What is the deep Internet

What is the deep Internet

The concept "deep Internet" appeared in network thanks to existence of a system of anonymization in the form of the free software carrying the name TOR (The Onion Router).

Operation principle



TOR is the cornerstone the second generation of so-called "onions routing" – the system of the proxy servers (nod) scattered on all continents allowing to establish the anonymous network connection protected from listening. In fact, this system presents itself the huge anonymous network transferring data in encrypted form by means of a set of virtual tunnels. In addition to anonymization, TOR is also capable to provide protection against the different mechanisms analyzing traffic by means of which it is possible to learn trade secrets and the buried business contacts from the general access.


The TOR system was created by Research laboratory of US Navy together with group of students of the Massachusetts Institute of Technology within the Free Haven project of the data storage aimed at the development of a safe hostless system. In 2002 it was decided to transfer source texts of confidential development to independent programmers who very quickly wrote for it the client application and published the source code under the free license. From this point anyone could finish own code lines in a system and test it for presence of bugs and backdoors. At the moment the TOR system has more than 339,000 lines of the program code written mainly on C ++, Si and Python, at the same time the system is constantly improved and complemented with new comments. The network consists of about 5000 nod, the number of its users exceeds 2 million people.

Use



Officially the TOR network is used by many public organizations, law enforcement agencies, the companies and corporations, the Defense Ministries, workers of social spheres for ensuring confidentiality and maintaining inviolability of data.
Individuals use this network for a circumvention of Internet censorship, creation of own anonymous media and the websites through the services allowing to hide the true location of web resources. Journalists and the known world media use TOR for communication with informants and dissidents

Also the TOR network is actively used by any swindlers, drug dealers, weapon, counterfeit documents, etc., nationalists, hackers and pedophiles. It should be noted that the absolute anonymity of TOR is not capable to be provided after all and therefore law enforcement agencies with enviable regularity catch the users and their clients described above.

Author: «MirrorInfo» Dream Team


Print