Programs for access to the deep web. Deep Web, or The Invisible Side of the Internet. Deep Web: how to get there? What is the "deep web" Deep Web

I came across a very interesting article about the multi-level structure of the “Deep Internet”.

If anyone hasn’t heard what it is, I’ll explain: it’s a network consisting of a huge number of web pages that are not indexed by search engines. Access to these pages is possible only through a chain of encrypted connections, the nodes (entry points) of which are scattered throughout the world. There are web pages that are not linked to other hyperlinks - for example, pages that are dynamically created by database queries. The size of the deep web is unknown and generally difficult to estimate, primarily due to the vagueness of the concept itself.

The World Wide Web is a complex multi-level structure that contains mysteries and secrets that the average user is not even aware of...

There are groups of passionate professionals who call themselves “Netstalkers.” They explore the Network, looking for hidden corners, classified information and other secrets in it. Netstalkers divide the Network into levels.

Social media
Blogs
News
Porn
Imageboards (for those who don’t know - something like chats/forums, with complete anonymity of participants)
Small boards (almost the same as image boards, but more thematic and with fewer participants)
ARG (Alternate Reality Games)
Closed communities
Hard porn
Collections of strange links

Tor (the same TOR... An anonymous proxy network inside the regular Internet)
Net art
Hacker communities
i2p (Another anonymous proxy network)
Dead forums (forums that have been taken down but are still online)
Freenet (Another anonymous network on the Internet, peer-to-peer)
Memetics Information
Future sites
Two Internet sects
Search results for words from the subconscious
Deep Web (Deep Network, the term originally meant pages that were not indexed by search engines)
The limits of bruteforce netstalking
Dark Internet
Number radio stations
Secret government radio stations

If the two upper levels are still quite objective, then deeper the paranormal, supernatural and folklore begin...

The so-called "Pass"
Researcher forums
Blank Pages
Non-existent IPs
Void
Non-existent pages
The way up, back, for the last time
Non-existent protocols
Old browsers needed here
Really dangerous point
You Tube for Level B
Random numbers
Small imageboard
Tons of useless information
Tons of useful information
Valuable phrase
The limit of human capabilities
Level D Control
Holes
Death
Schumann resonance
Dead zone
The terrifying truth about mirrors
Level C management
Quiet house

And at the very depths - Level A
About which it is generally difficult to say anything, just like about the higher planes of human existence.

This diagram clearly shows the levels of which, according to the assumptions of "Netstalkers", the World Wide Web consists

Here's what he said about this topic in his interview: CEO one of the leading computer security companies in Russia:

The volume of illegal trade on the deep web is difficult to estimate, but some experts believe it could be in the hundreds of billions of dollars a year. There you can buy absolutely everything - from plastic card holder data to passwords for email addresses, from animal skins listed in the Red Book to pornography. Moreover, the “deep Internet” is used not only by illegal traders and hackers, but also by representatives of large businesses to transfer confidential information to partners, journalists to communicate with “unnamed sources,” and diplomats for classified correspondence. “Hidden networks are used for anonymous, hidden exchange of information, and you can meet a wide variety of people there - from religious fanatics to child pornography dealers. For the most part, of course, hidden networks are criminal in nature, since they are not regulated by any legislation.

Here there is drug trafficking, and the sale of fake ID cards, and trading in access data to financial accounts of users of various banks, and child pornography, and much, much more that simply cannot legally exist on the public Internet." But, in addition to openly criminal sites , there are also those resources whose existence the owners would not like to advertise due to the secrecy of information or the presence of trade secrets in the data."Closed bases, academic, government, military sources, closed bases of enterprises and organizations.

How much do you know about the Internet? And how much does the Internet know about you?

What is deep web

Deep Web is a shadow Internet based on maximum anonymity, complete rejection of provider servers, which makes it impossible to determine who sends what, where and what. Before you get to any site via the deep web, your data is transmitted in encrypted form through the same network participants as you, which makes data transfer as anonymous as possible, but rather slow. The Deep Web now resembles in speed the very first Internet using dialup modems. The concept of the Deep Internet (Deep Web) gained popularity quite recently and still does not have a clear meaning. In a broad sense, this phrase denotes information hidden from indexing by search engines, and includes closed communities and forums, individual pages of websites prohibited from indexing, databases, as well as encrypted networks for anonymous surfing (the latter most often refers to TOR and i2p). In a narrower sense, the deep Internet is pseudo-domain spaces created using encrypted connections, ensuring user anonymity by hiding the IP address issued to him by the provider.
Typically, interest in the deep Internet is associated with the desire of more or less experienced users to find something secret on the Internet, hidden from the eyes of the majority. Novice Internet stalkers are confident that the deep Internet includes a lot of interesting information, which only through a misunderstanding turned out to be hidden from the eyes of the majority. In fact, this opinion is only partly true, and the so-called Deep Web includes both information that is not needed by the majority of law-abiding citizens (the vast majority of TOR and i2p network sites), as well as very interesting discussions and opinions of people united in a closed community, to isolate themselves from people with views and opinions that are alien to them or inexperienced newcomers in their field of activity (a typical example is closed SMO or SEO forums). In addition, the closeness of some communities makes them elite in the eyes of other users (a striking example is the closed collective blog Leper Colony).

Scale

The size of the deep web is unknown. There are relatively reliable estimates of the total number of sites leading to online databases: about 600 thousand such sites on the entire Internet and about 30 thousand in the RuNet. The most interesting thing is that the volume of information concentrated in the deep web is tens of times greater than the volume of information in the regular Internet space.

Below are some links to interesting (in my opinion, resources)

Https://onion.cab/ – a search engine on the Tor network and a gateway to the Internet.
http://www.deepweb.us/ – a collection of M. Zillman’s resources on the deep web.
https://www.wilsoncenter.org/sites/default/files/stip_dark_web.pdf – educational material with verified clickable links to Deep and Dark Web search resources.
https://www.deepdyve.com/ - paid deep web search engine.
http://www.hozint.com/ - a platform for collecting information about political stability, security of countries, various incidents and unrest, collecting and scanning information on the deep web.
http://www.gwu.edu/~nsarchiv/search.html - US National Security Archive at George Washington University.
http://www.base-search.net/ is an invisible web search engine for open academic web resources belonging to the best universities and research centers in the US and UK.
http://citeseer.ist.psu.edu/index – a search engine on the invisible web for various publications, books, articles in the field of computer solutions and information sciences in English.
http://www.findthatfile.com/ – the most comprehensive file search on the Internet. Allows you to search for files in 47 formats. You can search by the author of the file, its name, or a fragment of content. Supports not only basic types of text and table files, but also compressed files, audio-video files and much more.

Http://www.deepwebtech.com/ is a leading manufacturer of “deep web technologies” that implement a federated search approach, the creator of a number of deep web search engines, solutions for the Internet and intranet.
http://www.ipl.org/ is a search engine for collections containing the most relevant and interesting information resources created as a result of the voluntary collaboration of thousands of students, volunteers of cataloging and classification of information and leading specialists in the field of information technology.
http://publicrecords.searchsystems.net/ - Free search of over 50,000 of the world's largest public databases. For example, it can provide information about business applications, existing licenses, and even about participation in criminal proceedings, bankruptcies, and many, many other interesting things.
http://www.resourceshelf.com/ is a community-supported collection of information collection and cataloging specialists on the most sought-after topics in business and science.
http://vlib.org/ is the world's largest virtual library, combining digital resources of many countries, educational centers, commercial organizations, etc.
http://biznar.com/biznar/ – is the most modern system using federated deep web search technology in business.
http://lookahead.surfwax.com/index-2011.html - the first real-time deep web search engine with elements of semantic analysis. Allows you to capture news and facts that are not available to other systems. Integrates into browsers.
http://infomine.ucr.edu/ is a virtual library of Internet resources that contains data from the libraries of many of the richest and most successful American universities.

Not of course, there are many sites that are not available on the regular network, such as WikiLeaks, Piratebay, The Hidden Wiki and a bunch of other sites, as they say: there is something for everyone...

How and who uses the Deep Web?

Tor users use this network by connecting through a series of virtual tunnels rather than a direct connection, thus allowing organizations and individuals to exchange information over public networks without revealing their privacy. Tor is effective at circumventing Internet censorship, allowing users to browse sites that would otherwise be prohibited on the regular Internet.

Criminals of various stripes, terrorists, drug dealers, hired killers feel at ease in these open spaces, although from time to time information leaks into the media.

Tor can also be used by software developers to create new and improve old communications tools with built-in privacy protection.

Hidden services allow individuals to create websites without revealing the IP address and true location of the webmaster. For example, Tor is used to discuss socially problematic topics: chat rooms and web forums are formed for victims of domestic violence or people with certain diseases.

Journalists can freely and safely correspond with dissidents and denouncers of regimes. Non-governmental organization (NGO) staff have access to correspondence with families when they are away from their home country, without publicly disclosing that they are working with the organization.

It is clear that such a place cannot be bypassed by the military, special services, and law enforcement agencies to ensure the secrecy of their messages and tasks. They also use the Deep Web to search for terrorists, other criminal elements and their illegal actions.

What currency is used on the Deep Web

A frequently used currency in the deep web of black markets is Bitcoin, and they do not exist in physical form, but computers and sometimes entire computer centers are used to acquire them.
What sets Bitcoins apart from regular currencies is the fact that it is impossible to track their owners and the chain of transactions, which makes them the most preferred form of payment for illegal businesses.

Most likely, this space will be under the control of supervisory authorities in the near future, but time does not stand still and we should certainly expect the emergence of new programs and browsers, since the secret Internet allows you to cash out huge amounts of money.

P.S. this is my first post, if there is anything wrong...

The web is like an iceberg. Information available for mass use is only the tip of it. The underwater part is a hidden Deep Web network containing a huge amount of prohibited information. How to get here has long been no secret for Internet users.

Shadow Internet

Thanks to a sufficient number of information sites, social networks, blogs, and torrent trackers, many users do not even think about the existence of an even larger amount of information. According to some estimates, what is on the surface is only 1/5000 of the data. On the Internet, you can only rarely find strange, atypical content, which, as a rule, is hidden from the average reader.

Increasingly, network users are asking questions about the Web, how to get on it, and what opportunities it offers. The Deep Web is an anonymous shadow Internet that provides complete freedom of action.

How to get to the Deep Web?

In order to get into the Deep Web, you need to acquire its capabilities through the means of anonymous network connections that bypass the provider’s servers.

The speed of surfing on the shadow Internet is much lower than usual due to the fact that it is done through several network nodes. Such a system allows other client information.

On the other hand, although the data transmitted along the chain is securely encrypted, it is still possible for it to be intercepted at the last node that interacts directly with the server. For this reason, it is recommended to periodically change the packet sending chain. It is worth understanding that the browser is the best option in terms of anonymity, but nevertheless cannot guarantee it 100%.

Finding Tor in one of your usual search engines will not be difficult. The browser interface replicates the elements of Mozilla Firefox, which will allow you to get used to it without any extra effort.

The Hidden Wiki

Traveling through the hidden Internet with the help of Deep Web Search has already acquired a certain mystical connotation, and users who sink to the “bottom of the network” have even acquired their own name - netstalkers. It is believed that for such surfing you need to have certain technical knowledge and be able to identify hidden encrypted links and codes. But even a few well-known resources, the addresses of which are posted on the main page of The Hidden Wiki, are quite enough to interest and surprise the reader.

All banned sites have the domain ".onion". Access to them is usually limited in regular browsers.

