part of the internet, one must use specialized software or obtain authorization. This portion of the internet is not easily accessible to the general public and is often used for private communication and sensitive information sharing.

  • To gain access to the deep web, it is imperative to have either a password, encryption, or specialized software. Without any of these essential tools, it would be impossible to navigate through the vast and intricate network of hidden websites. It is important to note that the deep web is not accessible through typical search engines and requires additional measures to ensure safe and secure browsing. Therefore, it is crucial to adhere to the necessary protocols and obtain the proper tools before attempting to access the deep web.

  • It is worth noting that the deep web surpasses the surface web in terms of size and scope. While the surface web is accessible to everyone, the deep web requires special software or authorization to access its content. Despite its vastness, the deep web remains largely unexplored and mysterious to the average user.

  • The deep web is also known for its anonymity, is commonly employed and utilized for legitimate purposes that require discretion. It provides a secure environment for activities such as online research, confidential communication, and anonymous browsing. Despite its association with illegal activities, the deep web serves as a valuable tool for those seeking privacy and protection online.

Dark Web

  • The dark web is a subset of the deep web that is intentionally hidden from view. It can only be accessed through specialized software and requires specific knowledge or credentials to navigate. The content found on the dark web is often illicit and can include illegal activities, such as the sale of drugs, weapons, and stolen data. Due to its anonymity and untraceable nature, the dark web has become a haven for criminal activity and poses a significant challenge for law enforcement agencies worldwide.

  • To access the dark web, it’s essential to utilize specialized tools like the Tor project or a similar browser. These tools ensure that your online activity remains anonymous and secure, protecting your identity and privacy. Without them, you risk exposing yourself to potential risks and threats on the dark web.

  • The dark web is an elusive section of the deep web it’s difficult to measure in terms of its size and scope. This hidden network is notorious for harboring illicit (illegal) activities and content, making it a source of concern for law enforcement and cybersecurity experts alike. Despite its mysterious nature, the dark web continues to attract a significant amount of traffic, with users seeking anonymity and privacy for a variety of reasons.

The vast expanse of the Internet can be broken down into three distinct layers, each with its own unique characteristics and purposes. However, it’s important to note that there are many other components and complexities that lie beyond these foundational layers.

levels

Level 0 — Basic Web
At Level 0, the web is fully accessible. This means that all websites and online content can be easily reached without any restrictions or limitations. Whether you are browsing for information, shopping online, or connecting with others through social media, everything is readily available at your fingertips. This level of accessibility ensures that all users, regardless of their background or abilities, can fully participate in the online world and enjoy all that it has to offer.

Level 1 — Surface Web
The Surface Web can be categorized into its first level, which comprises of data and information that can be conveniently accessed and viewed by the general public without any restrictions or limitations. This category encompasses several types of online content, including websites, blogs, news articles, and many more, all of which can be easily found through search engines and other browsing tools.

Level 2 — Bergie Web
At Bergie Web, we prioritize the effective management and maintenance of FTP servers and web servers, as well as implementing robust internet security protocols to ensure optimal protection. There would be special emphasis on the utilization of proxies, which play a crucial role in enhancing online security and privacy. We are dedicated to providing top-notch services that ensure the smooth functioning of your online operations while safeguarding your data and sensitive information although this level includes as follows:

  • FTP Servers
  • Loaded Web Servers
  • Google Locked Results
  • Jail bait Porn
  • Honeypots
  • Most of the internet
  • The use of PROXY is a must require after this point

Level 3 — Deep Web
The Deep Web, also known as the third tier of the internet, is a realm shrouded in mystery and infamy due to its association with illicit activities. The Deep Web serves as a platform for accessing banned materials, including books and videos, forging documents, obtaining financial records, circumventing censorship, and even conducting scientific experiments. To access this hidden layer, one must employ TOR, a tool specifically designed to offer anonymity and security while navigating the Deep Web. Despite its reputation, the Deep Web remains a fascinating and enigmatic aspect of the Internet.

Level 4 — Charter Web
Level Four is the charter web which is a highly advanced and secretive network divided into two main parts: TOR Level Access and Special Level Access. Access to this level is restricted to only a select few, as TOR browsers are unable to reach it. In order to gain access, a special method known as the “Closed Shell System” is required. This system is comprised of a variety of advanced machines, including AI measurement devices, AI and GGGEQP processors, crystalline power controllers, weather-changing devices, hidden HAARP projects, hidden research and coordinates of Atlantis, terror/murder/drug networks, global human trafficking networks, supercomputers, and AI, among others.

All of the sites within Level Four are hosted on either personal or private servers, and standard computers and the internet are not sufficient for access. In fact, these elements constitute a staggering 80% of the Deep Web. The remaining 20% requires even more advanced technology, including devices that use Quantum technology and highly specialized atmospheres.

It is important to note that while everything up to Level Four has been proven to exist, there is no known method or research available to access the Mariana Web which is level five beyond this point. The secrecy and level of technology involved in Level Four is truly unparalleled, making it one of the most exclusive and highly protected networks in the world.

