How to get into the deep internet. Amazing every day! Are there any new Luddites now who are opposed to technology?

How much do you know about the internet? And how much does the Internet know about you?

What is deep web

The Deep Web is a shadow Internet, which is based on maximum anonymity, a complete rejection of provider servers, which makes it impossible to determine who, where and what is sending. Before you get to any site via the deep web, your data is encrypted and transmitted through the same network participants as you, which makes the transfer of data as anonymous as possible, but rather slow. The Deep Web now resembles the speed of the first Internet using dialup modems. The concept of the Deep Web has gained popularity quite recently and still has no clear meaning. In a broad sense, this phrase denotes information hidden from indexing by search engines, and includes closed communities and forums, certain pages of sites are prohibited from indexing, databases, as well as encrypted networks for anonymous surfing (the latter most often mean TOR and i2p). In a narrower sense, the deep Internet is a pseudo-domain space created using encrypted connections that ensure user anonymity by hiding the IP address given to him by the provider.
Usually, interest in the deep Internet is associated with the desire of more or less experienced users to find something secret on the Internet, hidden from the eyes of the majority. Novice internet stalkers are sure that the deep internet includes a lot of interesting information, which only through a misunderstanding turned out to be hidden from the eyes of the majority. In fact, this opinion is only partially true, and the so-called Deep Web includes both information that is not needed by the majority of law-abiding citizens (the vast majority of TOR and i2p network sites), and very interesting discussions and opinions of people united in a closed community. to isolate themselves from people with alien views and opinions or inexperienced newcomers to their field of activity (a typical example is closed SMO or SEO forums). In addition, the closed nature of some communities makes them elite in the eyes of other users (a vivid example is the closed collective blog Leprosorium).

Scale

The size of the deep web is unknown. There are relatively reliable estimates of the total number of sites leading to online databases: about 600 thousand such sites on the entire Internet and about 30 thousand on the Runet. The most interesting thing is that the amount of information concentrated in the deep web is tens of times greater than the amount of information in the ordinary Internet space.

Below are some links to interesting (in my opinion resources)

Https://onion.cab/ - Tor search engine and gateway to the Internet.
http://www.deepweb.us/ - M. Zillman's collection of deep web resources.
https://www.wilsoncenter.org/sites/default/files/stip_dark_web.pdf - Study material with verified clickable links to Deep and Dark Web search resources.
https://www.deepdyve.com/ is a paid deep web search engine.
http://www.hozint.com/ is a platform for collecting information about political stability, security of countries, various incidents and unrest, collecting and scanning information on the deep web.
http://www.gwu.edu/~nsarchiv/search.html - US National Security Archive at George Washington University.
http://www.base-search.net/ is an invisible web search engine for open academic web resources owned by top universities and research centers in the US and UK.
http://citeseer.ist.psu.edu/index - search engine on the invisible web for various publications, books, articles in the field of computer solutions and information sciences in English.
http://www.findthatfile.com/ - The most comprehensive file search on the Internet. Allows you to search for files in 47 formats. The search can be carried out by the author of the file, its name, a fragment of the content. Supports not only basic types of text and table files, but also compressed files, audio-video files and much more.

Http://www.deepwebtech.com/ is a leading provider of "deep web technologies" that implement a federated search approach, creator of a number of deep web search engines, Internet and intranet solutions.
http://www.ipl.org/ is a search engine for collections containing the most relevant and interesting information resources, created as a result of the voluntary joining of efforts of thousands of students, volunteers of information cataloging and classification and leading specialists in the field of information technology.
http://publicrecords.searchsystems.net/ - Search over 50,000 of the largest open source databases for free. For example, it can provide information about business applications, available licenses and even about participation in criminal proceedings, bankruptcies and many, many other interesting things.
http://www.resourceshelf.com/ - is a collection of the most in-demand business and scientific issues supported by a community of researchers and specialists in collecting and cataloging information.
http://vlib.org/ - the world's largest virtual library, combining digital resources from many countries, training centers, commercial organizations, etc.
http://biznar.com/biznar/ is the most modern system leveraging federated deep web search technology in business.
http://lookahead.surfwax.com/index-2011.html is the first real-time deep web search engine with elements of semantic analysis. Allows you to grasp news and facts that are not available to other systems. It integrates into browsers.
http://infomine.ucr.edu/ - a virtual library of Internet resources, contains data from libraries of many of the richest and most successful American universities.

