1 of 43

The Dark Internet

2 of 43

Shining Light onThe Dark Internet

3 of 43

Google only indexes a tiny fraction of the internet. By some estimates, the web contains 500 times more content than what Google returns in search results. The links that Google and other search engines return when you type in a query is known as the “surface web,” while all the other, non-searchable content is referred to as the “deep web” or “invisible web” AND its negative aspect as “the dark web.”

Most of that information is hidden simply because the vast majority of users won’t find it relevant. Much of it is tucked away in databases that Google is either not interested in or barred from crawling. A lot of it is old and outdated. The contents of iPhone apps, the files in your Dropbox account, academic journals, court records, and private social media profiles are all examples of data that aren’t necessarily indexed by Google but still exist on the internet.

4 of 43

Key Abbreviations and Terms Used:

NIST’s National Vulnerability Database (NVD)

National Institute of Standards and Technology

NVD paper

The Tor network hosts onion sites. The Tor network is a series of interconnected nodes that allow private and anonymous internet use. Tor stands for “The Onion Router,” while sites hosted on the service carry the “.onion” top level domain suffix

Onions have many layers, as does Tor (The Onion Router). The network routes your web traffic through a worldwide series of these “layers,” a.k.a. nodes, thus disguising your identity in the process:

5 of 43

6 of 43

https://www.torproject.org/

7 of 43

8 of 43

9 of 43

10 of 43

See also: The best VPNs for Tor

Warning: Your ISP can detect you are using Tor

Much of this article revolves around the use of anonymity networks like Tor, which are used to access the dark net. Internet providers can detect when Tor is being used because Tor node IPs are public. If you want to use Tor privately, you can use either a VPN or Tor Bridges (Tor nodes that are not publicly indexed). US Tor users in particular may want to use a VPN, which will be faster and more reliable.

Recent changes in US legislation mean internet providers are free to sell and share data on their customers, including their browsing habits. When using a VPN, your ISP will not be able to see that you are connected to a Tor entry node, only an encrypted tunnel to a VPN server.

NordVPN is the  #1 choice for Tor and has been designed with Tor users in mind.

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running on a computing device, e.g. a laptop, desktop, smartphone, across a VPN may therefore benefit from the functionality, security, and management of the private network. Encryption is a common though not an inherent part of a VPN connection.[1]

11 of 43

Why do we need alternatives to Tor Browsers?

People usually use the Tor browser for two significant reasons:

  • To access the dark web
  • To enjoy an anonymous web browsing experience

Tor was one of the most secure browsers, but security experts have found some serious issues. Thus, many don’t recommend using it anymore.

12 of 43

The users are now more concerned about their digital privacy than anything else. The following mentioned below are some of the valid reasons that raised the demand for the best Tor browser alternatives:

  • It slows down your internet connection. Usually, when you browse through Tor, the internet speed is lowered to 40%. It is because the traffic goes through many relays.
  • Results in a frustrating user experience.
  • Your ISP can easily detect you when you’re using Tor.
  • It doesn’t encrypt the data traffic.
  • You can get into legal trouble. Usually, people who want to hide sensitive information use it. If the government knows you’re using the Tor browser, they might start watching your online activities.

13 of 43

What alternatives to the TOR browser? �Answer - see below but once again please check with your IT staff before installing any of these on a computer.

See this Listing: https://beencrypted.com/privacy/anonymous-browsing/best-tor-alternatives

Tor Alternatives – Better Privacy

  • Virtual Private Network (VPN) – By using VPN, you don’t have to install any other privacy tool, its the perfect alternative for Tor.
  • I2P Browser – uses darknet technology and provides layered encryption.
  • ZeroNet – There are no central servers, and you can use them without an internet connection.
  • FreeNet – A free software for communicating over the web without fearing censorship.
  • GNUnet – It is a medium-latency network that is famous for providing anonymity and security
  • Subgraph – It uses a firewall and meta-proxy to ensure anonymity while using the dark web.

