Tor browser with types of web and how you can search the data anonymously. which kinds of data stored on a different web types.
Is all the searches are legal on Tor browser and who can use the Tor browser.
3. The Surface Web is the portion of the World Wide Web that is readily available to the general public and
searchable with standard web search engines. It is the opposite of the deep web, the part of the web not
indexed by a web search engine. The Surface Web only consists of 10 percent of the information that is on
the internet.
4. The content of the deep web is hidden behind HTTP formsand includes many very common uses such as web mail, online
banking, private or otherwise restricted access social-media pages and profiles, some web forums that require
registration for viewing content, and services that users must pay for, and which are protected by pay walls, such as video
on demand and some online magazines and newspapers.
5. The dark web is the World Wide Web content that exists on dark nets, overlay networks that use
the Internet but require specific software, configurations, or authorization to access. The dark web
forms a small part of the deep web, the part of the Web not indexed by web search engines,
although sometimes the term deep web is mistakenly used to refer specifically to the dark web.
6. What is Tor?
• Tor was originally designed, implemented, and deployed as a third-generation onion routing
project of the U.S. Naval Research Laboratory, for the primary purpose of protecting
government communications.
• Tor is a free tool that allows people to use the internet anonymously.
• Basically, Tor protects you by bouncing your communications around a distributed network of
relays run by volunteers all around the world: it prevents somebody watching your Internet
connection from learning what sites you visit, it prevents the sites you visit from learning your
physical location, and it lets you access sites which are blocked.
• Tor anonymizes the origin of your traffic!
7. What is under the hood?
• When a user connects using Tor as a proxy server, Tor finds 3 Nodes (Entry
node, Middle Node, and Exit Node) in the anonymous network. During this
discovery, Tor also generates 3 separate shared secret keys (symmetric keys)
with each node using Diffie-Hellman Key Exchange. Any router among these
three has no idea about what other two’s keys are. Only the sender has the
three keys so that it can encrypt the data he sends in 3 layers.
• As the above diagram shows, once this 3-layer-encrypted data is sent through
these three nodes, Entry node decrypts the first layer of the encryption using
his shared secret key and discovers where to relay the data. But it has no
capability to find out the actual data because it is encrypted using a key which
it does not have.
• Then the 2-layer-encrypted data coming from the Entry Node is relayed to
the Middle Node. Then it decrypts the next layer of encryption using its
shared secret key as above described. And the decrypted data is relayed to
the Exit node.
• The data coming to the Exit Node is only encrypted in One layer. So, when it is
decrypted using the Exit Node’s shared secret key, the actual plain text data is
revealed. Then this actual data is sent in plain text to the destination server.
8. Who is using tor?
• Normal people (e.g. protect their browsing records)
• Militaries (e.g. military field agents)
• Journalists and their audiences
(e.g. citizen journalists encouraging social change)
• Law enforcement officers
(e.g. for online “undercover” operations)
• Activists and Whistleblowers
(e.g. avoid persecution while still raising a voice)
• Bloggers
• IT professionals (e.g. during development and operational testing,
access internet resources while leaving security policies in place)
9. Hidden services are computers that make their functionality
available within the TOR network and whose address ends in
.onion. Their function can be a simple web server or a complex
service consisting of many modules.
Hidden services include all web content that cannot be found
via search engines. This also includes Clear Web pages that are
not indexed for Google and Co. Anyone who knows the URL,
i.e. the www address, of such pages can call them up without
any problems - Google, on the other hand, cannot find them.
Strictly speaking, even pages that are relatively easy to track
down are already part of the Deep Web.
What are Hidden Services?
10. The actual surfing in the
Darknet is therefore not illegal
per see - it depends on what
you do there.