b'Webwaves Webwavesanonymised and encrypted using thegeneration of random addresses until one following workflow (Figure 1). is created with the necessary initial string. The CIA site on the dark web is one such 1. Your Tor client retrieves a list of Toraddress and can be accessed on a Tor relay nodes. These are volunteer-runbrowser here: ciadotgov4sjwlzihbbgxnq servers that are used for the Oniong3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.routing. onion/2. Your client picks a random pathAccessing the dark web is not illegal, through these relays to the destination.and the Tor browser can be used for Each connection applies a layer ofgeneric internet browsing. The Tor encryption. Anonymity and encryptionproject receives funding from the U.S. are maintained as each relay/layer onlyGovernment in addition to organisations knows information about the previousincluding Google and the University of Ian Jamesand next node. Cambridge.ASEG Webmaster3. Should you initiate another connection, webmaster@aseg.org.au a new random path is created. While the dark web is associated with illicit purposes, there are legal and Navigating the dark web on Tor involveslegitimate reasons why users may wish stepping away from the usual domainto access the dark web. In the case of the Tor and the dark web names and instead moving across to thelink above, users could report security The majority of web users interact.onion domain names. This isnt actually athreats to the CIA anonymously. More with the surface web - the networks oftop level domain name, but is an addressgenerally, a privacy focus when browsing webpages that are easily accessible andthat is accessible when using the Torshould be encouraged. Large quantities found by using common internet searchnetwork. These .onion addresses areof data are routinely collected and this engines. These have familiar domainsopaquely named, with 16 (V2) or 56 (V3)data is exploited for the benefit of the including .com and .com.au. character long alpha-numeric strings.corporations who collect it. We should It is possible to have partially humanhave the right to browse the internet Extending beyond this is the deep web,readable .onion addresses by brute forcewith privacy.which is often confused with the dark web. The deep web contains websites that are not indexed (searched) by internet search engines. This includes websites that are hidden behind security and passwords, such as online banking, and websites behind paywalls such as newspapers and video streaming.The dark web (or dark net) goes even further - not only are sites are not indexed but they are inaccessible through common browsers. They also contain additional security including encryption and routing between multiple IP addresses. An example of a dark web browser is Tor.Tor, The onion router (https://www.Torproject.org/). The name is self-descriptive, with a security methodology akin to peeling the layers of an onion. Tor was initially developed by the U.S. Naval Research Lab as a means of creating anonymous, encrypted network connections. Internet connections areFigure 1.How Tor works (from https://www.eff.org/) OCTOBER 2021 PREVIEW 44'