14 of 43

  • Epic Privacy Browser – It prevents IP leaks, blocks fingerprints, and increases connection speed while browsing the web.
  • Firefox Focus – It is available on all popular platforms, including Android and iOS. It has a blocking social and ad trackers feature that prevents trackers from recording users’ activities.
  • PeerBlock – A helpful tool for downloading torrents.
  • Yandex Browser – It is an open-source Chromium project with impressive security boosting extensions such as an ad block, site reputation indicator, and flash blocker.
  • Disconnect Browser – It prevents internet tracking by hunting all those companies and websites that track down netizens.
  • Comodo IceDragon – It offers you excellent security and privacy boosting features like a site inspection feature and a built-in ad blocker and VPN.

15 of 43

  • IprediaOS Encrypted Browser – A Linux-based operating system that uses programmed encryption services and safeguards users from attackers and trackers.
  • Tox – It is like an instant messaging app that uses open-source libraries to encrypt everything you do.
  • JonDo Live-CD – It comes with some pre-installed programs like Tor browser, Pidgin, and Thunderbird and works best on Linux.
  • Whonix – Uses Whonix-Workstation, which works on a private framework to provide users security and anonymity.
  • Psiphon Browser – It is best at hiding your IP address and comes with features like multi-screening and server exchanging.
  • Globus Browser – It uses VPN servers to keep your activities protected.

16 of 43

  • Freepto – It automatically encrypts the data stored on the USB disk to boost security.
  • Lightweight Portable Security – A Linux-based software that doesn’t use external servers.
  • Tails – It uses cryptographic tools to encrypt emails, data files, and other instant messages.

Tor is one of the most reliable networks to access the deep and dark web. Its vast range of servers, circuits, layers, bridges, and security updates/patches make it more secure and anonymous than other Tor Alternatives.

80% of people use Tor to access “.onion” URLs, but thousands also use Tor to browse the web anonymously. However, Tor has many privacy, security, and speed issues from ISP throttling.

17 of 43

Key Q&A

How does a VPN work?

VPN creates a "tunnel" where you can send data securely using encryption and authentication tools. Businesses often use VPN connections because they're a more secure way to help employees remotely access private company networks, even when they're working outside the office.

The VPN lets remote devices, like laptops, operate as though they're on the same local network. Many VPN router devices can support dozens of tunnels at the same time, using easy configuration tools—ensuring all workers have access to company data, no matter where they are.

18 of 43

19 of 43

Deep web vs dark net

The deep web is often confused with the dark net, also called dark web, black web, and black net. Put simply, the deep web is all of the information stored online that isn’t indexed by search engines. You don’t need any special tools or a dark net browser to access the deep web; you just need to know where to look. Specialized search engines, directories, and wikis can help users locate the data they’re looking for.

20 of 43

Deep web vs dark net

The deep web is often confused with the dark net, also called dark web, black web, and black net. Put simply, the deep web is all of the information stored online that isn’t indexed by search engines. You don’t need any special tools or a dark net browser to access the deep web; you just need to know where to look. Specialized search engines, directories, and wikis can help users locate the data they’re looking for.

21 of 43

Many of the best general deep web search engines have shut down or been acquired, like Alltheweb and CompletePlanet. Still, a few are hanging around to get you started:

  • The WWW Virtual Library – The original index of the web, but more of a directory than a search engine.
  • Surfwax – Indexes RSS feeds.

These are all okay, but specialized search engines tend to be better than general ones for finding info on the deep web. If you’re looking for a court case, for example, use your state or country’s public records search. If you need academic journals, check out our article on using deep web search engines for academic and scholarly research. The more specific you can be, the better, or else you’ll just end up with the same search results that you would find on Google. If you need a specific file type, like an Excel file or a PDF, learn how to specify searches for that type of file (e.g. type “filetype:PDF” in your DeeperWeb query).

22 of 43

Why does your business need a VPN?

At their most basic, VPNs protect businesses and users and their confidential data. Here are other reasons why your business could benefit from a VPN:

Convenience

VPNs are a convenient way to give employees, including remote workers, easy access to your business network without having to be physically present—while maintaining the security of private networks and business resources.

Better security

Communication with a VPN connection provides a higher level of security compared to other methods of remote communication, keeping private networks closed to people who don’t have authorized access. The actual geographic locations of users are protected and not exposed to public or shared networks like the Internet.

Easier administration

It’s easy to add new users or groups of users to networks using flexible VPN software tools. That's good for businesses that are growing faster than their budgets since it means you can often expand network footprints without adding new components or building complicated network configurations.

23 of 43

Are there downsides to using VPNs?

