Is the internet the gateway to the truth

What is the Darknet?

Darknet, Deep Web, Clear Net: These are the differences

The two terms are often used in everyday language Darknet and Deep web equated with each other. But that is not the case. Because in truth the darknet is only a small part of the deep web.

The World Wide Web can be thought of as an iceberg: the Internet, as most people know it, is only a small part of the entire Internet. It is called Clear Net, Visible Web or Surface Web designated. We can search this with search engines like Google, Bing etc. The Clear Net is similar to the visible 10 percent of an iceberg.

The deep web, on the other hand, makes up about 90 percent of the entire World Wide Web and is located below the surface of the water. The pages from the deep web are not indexed, which means that they are not recorded by conventional search engines. This mainly contains access-protected areas such as databases, bank networks and services belonging to universities, authorities or companies. This harmless content is usually password-protected or paid for.

The darknet, in turn, is a small part of the deep web that cannot be entered without encrypted access. A special encryption is, for example, the Tor browser, which ensures the anonymity of the user in the Darknet. Most of the content on the Darknet is of a criminal nature, but above all it offers free communication on the Internet - completely anonymized and uncensored. For example, the Darknet offers journalists, whistleblowers and persecuted or politically opposed people a platform to access regionally blocked content, circumvent censorship in their home country and communicate with other people.

How does the darknet work?

In order to gain access to the Darknet, special software is required to access the Tor network to access. Most users use the Tor browser for this. This ensures that your own communication and actions in the Darknet remain anonymous. In the Clear Net, however, everyone's communication can be traced back.

The data traffic in the Darknet is encrypted by the Tor network and rerouted over several computers. Since conventional search engines do not work in the Darknet, you have to use special search engines to find websites in the Darknet.

How do you get into the darknet?

In order to be able to surf in the shadow internet, you need some kind of darknet browser. Since the Darknet runs in the Tor network, it makes sense to contact this network. "Tor" stands for "The Onion Routing" (German: The onion router). The easiest way to do this is to use the Tor browser. You can also use the browser for anonymous surfing on the Internet without Darknet. Download the browser and install it in the appropriate system and language version on your PC.

If you have installed the Tor browser, it ensures that you can surf the Internet anonymously. He will ask you if you want to connect directly to the Tor network or if you want to set additional proxies. A proxy server is an intermediary in a network. With its help you can secure, disguise or accelerate the communication between the local client and a web server. If you use your private Internet connection, you usually do not need to set any additional proxies.

This is how the Tor network works

As soon as you have opened the client, it connects to the Tor network and calls up a list of all the servers that are available in the Tor network. These servers all have a public key to establish their credible affiliation to the network.

In contrast to surfing with normal browsers, your computer does not connect directly to the server belonging to the website you are visiting. Instead, the Tor client creates a new random connection with each request over several nodes (English: nodes) on. The client always connects you to at least three randomly selected servers. The advantage is that each server only ever knows its direct neighbor. This guarantees a certain quality of anonymization, while on the other hand the communication speed is not unnecessarily increased. As soon as your PC has connected to all three servers, data can be sent. The third server acts as a Exit node.

In simplified terms, one can imagine the different layers of the onion principle of the Tor network as follows:

  1. The entry point: The entry point into the Tor network (server 1) is contacted by your PC and receives its IP address. In order to anonymize this process, it is advisable to also establish a VPN connection. Your computer is connected to another node (Server 2) via the Tor client. Your data is encrypted on the way to this node.
  2. The gate knot: Server 2 is now connected to Server 1, but not to your PC. The data transferred via it are thus protected. To ensure qualitative anonymity in the Tor network, Server 2 also connects to another server, the exit node.
  3. The exit node