• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Deep Web & Dark Web To Fight With Mass Surveillance

By Abhishek Ghosh June 23, 2015 8:31 am Updated on June 23, 2015

Deep Web & Dark Web To Fight With Mass Surveillance

Advertisement

After Snowden Reveals, Common Internet Users Understood the Truth Behind. Here is How Deep Web & Dark Web To Fight With Mass Surveillance. We will learn many things around creating near 100% secured websites, but before that; we need to learn, check and recheck to make it sure that the agents and data thieves can not disturb the Freedom. Again a small revise – Microsoft, Google, Yahoo, Amazon, Skype are already marked (and proved) Governmental agents who steals data. Richard Stallman is the founder of Free Software foundation for whom we are using GNU/Linux with a practical license and Edward Snowden is the person to prove many assumed thoughts. You should read about PRISM, NSA’s Mass Surveillance on Wikipedia. These are not sci-fi stories, these are the real facts. Freedom does not mean that one will violate the “norms”.

 

Deep Web & Dark Web To Fight With Mass Surveillance : Basics

 

Pseudo-top-level domain is a name for a computer network that is not participating in the official Domain Name System (DNS). Our website uses a Top Level Domain – .com.

Tor Project is an important project, that is the project which is now motioning the official HTTPS Everywhere list – it is a list of HSTS websites like that of us. Number of HSTS websites are not exactly huge (data of June 2015), not even 500 on this Earth. Many HSTS are on 301 redirect or are CDN. HSTS offers some sort of security. Network Protocols are normally intruding at this point.

Advertisement

---

Using Virtual Private Network somewhat secures the connection. If we encrypt a connection in a serious for multiple times – the change of tracing becomes difficult.

But there are problems with the conventional DNS system, to circumvent it; Deep Web & Dark Web actually developed. Normal web search engine bots can not spider them. .onion, .exit, .bit are examples of pseudo-top-level domains. They are intended for the hidden services. Hidden means, hidden from the mass surveillance. Tor is Free Software for enabling anonymous communication, it is a protocol itself to connect with the services.

Dark Web is a public World Wide Web content that overlay the public Internet and require specific software, configurations and authorization to access. Deep Web is the special search engines to index them. This Dark Web can be thought as a different Internet – its free from Google’s tracking javascript, looks like the Internet of ’90’s. Obviously, like we have said in an another topic about Google’s silent death; there are banner ads used on the Dark Web, like we used on 1990 on websites to earn money. Direct link. This “mass surveillance” running internet is called “clearnet”. It is clear to the NSA’s agents. There are many NSA from many countries.

In short, one will need a Tor Browser to connect to these most of the services. But if your computer is exactly set like how Richard Stallman describes, your typing on keyboard can be traced by various backdoors, malware and tojans. So, it is important to use a safe hardware as computer with Free Software running on it.

 

Deep Web & Dark Web To Fight With Mass Surveillance : Onion Sites

 

On the clearnet, means this Internet you are using; is full of tracking Javascript and most common commodity is SEX or rather Pornography. Dark Web was not intended for creating porno hub, but they also use the system. If we do not like, we will not watch, quite simple. There are REAL brothels are running on this earth including one office of an American President. The data which we commonly know are tip of the iceberg. Political matters will uncannily enter because they basically loves to divide human and run costly luxury cars. You can not say against Judge or President – exactly like you can never say against the kings. In the same way, on Internet, these same peoples via agencies imposed their long running monarchial rules.

On this clearnet, it is near impossible for a real journalist to find the real data – how a Pakistani homeless is living if you are an American or Indian. These are very risky works and the unfortunate result of taking photograph of very sad economical condition is usually committing suicide or murder in some way. Yes, these are related with Digital Photography.

Configuring hidden services for Tor is described in official Tor Project’s website. We can use our own computers or servers to host an onion site. Facebook, in this era of data protection running their own Tor website – https://facebookcorewwwi.onion/. Facebook works as Agent for data stealing – basically if the website host is bad, there is no way to stop data theft. If you want to only surf the onion websites, it is quite easy – simply read Tor Project’s website.

If you want host an Onion website, the server configuration part is somewhat like normal web hosting, but extra precaution are required like – not to run anything else on the server, avoiding exposing the other services from the provider, you must use the VPS in an way that the provider do not understand that you are running a Tor on the instance – like you can fake it to be used for database. It demands quite good knowledge on networking to “fake such”, mail server should not run on the server, web designing should be light with inline resources, avoiding Javascript, error message etc. and the server’s security must be top notch because NSA like agents will try to intrude. Yes, you’ll be able to see the logs – it is really practical part of PRISM. They’ll also use top notch encryption. Server OS better be from Free Software Foundation and Web Server being Apache2. We will install the system to host Tor later as an example but roughly, the servers hugely prone to get hacked. All packages like wget, rsyslog… we actually can not convert this website to onion with just 1 step. That WordPress has lot of tracking, we need to use simple webpages like plain HTML, hardly plain PHP or Python. More softwares will run, you are at risk.

One can actually make money by running a Tor website. You need to use Banner Ads. If you fail to maintain the security and have “sensitive content”, NSA might hack and put a webpage like this :

Deep Web & Dark Web To Fight With Mass Surveillance

Sensitive content can be a simple blog post like this one which you are reading. If you are too noob and has more sensitive content, then they will pluck you like a ripe fruit, put in a cage and fetch huge money from you. Thats a Tax for not doing the “right”. Jesus Christ was also wrong!

Tagged With darkweb deep web , deep web engines nsa surveillance , mass surveillance and dark web , mass surveillance deepweb , safest web browser for mass surveillance

This Article Has Been Shared 589 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Deep Web & Dark Web To Fight With Mass Surveillance

  • Differences between FTP and SSH

    You must have heard of FTP and SSH. This article explains the basics of both FTP and SSH in simple language.

  • Keyless Door Unlocking Mobile Cloud Based Apps : Gaining More Interest

    Keyless Door Unlocking Mobile Cloud Based Apps like Lockitron, ShareKey are growing interest from both the developers and the users. Let us have a deeper look.

  • Distributed Computing : Basics

    Distributed Computing is a model for solving computational problems using a large number of computers organized in clusters in a distributed infrastructure.

  • Cloud Security Solutions for Tablets and Smartphones

    Cloud Security Solutions for Tablets and Smartphones covers the issues with lost or stolen mobile devices, accidental data deletion, App security and Malwares.

  • Service Oriented Architecture (SOA) : Detail Article

    Service Oriented Architecture or SOA is an architectural pattern of IT which plays a special role on business processes, where levels of abstraction are basis.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • How to Do Electrical Layout Plan for Adding Smart Switches January 26, 2023
  • What is a Data Mesh? January 25, 2023
  • What is Vehicular Ad-Hoc Network? January 24, 2023
  • Difference Between Panel Light, COB Light, Track Light January 21, 2023
  • What is COB LED? How LED Chip On Board Works January 20, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Deep Web & Dark Web To Fight With Mass Surveillance," in The Customize Windows, June 23, 2015, January 27, 2023, https://thecustomizewindows.com/2015/06/deep-web-dark-web-to-fight-with-mass-surveillance/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT