DeepWeb | Underground Market

There is a "DeepWeb" which is totally different from the one we surf daily.
1. Also called the hidden web and deepnet, the deep web is where search engines have not indexed he information, and so “invisible” to the mainstream public.

2. A 2001 study done at University of California, Berkeley estimated the deep web to consist of about 7.5 petabyes (or 7,500 gigabytes) of information. In a 2003 study, that number increased to 91,850 petabytes. Researchers also estimated that to the 1 billion indexed pages on the internet (in 2001), there were 550 billion in the deep web.

3. To access this part of the internet, you need to download The Onion Router, referred to as TOR. TOR is an anonymous network of nodes that are intended to mask the user’s IP and protect the privacy of the user.

4. You can read banned books on TOR.

The Tor Library

5. Anonymous sellers advertise their goods on topic-specific forums. Like copied credit cards on a credit card fraud board.

Cloned credit cards with PINs for sale somewhere on the deep web.

6. And people can purchase fake identification too. An American passports would set you back 700 Euros, or 973.91 USD.

A counterfeiter advertising his/her services on the deep web.

7. Of course, there’s no cash or check exchanged over the deep web. To exchange goods, you need to use bitcoin.

8. TOR is sponsored by the United States Department Of State Bureau Of Democracy, Human Rights, And Labor, The Ford Foundation, Swedish International Development Cooperation Agency among other government-backed groups.

9. You can also purchase organic weeds from the Netherlands.

Screen Shot 2014-03-18 at 3.56.30 PM

10. Weapons can be purchased online as well.
Screen Shot 2014-03-18 at 4.24.45 PM

11. Even child spirits from abortions and miscarriages.

Screen Shot 2014-03-18 at 4.25.54 PMScreen Shot 2014-03-18 at 4.25.45 PM

12. Journalists in heavily censored countries use the deep web to communicate and exchange information.

13. Clicking on a wrong link (with JavaScript enabled on your browser) can mean the end of your life (not really). A JavaScript exploit can be used to upload malware into the user’s computer — meaning a keylogger can be installed without your knowledge and your passwords will be compromised.



Popular posts from this blog

The power of Bluetooth 4.0

How to hack your xbox 360 completely

Autonomous mobile additive manufacturing robot runs circles around traditional 3D printers