Comments by "Perhaps" (@NoEgg4u) on "What is the Dark Web? A Guide to the Dark Side of the Internet" video.
-
@7:41 "You may also want to double up and use a virtual private network (VPN) that carries your traffic end-to-the end."
No. No. No.
Do not do that.
Brilliant minds created TOR network to keep you anonymous. You are not going to improve on it. In fact, adding a VPN into the mix will expose you (your VPN service will see everything).
Never use a VPN with TOR. In fact, never use a VPN unless you have something specific where a VPN service is your only solution.
When you use a VPN service, they will see 100% of what you are doing. No matter what claims they make about privacy, you cannot verify any of their claims. If a court orders them to keep logs and rat on you (or rat on anyone visiting some site), they will.
If you want to visit the dark web with the highest level of safety, then use one of the following operating systems:
-- TAILS
-- Parrot OS (with its "AnonSurf" feature enabled)
-- Qubes OS (via its whonix virtual machine option)
You can access the dark web via Windows, via installing TOR browser. That is the least safe.
If you download that browser, there is only one place to obtain it (well, to safely obtain it). If you download it from anywhere else, you are asking for trouble.
Whichever option you choose, disable java-script, because it allows web sites to run code on your computer. That will break the functionality of countless web sites, but will keep you safe.
60
-
@5:57 -- "A lot of people think they have end-to-end anonymity, and that's not true."
Our host is mistaken.
If, for example, you visit twitter, via the dark web (via TOR), then as long as you do not sign in, no one at twitter will know who you are. You can read all of the postings that you want. Twitter will know that you (not you, specifically) read those postings.
If you sign in to twitter, then it was you that gave up your anonymity. It was no fault of TOR network.
@6:17 "I have to encrypt and decrypt, encrypt and decrypt, encrypt and decrypt, and so forth."
That is not how TOR functions.
Your data gets encrypted by you own computer, and then those packets of encrypted data are encrypted, again (not yet decrypted), and then encrypted again by the next TOR node, and only when your data reaches the final TOR node (the exit node) does that final node do a triple decryption (peeling back each layer of encryption).
12
-
@1:20 -- The deep web is basically anything that will not show up in with a search engine.
For example, when you use your browser to see your bank balances, you certainly would not want someone to be able to search for that content and see your balances.
When you login to any site to see something, then that content will not be found via a search engine.
Even if someone (or a search engine) knew exactly where that content is located, that content cannot be indexed by a search engine, because without a password for that information, the search engine never sees that content, and therefore cannot index it. The search engine cannot get to it, and neither can anyone else.
Even though you can use a search engine to view postings on facebook, the search engine cannot access all content on facebook, because some of it is private.
In a nutshell, if it is password protected, then it is part of the deep web.
3