Know everything about the mysterious dark world of the Internet

dark web



Remember the scene in the Hollywood movie where Godfather does not meet face-to-face with his pet killer, either through a very secret network, or through a secret network, do you remember Angellina Julie starring 'Hacker' where criminals do not know a name, Where did the law enforcement force could not swallow?

In reality, these silver screen-based films of Saifai seem to be only keccha, but just like the unknown network of these movies, we have a super-dark internet!

The Internet has expanded with the excellence of information technology, and it has become a huge field like today's ocean. With the ability to increase search engine optimization. Specifically Google's name will be called, which is now one of the most trusted brands worldwide. Can we think of a net session without Google? Impossible!

But what is the capability of this Google?


It will be astonished to know that when you search for a topic and Google brings millions of results to you, only 10 percent of the total information on the Internet is available! That means 90 percent of the total information on Google online does not know! By searching only within 10 percent of the time, he presented his results to the customer. The remaining 90 percent will be forever unknown to you.

According to a poll, the data stored on the visible web is 500 times higher than the data stored on the invisible web. In fact, this visible net is a part of the glacier ocean lying on the ocean and the Deep Web is the ocean itself!

This is the subject of our discussion today on this unknown Black Web.

Black Web can basically be divided into two parts, and it is:
1. The Deep Web
2. The Dark Web



The Deep Web is all the parts of the internet that the search engines do not find, but if you know their address then you can go to this section.

And the Dark Web is that part of the Internet where you can not access conventions, conventional browsers can not access it. You need to take special software to get there.

What is the origin of this part of the Internet? It is impossible to say absolutely right. In fact, neither you nor I am not alone on the Internet! Your every step, keeping track of each download of your Internet Service Provider They have your full log and they provide it to any requirement, to the law enforcement agencies. That means there is no freedom in your movement !!!

At times, various groups of the World Internet have felt the need for a system where they can secretly manage their activities. Military forces, revolutionaries, hackers, even the administration itself has sought a system where detectives can secretly exchange information or seize bribes to get theft information back to the criminals. Besides, there are many countries in the world where online censorship is very tight, as a result of which the government has not been able to supervise the situation of dissidents. And this is how this unknown part has originated from the unknown parts. Along with it it has been tempting those criminals who do not have the courage to discuss the main nets fearing being caught.

Now the question is why web search engines can not search on the web?

This is because search engines supervise their search with a kind of virtual robot or crawler. These Crawlers write websites to HTML tags of the website. Moreover, requests from some sites are recorded in search engines. Now that sites do not want Edin to find that their site does not find the search engine, they use the Robot Exclusion Protocol which prevents the Crawlers from finding or writing sites. Some sites have dynamic databases that can be found on the basis of certain conditions of fulfillment, and this is not possible for the Crawler. There are some sites where there are no links to other sites. These are isolated sites, they do not even come in search. Moreover, search engine technology could not leave his nest room yet. Search engines can not find webpages in other formats except text (such as Flash format)!



The information on this web web page is based on the information from the Surface Web. These are very comfortable and relevant. So understand what the search engines are doing !!!

Here's the funest part of the Dark Web:

You can not access these sites with your current web browser. They are all out of the Internet, no protocol, no protocol. And their addresses are so bizarre (such as sdjsdhsjhsuyumnsdxkxcoioiydsu67686hsjdhjd.onion) that ordinary people are very hard to remember them. This is the real invisible part of the Internet. You will not be able to access this network unless you have special knowledge (such as programming, networking, proxy). Another feature of this section is that they use "Pseudo Top Level Domain" without using top-level domains (such as .com), such as sites on the World Wide Web, which is under the second network rather than the original World Wide Web. Such domains include Bitnet, Onion, Freenet etc.

This world is the most different! What you never imagined in your life can be found here. Maybe you have never imagined that it is possible to enter the site without passwords, so here it is. You will get such things

Which can confuse your head too. WikiLeaks has announced that they will release more new data this year, but you may wonder, all this data from WikiLeaks has been on this dark web several years ago. You can see that the latest version of any book is not due to copyright law on the Surface Web site.

There are more degradation entertainment! Hot Topics from Children's Pornography, a variety of Genital Mutilation videos, which are not on the Surface Web.

There are some sites where marijuana, heroin and all types of drug home delivery are offered. The original users of DarkNot are mainly drug addicts.

Again there are some sites where hardliner groups are teaching how to make fodder powders, some sites are sold by ready-made weapons. Starting from 47 to rocket launchers, mortar like weapons are available to buy.



During the Arab Spring, the revolutionaries contacted the DarkWeb. DarkWeb has many types of mail services, chat services where you can do a lot of things by keeping your identity confidential.

There are more surprises! Several days ago I went to an underground site where the rent was available in exchange for money! What's terrible, is not it? I did not even have it.

In such a site, I see that Killer describes himself as such, "You can call me slut." I can finish your enemy in the professional way. I'm not curious about your problem with him. You just give me the money and I'll finish him. The target age should be at least 18, the target male or female does not matter to me. I am not a pregnant woman as a target. I do not torture the target if the target is a political person or a member of the law enforcement agency, then additional charges will be required. And in exchange for the extra charge, I can decorate the whole story like suicide or accident. The downpayment will work within four weeks. For additional US targets, the additional 5000 dollar travel charge will be required. I will send you the picture of the target. "

In essence, you will enter a black forest where you have to think twice before taking every step. The Hacking Technique on the Surface Web site is a part of the 1% data leaked from this Dark Web. Hackers here are very dangerous and they do not have any link in progress, be careful your mail may be hacked. Moreover, the government agents are there.

But the question is how are these network law enforcement agencies working under the nose?

To understand this, we need to think a bit about such a network.

On the network used in the DarkWeb, Surface is a network that has become quite popular in the network; Onion Network Pseudo-top-level-domain is onion .onion. The spooky sites address! Although designed primarily for the US Navy, this network is the first choice for users of worldwide incalculable net users. You will not be able to login through your browser, so you have to download Tor browser.

Tor will hide your identity, and this will make it impossible for someone to recognize your position. When you are going to enter a site with Tor, then your request will send the request to the onyone proxy through solid encryption. Onion Proxy does not contain data and data you send, it becomes a cryptic script.

Now the onion proxy will be the main internet with this data, where voluntary members are waiting for an inexhaustible Router. Prior to entering the onion router, this data goes back to encryption at the entrance to the onion network. Once you exit the network, you have to go through an encryption once more. In the meantime, some of the annoying routers have encryption where the encryption output is one in one router and no router knows that the data is coming from a router. When the data is finally reached by the recipient, then it returns to the original position through the deconption process. Because of this many layers or pebbles, the name of this network is named Onion Network.

Now if someone is able to steal this data while running this data, it will not be possible to find out who or who receives the sender! Because the onion routers themselves do not know it. But yes, if anyone can monitor the two ends, then he can understand where the location of the sender-receiver

Because of this kind of system, these networks are always out of the control of law enforcement agencies. Silkroad, among the most popular black markets in the Onion Network, was sold for 22 million dollars last year as Forbes. And here the traditional coins do not sell, it is sold in a virtual currency called Bitcoin. Microsoft, Apple products available here at 80% discount.

Irregularities inside this kind of support system, why? An open platform is really needed. The child pornography that he creates will stop working on another network. And besides, cyber-terrorists have always been one step ahead of law enforcement agencies. For example I can say Internet Protocol ^ 6, but the Surface is still on the Web. But all the sites around the underground use the IP ^ 6

Since the Internet is also bad like all the other creatures of the world, it will have to adapt to it. And of course, let's go to the Dark Web even once in the life, otherwise you will miss the ocean shade like oyster shell.

But yes, do not go too far. Remember, the government has huge money, so if you want, you can hire thousands of Dark Web mercenaries hackers to keep your eyes on the dark web. Some Tips:

# You must stop JavaScript, Flash, Shockwave before entering the Dark Web. These can easily disrupt your Anonymity.
Use #paid proxy service They use military agencies and their services are great.
       # If your destination is not hacked in any way, then there is a possibility to get out of your identity if it is a hack. Never use your real data on any web site in the Dark Web.

Remember, you are not alone on the Dark Web, like the Surface Web, here's the corner of the wall. Welcome to the Dark Web.

Post a Comment

0 Comments