Not of course many sites inaccessible on the regular network, such as WikiLeaks, Piratebay, The Hidden Wiki and a bunch of other sites, as they say: everyone has ...

How and who is using the Deep Web?

Tor users use this network by connecting through a series of virtual tunnels rather than direct connections, thus allowing organizations and individuals to exchange information over public networks without revealing their privacy. Tor is effective in circumventing Internet censorship by allowing users to browse sites that would be prohibited on the regular Internet.

Criminals of all stripes, terrorists, drug dealers, hired killers feel at ease in these open spaces, although from time to time information leaks into the media.

Tor can also be used by software developers to create new and improve old communication tools with built-in privacy protection.

Hidden services allow individuals to create websites without revealing the webmaster's IP address and true location. For example, Tor is used to discuss socially problematic topics: chat rooms and web forums are formed for victims of domestic violence or people with certain diseases.

Journalists can freely and safely correspond with dissidents and denunciators of the regime. Employees of nongovernmental organizations (NGOs) gain access to correspondence with families when they are out of their country without disclosing to the general public that they are working with the organization.

It is clear that such a place cannot be bypassed by the military, special services, law enforcement officers to ensure the secrecy of their messages and tasks. They also use the Deep Web to search for terrorists, other criminal elements and their illegal actions.

What currency is used in the Deep Web

Bitcoin is a commonly used currency in the deep web of black markets, and they do not exist in physical form, but computers, and sometimes entire computing centers, are used to acquire them.
What distinguishes bitcoins from conventional currencies is that it is unrealistic to trace their owners and the chain of transactions, which makes them the most preferred form of payment for illegal transactions.

Most likely, this space in the near future will be under the control of supervisory authorities, but time does not stand still and we should certainly expect the emergence of new programs and browsers, since the secret Internet allows you to cash out huge amounts of money.

P. S. this is my first post, if anything - sorry ...

I came across a very curious article about the multi-level structure of the "Deep Internet".

If anyone has not yet heard what it is, I explain: this is a network consisting of a huge number of web pages that are not indexed by search engines. Access to these pages is possible only through a chain of encrypted connections, the nodes (entry points) of which are scattered all over the world. There are web pages that are not linked to other hyperlinks - for example, pages dynamically generated from database queries. The size of the deep web is unknown and, in general, difficult to estimate, primarily due to the vagueness of the concept itself.

The World Wide Web is a complex multi-level structure that keeps secrets and secrets about which an ordinary user does not even know ...

There are groups of passionate professionals who call themselves "Netstalkers". They explore the Net, looking for hidden corners, classified information and other secrets. Netstalkers divide the Web into levels.

Social media
Blogs
news
Porn
Imageboards (for those who do not know - something like chats / forums, with complete anonymity of the participants)
Small boards (almost the same as image boards, but more thematic and with fewer participants)
ARG (Alternate Reality Games)
Gated communities
Hard porn
Collections of strange links

Thor (the same TOR ... Anonymous proxy network inside the regular Internet)
No-art
Hacker communities
i2p (Another anonymous proxy network)
Dead forums (forums that have been shut down but are still online)
Freenet (Another anonymous network within the Internet, peer-to-peer)
Memetics information
Future sites
Two internet sects
Search results for words from the subconscious
Deep Web (Deep Web, originally the term meant pages that are not indexed by search engines)
The limit of brutforce net-stalking capabilities
Dark internet
Numbered radio stations
Secret government radio stations

If the two upper levels are still quite objective, then the paranormal, supernatural and folklore already begin deeper ...

