How To Access Deep Web?
I am sharing the way I got into the deep web here. I would like to give introduce some basic terminology here so as to make you familiar.
- Contextual Web: pages with content varying for different access contexts (e.g., ranges of client IP addresses or previous navigation sequence).
- Dynamic content: dynamic pages which are returned in response to a submitted query or accessed only through a form, especially if open-domain input elements (such as text fields) are used; such fields are hard to navigate without domain knowledge.
- Limited access content: sites that limit access to their pages in a technical way (e.g., using the Robots Exclusion Standard or CAPTCHAs, or no-store directive which prohibit search engines from browsing them and creating cached copies).
- Tor Browser: Tor is short for The Onion Router (thus the logo) and was initially a worldwide network of servers developed with the U.S. Navy that enabled people to browse the internet anonymously. Now, it's a non-profit organization whose main purpose is the research and development of online privacy tools.
- Anonymous user: When a user visits web portal without logging in, that user is called "anonymous."
- Onion routing: Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion.
- .onion site: It's a site that is only reachable via the TOR Onion Routing network - an anonymizing network that will make you (and the website) untraceable.
That is cool. Lets start by installing the Tor Browser from this link - https://www.torproject.org/download/download-easy.html.en
Once you've downloaded the installer, you have two options: You can just install the software or you can check the installation file's GPG signature first. Some people like to check the installation file to make sure they've downloaded the proper version of the browser and not something that's been tampered with.
But checking the GPG signature is not a painless process and requires an additional software download. Nevertheless, if that's something you'd like to do, the Tor Project has a how-to explaining what's required.
Using the Tor Browser
Once the browser is installed, you'll have a plain old folder called Tor Browser. Open that and inside you'll see "Start Tor Browser.exe". Click that file and a new window opens asking whether you'd like to connect directly to the Tor network or if you need to configure proxy settings first.
Once you've downloaded the installer, you have two options: You can just install the software or you can check the installation file's GPG signature first. Some people like to check the installation file to make sure they've downloaded the proper version of the browser and not something that's been tampered with.
But checking the GPG signature is not a painless process and requires an additional software download. Nevertheless, if that's something you'd like to do, the Tor Project has a how-to explaining what's required.
Using the Tor Browser
Once the browser is installed, you'll have a plain old folder called Tor Browser. Open that and inside you'll see "Start Tor Browser.exe". Click that file and a new window opens asking whether you'd like to connect directly to the Tor network or if you need to configure proxy settings first.
Most people can simply connect directly to the Tor network to get started. For most people, choosing the direct option is best, so choose Connect. A few seconds later a version of Firefox will launch and you are now connected to the Tor network and able to browser in relative anonymity.
To ensure you are being anonymous, go to https://www.whatismyip.com/ and check your IP address. You can easily detect this by comparing visiting this website on internet browser (ex. google chrome) and tor browser.
But browsing anonymously on Tor isn't quite as easy as booting up a program. There are also some rules of the road you should observe, such as connecting to every site possible via SSL/TSL encryption (HTTPS). If you don't, then anything you do online can be observed by the person running your exit node. The browser has the Electronic Frontier Foundation's HTTPS Everywhere add-on installed by default, which should cover your SSL/TSL needs most of the time. The Tor Project has more tips on browsing anonymously.
Also, remember that browsing in anonymity does not make you immune to viruses and other malware. If you are going to the seedier parts of the Internet, Tor cannot protect you from malicious software that could be used to reveal your location.
To ensure you are being anonymous, go to https://www.whatismyip.com/ and check your IP address. You can easily detect this by comparing visiting this website on internet browser (ex. google chrome) and tor browser.
But browsing anonymously on Tor isn't quite as easy as booting up a program. There are also some rules of the road you should observe, such as connecting to every site possible via SSL/TSL encryption (HTTPS). If you don't, then anything you do online can be observed by the person running your exit node. The browser has the Electronic Frontier Foundation's HTTPS Everywhere add-on installed by default, which should cover your SSL/TSL needs most of the time. The Tor Project has more tips on browsing anonymously.
Also, remember that browsing in anonymity does not make you immune to viruses and other malware. If you are going to the seedier parts of the Internet, Tor cannot protect you from malicious software that could be used to reveal your location.
This is enough for a average user to do private surfing..
Comments
Post a Comment