Narcotic drugs

In The Hidden Wiki you can also find a specially designated “Drugs” item, which contains a fairly extensive list of resources for the sale of various narcotic drugs. Sites with .onion domains are not very reliable and change their addresses quite often on the Deep Web. How can I get to the same page next time? You will most likely have to learn about this from recent posts on various forums. Of course, all this is explained by their illegality and a fairly large number of users who do not want to put up with the proximity of prohibited content.

Not so long ago, the most popular resource for selling drugs was Silk Road, but after the arrest of its creator, the project was closed, and in its place appeared Silk Road 2.0, which was even larger in terms of monetary turnover, which was recently followed by its third version. Due to the fact that payments are made in Bitcoint currency, users are guaranteed complete confidentiality. In order to use the resource, you need to go through a short registration, after which you are immediately given the opportunity to begin choosing the products offered with the prices indicated on them. Everything looks about the same as in regular online stores, with the exception of the products themselves.

Immoral content

Also, some is occupied by the sale of immoral pornographic products, represented in the Deep Web by photo and video content. The fight against such a product is unsuccessful due to the huge costs associated with it. In contrast, a large proportion of onion sites do not post such content for ethical reasons.

On The Hidden Wiki you can find other controversial Deep Web links that provide a huge variety of very unusual services and products.

Russified content

The Deep Web consists almost entirely of English-language sites, and the share of Russified resources in it is very small. However, there are several trading platforms, led by Russian Road, which offer stolen electronics, counterfeit documents, as well as smuggled black caviar and other similar products. The site also adheres to the rules of “morality” and does not host child pornography, nor does it provide killer services. Many resources claim that the sale of drugs and weapons is not prohibited in absolutely all countries, while the danger of immoral content is obvious.

Firearms

Thanks to the shadow network, on the Black Market website anyone can purchase firearms On average, it’s $300 cheaper than in official stores, where it still requires lengthy registration and fiddling with paperwork. The administration of the resource reports that they have several warehouses with weapons and narcotic drugs, which they can successfully disguise and deliver in parcels.

Killer services

Hitman Network is interesting in terms of the services offered. The Deep Web has its own concepts about the value of life. For example, ordering such a service in the United States will cost 10 thousand dollars, and in Europe it will cost 12 thousand. The entire service will be no different from purchasing in any online store. Of course, the organizers have their own restrictions - the object must be over 16 and not be among the TOP 10 politicians. The site also offers 1% discounts on orders from attracted customers.

Fake documents

There are many onion sites involved in the production and sale of such resources can be found using Deep web search, represented by the search engines “deeperweb”, “DuckDuckGo” and many others. Communication with the site owners occurs via email, and in most cases, sellers use hacked mailboxes of users who are absolutely not involved in such operations.

Hacker services

Also, similar resources often offer services for hacking mail and various Internet accounts. There are even specialists who are capable of destroying a person’s reputation by accusing him of pedophilia or other unacceptable behavior. Moreover, the price range for such operations is within $200-300.

Stolen goods

In the vastness of Deep Web links, it is possible to launder Bitcoins, purchase stolen Paypal accounts and other services. There is also the sale of stolen goods mobile phones, which cost only a third of the real price. Basically, online resources try to work covering a wide range of goods and services.

News services

If you want to read censored news, the Deep Web can help. How to get to such sites on the deep web is no secret. There are a huge number of prohibited political and even terrorist sites here. It was with the help of the technology of “onion” connections presented in the Tor browser that such a large-scale project as WikiLeaks was first implemented.

Deep Web links 2014 is presented with the most popular services on the Wiki website, where users can find popular and interesting, and most importantly, working news sites.

There are even stranger resources on the lower layers of the Deep Web, containing information with a paranormal, mystical tinge. Information about such things is not made public, and getting to them will be much more difficult. Such an activity will require considerable effort and a deeper study of the hidden network from personal experience.

Netstalking (from internet stalking) is an activity aimed at searching for hidden information in the depths of the Internet. A netstalker, like a miner in a mine or a homeless person in a landfill (depending on the skills and technologies used), is trying to find a grain of gold among a pile of information noise.

How did it all start?

