Source Time Magazine page 30 and 31 November 11th 2013.
So, if the web you and I know is only 19 Terrabytes worldwide but Deep Web is 7,500 Terrabytes worldwide then what is it composed of?
It appears to be built by the U.S. military originally so super secret things could not be traced and it still is that. However, now overlaid on top of this is illegal things done in secret that also cannot be traced. So, something originally designed to operate in secret now has 30 million to 50 million new users every year having nothing at all to do with secret operations of governments and police forces worldwide.
For example, there are 800,000 daily Tor users which is a jump of 20% in the past year. The operating system TOR can access 6,500 hidden websites. Tor's privacy enables all government as well as illegal activities but also protects law-enforcement and military communications.
So, basically you have everything from secret stuff from all governments to Black Ops of all governments to spy stuff from all governments to illegal stuff from all governments to illegal stuff from citizens around the world all living anonymously on a totaly secret web. And even the people who designed this system "TOR" can't figure out how to find out who is doing what on Tor because of the way it is designed to function.
There is a graph on pages 30 and 31 in the middle that looks something like this
1. Accessing deep web sites with TOR
Booting up-When you run Tor Software to access the internet, all your data--including your web searches--are wrapped in layers of encryptions
As a result of this monitors worldwide can only monitor your location but not what you are browsing.
So, your encrypted data enters the Internet Service Provider (Like Comcast or others). Then each Tor Relay knows only the IP address of the relay before it and after it.
2. Relay race:
To hide your location, Tor sends your data through a network of relays--other comptuers using Tor. Each relay strips a layer of encryption before passing it on. Tor changes your relay path frequently.
3. Final destination:
Tor has more than 4,000 relays. Your encrypted data passes through 3 of them. Once the first layer of encryption is stripped, the exit relay connects you to the website you want to visit.
Law enforcement sees the exit relay's address, not your address.
4. Shady Shopping:
illegal marketplaces are hosted on servers that are exclusive to Tor users. On these sites, you can by drugs or weapons and even hire assassins illegally.
5. Seal the deal:
at checkout, you use a digital currency called Bitcoin-- exchanged vie digital wallets on the buyer's and seller's computers which makes it virtually untraceable.
6. Delivery:
Sellers ship contraband in packages that conceal the illegal contents. After you receive the merchandise, an escrow account releases payment to the seller.
The U.S. Government constructed TOR and the deep web in 1996, by three scientists with the U.S. Naval Research Laboratory and presented a paper titled, "Hiding Routing information" at a workshop in Cambridge, England. (info on page 28 of same article) It laid out the technicl features of a system whereby users could access the Internet without divulging their identities to any Web servers or routers (worldwide) the might interact with along the way. They called their idea "onion routing" because of the layers of encryption that surround and obscure the data being passed back and forth. By October 2003, the idea was ready to be released onto the NET as an open-source project called TOR(which originally stood for The Onion Router, though the acronym has since been abandoned). If the Deep Web is a masked ball, Tor provides the costumes. It was a highly elegant and effective creation, so much so that even the people who built it didn't know how to break it.
end quotes and info from Time Magazine pages 28, 30 and 31 November 11th 2013.
Though I can see why the U.S. government would want something like this along with police forces and Interpol and the FBI and the CIA and MI6 and all other governmental agencies worldwide, it seems rather problematic that Governments, Black ops of various countries as well as criminals worldwide are all on this thing together now worldwide.
To the best of my ability I write about my experience of the Universe Past, Present and Future
Top 10 Posts This Month
- Because of fighting in Ukraine and Israel Bombing Iran I thought I should share this EMP I wrote in 2011
- most read articles from KYIV Post
- reprint of: Drones very small to large
- The ultra-lethal drones of the future | New York Post 2014 article
- Keri Russell pulls back the curtain on "The Diplomat" (season 2 filming now for Netflix)
- The 70s: Wikipedia
- "There is nothing so good that no bad may come of it and nothing so bad that no good may come of it": Descartes
- Jack Ryan from Prime (4 seasons)
- ‘Central Park Five’ members sue Trump for defamation after his debate comments on 1989 case
- US intelligence officials make last-ditch effort to sound the alarm over foreign election interference
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment