Skip to main content

Dark Web: Safe or unsafe? Truth Revealed!

 


The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind. 

A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing.

It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR.


Advantages of Dark Web 


  • Humans are allowed to hold privacy and express their views freely.

  • Privacy is considered to be critical for honest persons through the different criminals and stalkers. 

  • The growing tendency of employers to track posts on social media also can make it hard to interact in honest discussions publicly. 

  • For undercover law enforcement officials to communicate, the Dark Web recognition is perfect for the search of criminals.

  • Usage in cryptocurrencies to hide the intentions and identity of any person.

Disadvantages of the Dark Web

  • The dark web could make it less complicated to dedicate a number of the worst crimes. For example, the combination of the dark web and cryptocurrencies theoretically makes it a whole lot less complicated to rent a person to commit a murder.

  • The Dark Web users have the guarantee of their privacy but on the other hand, it can be used to violate the privacy of the persons which includes private photos, Drug records, and financial information.

Challenges under the Dark Web

In India, there had been instances in the past year in Chennai & Mumbai wherein LSD was bought at the dark web the usage of bitcoins.

In terms of evidence, the Internet Protocol address is simply one of the factors. There are continually a few linkages that may be established. Gathering proof on the dark web internet is relatively hard, however now no longer not possible as a few humans have a tendency to believe.

The dark web has self-damaging mailboxes and proxy servers wherein humans can use fake IDs. It really makes it hard to show a selected price and there may be a demand for modification to the Information Technology Act and Evidence Act.

The Information Technology Act presently deals with cybercrime is at heart a code of e-commerce and is derived under the Ministry of Electronics and Information Technology. There are only six sections in the law that deal with cybercrime. With the changing times, we want a code of criminal methods handling cybercrime that could come under the Ministry of Home Affairs, which deals with policing issues.


By: Tithi Pankaj

(Legal Intern, WCSF)


For more updates, please visit our website: https://www.worldcybersecurities.com/



Comments

  1. Really informative and well researched blog

    ReplyDelete
  2. Amazing content, i request you to keep writing blogs like this...

    Please visit my blog also
    SOAR Cybersecurity

    ReplyDelete
  3. Anonymous12:56 PM

    Need a comprehensive guide to Authority to operate (ATO)? Our Relevantz PoV covers the ins and outs of ATO, a 6-step process, how to select the perfect ATO partner, and more: Authority to operate (ATO) PoV

    ReplyDelete
  4. You've given a thorough introduction to the dark web's underlying technologies. The fact that the dark web is invisible to search engines does bring up significant issues about internet privacy and anonymity, especially in contexts like take my class . An important advancement has been made with the creation of Onion Routing by the Naval Research Laboratory (NRL) team. Thanks to this technology, communication can be done anonymously, making it impossible for outsiders to identify the source or the destination. Darknets are networks that make use of the Onion Routing method. The Onion Router, or TOR, was developed as a result of the publication of this method. The way people can securely and discreetly converse online has been significantly impacted by this advancement.

    ReplyDelete
  5. Thank you for information and i appreciate your involvement in this topic.🙂👍

    ReplyDelete

Post a Comment

Popular posts from this blog

UNESCO Guidelines on Generative AI in Schools

The advent of artificial intelligence has assumed prominence amongst all industries and various facets of people's personal lives. The integration of AI in education has been inevitable, given the significance and role of information, knowledge production and administration in the sector. This is especially so as its capabilities entail replicating higher-order thinking. Besides assisting in the education process, it also brings the element of real-life relevance, allowing education to be imparted against the backdrop of the evolving world due to the same AI. It tends to have implications on the subject matter that needs to be imparted, which tends to be something that constantly needs to answer the question of "Why and how is this particular subject matter relevant for learning?".  This induces policy-makers and educational institutions to rethink what they need to impart as knowledge, the area of matter, and the manner of thinking to be emphasised. This is because educa

India's Cybersecurity Landscape: New Rules, Rising Threats, and Government Response

The recent interaction of the newly reappointed Union IT Minister with journalists has sparked significant interest within the IT Industry and among privacy enthusiasts. Ashwini Vaishnaw announced on June 15 that the MEITY will soon release the rules under the Digital Personal Data Protection (DPDP) Act, a development of immense significance for India's cybersecurity landscape. [1] 's Acts. It holds immense significance for the country, especially with the increasing number of internet users.  Of 2023 for public consultation. The rules hold immense significance for a country like India, with 751.5 million internet users at the commencement of 2024 [2] . With the continuous surge in internet usage across India, the volume of personal data shared online is also on the rise. This occurs either voluntarily, such as an individual providing personal information to a social media platform to access its services, or involuntarily, as a consequence of falling victim to a cybercrime inci