

When attempting to connect via the entry relay, the IP address of the client can be read. Entry/Guard Relay This relay provides an entry point to the Tor network. These relays are also called nodes or routers and allow network traffic to pass through them.ġ. The Tor network has three relays: an entry/guard relay, a middle relay, and an exit relay. The Tor browser is one of the browsers used to access the contents of the dark web. Accessing dark web involves the use of a specialized browser. Cyber criminals use the dark web to perform nefarious activities such as drug trafficking, anti-social campaigns, and the use of cryptocurrency for illegal transactions.

The dark web is not indexed by search engines and allows complete anonymity to its users through encryption. It is used to carry out unlawful and antisocial activities. Dark Web This is the third and the deepest layer of the web. Information contained in the deep web can include military data, confidential data of organizations, legal dossiers, financial records, medical records, records of governmental departments and subscription informationģ. The contents of the deep web can be accessed only by a user with due authorization. Deep Web This layer of the web cannot be accessed by normal users because its contents are not indexed by search engines. The surface web comprises only 4% of the entire web.Ģ. Public websites such as Wikipedia, eBay, Facebook and YouTube can be easily accessed from the surface web. Surface Web As the topmost layer, the surface web stores content that can be accessed as well as indexed by search engines such as Google, Yahoo, and Bing. With respect to the accessibility of content, the web is divided into the following three layers:ġ. This section outlines the fundamentals of the dark web and discusses the characteristics of the Tor network.

Because of the anonymity allowed to dark web users, criminals use the dark web to perform a wide range of illegal activities. The dark web refers to the last and the bottom-most layer of the web, which is not indexed by search engines hence, its contents remain hidden from normal browsers and users.Īccess to the dark web requires individuals to use special browsers such as Tor that provide users with anonymity and keep their data safe.