A VPN's success depends on other parts of your network infrastructure. Here are factors that could cause performance issues for your VPN:

Configuration security risks

Design and implementation of a VPN can be complicated. If you’re not sure how to keep it up and running safely, consider bringing in an experienced network security professional to make sure VPN security hasn’t been compromised.

Reliability

Since VPN connections run off the Internet, you need to choose an Internet service provider (ISP) that consistently delivers excellent service with minimal to no downtime.

Scalability

If you need to add new infrastructure or create new configurations, you may run into technical problems due to incompatibility—especially if you're adding new products from different vendors.

24 of 43

Slow connection speeds

If you're using a VPN client that provides free VPN service, your connection speed may be slow, as these providers do not usually offer high-speed connections. Consider whether the speed is sufficient for business needs.

Should you create your own VPN, or buy one?

Instead of trying to build one yourself, you can buy a prebuilt VPN solution. If you're shopping for VPN solutions, ask questions about the ease of configuration.

25 of 43

Steps for setting up a VPN

6 steps to set up a VPN

Step 1: Line up key VPN components

To get started, you'll need a VPN client, a VPN server, and a VPN router. The downloadable client connects you to servers around the world, so employees everywhere can access your small business network. The client can be used on devices like smartphones and laptops, even if workers are using public Wi-Fi networks.

To secure and encrypt all network traffic, you'll also need a VPN router. Many routers come with VPN clients built-in.

26 of 43

Step 2: Prep devices

On occasion, VPN clients can conflict with other clients, or fail to work properly. It's a good idea to prepare your network system before you set up a VPN so that you can avoid problems down the road.

As a first step, uninstall any existing VPN client software that you don’t need. In theory, the VPN clients should be able to work well together, but competing clients can also be a source of problems, so it’s best to remove them.

This is also a good time to consider network configuration. If you plan to install a VPN for workers who'll access online resources in several ways—such as Wi-Fi, 4G modems, and wired connections—you may need to spend more time configuring the VPN client. Simplifying networks by unplugging unused devices can help.

27 of 43

Step 3: Download and install VPN clients

The simplest way to get your VPN up and running is to install clients from your VPN provider. However, they may not offer software for every platform you need, such as Windows, iOS, and Android. Even if they don't, it's better to install what they offer first and then confirm that your VPN account is operating correctly.

Look for the "downloads" page on your VPN provider's website. You should also download apps for the mobile devices that your workers use since you’ll want to protect connections from as many devices as possible.

If the initial client you install works right off the bat, then you can contact the VPN provider about clients for other platforms. And if you can’t log in at all, then you can pass along that information to the VPN provider's support team.

28 of 43

Step 4: Find a setup tutorial

If, for some reason, your VPN provider doesn't offer software for the devices your business uses, check the provider's website for guides on manual setup. Hopefully, you'll find the documentation you need. If you don't, search for other providers' setup guides that use the same devices.

For example, if your business uses Chromebooks, you can search for tutorials specifically for these devices.

29 of 43

Step 5: Log in to the VPN

After you install the VPN client apps, it's time to enter login information. In general, the username and password will be the ones you used when you signed up with the VPN provider, although some companies ask you to create a separate login for the VPN client itself.

Once you're logged in, the VPN app usually connects to the server nearest to your current location.

30 of 43

Step 6: Choose VPN protocols

VPN protocols decide how data is routed between your computer and the VPN server. Some protocols help improve speed, while others help improve data privacy and security.

OpenVPN

This is an open-source protocol, which means you can view its code. OpenVPN is also rapidly becoming an industry standard.

L2TP/IPSec

The Layer 2 Tunnel Protocol is another popular protocol. It has strong security protections and is often bundled with the IPSec protocol, which authenticates and encrypts packets of data sent over the VPN.

SSTP

The Secure Socket Tunneling Protocol is fully integrated with the Microsoft operating system.

PPTP

Point-to-Point Tunneling Protocol is one of the oldest VPN protocols. But it is becoming less widely used since there are faster and more secure protocols available.

31 of 43

Step 7: Troubleshoot

Usually, your VPN provider's client will start working right away. But if that's not the case, try these steps:

  • Shut down and reopen the client and try rebooting your device.
  • If you have any other VPN software running, make sure you're disconnected, then close it down.

