What is the deep web?

The Deep Web is also known as the “deep internet”, the “hidden internet” or the “invisible internet”. This concept is attributed to computer scientist Mike Bergman and refers to Internet content that is not indexed by conventional search engines, such as Google, due to various factors. The main reason why the Deep Web exists is because there is information that is not wanted to be indexed by the main search engines such as Google, Yahoo! or Bing, for this reason, we have specific search engines where this information is indexed within the Tor network.

The Tor network is the basis of the Deep Web, in the world of Tor all traffic is encrypted and anonymized, because we go through different nodes between a source and a destination, in fact, we could access the normal web through the network Tor to anonymize all network traffic as much as possible. Of course, when someone builds a website on the Tor network, the only way to access it is with direct links, there is no indexing, although we do have some “search engines” that have a large number of Tor addresses to access directly. these services.
You must keep in mind that it is not the same as the Dark Web, although this part of the Internet is within the deep web. The content on the Deep Web is not necessarily illegal, but will simply remain hidden from traditional browsers and search engines. And yes, that makes hackers take advantage of it to commit crimes and access forums where they exchange stolen data or malware. That would be the Dark Web.

It is not possible to access, as you would normally do.

It should be borne in mind that it is not possible to access the Deep Web in the same way that you do it in the rest of the pages. For example, it’s not just going into Chrome and typing Hooclass.com in the address bar and going in. This is not so simple, as you will see. That is why you will need certain tools to be able to enter the deep web, although it is not that complicated.

Most of the search engines do not work.

Although the vast majority of us use search engines such as Google, Bing or Yahoo!, as we have explained before, the information found in Tor is not indexed in these search engines and therefore it will be necessary to resort to others to access it. the web pages found in this part of the Internet. Therefore, you will not be able to access the Deep Web through the “normal” search engines, but you will have to use specific search engines to navigate all the content that is on the Deep Web.

What we could search for on Google and other search engines are the specific browsers or operating systems to enter the deep web, such as the popular Tor Browser, which is widely used to easily navigate Tor without having to forward all the traffic from Internet, something that would not be highly recommended to do.

The browser you normally use may not work for you.

In principle you can use your normal browser, but you will have to install a program to forward all the traffic of your computer through the Tor network, in this way, you could use a normal browser such as Firefox or Google Chrome, however, the most It is recommended to use a specific web browser to browse the Tor network, such as the Tor Browser which is based on Firefox. It is the simplest and you will not have to configure anything.

With this web browser you won’t have to install any type of additional program, we will simply have to install the Tor Browser and we will start browsing the Tor network without the need for any additional software. It is available for operating systems such as Windows, Linux or Android and is completely free.

There are certain services on the Internet that offer the possibility of entering their .Onion version. For example, the social network Twitter has its own version available. If you try to open it from Chrome or Firefox you will see that it gives you an error and you cannot enter. On the other hand, if you open that same URL from the Tor browser, you will be able to enter without problems.

How can we enter the hidden Internet?

If you are wondering if we can access it through the main search engines, the answer is no. We have to enter the Deep Web with the DuckDuckGo, Torch, The Hidden Wiki search engines and more that we will see below. Regarding the browser, the usual browsers would not work either. We are going to have to use the Tor Browser that uses the Tor network (The Onion Router). This network works in a special way, in this case it is based on a layered technique that serves to protect communications and guarantee anonymity on the Internet. The Tor network works by encrypting the information at its entrance and decrypting it at the exit of said network, this is known as onion routing.

The Hidden Wiki
As for Hidden Wiki, from a strict point of view we could not consider it as a search engine. However, as it contains an updated list of links to the main Deep Web sites, it makes us pay close attention as a starting point.

The reason why it is so important on the Tor network is because the URLs used with .onion change very often. For example, as you can see above, version 2 of onion domains is now being migrated to version 3, which entails changes. However, in the Introduction Points section we can access the Deep Web with these search engines if we click on their link:
We can define DuckDuckGo as an independent search engine, whose main hallmark is that it does not collect information about its users. Its philosophy focuses on the privacy of Internet users. This search engine also exists on the usual web that we all know, in fact, if you want to protect your privacy and security when browsing the “normal” web, we recommend using DuckDuckGo. It is one of the most popular.
One element that differentiates it from other search engines is that it does not work based on the user’s previous searches, preferences or location. In the vast majority of results we will obtain the same as with a conventional search engine, but protected with the privacy offered by the Tor network.
Surely you have ever put things like “weather” or “restaurants” and they appear in Google results according to your location. You may also get results based on other things you’ve previously searched for. This happens because they collect certain data, such as where you are.

We can consider Torch as one of the best Deep Web search engines and also as one of the most long-lived and popular. Its operation is similar and you will also need the Tor browser to be able to enter and perform searches to keep your privacy safe.

This search engine ensures that it has more than a million pages indexed in its database. If we want to obtain unusual things, it can be an option, although sometimes you come across broken links because they have not been updated correctly, however, there is a huge amount of information to be able to navigate the Deep Web.

Ahmia is another very useful search engine to find a lot of information on the Deep Web, with the previous search engines and with Ahmia we have all the ingredients to start using the Tor network and browse the deep web.

One thing that Ahmia stands out for is that it has a more careful design than most of the sites we find on the Deep Web. One of its features is that it has a blacklist system, where everything it finds to be excessively objectionable is eliminated so as not to hurt the user’s sensitivity. We find a fairly fast web page that will not make us wait for a long time.

Another search engine that we can use is NotEvil. Its operation is very simple, it will be enough that you define well with the keywords what you are looking for. You will only have to use the search bar and press the Search button to make your queries. This would be your main screen:

In this case, it has all kinds of links that will take you to pages that are useful to you, and also, it does not contain ads that bother you. On the other hand, its interface is simple and it will be quite easy for you to adapt to it.

Project Gutenberg
In this case we are faced with a search engine that has a specific purpose, differentiating itself from others in this aspect. With it we will not be able to search for many web pages as is normal.

This platform is aimed at searching for books online, with free downloads and in a wide variety of languages. This browser also has a version that is indexed. The content offered is basically in the public domain, which may be because the copyright has already expired or there is authorization from the author or owner of the rights.

Tor Links
Another website within the Deep Web that is very popular is directly accessing TorLinks. On this website we can see the URL of many web pages of the Deep Web, we will find it divided into sections to facilitate access to all the information. For example, we will have commercial and non-commercial links related to financial services, business, drugs, domain services, adult themes and even gambling we will also have.

We have to enter the following URL: http://torlinksd6pdnihy.onion/. Logically, it is absolutely necessary to enter with the Tor Browser web browser or with any other web browser that is connected to the Tor network. Otherwise you would get an error.

There are numerous risks that we must take into account:

All over the world there are people looking to catch an unsuspecting user when they access or download some content to steal information or worse. They are called hackers, or computer criminals.
There is the possibility that we enter a site that, although it is not going to steal information or infect our computer, may be committing a crime that we are not aware of. As well as being in direct contact with criminals.
The chances are high that we acquire a product which may be illegal, or directly a fraud. Depending on what is acquired, it may be sufficient cause to open criminal proceedings.
It is in constant analysis in search of criminals or illicit actions. This can be carried out by large governments or institutions. Through these sites, it also navigates to the Police of any country. This is to check whether or not the law is being followed. This causes many arrests after verifying that illegal actions were being carried out.
The content of the Deep Web can be very delicate, and be emotionally damaging, which would affect the family and personal environment.

What’s on the Deep Web:

Content distribution pages: Movies, music, books, and a lot of artistic content in general can be distributed here. While many are legal for the simple fact of not having copyright, others do and downloading is illegal. Making piracy one of the big problems of the Deep Web.
Censored content: Many of the contents that are censored in some countries, or content that, to put it in some way, would not see the light of day under normal circumstances, can be found here. This can be especially sensitive.
Hidden Wiki: We are facing a kind of traditional Wikipedia, but where we can find all kinds of content, many of them, it would be unthinkable that they could appear in the Wiki that we all know and use on a daily basis. It is intended to make browsing the Deep Web easier.
Black market: Here we are already dealing with something illegal, and normally in order to access it is necessary to know the server directly. It can be stolen material, forged documentation, weapons or drugs, among others.
Exploitation: Again we are facing an illegal activity, where adult content is normally distributed without any type of limit.
Hackers: Within the wide variety of services that we can find, there are hackers. These offer their services on the deep web, which help the user who hires them to achieve certain things or carry out some type of attack.
Hosting: Just like on the internet accessible from normal search engines, where we can create websites, here you can find hosting services where they allow illegal activities to be carried out.
Scams: It is very common to be thinking about acquiring a service or product, and that this really is a scam to steal your money.

We can say that the Deep Web is not in itself illegal, but it is much easier to carry out criminal activities. In any case, the common sense of users should be appealed to, so that it does not have to be dangerous to browse these networks, as long as certain precautions are followed.

Related Articles


Your email address will not be published. Required fields are marked *