THE DARK WEB
The dark web is a part of the internet or rather the world wide web that exits on dark nets and overlay networks which can be accessed with some specific softwares. The parts of the dark web which includes the pages and the sites of the dark web are not indexed in the surface web.
The dark web is accessed by gaining access to some proxy server. These servers are placed in various places of the world. The dark web is accessed by some typical techniques which are not known to the normal users and these techniques are generally not the same as that of the normal using of the internet.
The dark web need some specific softwares to be accessed by a user. These softwares are not the general web browsing softwares like Chrome or Firefox. The commonly used software includes the software TOR Browser.
WHAT IS TOR BROWSER?
The TOR browser is the short form of The Onion Routing. This browser is the gateway to the darkweb. This software maintains the anonymity of an user IP address by the technique of onion routing. This software is prescribed to be used with an UNIX or Linux bases operating system. While using this software , one should keep in mind to turn off the javascript and not to open the software in full window(always open in half window). If a user forgets to do these two things at the start then the user is being traced.
The above image is a screen shot of how the home page of the tor browse looks
Browsing over the TOR Browser is very slow because the TOR browser performs onion routing and directs the traffic by a series of world wide , free volunteer overlay networks consists of seven thousand relays used to hide the IP address and hides the activities of the user across the dark web.
THE ONION ROUTING
The onion routing is a process of routing which maintains the anonymity of an user from surveillance and network analysis. In the process of onion routing a message is encapsulated by a series of encryption just like the layers of an onion.
So tracing the IP address and the activities of an user gets very difficult to be traced. The encrypted message is transmitted through the different nodes also called the onion routers.
In the above image, the initiator is the user. When the user connects to the TOR browser then the IP address gets encapsulated and encrypted through the four onion routers W , X , Y ,Z and then it goes to the responder.
Hence for this cases the TOR Browser is also called a VPN (virtual private network) as the IP address gets changed.
In onion routing the user's IP gets changed and a new fictitious IP is assigned. This process keeps continuing at every moment while using TOR Browser. Hence for this reason it gets very difficult to keep vigil and analyze the activities of a user.
WRITTEN BY:
SUBHODEEP MOITRA
TECHNO COLLEGE HOOGHLY
DEPARTMENT : BCA
Comments
Post a Comment