The best way to understand the Dark Web, for instance, is to use an iceberg as an illustration and analogy of how content is shown on the Internet and that most of the things we see, publish and share online, represent just 4% of everything existent.
To begin let’s call the top of the Iceberg World Wide Web or Surface Web. This is the part of the Web where we use our day to day Social Media accounts, watch our videos or simply search for information on search engines like Google or Bing. At this stage, the kind of information being handled could be still considered as safe as long as users have access to privacy protection tools that in most cases, technical skills are not required.
Going down deeper, we won’t find what is commonly found on the surface and not even by attempting to use search engines. Unless we are granted access to the content that we are looking for it will be difficult to break into. Therefore, memberships, specific terms or passcodes will be required and just as the content of this part of the Iceberg is not publicly visible, by default it will receive the name of The Deep Web or Invisible Web. Now, The Deep Web has nothing to do with The dark web yet when it comes to definitions. The Deep Web’s content comprehends a vast amount of database information that has not been captured or indexed by conventional Search engines. Digital Libraries, legal documents, and government reports are a clear example of how such information is being kept in internal servers to become part of The Deep Web. Adversely, our private information such as bank details, emails, documents, and webcams IP addresses, exist in The Deep Web. All our information may be exposed to malicious
hackers who will use their skills dig deep and break into security layers to find our valuable information.
When hackers get what they pursue, they sell the information in underground markets or secret forums without us realizing what happened or what’s going on.
The Dark Web is compared to the extreme and deepest side of the iceberg and is considered as a source of encrypted and illegal content that can be accessed anonymously. Special Software like Tor (The Onion Router) it’s used to enable website owners and visitors protect their identities behind multiple layers of encryption. Not only drugs, child pornography and who knows what else can be found in the Dark Web, but also confidential information shared between governments, journalists, and other secrets.
What’s the real danger of the Dark Web?
Not only bad things exist in The Dark Web of course, however, anonymity lures to all of those who want to
find material that could be impossible to find on the surface of the Web. On the other hand, anonymity stimulates curiosity and gives the illusion of freedom or debauchery.
Is anyone in your family in the Dark Web territory? What to do if that’s the case?
As explained before, accessing the Dark Web requires the help of TOR or similar cryptical software,nonetheless, we would like to recommend you to watch your children’s online activity on a constant basis and compare it with certain unbalanced habits that might be leading your children to underperform at School or behave oddly at home. It is also crucial to understand when, how and what triggers their crave for getting online at bedtime, the reason to do that is the misuse of sleeping time and its replacement for entertainment which has become a norm among most of the teenagers in the last couple of years. If parents are aware of the implications of teenagehood, they will realize that curiosity itself and the quest for exploring ‘new things’ or ‘new experiences’ is part of the maturing process and such shouldn’t be ignored.
Share This Post: