SlideShare a Scribd company logo
1 of 11
INTERNET
Understand
Internet
Before You Regret
Only for Education purpose
INTERNET
 The internet is a globally
connected network system.
 When most of us think of the
internet, we imagine day-to-day
activities like
1. Watching a video.
2. Checking the news.
3. Booking a vacation online.
SURFACE WEB
 The surface web is the portion of
content on the INTERNET that is readily
available to the general public and
searchable with standard search
engines.
 The Surface Web only consists of 10
percent of the information that is on the
internet.
 Google's index of the surface web
contains about 14.5 billion pages.
DEEP WEB - I
 Deep Web is a part of the invisible web
that a normal user cannot access.
 Deep Web access only if one has the
authorization or login credentials to do so.
 The data stored in the deep ranges from
 Personal information (including military
data)
 Financial records.
 Academic databases.
 Medical records.
 Government records.
DEEP WEB - II
 You just need a special authorization or
access credentials to access the
information on the Deep Web.
 Example:
 You normally generate a PIN or OTP to
access your online banking account
 It is only once you enter the PIN/OTP that
you are able to log into your account.
 You cannot get into your account by typing
‘Sumit Parvat’s Banking Account’ on a
search engine.
DARK WEB - I
 Dark Web an encrypted section of the web
that offers complete anonymity as it is not
indexed by search engines.
 It requires the use of an anonymizing
browser called Tor to be accessed.
 The dark web is an instrument to illegal
activities like
 Child pornography
 The sale of drugs
 Firearms
 Stolen credit card numbers.
 What is Available on The Dark Web?
 Credit card numbers
 Fake passports
 Stolen/Hacked Accounts
 Fake College Degrees
 Murder for hire/Assassination
 Plastic Explosives
 Weapons
 SWAT-style body armour
 Hacked Government Data
DARK WEB - II
THE TOR PROJECT
 Tor is free and open-source software
for enabling anonymous
communication.
 the original software project name "The
Onion Router“.
 Tor was developed in the mid-1990s by
United States Naval Research
Laboratory employees.
 To exchange sensitive and confidential
data anonymously.
WORKING OF TOR
 Your data is bundled into an encrypted packet
when it enters the Tor network.
 Tor strips away part of the packet's header.
 Tor encrypts the rest of the addressing information,
called the packet wrapper.
 The modified and encrypted data packet is then
routed through many of these servers, called
relays, on the way to its final destination
 Each relay decrypts only enough of the data
packet wrapper to know which relay the data came
from, and which relay to send it to next.
 The relay then rewraps the package in a new
wrapper and sends it on.
SURFACE VS DEEP VS
DARK WEB
THANK
YOU !!!

More Related Content

What's hot

The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Internet anonymousness
Internet anonymousnessInternet anonymousness
Internet anonymousnessPaul Setchko
 
Montilla K32 - DEEP WEB
Montilla K32 - DEEP WEBMontilla K32 - DEEP WEB
Montilla K32 - DEEP WEBPoch Montilla
 
Dark web investigation
Dark web investigationDark web investigation
Dark web investigationCobinweb
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyaniyanizaki
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Comm Slideshow
Comm SlideshowComm Slideshow
Comm Slideshowsmithj12
 

What's hot (20)

Invisible Web
Invisible Web Invisible Web
Invisible Web
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Deep and dark web
Deep and dark webDeep and dark web
Deep and dark web
 
Darknet
DarknetDarknet
Darknet
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Internet anonymousness
Internet anonymousnessInternet anonymousness
Internet anonymousness
 
.Onion
.Onion.Onion
.Onion
 
Dark net
Dark netDark net
Dark net
 
Overview of Deep web
Overview of Deep webOverview of Deep web
Overview of Deep web
 
Montilla K32 - DEEP WEB
Montilla K32 - DEEP WEBMontilla K32 - DEEP WEB
Montilla K32 - DEEP WEB
 
Godfather 2.0
Godfather 2.0Godfather 2.0
Godfather 2.0
 
Dark web investigation
Dark web investigationDark web investigation
Dark web investigation
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyani
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Internet(Internetwork)
Internet(Internetwork)Internet(Internetwork)
Internet(Internetwork)
 
Dw communication
Dw communicationDw communication
Dw communication
 
Comm Slideshow
Comm SlideshowComm Slideshow
Comm Slideshow
 

Similar to Understand Internet Before You Regret.

The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web ASAD AHMED
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark WebAmit Biwaal
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight IntelliaggGavin O'Toole
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
ABOUT DARK WEB
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB VenkatVs7
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep WebIRJET Journal
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat IntelligenceMarlabs
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfkabirhasan11
 
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Kimberly Williams
 

Similar to Understand Internet Before You Regret. (20)

Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
The Deep Web.pptx
The Deep Web.pptxThe Deep Web.pptx
The Deep Web.pptx
 
Dark Web
Dark WebDark Web
Dark Web
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
ABOUT DARK WEB
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB
 
Deep web
Deep webDeep web
Deep web
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdf
 
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?Should the ″Dark Web″ be monitored, shut down completely, or left alone?
Should the ″Dark Web″ be monitored, shut down completely, or left alone?
 
Deep web
Deep webDeep web
Deep web
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Understand Internet Before You Regret.

  • 2. INTERNET  The internet is a globally connected network system.  When most of us think of the internet, we imagine day-to-day activities like 1. Watching a video. 2. Checking the news. 3. Booking a vacation online.
  • 3. SURFACE WEB  The surface web is the portion of content on the INTERNET that is readily available to the general public and searchable with standard search engines.  The Surface Web only consists of 10 percent of the information that is on the internet.  Google's index of the surface web contains about 14.5 billion pages.
  • 4. DEEP WEB - I  Deep Web is a part of the invisible web that a normal user cannot access.  Deep Web access only if one has the authorization or login credentials to do so.  The data stored in the deep ranges from  Personal information (including military data)  Financial records.  Academic databases.  Medical records.  Government records.
  • 5. DEEP WEB - II  You just need a special authorization or access credentials to access the information on the Deep Web.  Example:  You normally generate a PIN or OTP to access your online banking account  It is only once you enter the PIN/OTP that you are able to log into your account.  You cannot get into your account by typing ‘Sumit Parvat’s Banking Account’ on a search engine.
  • 6. DARK WEB - I  Dark Web an encrypted section of the web that offers complete anonymity as it is not indexed by search engines.  It requires the use of an anonymizing browser called Tor to be accessed.  The dark web is an instrument to illegal activities like  Child pornography  The sale of drugs  Firearms  Stolen credit card numbers.
  • 7.  What is Available on The Dark Web?  Credit card numbers  Fake passports  Stolen/Hacked Accounts  Fake College Degrees  Murder for hire/Assassination  Plastic Explosives  Weapons  SWAT-style body armour  Hacked Government Data DARK WEB - II
  • 8. THE TOR PROJECT  Tor is free and open-source software for enabling anonymous communication.  the original software project name "The Onion Router“.  Tor was developed in the mid-1990s by United States Naval Research Laboratory employees.  To exchange sensitive and confidential data anonymously.
  • 9. WORKING OF TOR  Your data is bundled into an encrypted packet when it enters the Tor network.  Tor strips away part of the packet's header.  Tor encrypts the rest of the addressing information, called the packet wrapper.  The modified and encrypted data packet is then routed through many of these servers, called relays, on the way to its final destination  Each relay decrypts only enough of the data packet wrapper to know which relay the data came from, and which relay to send it to next.  The relay then rewraps the package in a new wrapper and sends it on.
  • 10. SURFACE VS DEEP VS DARK WEB