VPN clients need appropriate software drivers to work correctly. In some cases, you can click on the "repair" setting to reload drivers. Check the settings page to see if this feature is available.

If you're having trouble logging in, double-check your login credentials. Some VPN clients generate their own logins, and some let you choose your own.

Be sure you're using the correct login, and if necessary, read any welcome emails or quick-start guides you may have received from the provider.

You can also try switching servers. Choose to connect to a different server that's close to your physical location.

32 of 43

Another option: Try connecting with different protocols, assuming the VPN client allows you to change them. For example, you can use OpenVPN using TCP, then switch to L2TP and PPTP.

If you're still running into problems, other software programs may be the culprit. Sometimes, firewalls or security software can disrupt VPN connections. You can temporarily disable software that might be causing the problem—just make sure to turn it back on once you connect so you don’t leave critical business systems vulnerable to attack.

33 of 43

Step 8: Fine-tune the connection

Once you have the basics out of the way, it's time for improvements. Make sure the settings you've applied to the VPN suit your business's needs.

For example, decide whether you'd like the VPN to run as soon as people start their devices. This may be a good idea if you need the protection of a VPN all the time—for example, if most people work outside the office. But if you think that you'll only need to use the VPN occasionally, you can set it to launch only when required, freeing up network resources for other uses.

Another fine-tuning option is to choose commonly used servers as your defaults or "favorites." This can save you a bit of time since you and other employees won't have to search for preferred servers every time you connect.

You may also want to turn on the "kill-switch" if your VPN provider offers it. The kill-switch is designed to prevent a device from sending or receiving data if the VPN becomes disconnected.

https://www.cisco.com/c/en/us/solutions/small-business/resource-center/security/how-to-setup-a-vpn.html?socialshare=lightbox-vpn-overview – a good video overview from cisco

34 of 43

35 of 43

36 of 43

37 of 43

Created by FindLaw's team of attorney writers and editors.

Ross Ulbricht was arrested by the Federal Bureau of Investigation (FBI) in 2013 for operating an online marketplace for illicit drugs called Silk Road. The site could be found on the so-called Dark Web where Ulbricht (known by the pseudonym "Dread Pirate Roberts") remained anonymous and thus shielded -- however briefly -- from law enforcement. Silk Road wasn't accessible through just any desktop browser, nor could buyers use their credit card for purchases of heroin, methamphetamine, or other substances.

But just as Silk Road was shut down, others filled the void. As the name would suggest, the Dark Web operates in the shadows of the internet, cloaked in encryption and reached only through certain encrypted browsers. Below, we'll explain what the Dark Web is, how it differs from the Deep Web, the types of crimes it harbors, and how law enforcement tracks and prosecutes Dark Web crimes.

38 of 43

Is the Dark Web Illegal? An Introduction

The Dark Web allows users to remain anonymous through encryption. This is attractive to anyone involved in illegal activity, such as child pornography, sex trafficking, illicit drugs, or counterfeit goods. But it also may be useful for anyone living in an authoritarian state wishing to communicate with the outside world, as well as providing a safe space for whistleblowers. So while it's not illegal to visit the Dark Web, it provides access to illegal activities.

Web sites that exist on the Dark Web are encrypted (and thus difficult to track), most commonly through the Tor encryption tool. Therefore, most Dark Web users access those sites using the Tor browser. There are other encryption tools and corresponding browsers such as I2P (these are not universal, by design) and you have to know the exact URL in order to access the site. There's no "Google" for the Dark Web because that kind of indexing would provide a breadcrumb trail for investigators.

Another layer of anonymity involves the way payments are processed. Silk Road, for example, only accepted payment via Bitcoin, which is an unregulated cryptocurrency. As with the Dark Web generally, there's nothing illegal about using Bitcoin. But the anonymity of Bitcoin payments is attractive to those making illegal transactions.

39 of 43

With more than 53,000 security incidents last year, security is top of mind for many organizations around the world. However, it’s not only corporations that are targets. The American Bar Association found that about one in four law firms have already been breached.

While organizations have beefed up their security programs and most have initiated at least some plans to respond to attacks, many are still behind the curve on proactively monitoring the threat landscape and potential threat actors.

