2. CLEARNET
That Internet, used by billions around the world every day, is sometimes known as the Surface
Web, or the Clearnet, as coined by Tor and other anonymous online users. The so-called surface
Web, which all of us use routinely, consists of data that search engines can find and then offer
up in response to your queries. But in the same way that only the tip of an iceberg is visible to
observers, a traditional search engine sees only a small amount of the information that's
available -- a measly 0.03 percent
3. WHAT IS DEEP WEB ?
In simple words Everything else Clearnet is DeepWeb.
The deep Web (also known as the undernet, invisible Web and hidden Web, among
other monikers) consists of data that you won't locate with a simple Google search.
It’s made up of tens of billions of sites that are hidden within a universe of code --
various estimates have put the Deep Web at anywhere from five to 500,000 times the
size of the Surface Web.
4. DARKNET
Darknets are small niches of the “Deep Web,” which is itself a catch-all term for the assorted
Net-connected stuff that isn’t discoverable by the major search engines. (BrightPlanet has a
stellar Deep Web primer.) They cloak themselves in obscurity with specialized software that
guarantees encryption and anonymity between users, as well as protocols or domains that the
average webizen will never stumble across.
5. WHY DARKNET IS IMPORTANT ?
Many countries lack the equivalent of the United States’ First Amendment. Darknets grant
everyone the power to speak freely without fear of censorship or persecution. According to the
Tor Project, anonymizing Hidden Services have been a refuge for dissidents in Lebanon,
Mauritania, and Arab Spring nations; hosted blogs in countries where the exchange of ideas is
frowned upon; and served as mirrors for websites that attract governmental or corporate angst,
such as GlobalLeaks, Indymedia, and Wikileaks.
6. ANONYMOUS NETWORKS
TOR
Tor makes it possible for users to hide their locations while offering various kinds of services,
such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor
users can connect to these hidden services, each without knowing the other's network identity.
7. STEP 1
A hidden service needs to advertise its
existence in the Tor network before
clients will be able to contact it
8. STEP 2
the hidden service assembles a hidden
service descriptor, containing its public
key and a summary of each introduction
point, and signs this descriptor with its
private key.
9. STEP 3
A client that wants to contact a hidden
service needs to learn about its onion
address first. After that, the client can
initiate connection establishment by
downloading the descriptor from the
distributed hash table
10. STEP 4
When the descriptor is present and the
rendezvous point is ready, the client
sends this message to one of the
introduction points, requesting it be
delivered to the hidden service
11. STEP 5
The hidden service decrypts the client's
introduce message and finds the address
of the rendezvous point and the one-time
secret in it. The service creates a circuit to
the rendezvous point and sends the one-time
secret to it in a rendezvous message
12. FINDING A DOOR TO TOR SERVICE
Some common sites to walk in the tor network.
1. HiddenWiki
2. TorDir
3. deepweblinks.org
4. http://2vlqpcqpjlhmd5r2.onion/ – Gateway to Freenet
5. http://wiki5kauuihowqi5.onion/ – Onion Wiki
13. STEP 6
In the last step, the rendezvous point
notifies the client about successful
connection establishment. After that,
both client and hidden service can use
their circuits to the rendezvous point for
communicating with each other
14. I2P ANONYMIZING NETWORK
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can
use to securely communicate. All data is wrapped with several layers of encryption, and the
network is both distributed and dynamic, with no trusted parties. Unlike many other
anonymizing networks, I2P doesn't try to provide anonymity by hiding the originator of some
communication and not the recipient, or the other way around. I2P is designed to allow peers
using I2P to communicate with each other anonymously — both sender and recipient are
unidentifiable to each other as well as to third parties