At the end of the 20th century, when computerization and internetization had not yet affected all spheres of our lives, a personal computer was not a thin laptop with an apple and beautiful buttons, but a kind of shaitan machine that 90% of current computer owners could not use.

During the most basic operations with a computer, numerous errors arose, but their solution then could not be found simply by typing a couple of lines into Google. Solving one problem after another, individuals became so carried away by digging that instead of developing in breadth, they began to dig in depth.

Studying the principles of computers and the Internet, they created a certain area inaccessible to ordinary users - the Deep Web (Deep Network, hidden Internet). Subsequently, a suitable application was found for this segment of the network.

DarkNet

The darknet is usually understood as the lower levels of the deep web. This layer is distinguished by a high entry threshold, and the resulting high anonymity. Alternative opinion: the darknet is a network between trusted users.

How to get to the Deep Web?

Netstalkers don't ask such questions. Instead, they look for clues on their own and dive deeper.

However, we know how to satisfy your idle interest. All the necessary initial information will be presented in the article, but you will need to find the links yourself.

  1. Download and configure Tor Browser. You can also access the deep web from your phone; there is a version of Tor Browser for Android.
  2. In it, follow the link to the special “Hidden Wiki” directory with entry-level sites. As you dive deeper, you will find other catalogs, and then another and another... It seems that this process is almost endless.

Video instruction for diving

Is it worth it?

The use of similar technologies in theory, can lead to being targeted by the intelligence services. If this doesn't bother you, then a final word of caution: use for research purposes only. In addition, you may regret what you see. WE DO NOT RECOMMEND!

Map

Researchers have classified the deep web into levels, which can serve as a map for the novice netstalker.

  • Level D - basic(open and indexed by search engines) Internet: social media and in general any sites found through search engines (including the one you are currently on). At this level there are strange links to the lower level and hints for the transition.
  • Level C - Deep Web: systems of anonymous networks and proxy servers (Tor, I2P), closed communities. Illegal content on an unimaginable scale. Hacker communities. Information about various anomalous objects and phenomena. Some search results using words from the subconscious. Allegedly secret government radio stations.
  • Level B - Dark Web: something used to control the upper level of D. Absolutely immoral content. Non-existent IP addresses and protocols, blank pages (it’s not clear what we’re talking about). Research forums. Youtube level B. A huge amount of useful and useless information (it is believed that level D belongs to only 4% of all information in one way or another accessible via the Internet). Something called "Void" (emptiness, abyss).
  • Level A is the lower limit of the Internet: Holes, Schumann Resonance, Level C control, the terrifying truth about mirrors, Internet dead zone, access to the Quiet House.

The essence of what is happening at A level is not clear to us even speculatively. We will be glad to receive any opinion from people knowledgeable about this issue.

Quiet house

The ultimate goal of an advanced netstalker is a Quiet House. The lower limit of the deep web.

Researchers point out the impossibility of returning from the “Quiet House” to the real world. This area is not a site, and it is not at all clear which area of ​​existence this place belongs to.

According to the image on the left, you can get to the Quiet House not only through the Internet. Netstalkers have discovered the possibility of transitioning to the Quiet House through sleep and something called “Life” (perhaps simply meaning the waking state).

We assume that the terrifying truth about mirrors has something to do with this. In the proposed scheme, at each level, there is the word “MIRROR” (mirror).

Project City

A certain society of people calling themselves “Doctors”. They declared their goal to “cure all people.” The first mention on the public Internet is on an anonymous entertainment forum. Known for extremely unpleasant messages and pictures.

It was not possible to confirm the reality of the existence of this secret project.

The average person or even an advanced Internet user is poorly aware of what is happening on the World Wide Web. The surface of the network is widely known and accepted even in communist countries search engines and portals such as: Google, Facebook, Amazon, Komando, eBay, Yahoo, Bing and everything else that any search site finds.

By the way, an interesting fact is that even today’s largest search monster, Google, surveys from 4 to 16 percent of the global network, depending on the relevance of the query and indexing. In other words, you and I are like surface sailing ships, we sail where the “search” wind blows and we see what is on the surface of the water - no further than our nose.

Deep Web

Below the surface of the digital sea exists the deep web. There you will find abandoned and unattended websites that have been collecting dust for years without moderation or maintenance, databases of research firms, government databases and other things that are not intended for the public, simply put - not indexed by search robots. You could spend years exploring this wealth of information.

Dark Web

There is an even deeper dangerous place- the so-called dark network (Dark Web). They sell illegal substances, weapons, counterfeit money, stolen cards, fake degrees or even passports, cloned debit cards, safe-cracking tools and even heavy weapons.

Dark websites also allow you to hire a hitman or escort, buy someone's identity, or indulge in child pornography. Imagine how different this Internet is from the one you and I use every day, without even thinking about what is happening in the depths of the network.

Finding dark places on the Internet is not easy, even if you try very hard - you need to know exactly the meeting place (specific address on the Internet) and how to get to it.

Famous examples of “closing” Dark Web resources

Of course, in most countries there are entire programs developed by intelligence services to combat online trafficking in people, weapons and drugs. The fight against the illegal use of insider information, illegally obtained data of citizens and their bank cards is growing every day. A striking example of such opposition is the arrest in San Francisco of Ross Ulbricht, owner of the Silk Road online trading platform. Ross faces charges of hacking, money laundering and drug trafficking.

The work of the intelligence services

Asking questions, how is this possible in a world so transparent for the intelligence services, when not only phone calls recording is not a problem - they are transmitted digitally with weak encoding by default, but it is not difficult to find out what you are watching on TV. For those who are not aware or in a tank, a modern TV is a regular computer with built-in analog-to-digital tuners and a large display. Firstly, a person first needs to get “under the hood” of these very special services, remember how Stirlitz was under the hood of Mueller? It's the same in modern world, focused surveillance, wiretapping and analytics are an expensive pleasure, if every senile person from an Internet forum is taken under control, then no budget will be enough, even the pension fund will not help plug the holes. Secondly, characters like Ulbricht use “holes” in the developed digital models pre-installed by the special services for their mercantile needs; in most cases, illegal immigrants and attackers resort to “The Onion Router,” an anonymous network connection protected from eavesdropping and calculation of the addressee’s location.

Cryptocurrencies

Traffic anonymity is ensured mainly due to the distributed network of information transfer servers. Various cryptocurrencies such as Bitcoin (not to be confused with personalized digital money such as Webmoney, etc.) are used to support illegal activities. Cryptocurrencies are distinguished by the fact that they provide complete anonymity. Regarding Bitcoin, the rule is simple: on whose digital device the wallet with it is located is the dad. For example, for Ross Ulbricht, the FBI determined the profitability of the business from drugs alone at $213.9 million. You can imagine, if such amounts were turned over only on one site and for one position, then this explains the epic growth of bitcoin quotes over a couple of years from cents up to a thousand dollars. Demand on exchange exchanges drives growth. And after the closure of this site, Bitcoin gradually decreased in value.

Attempts to counter the Dark Web

Analyzing all of the above, we ask ourselves the question: will everything really remain at the level of unsystematic operational work to counter everything illegal that happens on the World Wide Web? The answer is already in sight: DARPA (the US Department of Defense Advanced Research Projects Agency) has come up with a new Memex engine capable of opening TOR and other hidden networks. Tens of thousands of anonymous sites are visible to Memex without any difficulty. The system is capable of indexing all areas of the dark Internet, ignored by conventional search engines.

We can only hope that, as usually happens, the intelligence services will not start using Memex for banal espionage and other less than legal activities, but will begin to combat trafficking in people, weapons and drugs.

However, it is almost impossible to protect someone completely from all the “negativity”. Including the special services. Therefore, all their attempts to protect anyone from themselves will be in vain. A person chooses what to do and protect himself from anything only each of us can do independently.

Did you like the article? Share with friends: