Instances of knowledge leaks of Indians on the dark web/ darknet are on the increase. The dark web/ darknet is increasingly getting used for various nefarious activities including data leaks, fraud, illegal weapon sales, drug traffic, cyber terrorism, etc.
For instance, Recent personal details of many Indian jobseekers were up purchasable on the dark web. Data of about 100 GB including Aadhar cards, passports, PAN cards, etc. Were leaked on the darknet free of charge of cost. Hacked internal data of BEML (Bharat Earth Movers Limited) including email conversations, details of indigenization levels of varied defence products, etc were leaked on the darknet.
(डार्क वेब वर्ल्ड वाइड वेब सामग्री है जो डार्कनेट्स, ओवरले नेटवर्क पर मौजूद है जो इंटरनेट का उपयोग करते हैं लेकिन एक्सेस करने के लिए विशिष्ट सॉफ़्टवेयर, कॉन्फ़िगरेशन या प्राधिकरण की आवश्यकता होती है।)
WHAT IS A DARK NET?
Dark Net may be a network of computers on the web that are:-
a) not accessible through traditional search engines and
b) provide anonymity to the source of the web page.
In order to access the content of the darknet, we’d like special software to urge into this network of computers. In simple words, the web page on the darknet is intentionally hidden so as to supply anonymity to the service providers.
UNDERSTANDING DARK NET or DARK WEB
Surface Web: Whenever you search a webpage on an enquiry engine like google the program has the power to ‘look for’ and extract the content and present it within the sort of a website/webpage. So as to try to do this the webpages are ‘indexed’ by the program. Only about 10-15% of all the online content is present on the surface web accessible by common searches.
Deep Web: Deep Web on the opposite hand may be a term used for all those web pages or sites that are there on the web but aren’t indexed by search engines and thus not discernible by conventional search engines.
In other words, these webpages on the deep web they are doing not show up in conventional search engines like Google, Bing, Yahoo, etc.
About 75-85% of the online content/web pages are on the deep web. Common samples of the web page on the deep web include financial data, checking account details, emails, personal data, etc. They are password protected and therefore the only thanks to access these sites are thru login.
Dark Net: The darknet may be a part of the deep web that’s intentionally hidden so as to supply anonymity. so as to try to do this, the deep net uses a specialised network of computers called relays through which the knowledge passes. Commonly, information on the darknet passes through a minimum of 3 relay computers between the source and destination. Additionally, the darknet uses network technology that hides the situation of those relay computers (IP address) so as to make sure anonymity of the users. are often accessed through TOR (Anonymity Network).
FEATURES of Dark Web
- While it’s hidden from an inquiry engine, the online pages on the darknet are often accessed and downloaded by anyone who has the precise address of the webpage
- Darknet doesn’t provide any protection against malware, virus attacks, etc.
- Since the info is routed through a variety of relay computers between source and destination communication is slower in the darknet.
SCOPE OF DARK NET
The darknet is employed for both legitimate and illegitimate activities.
By virtue of its ability to supply anonymity, the darknet is employed by human rights activists, free internet activists, media personnel etc. In countries where there are severe restrictions, and censorship on internet usage like China, Iran, Saudi Arabia, etc. Darknet is additionally employed by whistleblowers so as to take care of anonymity. Besides in the aftermath of glaring revelations on surveillance by the USA’s security agency NSA, the number of users using the darknet has increased for the want of privacy.
While the use of darknet isn’t illegal per se it’s increasingly become a platform for various nefarious activities including illegal weapon sale, drug traffic, kiddie porn, data theft, data leaks, cyber terrorism, hacking, organised crime, concealment etc.
Also Read This: