The Darknet – What We Did

This week we learnt about The Darknet and Tor.

Tor is free and open-source software for enabling anonymous communication. The core principle of Tor, “onion routing”, was developed in the mid-1990s by US Navy Research Labs, to protect US intelligence communications online.

An overview of Tor

How does Tor work?

When you’re visiting a website using your web browser, your request for the website leaves your computer and goes to your Internet Service Provider and then continues from there onto the website that you want to visit.

A big problem with this is that your Internet Service Provider (and any other middlemen such as school or workplace proxy servers) and government can see exactly which pages you are looking at on the internet. This isn’t a huge problem because ISPs don’t actively look at what you are doing.

For people wanting to avoid the eavesdropping, this is where Tor comes in. When you visit a website using Tor, your request is encrypted, sent to your ISP and instead of going directly to the website, your request goes through lots of random computers (or nodes). The request goes through a couple of ‘relays’ then reaches the ‘exit node’ (which is again random) where the request is decrypted and goes to the website’s servers. The response to the request goes back to a different node where it is encrypted again and sent back through another bunch of random computers. This random connection is called a Tor Circuit.

By using this method of routing requests and responses, the ISP (and other middlemen) can’t see which websites you are accessing (because the request goes to a random node and not directly to the website) and they can’t see what you are doing on that website (since the data is encrypted).

Why would someone use Tor?

The are lots of genuine uses for Tor, in fact it, is used by journalists, whistle-blowers and government officials to protect their identities and stop confidential information being leaked. However, since it’s very difficult (almost impossible) to track down the person using Tor, it has been used by lots of criminals, drug dealers and terrorists for their illegal activities.

The Surface Web, Deep Web and Dark Web

The internet can be thought of as a glacier. The tip of the glacier or Surface Web is the parts of the internet that you’ll usually be using. All of the surface web can be searched for on search engines like Google and Bing.

However, almost 90% of the internet can’t be searched for on Google or Bing and this forms the Deep Web. These are all pages that you can’t search for, for example, you can easily find Instagram by Googling for it, you can look at the most popular posts but once you login, you are now in the Deep Web. This is because your Instagram feed can’t be searched for on Google (especially when you are following private accounts) – you need to go through a ‘door’ to access it.

But there’s an even darker part of the Deep Web called the Dark Web. This is where there is lots of illegal activity and you can find marketplaces for drugs, illegal guns, stolen credit cards and even assassins. You can probably imagine some of the worse things that you can find on the Dark Web. You can also probably imagine that the people running these websites would have a serious hit to their real life reputation (and probably be locked away in prison) if other people found out that they were running these websites, so they host their websites on the Dark Web to keep their identity completely anonymous.

So Tor is illegal?

Actually using Tor isn’t illegal, but it’s what you do using Tor which is illegal. If you wanted to, you could use Tor for all of your normal web browsing like checking your Twitter, your emails and what not. But it starts to become illegal when you start buying drugs or engaging in other illegal activities.

What we did

This week was all about learning about how Tor can be used to be anonymous online and the dangers of the Darknet.

So at the start of the session we opened up the Tor Browser, this is a special web browser (like Google Chrome, Firefox or Safari) which lets you access the Tor network.

The Tor Browser is a specially modified version of Firefox which has a few extensions installed which add a layer of anonymity and protection.

We then had a look at a specially created list of Tor websites, we found things ranging from forums filled with hackers to marketplaces. Just on this directory of Tor websites, we managed to find hackers that you can hire for €250, massive forums, anonymous email hosting, website hosting and various marketplaces selling items from drugs to credit card information.

This quick glimpse on the Dark Web definitely gave everyone a scare into how easy it is to get access to dangerous illegal services and sometimes how inexpensive some of the things were.

Wrapping Up

The Dark Web is a very dangerous place with lots of illegal activity going on.

Please don’t use Tor, we had adults on hand with experience to stop us from going to places that would get us into trouble. But that definitely shouldn’t stop you from having an interest in the Dark Web, it’s amazing how there is a whole other section of the internet that we never think about and how all this complicated technology can let criminals have a completely anonymous marketplace.

If this article was interesting, I’d definitely recommend this episode of a podcast that I listen to called Darknet Diaries which is all about Darknet marketplaces and how they have been shutdown by governments and the people running them being caught.