Dark web people- Never before has the real world been so interconnected with the cyber with an increasing amount of our everyday activity becoming digitised. However, what we say, what information we look at, and every online activity necessarily leaves electronic records and footprints that can reveal some of our most personal activities and attributes. Unsurprisingly, this is something that has not escaped the attention of the intelligence community who argue that by collecting and examining this data they can detect, locate, and even predict threats.
People are, however, rightly concerned that access to this information without their knowledge or control represents a significant threat to their privacy, with additional concerns being raised about how access to this information might be used against them or used to distort their access to services. As such, an increasing number of people have begun to utilise anonymising technology to secure their identity and online activity behind encryptions and auto-deletes. One popular tool for this is TOR, an easily downloadable program that allows online anonymity through onion routing – a form of layered encryption where the traffic is processed through three nodes, encrypted at each stage so that the sender and destination are unknown as each intermediary knows only the location of the immediately preceding and following nodes (Abbott el at, 2007). Through this TOR circuits many kinds of ‘hidden services’ are available such as website hosting denoted by the onion URL, online messaging and VOIP communications, and data sharing (TOR Project). These protections have created what is commonly referred to as the ‘dark web’, the collected sum of these websites that allows anonymity to those who visit or conduct business through it.
This technology, however, should not be just for those who have the awareness to download and utilise it. The increasing pervasiveness of online surveillance means that people should have such online protections put into place for them, whether they have explicitly requested it or not.