{"id":263,"date":"2022-12-01T19:24:46","date_gmt":"2022-12-01T19:24:46","guid":{"rendered":"https:\/\/ctlsites.uga.edu\/mist5720\/?p=263"},"modified":"2022-12-01T20:24:39","modified_gmt":"2022-12-01T20:24:39","slug":"the-dark-and-the-deep-web-a-synopsis","status":"publish","type":"post","link":"https:\/\/ctlsites.uga.edu\/mist5720\/the-dark-and-the-deep-web-a-synopsis\/","title":{"rendered":"The Dark and The Deep Web: A Synopsis"},"content":{"rendered":"\n<p>After reading and writing about <em>American Kingpin<\/em>, the story of Ross Ulbricht, my interest in the dark web and the deep web absolutely peaked. I realized that while I had certainly heard these terms, I really had no idea what they meant or what these things were. As such, I decided to look into the part of the internet that remains unknown to the vast majority of the population. To do so, I began where my interest began, with Ross Ulbricht and his use of the dark web. In <em>American Kingpin<\/em>, Ross uses the internet browser \u201cTor\u201d for his illegal website, The Silk Road. Thus, I first sought to understand how Tor is accessed and used.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Tor<\/strong><\/h2>\n\n\n\n<p>Tor is a free of charge and open-source software which allows internet users to browse anonymously while concealing their location and user history using server relays. \u201cTor\u201d stands for \u201cThe Onion Router\u201d which refers to the principle of \u201cOnion routing\u201d which was developed, ironically, by the US Department of Defense in the 1990s. It is called Onion routing because of the nested encryption layers that metaphorically parallel an onion\u2019s layers. In theory, Tor can be downloaded by anyone with access to the internet. In fact, all one needs to do is google \u201cdownload Tor\u201d to find a link to do so. Throughout its history, Tor has been used for both legitimate and illegitimate purposes. The US government largely subsidized Tor until 2012 as it used its encryption software for classified communication. However, in more recent years, Tor has become a haven for websites such as Ross Ulbricht\u2019s Silk Road, human trafficking, and general criminal mischief. However, many extremely legitimate uses remain, which is one of the reasons why international governments have not made attempts to dismantle it. Tor has recently been used by victims of domestic violence to connect to social workers without their abuser\u2019s knowledge. Uses such as this, among others, make Tor an invaluable asset to many across the world who need to maintain their privacy. However, this privacy also gives credence to those who would mean to break the law.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/bcsheatechtrek.files.wordpress.com\/2022\/03\/image-33.png?w=754\" alt=\"\" class=\"wp-image-26849\" width=\"482\" height=\"255\" \/><figcaption class=\"wp-element-caption\">A visual representation of Tor&#8217;s encryption process<\/figcaption><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>The Dark Web<\/strong><\/h2>\n\n\n\n<p>Using Tor allows you to access the non-monitored part of the internet. This large virtual space is colloquially known as the \u201cDark Web\u201d (not to be confused with the \u201cDeep Web\u201d which we discuss later). The Dark Web actually began, surprisingly as a school project of a student at the University of Edinburgh in Scotland. The creation of Tor, by the US military, dramatically expanded its accessibility. Today, the Dark Web is the host of more than 55,000 domains. To access these websites, one must use a browser such as Tor or one of the many other Dark Web browsers. As explained above, the Dark Web is full of both licit and illicit materials. One of the most prominent illicit materials found on the Dark Web, especially since the dismantling of Ross\u2019s Silk Road, is information. Whether it be online shopping account information to proprietary aerospace technology, the Dark Web is the world\u2019s largest market for the illegal purchase of private information. A cloned Mastercard with the PIN number goes for an average Dark Web Price of $25 according to the Dark Web Price Index. Moreover, the years 2020 and 2021 have been some of the worst of all time for cyberattacks. Massive companies such as Lockheed Martin and Microsoft have experienced multiple significant breaches in the past two years. Information from these two companies and many more were later found for sale on a multitude of Dark Web websites. These breaches are serious concerns for both the public and the private sector as companies, governments, and private citizens scramble to ensure their information is secure.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Deep Web<\/strong><\/h2>\n\n\n\n<p>In contrast to the Dark Web, which refers to a specific set of encrypted (often illegal) websites, the Deep Web refers to all information that is found and logged on the internet that cannot be accessed through standard browsers. While many often confuse the two, one is much larger than the other. The Dark Web is simply a subset of the larger umbrella of the Deep Web. As such, it is estimated that the Deep Web is as large as 550 times the size of the \u201cSurface Web\u201d (the websites we all use regularly). This information makes up nearly 99% of all the internet. Imagine the Deep Web as the internet\u2019s log of everyone\u2019s passwords, usernames, browsing history, and any other information that has been logged onto a website. The Deep Web contains nearly all password-protected websites that are only accessible by one particular person (your Gmail inbox for example). For the most part, this information is very secure. However, the aforementioned sale of information on Dark Web websites usually occurs due to breaches in the Deep Web in which hackers are able to access these large pools of information.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/bcsheatechtrek.files.wordpress.com\/2022\/03\/image-34.png?w=751\" alt=\"\" class=\"wp-image-26852\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Summary<\/strong><\/h2>\n\n\n\n<p>To conclude, these huge portions of the internet, The Deep Web and The Dark Web are both extremely important pieces of software. The Deep Web is the foundation upon which the rest of the internet is built. Without it, many password-protected websites would not exist. Moreover, the Dark Web, along with Dark Browsers such as Tor, is crucial for many who seek to use the internet without fear of detection, including the US government. However, due to those who would seek to use it for nefarious purposes, the Dark Web has become host to many criminal enterprises. This includes the catalyst for this blog, Ross Ulbricht\u2019s Silk Road.<\/p>\n\n\n\n<p>While my curiosity has led me to learn more, I am still wary of downloading Tor to see it for myself. Downloading Tor and accessing the Dark Web is certainly not against any law, however, given the plethora of danger on this part of the internet, I am unsure if it is worth the risk. I would love to know the class\u2019s thoughts on this.&nbsp;<\/p>\n\n\n\n\n\n<p><strong>Sources<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.avast.com\/c-dark-web#:~:text=Dark%20web%20browsers,relay%20points%2C%20known%20as%20nodes.\">https:\/\/www.avast.com\/c-dark-web#:~:text=Dark%20web%20browsers,relay%20points%2C%20known%20as%20nodes.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.privacyaffairs.com\/dark-web-price-index-2021\/\">https:\/\/www.privacyaffairs.com\/dark-web-price-index-2021\/<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.makeuseof.com\/tag\/deep-web-important-think\/#:~:text=The%20deep%20web%20is%20a,legitimate%20uses%20of%20its%20own.\">https:\/\/www.makeuseof.com\/tag\/deep-web-important-think\/#:~:text=The%20deep%20web%20is%20a,legitimate%20uses%20of%20its%20own.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.britannica.com\/story\/whats-the-difference-between-the-deep-web-and-the-dark-web\">https:\/\/www.britannica.com\/story\/whats-the-difference-between-the-deep-web-and-the-dark-web<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/data-ox.com\/web-dark-web-and-deep-web\/\">https:\/\/data-ox.com\/web-dark-web-and-deep-web\/<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>After reading and writing about American Kingpin, the story of Ross Ulbricht, my interest in the dark web and the deep web absolutely peaked. I realized that while I had certainly heard these terms, I really had no idea what they meant or what these things were. As such, I decided to look into the&hellip; <a href=\"https:\/\/ctlsites.uga.edu\/mist5720\/the-dark-and-the-deep-web-a-synopsis\/\" class=\"read-more\" title=\"The Dark and The Deep Web: A Synopsis\"><span>Continue reading <span class=\"screen-reader-text sr-only\">The Dark and The Deep Web: A Synopsis<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/span><\/a><\/p>\n","protected":false},"author":4296,"featured_media":267,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-263","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/ctlsites.uga.edu\/mist5720\/wp-content\/uploads\/sites\/1783\/2022\/12\/downloaddark.jpeg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ctlsites.uga.edu\/mist5720\/wp-json\/wp\/v2\/posts\/263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ctlsites.uga.edu\/mist5720\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ctlsites.uga.edu\/mist5720\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ctlsites.uga.edu\/mist5720\/wp-json\/wp\/v2\/users\/4296"}],"replies":[{"embeddable":true,"href":"https:\/\/ctlsites.uga.edu\/mist5720\/wp-json\/wp\/v2\/comments?post=263"}],"version-history":[{"count":0,"href":"https:\/\/ctlsites.uga.edu\/mist5720\/wp-json\/wp\/v2\/posts\/263\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ctlsites.uga.edu\/mist5720\/wp-json\/wp\/v2\/media\/267"}],"wp:attachment":[{"href":"https:\/\/ctlsites.uga.edu\/mist5720\/wp-json\/wp\/v2\/media?parent=263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ctlsites.uga.edu\/mist5720\/wp-json\/wp\/v2\/categories?post=263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ctlsites.uga.edu\/mist5720\/wp-json\/wp\/v2\/tags?post=263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}