We’ve talked before about simple measures law firms can take to proactively manage their security programs. From defending against phishing attacks to leveraging certified technology solutions purpose-built to protect their data, organizations don’t have to feel helpless in the face of an evolving threat landscape. But the dark web remains a scary place.

Let’s shine a light on what the “dark web” really means and how you can leverage that knowledge to protect your business and your clients.

40 of 43

Dark Web vs. Deep Web

There are different parts of the web, defined based on accessibility to the public and coverage by search engines. The public web, which makes up about 4 percent of the internet, is indexed by search engines and can be found by anyone with access to the internet.

The deep web, making up the majority of online content, is comprised of any sites that aren’t available to the public and are not indexed by search engines. This includes sites that are password-protected, online banking content, or private networks.

While most of the deep web can be accessed through common browsers, the dark web can only be reached through the Tor network and is designed with anonymity in mind. On the Tor network, a user’s traffic is bounced around multiple servers and encrypted several times over.  Although Tor is known to have a negative reputation, it is also used for positive efforts around to world. For examples, journalists and whistleblowers may leverage Tor to get their story out without compromising their identity.

41 of 43

Why Monitor the Dark Web?

Though its uses aren’t exclusively nefarious, the fact is that the dark web is the place to go to buy and sell new exploits, malware, compromised credentials, social security numbers, and contraband. It’s also a venue to recruit hackers as well as share tools and tutorials about how to hack systems and exploit security vulnerabilities.

Recorded Future, a cybersecurity company, researched vulnerabilities disclosed in NIST’s National Vulnerability Database (NVD) and found that 75 percent of those vulnerabilities appeared online in the dark web before they were listed in the NVD, giving adversaries an edge to exploit any vulnerabilities. With a median gap of seven days between when the vulnerabilities first appeared online and when they were released to the NVD, 25 percent had at least a 50-day gap and ten percent had gaps of more than 170 days.

Watching out for possible vulnerabilities that may impact your business could give you a head start to prevent a data breach. In cases where you’ve already been hacked, you can also try to determine if your data is being sold.

42 of 43

Accessing the Dark Web

When it comes down to it, keeping tabs on the dark web is an important component of a modern cybersecurity program. Whether or not you’re monitoring and preparing to suppress emerging threats, odds are good that someone else may be watching for opportunities to capitalize on your vulnerabilities.

If you’re taking advantage of SaaS tools, ask your provider whether their protocols including dark web monitoring. If your data is hosted on-premises, consider adding this precaution to your existing security tactics.

Should you need to do this yourself, there are a few key strategies to keep in mind. Accessing any underground forum should be handled with great care not to reveal any identifying information linked to you or your company. Here are three must-know tips before you get started:

  1. A new laptop should be used that is not, and has never been, connected to the corporate network.
  2. In order to connect to the Tor network, it’s recommended to use Tails, a Linux operating system specifically designed to securely connect to the Tor network.
  3. When in doubt, call on a cybersecurity expert to help you navigate the landscape. It’s important to be cautious and make sure you’re protecting your organization—not endangering it.

Mike Wrzesniak is a threat intelligence analyst on Relativity’s Calder7 security team.

43 of 43

A Quick Warning About Onion Sites

Onion sites, and darknets in general, can host some horrifying content. A large amount of it is fictional, but there is no doubt you can end up viewing potentially damaging and compromising material if you are not careful. Most of the truly awful bits are locked away behind paywalls, proxies within proxies, and addresses you won’t find printed anywhere.

There are those who would criticize websites for writing about such things—and Tor for enabling them. Tor’s Abuse FAQ provides a good defense, noting that:

“Criminals can already do bad things. Since they’re willing to break laws, they already have lots of options available that provide better privacy than Tor provides.”

Law enforcement already knows these areas of the Web exist—if not on Tor, they’d exist elsewhere. As the FAQ also notes, “Traditional police techniques can still be very effective against Tor.”

Read every description before you click any links!

How to Find Active Onion Sites

Google Search indexes the entire internet, one page at a time. Web crawlers (also known as a spider) are internet bots that systematically trawl through internet pages and index the content. Indexed content is found using a search engine.

The Tor darknet has similar indexing, though you won’t find those sites through Google. No, you need a special Tor search engine instead. Alternatively, there are numerous sites that curate lists of onion sites, such as The Hidden Wiki, and others that list indexed onion sites, such as the Onion Link List.