top of page
Search

Dark Net

  • Writer: Tanha Patel
    Tanha Patel
  • Mar 23, 2021
  • 3 min read

Internet existing underneath surface web, generally hidden from view of ordinary web users. It is a parallel network that is encrypted and requires a specific protocol to access. It is a type of network which can only be accessed with specific authorization, browser, and software. It is the hidden or unseen part of the internet. It is hidden from public view. It is associated with the encrypted part of the internet which is the TOR network. Tor network is a network where illegal actions such as the online drug market (Silk Road) were taking place. They can be termed as a network of hidden computers on ARPANET.

Origin: Darknet was defined in the 1970s to differentiate the network from ARPANET which is invisible and unapproachable by normal browsers. They receive messages and notifications from ARPANET but would not answer them (send messages). They also didn’t appear in the networks list.


The first use of the darknet: In 1971 students of Massachusetts Institute of Technology and Stanford University traded ARPANET for online trading of marijuana in the former’s Artificial Intelligence Laboratory.


They incorporated the usage of the dark web which often uses non-standard communication protocols and ports, such as friend-to-friend networks (for file sharing) and tor network for security and privacy.


It is a network that is not indexed by search engines like Google, Bing, etc. They include harmless places like educational databases and corporate sites such as the black market, hacking, privacy, etc. It is difficult to track users of the darknet so it has become heaven for criminals for human trafficking, drug supply, etc.


In 2002, Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman, four employees of Microsoft argued and presented a paper naming "The Darknet and the Future of Content Distribution" that the darknet was the primary hindrance to the development of workable digital rights management (DRM) technologies. After such publication darknet is popularly accepted.


As of 2015, due to hidden services that are provided by Tor’s network the term “darknet” is often used interchangeably as “dark web”. And also due to Tor’s history as a platform that cannot be search-indexed the term “darknet” is often used interchangeably as “deep web”.

Software: As to access darknet specific software is used. So some software are as follows:


1. Active Softwares:

  • Tor (The Onion Router)

  • anoNet

  • Decentralized network 42

  • Freenet

  • GNUnet

  • I2P (Invisible Internet Project)

  • OneSwarm

  • RetroShare

  • Riffle

  • Syndie

  • Tribler

  • Zero net

2. No longer supported

  • RShare

  • StealthNet

 

Uses:

  • Drug or other illegal substance dealers: A variety of darknet markets (black markets) allow for the anonymous buying and selling of drugs and other illegal or controlled substances like pharmaceuticals.

  • Counterfeiters: Counterfeiters offer document forging and currency imitation services via the darknet.

  • Sellers of stolen information: Credit card numbers and other personally identifiable information (PII) can be purchased on the darknet for theft and fraud activities.

  • Weapons dealers: A variety of darknet markets (black markets) allow for the anonymous, illegal buying and selling of weapons.

  • Hackers: Black hat hackers, or those looking to bypass and exploit security measures for personal gain or simply out of spite for an organization or action, brag about their exploits, communicate and collaborate with other hackers, and share security exploits (take advantage of a bug or vulnerability to gain access to software, hardware, data, etc.) on the darknet.

  • Gamblers: Certain sites on the darknet block U.S.-based internet service providers. Gamblers may take to the darknet to skirt local gambling laws.

  • Terrorists: Just as people living and/or working in countries being led by oppressive regimes will often take to the darknet, terrorists do too. Internet access, recruiting, sharing of information, and organizing can be done anonymously on the darknet.

  • Murderers/Assassins: While there is debate as to whether these services are legitimate, law enforcement, or simply fictitious sites, there are dark websites where murder-for-hire services are listed.

  • Vendors of illegal explicit materials: We won't go into further detail here.

Anyone can access this hidden internet very easily, but if you decide to go exploring please be very careful. There is a lot of unsavory content as well as a large number of criminals. Don't just click links without thinking about where you might end up, what you might see, or whom you might meet.

Comments


bottom of page