The World Wide Web comprises the Surface Web, Deep Web, and Dark Web, with the Dark Web being the least accessible and most concerning portion due to its unindexed nature and potential for illegal activities. While the Dark Web offers anonymity and serves as a platform for whistleblowers and activists, it also harbors criminal marketplaces and poses significant security risks for users who access it due to potential malware and attacks.
Surface, Deep & Dark Web
• 00:00:24 The internet is divided into three parts: the Surface Web, which is indexed and easily accessible, making up about 5% of the web; the Deep Web, comprising the majority of the internet (95%), containing password-protected content like medical and legal documents; and the Dark Web, which is not indexed and contains a wide array of content, including those from whistleblowers, journalists, and activists, and those facilitating illegal activities like drug trade and hacking.
Dark Web Content
• 00:02:01 The Dark Web is a non-indexed portion of the internet used by various individuals and groups, including whistleblowers, journalists, and political activists seeking anonymity. However, it also facilitates illicit activities, such as marketplaces for contraband goods and hacker forums for exchanging exploits and stolen credentials, where anonymity is highly valued.
Tor Network
• 00:03:53 The Tor network, an open-source project initially developed by the US Department of Defense, is used to access the Dark Web by providing anonymity and routing traffic through layers of nodes to obscure the user's location and identity. While providing a degree of anonymity, Tor has disadvantages, including slower speeds due to encryption and decryption, the potential for compromised nodes, and a lack of end-to-end anonymity once traffic leaves the network.
Dark Web Security Risks
• 00:03:33 Accessing the Dark Web involves considerable risks due to its nature. It's highly recommended to avoid accessing it unless well-versed in security protocols. Users should prioritize anonymity and security by employing tools like Tor, sandboxes, VPNs, and firewalls to mitigate the risks of malware, phishing attacks, and network-based attacks associated with the Dark Web.
IBM X-Force
• 00:09:25 IBM's X-Force researchers consistently monitor the Dark Web to track attack trends and provide insights to users for enhanced security. They strive to help users stay safe by understanding the dynamics and risks of the Dark Web without requiring users to directly interact with it.