Level 5 — Mariana Web
The Mariana Web is a highly unreachable level that has gained notoriety as one of the most dangerous levels on the internet. The level is named after the deepest point in the world’s ocean, the Mariana Trench. While there is no concrete proof of its existence, it is believed that the Mariana Web is where the most secure data is stored, particularly by military networks.

However, accessing the Mariana Web is no easy feat. It involves complex algorithms, calculations, and security measures that cannot be accomplished with a regular computer. Instead, the use of quantum computing, secret algorithms, and calculations is necessary. Some anonymous suggest that the “Polymeric Falcighol Derivation” can help access the Mariana Web, but this requires the use of Quantum Computers, which are not readily available to the public due to their advanced functionality.

Some anonymous have speculated and told that the Mariana Web may be even deeper than the dark web, which is infamous for its illicit content, such as contract killers and drug dealers. However, the existence of the Mariana Web remains shrouded in mystery, leaving many to wonder if it is nothing more than a legend or a closely guarded secret, similar to Cicada 3301 or the Illuminati.

Level 6 — Mediator layer between the Marianas Web & the Level 7
Upon reaching Level 6 of the Deep Web, one may come across a mediator whose purpose is to serve as a connection point between the Marianas Web and Level 7, known as THE FOG/VIRUS SOUP. However, this level poses a significant risk to those who venture into it. There are individuals with malicious intent, such as drug lords and human traffickers, who may pose a threat to anyone who is aware of their activities. Despite the seemingly unrealistic nature of this threat, it is, in fact, a reality that should not be taken lightly. Moreover, advancing to Level 6 requires quantum computing, which is a challenging and arduous task.

Once one reaches Level 7, the risks become even more significant, and the stakes are higher. The big players are fighting for control in operations that are worth millions or even billions of dollars. It is a cut-throat environment in which only the most skilled and resourceful individuals can survive. Therefore, it is crucial to exercise caution and take the necessary precautions before attempting to venture into the higher levels of the Deep Web.

Level 7 — The Fog / Virus Soup
As one navigates through the intricate levels of the internet, Level 7 stands out as a fierce battleground where users relentlessly compete to ascend to the next tier. This level is akin to a power struggle, with users vying for control over the internet’s vast expanse. Those who have successfully reached Level 7 are either attempting to ascend to Level 8 or actively blocking others from doing so. The competition is fierce and cutthroat, with users resorting to any means necessary to keep others from advancing. This level is notorious for its complexity and is often referred to as “The Fog” or “Virus Soup” due to the infinite lines of code designed to hamper anyone who dares to goes or venture within. The sheer volume of codes is overwhelming, and users are forced to navigate through an endless maze of lines in search of a way out. Everyone is fighting to keep others out since the systems below hold tremendous value, making this level a veritable battleground.

Level 8 — The Primarch System

Located at Level 8 of the vast expanse that is the internet, lies the Primarch System, a highly coveted final level that poses a challenge even to the most advanced quantum computers, rendering it inaccessible.

The Primarch System is a mysterious and enigmatic entity that governs the internet, and it remains beyond the control of any government. Its discovery was made possible through deep web scans in the early 2000s, and it has since remained an enigma at the very core of the deep web.

While the system is believed to be unresponsive, it occasionally releases unalterable commands that have far-reaching implications across the entire network. With its control beyond human reach, the Primarch System is a force to be reckoned with, and its existence continues to fuel the curiosity and intrigue of many.

Level 1–8 In Detail

Level1-5

Level0-8

History

In the 1960s, the ARPANET was established as a test network that would eventually evolve into what we now know as the Internet. However, as time progressed, a small portion of the Internet known as the dark web emerged. This hidden area is part of the deep web, which is not publicly visible. It consists of un-indexed websites that are estimated to account for 96% of the Internet.

Surprisingly, the dark web has become notorious for its illegal activities and the multitude of secrets hidden within the cyber world. Because dark websites are not easily accessible to the general public, they cannot be found using commercial search engines such as Chrome, Bing, or Safari. Instead, access to the dark web requires the use of specialized browsers that use IP masking techniques to conceal the identity of visitors. This hidden and invisible web is also commonly referred to as the deep net.

In my opinion, after thorough analysis and research, I have come to categorize the Dark Web into two distinct groups based on the types of activities that take place. This classification helps to better understand and navigate through the complex and often murky world of the Dark Web.

Legal Activities

The dark web, while often associated with illegal activities, is not solely used for such purposes. In fact, there are a number of legitimate activities that can be carried out on this portion of the internet. For example, individuals may access databases and virtual academic libraries, allowing them to conduct research and gather information for personal or professional purposes. Additionally, those who wish to browse the web anonymously may do so on the dark web, where their online activities are less likely to be tracked and monitored.

It is worth noting that some organizations may also make use of the dark web for privacy reasons. This includes cyber police departments, security advisors, armed forces, politicians, and media professionals. By utilizing the dark web, these individuals and groups can protect sensitive information and maintain a level of anonymity that may be necessary for their work. While the dark web is often associated with illegal activities, it is important to remember that it can also serve a legitimate purpose for those who value privacy and security.

