Skip to main content

Dark Web: Safe or unsafe? Truth Revealed!

 


The dark web is the part of the internet that is not visible to search engines. With the advancement in technology, digitization has resulted in different types of attacks. We can talk to anyone as long as we have an internet connection. The main concern is with privacy and anonymity in mind. 

A team of computer scientists and mathematicians working for one branch of the US navy which is known as the Naval Research laboratory (NRL), developed a new technology known as Onion Routing.

It allows anonymous communication where the source and destination cannot be determined by the third party. A network using the Onion Routing technique is classified as Darknet. The NRL released the Onion Routing Technique and it became The Onion Router, also known as TOR.


Advantages of Dark Web 


  • Humans are allowed to hold privacy and express their views freely.

  • Privacy is considered to be critical for honest persons through the different criminals and stalkers. 

  • The growing tendency of employers to track posts on social media also can make it hard to interact in honest discussions publicly. 

  • For undercover law enforcement officials to communicate, the Dark Web recognition is perfect for the search of criminals.

  • Usage in cryptocurrencies to hide the intentions and identity of any person.

Disadvantages of the Dark Web

  • The dark web could make it less complicated to dedicate a number of the worst crimes. For example, the combination of the dark web and cryptocurrencies theoretically makes it a whole lot less complicated to rent a person to commit a murder.

  • The Dark Web users have the guarantee of their privacy but on the other hand, it can be used to violate the privacy of the persons which includes private photos, Drug records, and financial information.

Challenges under the Dark Web

In India, there had been instances in the past year in Chennai & Mumbai wherein LSD was bought at the dark web the usage of bitcoins.

In terms of evidence, the Internet Protocol address is simply one of the factors. There are continually a few linkages that may be established. Gathering proof on the dark web internet is relatively hard, however now no longer not possible as a few humans have a tendency to believe.

The dark web has self-damaging mailboxes and proxy servers wherein humans can use fake IDs. It really makes it hard to show a selected price and there may be a demand for modification to the Information Technology Act and Evidence Act.

The Information Technology Act presently deals with cybercrime is at heart a code of e-commerce and is derived under the Ministry of Electronics and Information Technology. There are only six sections in the law that deal with cybercrime. With the changing times, we want a code of criminal methods handling cybercrime that could come under the Ministry of Home Affairs, which deals with policing issues.


By: Tithi Pankaj

(Legal Intern, WCSF)


For more updates, please visit our website: https://www.worldcybersecurities.com/



Comments

  1. Really informative and well researched blog

    ReplyDelete
  2. Amazing content, i request you to keep writing blogs like this...

    Please visit my blog also
    SOAR Cybersecurity

    ReplyDelete
  3. Anonymous01 June, 2023

    Need a comprehensive guide to Authority to operate (ATO)? Our Relevantz PoV covers the ins and outs of ATO, a 6-step process, how to select the perfect ATO partner, and more: Authority to operate (ATO) PoV

    ReplyDelete
  4. You've given a thorough introduction to the dark web's underlying technologies. The fact that the dark web is invisible to search engines does bring up significant issues about internet privacy and anonymity, especially in contexts like take my class . An important advancement has been made with the creation of Onion Routing by the Naval Research Laboratory (NRL) team. Thanks to this technology, communication can be done anonymously, making it impossible for outsiders to identify the source or the destination. Darknets are networks that make use of the Onion Routing method. The Onion Router, or TOR, was developed as a result of the publication of this method. The way people can securely and discreetly converse online has been significantly impacted by this advancement.

    ReplyDelete
  5. Thank you for information and i appreciate your involvement in this topic.🙂👍

    ReplyDelete

Post a Comment

Popular posts from this blog

New Privacy Policy of Twitter

  Twitter is one of the most commonly used social media networking platforms and is very popular amongst celebrities as well. People enjoy uploading tweets and retweets over Twitter. It is a good platform for social messaging, news and marketing, etc. But recently twitter has been in the news for a change in its privacy policy. Just a few weeks after the announcement that Elon Musk was going to acquire that social media platform, Twitter had revamped its privacy policy. Everyone was expecting something big after that announcement and many were curious to know if there will be any changes in that micro-blogging platform. Later on, Twitter introduced the privacy policy to their users by creating a video guide for users so that they can understand the privacy policy. Also, Twitter has said that its new privacy policy is much more simplified and organized under three new heads namely data use, data sharing, and data collection. The new version of twitter’s privacy policy will take effe...

Famous Cyber crimes That Targeted People Instead Of Money

  With the emergence in the field of technology, the number of cyber crimes have also emerged. Different types of cyber crimes daily take place such as phishing, email spoofing, data theft, identity theft, bullying, harassment, cyber extortion, ransomware attacks, etc. The majority of the people would opine that the Cyber criminals engage in these activities for the sake of money but there are numerous examples where money wasn’t the only target of the Cyber criminals, rather they targeted people.  The intent of cyber criminals,  targeting the people can differ from case to case. Sometimes it may target a single person or sometimes a large number of persons. Various examples show the instances where the target of the cyber crimes were people, be it belonging to specific religion or age group or sometimes a sole person. Various examples of such crimes are discussed below: Bulli Bai App - This app was created over the platform namely GitHub which is an open software develop...