The Naked Truth About the Dark Web

What is dark web?

The most dangerous part of the internet is the Dark web, Cybermonster uses this as a powerful weapon. Read the complete article to know more.

Do you know that the Internet divides into three layers?

According to research by Deep Web Research in 2023. The percentage of the Internet we know (the public web) is estimated to make up only 4.3% of the total internet. The deep web accounts for around 96.2%, and the dark web accounts for a very small 0.5%.

Yes, the internet as we know it and use it in your daily life. It’s only about 4% of the Internet that actually exists!  

What are the top benefits of the internet?

  1. The internet offers you unprecedented access to information, entertainment, and communication. With the push of a button, you can connect with anyone on the other side of the world and access an almost limitless amount of knowledge.
  2. You can stay up-to-date with the latest news, trends, and happenings. In almost any topic you choose—from politics to sports to fashion—by simply following your favorite blogs or websites.
  3. Entertainment options are also virtually endless; you can watch movies, play video games, listen to music, read books and magazines. All from the comfort of your home.
  4. For those looking for more than just idle fun, the internet is full of incredible tools. And that help facilitate learning in a variety of ways. Online classes, virtual libraries and museums, language tutorials. An endless list of encyclopedias and reference sources become available at your fingertips!
  5. Social media platforms provide an even more interactive experience. Where you can easily connect with family members in distant countries. Or old friends near or far in a single click. In just a few minutes you can share stories, photos, and ideas – the possibilities are truly endless! We love the internet, right! However, Cybermonsters also love the internet and use all its layers of the web for malicious activities and evil intent

What are the layers of the internet? 

  1. The surface web
  2. The deep web
  3. The dark web
what is Dark Web

Before we continue our topic of the layers of the internet, let’s discuss who are the Cybermonsters:


The Cybercriminal Cybermonsters are motivated by financial gain. And will do whatever it takes to make money. They use sophisticated techniques such as malware, ransomware, phishing scams. And other malicious activities to steal data and extort money from unsuspecting victims.


Hacktivist Cybermonsters are individuals or groups of individuals who use technology to promote a political or social cause. Hacktivists typically use computer networks and the internet to spread their message. Often through hacking websites, defacing web pages, launching distributed denial-of-service (DDoS) attacks, and other forms of cyber vandalism.


Insider Threat Cybermonsters are an insider in your life, family, or business. An insider threat is a malicious attack on an organization or individua. And that comes from within the organization or known person. This type of attack can be particularly damaging because it often goes undetected until it’s too late. Insider threats can come in many forms, including theft of intellectual property, sabotage of systems and networks, and even espionage.


They are huge Cybermonsters with unlimited resources.  Nation state cybercriminals are a growing danger. These criminals are typically sponsored by governments and use sophisticated techniques to carry out their malicious activities. They often target critical infrastructure, financial institutions, and government Agencie. In order to gain access to sensitive data or disrupt operations.
Highly organized nation state cybercriminals have access to vast resources that enable them to remain undetected.

Let’s go deeper on what are the 3 Layers of The Internet

The surface web:

The surface web is the Internet you and I navigate to connect with family, friends, and businesses.  It is also known as the clear web or visible web. In other words, it’s the part of the World Wide Web. Any standard web browser can access it without special software or authorization.

The surface web is where we do the normal activites. Like visit websites, watch videos, do our banking, use social media, play games, and go shopping.

The websites and pages are indexed by search engines such as Google Chrome, Yahoo, and Bing among many others. This includes most websites that you would normally use on a daily basis, such as news sites, social media platforms. Remember this is only 4% of the whole internet!

The deep web: 

The deep web made up of pages that are not index. (meaning it is not accessible through a conventional search engine). Since the information contained in them is often restricted and not intended for public consumption.
For example, medical records, membership websites, and perfectly legal confidential information are part of the deep web.
The depth of the deep web is more than we can ever imagine. And it gets more dangerous the deeper you get.  

The Deep Web exists mostly on private networks and its contents are heavily encrypted. Making them difficult to access without prior authorization or special software. This encryption adds another layer of security in addition to making data virtually undetectable. Even if someone were able to gain access to it, they would still need powerful decryption tools in order to decipher what was contained within.

What do you need to access the deep web?

To access the deep web, you need to use special software called a Tor browser. This is because the deep web made up of content that is not accessible through search engines like Google or Bing. And it therefore requires a certain level of technical knowledge to be able to access its contents. The Tor browser provides users with an anonymous way of accessing this content. By routing their connection through multiple nodes on the Tor network. Which hides their IP address and makes it harder for third parties to track their online activity. Additionally, in order to view certain websites within the dark web. (Which is part of the deeper layers of the deep web) users need to use extra security measures. Such as encryption technology.
Also, in order to access these pages. you need to know the exact link and may need a specific username and password.

What is TOR?

The TOR (The Onion Router) is an anonymous network of computers that ensure privacy and anonymity when browsing the internet. Think of it as a network of fake doors or walls set up by computer users all around the world, like a maze. Whenever you access the internet using TOR, your request for information goes through these fake walls or “doors” before finally reaching its destination. In this way, TOR protects your identity and location from being tracked because no one can tell who or where the request originated from. It’s like being in a huge house with hundreds of doors, and you can go in and out without anyone seeing which door you used to enter or exit.

Who created TOR?

The Onion Router (TOR) was created in 2002 by the U.S. Naval Research Laboratory. But has since become an open-source project maintained by a large community of volunteers and network of developers around the world. TOR is designed to provide users with enhanced privacy, security and anonymity by routing their internet traffic through a number of different servers around the globe while also encrypting data as it is transferred.

The dark web: 

Technically, the dark web is also part of the deep web. In fact, the dark web is estimated to be a tiny fraction of the deep web. Unless you know exactly where to go it is hard to get there.

Not everything is unethical, illicit or nefarious in the dark web. Scammers set up many dark websites, designed for criminal activity.

The Dark Web can be a confusing and intimidating place, but it is important to understand exactly how it works. The Dark Web is part of the internet that is not index by search engines or easily accessible by regular means. It operates in a way similar to an underground network and is known for its anonymity and lack of censorship.

Think of the Dark Web like an iceberg – the “surface web” which we access through everyday websites like Google and Facebook makes up only a small portion of the whole internet. But just like an iceberg, those surface websites are supported on top by an enormous amount of data that isn’t seen from the outside. This hidden portion is known as the Deep Web. The dark web–a collection of darknet marketplaces where illegal activity such as drug trafficking or money laundering can take place with relative anonymity.

Most people imagine this area as some kind of virtual black market filled with criminals looking to lace their business deals with drugs and money, while others see it as a haven for freedom of speech, activism, whistleblowing etc., since individuals engaging in these activities have more privacy than any other online space allows them. But no matter what purpose users have for venturing here, there are risks involved that come along with using this part of the internet – primarily related to cybersecurity threats like malicious code viruses, identity theft, and hacking into systems for financial gain.

The Naked Truth About The Dark Web

How was the dark web created?

The Dark Web was created in the late 1990s by computer scientists who wanted to protect sensitive data, such as military information, from unwanted eyes. What first started as an experiment by US Navy researchers soon gained traction among other hackers and coders, who recognized its potential for anonymity. To gain access to these hidden sites, users had to install a custom browser known as Tor which scrambles online communication and masks users’ identities. This keeps them from being track or detect by law enforcement agencies and corporations.
Thanks to these measures of anonymization, criminals such as drug dealers, terrorists, and blackmailers were able to conduct their activities unnoticed on the Dark Web. Since then, numerous underground marketplaces have cropped up where people can buy drugs, weapons or hired hitmen without revealing their identities or having to worry about being caught.

Is it dangerous to try to access the dark web?

Yes, it is dangerous for regular people to try to access the dark web. The dark web is a hidden part of the internet that contains illegal activities such as drug trafficking and other criminal enterprises. Additionally, there are also viruses and ransomware on the dark web. And Unsuspecting users can unintentionally download it, putting their personal information at risk. Furthermore, because the dark web is unknown to most people, there are no consumer protections in place which means any purchases or services on the dark web could be fraudulent and pose additional risks.

What are the latest technologies used in the dark web?

Bad and dangerous AI technologies that are available in the dark web include malware that is able to analyze user behaviors, networks, and traffic patterns in order to exploit vulnerabilities. Other malicious AI technology includes programs that are designed to impersonate humans in order to make fraudulent purchases or engage in cybercrimes such as identity theft. 

Additionally, bad AI-driven bots can be used to send spam emails or spread misinformation on social media platforms. These bots can also be use to coordinate phishing campaigns by sending malicious links to unsuspecting users. 

Furthermore, deepfake videos generated using AI technology are becoming increasingly harder for users to detect and differentiate from real videos which can have implications for national security or other fraudulent activities. 

What can I do if my information is for sale on the dark web?

Take immediate steps to protect yourself and your data if you find that the dark web is selling your information.

The first thing you should do is strengthen how you protect your online accounts. This includes changing your passwords and setting up two-factor authentication (2FA) if it is an option. You should also notify any companies that may have been impacted by having your personal data leaked.

Also monitor your credit score as well for suspicious activity as well as keep an eye out for any emails or text messages from unknown numbers that try to solicit personal information from you. Additionally, you can use a dark web monitoring service which can alert you if there are any changes to the data being sold about you.

Finally, if the breach has affected sensitive documents such as bank account information or Social Security details, contact relevant financial institutions immediately so they can close or freeze the compromised accounts and assist in resolving issues related to identity theft.

Let’s summarize the 3 easy steps to protect yourself:

  1. Change your passwords
  2. Place a Freeze in your credit with each credit bureau.
  3. Check out haveibeenpwned website to see if your email is already compromise.

How to Prevent Your Information From Getting On The Dark Web

One of the ways you can prevent your information from getting on the dark web, is to never send sensitive information via email or text. I recommend using an encrypted email.

If you don’t have one and you need to send sensitive information, write it down with the least information possible in a piece of paper and take a picture. Send the picture to the recipient, without providing details about what this information is for. This is not the best solution but a practical one.

Now that you know about the three layers of the Internet and what the dark web is, what will you do to protect what matters most? Share with us in the comment box below.

You may also like: –

What is Cybercrime? Cybercrime Definition | Sandra Estok

Malware vs Ransomware Learn the Difference & Protect Yourself | Sandra Estok

What is Two-Factor Authentication? | Learn From Sandra Estok

Live Happily Ever Cyber!

Sandra Estok, CEO and Founder of Way2Protect | Happily Ever Cyber!

Sandra Estok

Subscribe for more ways to protect what matters most to you against hackers, scammers, and Cybermonsters™

1 thought on “The Naked Truth About the Dark Web”

  1. Pingback: What Is Cybersecurity and Why Should It Matter to You?

Leave a Comment

Your email address will not be published. Required fields are marked *