Illegal Activities

The Dark Web has gained a notorious reputation due to its secretive nature, and it has become a hub for various illicit activities that are detrimental to the well-being of society. These activities encompass a wide range of illegal practices, including phishing scams and darknet markets, illegal pornography, hacking groups, terrorism, financing, social media crimes, Bitcoin services, human trafficking, and illegal weapons, among others. It is crucial to avoid engaging in such activities as they not only violate the law but also pose a severe threat to the safety and security of individuals and communities. As responsible and ethical citizens, we must uphold legal and moral standards and refrain from participating in any form of illegal practices that can have severe repercussions for ourselves and others.

The Onion Router (TOR)

Tor

Tor11

As a user, you have the option to utilize TOR as a means of exchanging information online while remaining anonymous. This browser employs a unique method of bouncing connections between various routes, which makes it incredibly challenging to trace and ensures that your identity remains hidden. TOR accomplishes this by adding layers of encryption each time it bounces the connection through three different servers located across the world, earning it the moniker “ONION.”

While popular browsers like Google, Bing, and Yahoo are convenient for surfing the surface of the internet, the Dark web contains hidden pages that cannot be indexed on Google. To access this content, you will need to establish a connection to TOR. By doing so, you will be able to access a vast array of content that would otherwise remain hidden from view.

It may come as a surprise, but did you know that the Deep Web is approximately 40 times larger than the surface web? To put things into perspective, the 60 largest Deep Web sites alone contain more data than the entirety of the surface web. This staggering amount of information highlights the vastness and complexity of the Dark Web.

working tor

tor network working

tor over vpn

The Tor browser has a unique way of functioning on the TCP layer as it employs socket connections to facilitate communication. Whenever a new user opts to browse through Tor, the browser creates a virtual circuit connection with multiple nodes on the network, which are chosen randomly. This connection remains active for approximately 10 minutes before being replaced by a new one, and the cycle repeats itself. By using this technique, Tor ensures that the user’s online activity remains anonymous and secure.

The circuit in Tor consists of three types of nodes: the Entry Node, Intermediate Node, and Exit Node. The Entry Node is the first node that receives incoming traffic, while the Intermediate Node passes data from one node to another. Lastly, the Exit Node is the last node that delivers traffic to the open internet.

When a user requests access to a website, Tor encrypts the request with multiple layers and sends it to the Entry Node. The request then passes through various Intermediate Nodes, which are randomly chosen and distributed worldwide. At every jump to a node, the current node removes one layer of encryption before passing it to the next Intermediate Node.

Once the request reaches the Exit Node, it removes all remaining layers of encryption and sends the original unencrypted request to the webserver on the public internet. This mechanism ensures that the user’s identity remains anonymous, and all information about the source is lost. Additionally, Tor allows users to deploy websites without revealing the location of their hosting servers, using the extension “.onion” that can only be accessed within the Tor network.

It’s important to note that Tor is not the dark net, but rather a tool that enables anonymous browsing and safe communication among users. The dark net exists with or without Tor, as it is simply a dark web browser.

Why do all the Dark websites mainly contain .onion Top-Level Domain?

The top-level domain known as .onion has been specifically designated for hidden services by the Internet Engineering Task Force (IETF). This domain serves a special purpose as it allows for the creation of anonymous services that offer robust confidentiality and anonymity. Essentially, websites that use the .onion domain are able to operate completely anonymously, making it an ideal solution for those who want to keep their online activity private.

Conclusion on TOR

If you value your digital privacy and wish to browse the Internet anonymously, TOR is a reliable browser that can help safeguard your digital identity and privacy. However, it is important to note that despite its security features, TOR does have some weaknesses and vulnerabilities that you should be aware of.

Although accessing and surfing the dark web with TOR is not illegal, it is crucial to take necessary security measures and proceed with caution. Here are some tips to help you stay safe while using TOR:

  1. Avoid using personal information: refrain from revealing your name, address, phone number, or any other personally identifiable information while using TOR. This will prevent anyone from tracking and identifying you.

  2. Disable scripts: by default, TOR blocks scripts to prevent malicious codes from executing on your device. However, some websites require scripts to function properly, so you can enable them selectively for trusted websites.

  3. Use VPN services: a virtual private network (VPN) can help encrypt your online traffic and protect your identity by masking your IP address.

  4. Don’t use HTTP websites: unencrypted HTTP websites are vulnerable to eavesdropping and interception, so use HTTPS websites that offer end-to-end encryption.

  5. Encrypt your data storage: if you store sensitive information on your device, make sure to encrypt it with strong passwords and encryption software to prevent unauthorized access.

  6. Cover or disconnect your webcam lenses: cybercriminals can use your webcam to spy on you, so cover it with a sticker or disconnect it when not in use.

  7. Regularly update your system: keep your operating system, browser, and security software up to date to patch any vulnerabilities and prevent cyberattacks.

By following these tips, you can enjoy the benefits of TOR while minimizing the risks and protecting your digital privacy.

Thank you for taking the time to read. 😊

Originally Posted on
Image description

Top comments (0)