Explainer: How does the world of the dark web work? The mention comes in the case of NEET and NET paper leak


New Delhi:

An uproar has been going on across the country for the last few days regarding the manipulation of NEET papers. The echo of this matter is being heard from the streets to the Parliament. During the investigation of the NEET and NET paper leak cases, mention of the dark web also came up. Finally, what is the dark web and how does this technology work? Why is dark web used for illegal activities and can it be tracked? To know the answer to all such questions, our correspondent Prabhakar with the help of IT expert has seen all the rules and regulations of this dark world of dark web so you also understand the dark world of dark web.

Telegram and dark web were the two words most frequently heard in the NEET paper scam. Organized gangs used both these means to perpetrate the NEET paper scam.

History is not saved in the dark web

IT professional Neeraj Srivastav said that the dark web is basically a combination of two things. One is TOR Browser and the other is Onion Network. TOR does not save browser history and the browser that comes with it is usually used for P2P communication. Onion share is a utility under which we connect on network and when we connect on network, it uses many routers and in this peer to peer means person to person if we are sharing any file then any A central server is not involved.

…that’s why the communication cannot be detected

For example, if we send WhatsApp to someone, WhatsApp has a server. When you send a Facebook message or even a GSM message, a service provider, called a central server, is involved. However, Onion Share is designed to be a very complex network that uses encryption and does not have a fixed set of routers through which it will communicate. It can be used for four things. To share files, receive files, host websites and communicate with anyone. Like talking to someone or sharing a file, there is no central server involved. So it has no communication trace. It is also not known where it was sent from. It is possible that it is routed from the server to somewhere else and reaches you.

No mechanism to track communications: Srivastava

Srivastav said that if we want to share any file, first we have to add the file and start sharing. It generates a private key and a URL. You will go to that URL. Its network is complex and this browser runs a bit slow. So you have to be a little patient. As soon as sharing starts, it will generate a URL for you and generate a key, which we can also convert to a QR code. Usually people use it on TOR browser. If a file is to be sent via Onion Share, anyone who has the URL and private key can easily access it.

He said that currently we do not have any system that can track this communication. It is also not known which server it is coming from.

Initially used by journalists and whistleblowers

The dark web was initially used more by journalists and whistleblowers. However, it is now being used for illegal activities like selling drugs and weapons online. It provides an online platform to people in which we cannot track the location and IP address of the request.

He said that if you share a file with more than one person, all those people can access that file. This has an option, chat anonymously. Suppose you give the URL to five of your friends, then all five of them can talk to each other, there is no tracking and if you close this browser, then its history is deleted by default and which router we do not. let’s do Find out who chatted on this.

This is how the truth of dark web can be known

Regarding the dark web, he said that he should go to the dark web to find out who is behind it. There are two methods for this. One is to become a member of the dark web and the other is to create your own malware. Malware is a small program that allows the person creating it to track where the request came from and where it received the response. This can happen only when the investigating agency is already present on that platform.

Also read:

* CBI steps up probe into NEET paper leak case in Bihar, conducts raids in several districts
* Ground Report: What is Latur’s connection with NEET paper leak? Important information from WhatsApp chat
Yogi government to bring ordinance on paper leak, provision of punishment from 2 years to life imprisonment


Leave a Comment