Ever wondered how these terrorist groups work so easily on Internet even with so much vigilance? How they conduct business without using Google listings and adwords? How they get hide so easily with all this cyber crime cells and whatnot? Well although Technology has been human’s biggest gift to the world but just like everything, it also have its side effects.

Individuals, Companies and even Governments operates on cloud internet and computes their data on the what we call World Wide Web(WWW). But you will be surprised to know that comprise of just 2-3% of the whole internet. At present, the most easily indexed material from the web is text.If you add all the matter(or what is called Indexed websites) which you can find on search engines like Google,Bing, Yahoo, Yandex,etc., that still make it to just 5-6% of all the internet, what is referred as Surface Web. But if that’s true, what is that other 95% comprises of ?

the-deep-webIn the basic terminology, its called DEEP WEB.The “deep web” has existed ever since businesses and organizations, including universities, put large databases online in ways people could not directly view.Online services such as Dropbox and Gmail are publicly accessible and part of the World Wide Web – but indexing a users files and emails on these sites does require an individual login. But their is more Darker content on World Wide Web which is further called DARK WEB.

According to The New York Times, computer scientist Mike Bergman is credited with coining the term “Deep Web” in a paper titled “The Deep Web: Surfacing Hidden Value”.It may also have “deep web” elements – that are hosted by web servers using the anonymous web protocol called Tor. Originally developed by U.S. Defense Department researchers to secure sensitive information, Tor was released into the public domain in 2004.Like many secure systems such as the WhatsApp messaging app, its original purpose was for good, but has also been used by criminals hiding behind the systems anonymity. Some people run Tor sites handling illicit activity, such as drug trafficking, weapons and human trafficking and even murder for hire(Assassins).

You can install the TOR bundle (considering you are on Windows). Once it’s installed and launched, the browser should connect automatically to the Tor network. 1lfpxh4olbp_pr3i6j1uzmg

From there, you can use a directory of certain hidden services to get started. Some of these directories include:

  • Silk Road
    The Silk Road is an online black market which can only be accessed via the TOR browsing client. Many sellers on the site specialize in trading illegal drugs for Bitcoins, a peer-to-peer digital currency.
  • Hidden Wiki
    The Hidden Wiki is a wiki database that can only be accessed via the TOR browsing client and contains articles and links to other deep Web sites, the Silk Road, assassin markets and child pornography sites.
  • Bitcoins
    A type of currency often used in deep Web black markets is the Bitcoin, a peer-to-peer digital/virtual currency that regulates itself according to network software, with no more than 21 million Bitcoins issued in total by 2140.

**These sites may contain links to illegal services and are provided purely for informational purposes only. If you’re scammed or get yourself into trouble, I will not be held responsible. Do it at your own risk.**

Advertisements

One thought on “Ever wondered where INCOGNITO Mode came from or where all HACKERS hang out?

Comments are closed.