The so-called "Pass"
Explorers' forums
Blank pages
Non-existent IP
Void
Non-existent pages
Way up, back, one last time
Non-existent protocols
Older browsers are needed here
Really dangerous point
You Tube for level B
Random numbers
Small imageboard
Tons of useless information
Tons of useful information
Valuable phrase
The limit of human capabilities
D level control
Holes
Death
Schumann resonance
Dead zone
The terrifying truth about mirrors
Level C management
Quiet house

And at the deepest level - Level A
About which it is generally difficult to say something, just as about the higher planes of human existence.

this diagram clearly shows the levels of which, according to the assumptions of "Netstalkers", the World Wide Web consists

And here is what he said on this topic in his interview. general director one of the leading computer security firms in Russia:

The volume of illegal trade on the "deep Internet" is difficult to estimate, but some experts believe that they can amount to hundreds of billions of dollars a year. There you can buy absolutely everything - from the data of plastic card holders to passwords to e-mail addresses, from the skins of animals listed in the Red Book to pornography. Moreover, not only illegal traders and hackers use the "deep Internet", but also representatives of big business - to transfer confidential information to partners, journalists - to communicate with "unnamed sources", diplomats - for private correspondence. “Hidden networks are used for anonymous, covert exchange of information, and you can meet there a wide variety of audiences - from religious fanatics to child pornography dealers. For the most part, of course, hidden networks are criminal in nature, since they are not regulated by any legislation.

Here and the drug trade, and the sale of fake IDs, and the trade in data access to the financial accounts of users of various banks, and child pornography, and much, much more that simply cannot legally exist on the open spaces of the public Internet. "But, in addition to frankly criminal sites , there are also those resources whose existence the owners would not want to advertise because of the secrecy of information or the presence of commercial secrets in the data. "Closed bases, academic, government, military sources, closed bases of enterprises and organizations.

© Mikko Lagerstedt

Wondering what the Dark Web is and how to access it? We tell you in detail, step by step, about the best and safest way to access the Dark Web, from TOR settings and choosing a VPN service to how much extra effort you need to make to stay anonymous.

In fact, accessing the Dark Web is fairly easy. But it’s even easier to be found in it if you don’t take precautions.

According to research, only 4% of the entire Internet is visible to the general public. This means that the remaining 96% of the Internet is on the so-called "deep web" (The Deep Web). But let's understand the terminology.

What is Surface Web?

Clear Web / Clear Net / Surface Web is the usual Internet, the "world wide web" where you hang out every day and do everyday things: check your mail, go to Facebook and Twitter, buy on Amazon, etc. All sites and pages that a search engine such as Google "sees" are on the Surface Web.

What is the Deep Web?

The Deep Web is a subclass of the Internet, sites that cannot be found on search engines like Google. This includes all pages that are locked to outsiders by login windows, all company pages created for internal use. Most of the Deep Web resources are not illegal.

What is Dark Web or DarkNet?

The Dark Web is a subclass of the Deep Web containing all kinds of sites, legal and illegal. This includes black markets selling drugs, counterfeit goods and weapons, as well as hacker sites, adult pages, bitcoin mixers, and even sites for hiring killers. The variety of sites on the Dark Web is surprising at times. But the Dark Web does not have its own search engine, which would work in the same way as Google on the "regular" Internet.

If you need access to black market sites or DarkNet resources (with the .onion domain), then you need to access the Dark Web using the TOR network through the TOR browser. It is the most used web browser on the Dark Web.

How to access the Dark Web

Step 1

To get started, connect to a reliable VPN, for example, and use it all the time, whether you are using TOR or not. You can find the most suitable VPNs to use with TOR. You must take your anonymity and security seriously if you visit the Dark Net.

Don't be fooled into thinking that ISPs and law enforcement do not try to track anyone using TOR to access the Dark Web. Moreover, they do it pretty well, so don't make it easy for them.

Please note that recently it became known about the TOR vulnerability, which reveals your real IP-address, which, in turn, can lead to your real location. If you already have a TOR browser, please update it immediately. Vulnerabilities like these most often occur in TOR.

With a VPN, your DarkNet activities will be hidden from your ISP and government agencies as all your data will be encrypted. No one will even know that you are using TOR, let alone browse the DarkNet markets.

Better yet, the VPN gives you a fake IP address registered in a different country altogether. Therefore, even if TOR is at risk, you will simply be tracked to another location that is not actually connected to you.

