• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Deep Web

The Dark World

  • Deep Web
  • Deep Web Links
  • Best VPN
  • Tor
  • Hidden Wiki
  • News
You are here: Home / Deep Web Infographic / TOR and the Deep Web

deepwebadmin / November 17, 2015

TOR and the Deep Web

Share
Pin

Why the Internet isn’t secure – To understand how Tor is able to protect a user’s identity as they browse the Internet, it seems prudent to discuss exactly how the Internet works. The Internet is, at its most basic, the series of connections between computers across a great distance. In the beginning, computers were isolated, unable to communicate with each other. As the tech got more advanced, engineers were able to physically link computers together, creating early networks.

These networks still required the computers to be relatively near each other, however. Eventually, advances in fiber optics enabled networks to connect across continents, allowing for the Internet to be born.

Some computers house the data stored on the Internet, including web pages like Google. These computers are known as “servers.” A device used to access this information, such as a smartphone or PC, is known as a client. The transmission lines that connect clients to servers come in a variety of forms, whether fiber optic cables or wireless signals, but they are all connections.

Although clients initiate connections to get information from servers, the flow goes both ways.

Data is exchanged across the Internet in packets. These packets contain information about the sender and the destination, and certain individuals and organizations can use this data to monitor who is doing certain things or accessing certain information on the Web.

It is not just the server that can see this data. Traffic analysis is big business, and many organizations, both private and governmental, can monitor the messages flowing between clients and servers. How, then, does Tor keep the user’s information secret?

TOR and the Deep Web
TOR and the Deep Web

How Tor has the answer

There are two key aspects to onion routing. First, the Tor network is composed of volunteers who use their computers as “nodes.” As mentioned earlier, during normal browsing, information travels across the Internet in packets. When a Tor user visits a website, however, their packets do not simply travel to that server. Instead, Tor creates a path through randomly assigned nodes on that the packet will follow before reaching the server.

Share
Pin

Filed Under: Deep Web Infographic, Secrets Of Deep Web Tagged With: deep web infographic

Primary Sidebar

STAY ANONYMOUS

CyberGhost VPN Deep Web Access

Footer

Follow US

Recent Post

  • 11 Spine-Chilling and Nightmarish Deep Web Stories from Users
  • Deep Web Destinations – A Massive List of Places to Visit on the Deep Web
  • How Dark Web Whistleblowers Work
  • Money on the Dark Web: Bitcoin Fades as Monero Rises?
  • The Story of Deep Web Narcotics

Disclaimer

The information contained in this website is for general information purposes only. The information is provided by Deep Web Sites and while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk. Read more>>

© 2023 · Deep Web

  • Terms and Conditions
  • Privacy and Cookie policy
  • Disclaimer
  • Contact us