Page 185 - Reclaim YOUR DIGITAL GOLD (with DesignLayout Dec3) (Clickable) (Dexxi-FLIP-Audio)_Neat
P. 185
W eb 1.0 - 3.0 a n d t h e d a r k W eb
include those pertaining to online hotel reservations,
online shopping, medical records, banking, and similar
activities. Password protection ensures that the content
can be accessed only by those who have been granted
permission to do so (for example,employees).
DARK WEB
Thevast majority of Internet usersconnect to the Internet
using a personal computer or other electronic device
that permits the user to be assigned a distinct Internet
Protocol (IP) address. This address serves as the user
user’s online identity.
With the help of an IP address, networks are able to
deliver the appropriate data to the appropriate location,
such as ensuring that an email is delivered to its
intended recipient. Using a person’s unique IPaddress, it
is possible to track and monitor all of their activity on the
Internet. However, in the dark web a person can browse
the internet anonymously.
It is verychallenging to determine which websites a user
has visited because the dark web uses sophisticated
systems to anonymize a user’s real IP address.
Anonymous access to it is typically granted through the
use of specialized software, of which Tor (The Onion
Router) is the most well-known.
Over 2 million people use Tor on a daily basis (Users –
Tor Metrics, n.d.). Tor is a method that allows users to
browseboth theopenwebandthedarkwebanonymously,
without anyone being able to identify them or monitor
their activity.
165