Another advantage of using a VPN is to prevent hacker attacks that steal your identity, as well as personal files and photos from your computer.

You need to use a good VPN service that does not require login, is fast, accepts bitcoin preferentially, has a DNS leak switch, and is TOR compliant.

Step 2

You cannot access the Dark Web with a regular browser like Internet Explorer or Google Chrome. To enter the Dark Web, you need to download the TOR browser. But download it only from the official TOR website!

Close all windows and applications that are connected to the world wide web, including Skype, OneDrive, iCloud, etc. Open the VPN app and connect to a different location than where you are. Make sure to use the OpenVPN protocol as it is the most secure.

After that, open your regular browser and then download the TOR installation files.

Step 3

Download the TOR browser package to your PC or laptop. When the download is complete, double-click the downloaded file, select the destination folder (the folder where you want to extract the browser) and confirm the installation.

Step 4

Launch the TOR browser. Open the folder where you extracted TOR and launch it. The TOR home page will open in a new window. Connect to the network via TOR, following a simple instruction.

You now have a good level of anonymity and security and can access the Dark Web sites.

And now you want to go to some of the Dark Web sites ...

Check out the Dark Net Marketplace below to visit some of the sites. Just look! Many domains exist for a short period of time or are often "moved".

Silk Road - http://silkroad7rn2puhj.onion/

Dream Market - http://4buzlb3uhrjby2sb.onion/?ai=552713

Imperial Market - http://empiremktxgjovhm.onion/

Router - http://xuytcbrwbxbxwnbu.onion / (Russian market)

If you would like to enter specific Dark Web markets, you must follow the specific market guide as it will tell you in detail what to do in order to register, view offers, and more.

If you're looking for a larger list of hidden deep web links, see below.

This is one of the largest lists of verified darkwebnews.com resources with the .onion extension on DarkNet with a search function, site name, status, description, categories. But whether they work or not is unknown.

These are all necessary steps to securely access the Dark Web, but there are a few more important points to be aware of ...

Bitcoin and shopping on the Dark Web

If you go to the Dark Web to buy something, then you will need to use a cryptocurrency to do this, and Bitcoin is the most used cryptocurrency on the Dark Web.

Buying digital currencies is a separate topic, we will not delve into it, but there is one valuable advice on what to do so that your account is not immediately closed and you do not lose your money.

Never send cryptocurrency directly from your account (where you buy tokens) somewhere on DarkNet, and also never send tokens directly from anywhere on DarkNet to your account. Otherwise, it will be possible to immediately tell where the coins came from. You need to send tokens through the exchange to the wallet, and from the wallet to the Dark Web, and vice versa.

Additional Security Steps in DarkNet

Step 5

Don't resize the TOR browser window unless you enjoy tickling your nerves. The secret services have special programs that can determine by the size of the window which browser a person is using. The default TOR window size allows you to remain incognito.

Step 6

Remember that TOR is not necessarily 100% anonymous. You will need to disable JavaScript in your browser settings.

Step 7

Disconnect the webcam or cover it with black tape. Otherwise, later you may be surprised that your intimate photos are used for blackmail or extortion.

Step 8

Also mute the microphone or cover it with tape to mute.

Step 9

Never use your real name, photos, email, or even the password you previously used on the Dark Web. This is the most quick way track you down. Use an anonymous email account and pseudonyms that have nothing to do with you and that you have never used before.

Step 10

If you are using TOR on the Dark Web for anything other than, you should seriously consider your privacy and security.

Over the past few years, I have heard the concept of the Deep Web more and more often. But I never thought about how to get there. And so, after a little digging, I decided to understand this topic.

There is an opinion on the Internet that the deep Internet stores almost 100,000 TB of information, while the regular Internet does not exceed 2,000 TB. Almost all information on the dark side of the Internet is open source and free. Deep Web is not indexed by Google or Yandex search engines.

How to get there

If you want to access such a domain through a regular browser, you will see this.

Well, if through TorBrowser, then the page will naturally open. In the screenshot below, I opened the local Wikipedia (Hidden Wiki)

What can be found on the Deep Web

Since the deep internet is used by hackers, criminals and law enforcement agencies, this place is considered dangerous. The truth is not entirely clear why.

Somehow it so happened that the first thing I came across was the Runion forum, which has things that amazed me.

I'm not even sure if it's worth writing about it at all, since modern laws of the Russian Federation can be punished for this. I just hope that all the people who sell weapons on the forum are police officers, thus calculating the alleged criminals.

I was surprised not so much by what they sell firearms, but the fact that for communication they use strange boxes of the type: 4d2b151932e7 and requires encrypting letters.

Most sellers only accept Bitcoin for payment. A little later, I found a service that allows you to send messages to such strange addresses.

On the forum there are orders for body armor and even acetone. There are even SIM cards that are issued on legal entities... Many branches about politics, mercenary camps and the like.

On the portal http://doe6ypf2fcyznaq5.onion/ there is a catalog of popular resources. Of the harmless ones - a virtual confessional, in which you can absolutely anonymously ask priests from the local religion to forgive your sins.

What is the Dark Web or Darknet, how does it differ from the Deep Web, and why are these two terms always confused? We decided to help you figure it out and at the same time warn you - after all, the Darknet, with all its attractiveness, accessibility and alluring spirit of freedom and permissiveness, is very dangerous place, wandering around which can cost you quite a lot (both literally and figuratively).

What is the Dark Web?

The Dark Web is a term referring to a certain group of specific websites that exist in the encrypted network space. They cannot be found by traditional search engines and cannot be reached using traditional browsers. It is also often owned by the Dark Net, but do not confuse it with the Dark Internet (it will be discussed below)

Almost all Dark Web or Dark Web sites hide personal information using Tor encryption tools. This network (and did you know, by the way, that it is an acronym for The Onion Router - "onion router"?) May be familiar to you due to its ability to hide user identity and network activity. You can use Tor to hide your location in a way that makes it appear that you are logged in from a different country than where you are. This is very similar to how VPN services do it.

If a website is running through Tor, it has about the same effect, and even multiplies it. Sites designated as the Tor Hidden Service are only accessible when connected to the Tor network. Simply put, without connecting to this network, you will receive nothing.

The pseudo-suffix “Hidden Services. onion does not work with DNS servers, and Hidden Services URLs are an alphanumeric set of 16 characters automatically generated using the public encryption key when the site is created. You can copy the Tor link and try to open it in a regular browser, but this will lead you to a dead end.

To visit a Dark Web site using Tor encryption, the Internet user will have to use Tor themselves. Just like an end user's IP address bounces through multiple layers of encryption with a ball to reach another IP address on the Tor network, so is the case with Internet sites. Each of the nodes knows only those nodes that are connected to it directly (it does not know anything about the ways of connecting your PC to the web server). Any transition from one node to another is done using its own set of encryption keys. This reduces performance and speed, but significantly increases the security of your anonymous movements.

There are several levels of secrecy, even more than the already secret fact that you use Tor to visit a regular Internet site itself.

What follows from this? That anyone can visit the Darknet sites, but it is extremely difficult to figure out what kind of people are behind them. But it can get dangerous - in certain cases.

Silk road to oblivion and others

But not all Dark Web sites use Tor encryption. Some people use similar services like I2P or Silk Road Reloaded. The visitor will have to use the same decryption method that is used on the visited site, and - which is critical - know exactly how to find this site, up to manually entering a link just to enter this site.

Notorious examples of Darknet sites include the Silk Road (which translates to "Silk Road") and its derivatives. Silk Road was (and may still be) a site for buying and selling drugs "for entertainment purposes" - for those who want to unwind from time to time in an illegal way. This is one example of the Darkweb being used for disgusting purposes.

The Darknet made massive headlines in August 2015 after it was revealed that 10 GB of information stolen from Ashley Madison, a site designed to make bored spouses conveniently cheat on their partners, all information was posted on the vastness of the Dark Web.

The hackers who stole the data threatened to spread it all over the internet if the site didn’t shut down, and it has operated under that threat ever since. Now the spouses of Ashley Madison subscribers have begun to receive blackmail letters demanding the transfer of $ 2,500 in bitcoins - or all personal data will be made public.

In March 2015, the British government established special unit anti-cybercrime on the Dark Web, specifically targeting organized crime and child pornography. National Crime Agency (NCA) and British intelligence unit GCHQ jointly created the Joint Operations Section (JOC) for this purpose.

But there are still quite acceptable reasons for using the Darknet. We're talking about freedom of information.

The population of closed countries with a totalitarian system sometimes only through the Dark Web can communicate with the outside world. And the recent revelations of the surveillance of the Internet activity of their citizens and you by the American and British government special services may lead you to a sensible idea of ​​transferring your network communication to the Darknet. (I'll stay on Facebook, but I just like the outside attention.)

What is the Deep Web?

Although these terms - Deep Web and Dark Web - are often used interchangeably, they are by no means the same. There is some nuance here. The Deep Web refers to all sites that cannot be found by search engines.

Thus, the deep web includes not only the Dark Web, but all user databases, post pages, abandoned sites and personal pages, online forums with required registration and paid online content. There are a lot of such pages, and most of them exist for the most common reasons.

For example, as an online publication, we have “mock” versions of all of our web pages blocked from indexing by search engines so that we can check the content and design of the publication before releasing it to the public. Therefore, every page available for public viewing on this Internet site (and literally millions of similar pages and sites) has a duplicate in the deep web.

The content management system in which I am preparing this article is also located in the deep web. Here's another hidden take for every page on the public site. At the same time, our working corporate network is also closed from search engines and protected by a password. And since all this has existed for about 20 years, our network has grown pretty much with secret duplicates.

Are you using online access to your bank account? Your password-protected data is somewhere deep in the deep web. And if you estimate how many pages a Gmail account alone generates, then the true size of the deep web will become at least approximately clear.

This is why newspapers and popular news sources regularly return to the horror stories about the "90% of the Internet" made up of the "dark web". They simply confuse the massively risky and unkind Dark Web with the vastly larger, but mostly harmless ocean of the Deep Web.

At the same time, equalizing among themselves such actions as deliberate concealment of activities from the law and normal fencing from access by search engines for the sake of confidentiality or simply for banal business purposes.

What is the Dark Internet?

Even more confusing is the term "Dark Internet", sometimes used to describe the following examples of networks, databases, or even websites that cannot be found on the open Internet. In this case, this happens either for technical reasons, or because they contain some kind of private information not for public use.

The main practical difference is that the terms Dark Web or Deep Web are commonly used by newsmen to refer to corners of the web full of dangers and someone's hidden agenda, while the "dark Internet" is just boring warehouses where scientists store raw data. for their further research.

But, of course, you are interested in how to get into the Darknet

Technically, this is not particularly difficult. You just need to install and run Tor. Download the Tor Browser Bundle from www.torproject.org - all the tools you need are already there. Open the downloaded archive, select the location on your hard drive for the files after unpacking, then open the folder and run the Start Tor Browser file. That, in fact, is all.

The Vidalia dashboard will automatically connect to the mysterious encrypted network and, once connected, will open a browser. To disconnect from the Tor network, you just need to close this browser.

Depending on what you intend to do, some conspiracy theorists advise you to tape up your laptop's webcam in order to prevent the overly curious and tech-savvy "big brother" from spying on you. In this case, we can recommend wearing a foil hat at the same time.

The hardest part is figuring out where, what and how to search on the Darknet. Here, reader, we will leave you and wish you good luck and a safe search. And one more warning before you get even one step further: by entering the Dark Web, you will have a real opportunity to get to all those sites that tabloids scare us with. This means that right now, you may be a couple of clicks away from places offering drugs, weapons and - frankly - even worse.

Aggregators like the Reddit site offer long lists of links, as do some pages on the Wiki - a list offering access to some really dirty places. If you wish, you can briefly familiarize yourself with them, however, we would not recommend that you do this.

Also keep in mind: Darknet sites crash from time to time - such is their dark nature. And if good customer support is important to you - stay out of the dark and closer to the light!

And again: take our warning carefully: this article is not an attempt to either inspire or approve of your further, possibly illegal or immoral behavior.

Did you like the article? To share with friends: