Learning Library

← Back to Library

Exploring the Surface, Deep, and Dark Web

Key Points

  • The “surface web,” which is indexed by search engines, represents only about 5% of the entire web, while roughly 95% remains unindexed.
  • The vast unindexed portion is split into the **Deep Web** (mostly private, password‑protected content like medical, legal, and forum data) and the **Dark Web** (intentionally hidden networks inaccessible via standard browsers).
  • The Dark Web provides anonymity for whistleblowers, journalists, and political activists who need to share information safely in repressive regimes.
  • It also hosts illicit marketplaces where illegal goods—such as drugs, weapons, and stolen data—are bought and sold.
  • Hacker communities use the Dark Web to trade exploits, malware, and hacking tools, making it a hub for both legitimate privacy‑seeking activity and criminal enterprises.

Full Transcript

# Exploring the Surface, Deep, and Dark Web **Source:** [https://www.youtube.com/watch?v=N3-zrhoBx6w](https://www.youtube.com/watch?v=N3-zrhoBx6w) **Duration:** 00:09:46 ## Summary - The “surface web,” which is indexed by search engines, represents only about 5% of the entire web, while roughly 95% remains unindexed. - The vast unindexed portion is split into the **Deep Web** (mostly private, password‑protected content like medical, legal, and forum data) and the **Dark Web** (intentionally hidden networks inaccessible via standard browsers). - The Dark Web provides anonymity for whistleblowers, journalists, and political activists who need to share information safely in repressive regimes. - It also hosts illicit marketplaces where illegal goods—such as drugs, weapons, and stolen data—are bought and sold. - Hacker communities use the Dark Web to trade exploits, malware, and hacking tools, making it a hub for both legitimate privacy‑seeking activity and criminal enterprises. ## Sections - [00:00:00](https://www.youtube.com/watch?v=N3-zrhoBx6w&t=0s) **Untitled Section** - - [00:03:07](https://www.youtube.com/watch?v=N3-zrhoBx6w&t=187s) **Tor and Dark Web Risks** - The speaker explains how stolen credentials circulate on the dark web, emphasizes the need for anonymity via Tor, outlines its origins and operation, and warns about the dangers of entering that environment. - [00:06:14](https://www.youtube.com/watch?v=N3-zrhoBx6w&t=374s) **Tor Usage Risks and Mitigations** - The speaker outlines disadvantages of using Tor—including encryption overhead, possible compromised nodes, and exposure to malware and phishing—and advises employing a security sandbox to protect the system. - [00:09:18](https://www.youtube.com/watch?v=N3-zrhoBx6w&t=558s) **Leveraging Dark Web Insights Safely** - IBM X‑Force monitors the Dark Web for emerging attack trends and shares actionable intelligence with users, allowing them to stay protected without accessing the Dark Web themselves. ## Full Transcript
0:00You think you know about the World Wide Web? 0:03You think you've seen what's out there? 0:05I'm going to suggest to you you've only seen the tip of the iceberg. 0:09In fact, in this video, we're going to take a look at the rest of the burg 0:12all the way down to the wild, wild West portion of all of this. 0:17This area that we call the Dark Web. 0:19What kind of mysterious things are lurking there? 0:22Let's take a look. 0:24Okay, let's take a look then at the whole iceberg. 0:28So first of all, the part that you're familiar with, that's the indexed portion. 0:33In other words, indexed, meaning you could find it in your favorite search engine. 0:37That's about 5% of the web indexed. 0:41The other 95%. 0:45Is the part that's not indexed. 0:46You won't find it in your favorite search engine. 0:49So what are these components, then? 0:50Well, this first piece is called the Surface Web. 0:55Again, this is where you go to your favorite search engine. 0:58So you can go to Google. 1:00This is where you're going to find your social media sites, 1:04Facebook, Instagram, YouTube, all those kinds of sites, the kinds of things that you're normally used to. 1:10When you think of the web. 1:11It's all of that stuff. 1:13That's the surface web. 1:15Now, the stuff below the surface, what is that? 1:18Well, there's two real components here. 1:20One is called the Deep Web. 1:22And that's what makes up the majority of this 95%. 1:27And it's basically a bunch of things that there's not necessarily a great deal. 1:32Some of it may be sensitive, but in general, it's just that you can't find it. 1:36You don't know where it is. 1:37A lot of times it's password protected content. 1:39So it may be medical documents. 1:41It may be legal documents. 1:43It may be private forums. 1:45It could be a lot of different things like that. 1:47So nothing necessarily nefarious. 1:49It's just not something that's generally meant for the overall public. 1:54And that makes up the majority of the deep web that you just don't see. 1:58But then there's this other part down here. 2:01This is what is known as the Dark Web. 2:05And the Dark Web not only is not indexed, but it has a lot of different kind of content in it. 2:11So, for instance, there are this is a place where it's not easy to discover or even easy to get to necessarily. 2:19We'll talk more about that in just a few minutes. 2:21But on the Dark Web is where you're going to find a hangout for people who are whistleblowers, 2:27people who are reporting information that maybe they need anonymity. 2:32Sometimes journalists will go to the Dark Web in order to make reports. 2:37Because some places there are political activists in parts of the world where free speech is not necessarily appreciated. 2:44So they need some level of anonymity. 2:46And the Dark Web helps preserve some of that anonymity. 2:49Some of the other things that happen, though, on the other side of this are there are marketplaces, 2:54Dark Web marketplaces where different types of contraband may be sold, could be illegal drugs or other things like that. 3:01Also, hackers like to hang out in places like this, and they will exchange hacks. 3:07They'll exchange exploits, malware, credentials, stolen credentials. 3:11In fact, we found this in the recent X-Force Cloud Threat Landscape report 3:16where we tracked the cost of those stolen credentials. 3:19Basically, user ID and password on the Dark Web. 3:23And this is another use of this area where, again, anonymity is what is prized. 3:32Okay. 3:33If you're going to want to go to this dark section of the Internet, you're going to need to be careful. 3:38You're going to want anonymity and you're going to want security. 3:43By the way, for the record, I recommend you don't go there. 3:46It's a bad neighborhood. 3:48So there's a lot of risks that are involved with it. 3:50But the people who do this is how they do it. 3:53They use something called the Tor, The Onion Router. 3:57And The Onion Router is something that was an open source project 4:01that was originally designed to be a decentralized way of preserving anonymity 4:06and getting from one point to another without all the points in the middle knowing how you got there 4:12and certainly the points at the end not knowing that. 4:15It's basically created by a volunteer army of a lot of people who offer up their nodes, their systems 4:22that are going to be part of this router and with a lot of different layers. 4:26That's why we call it Tor, because it's an onion with you. 4:29Peel back the layers. 4:30We'll take a look at an example of how this thing works. 4:33It actually started from the US Department of Defense back in 1995 4:37and then ultimately was taken over by the Electronic Frontier Foundation. 4:42And as a way of preserving privacy. 4:45Now let's see, how does this thing work? 4:47Well, if you were going to to do this, here's a user and here is a system that they want to get to. 4:54There are different nodes that are involved in a Tor system. 4:57So we have entry nodes, we have middle nodes, and we have end nodes, exit nodes. 5:02So if this guy wants to go from here to here, how does he do it anonymously? 5:07Well, he first of all, installs the Tor software. 5:10There's a browser that they use. 5:12He's going to install that and it's going to automatically contact a directory. 5:17The directory knows the address of lots of other Tor nodes. 5:21It's going to tell him if you want to go to somewhere, here's the address I want you to use 5:26and it's going to point him to this as his entry node. 5:29So there's going to be an encrypted session between his browser and this first Tor entry node. 5:36This then will route to some other Tor node and middle node, 5:40which then will route it to another node, which will be the exit node. 5:45And it's called an exit node because when it comes out of this end, well, it's not protected. 5:51In fact, it's in the clear. 5:53That's actually one of the one of the risks that goes along with this. 5:57A lot of people think they have end to end anonymity, and that's not true. 6:00Once the traffic leaves the Tor network, then it's not protected anymore. 6:05So what are the pros and cons of this? 6:08Well, the pros are you get some level of anonymity in all of this, and that's important if that's what you're trying to get. 6:14What are the cons? 6:15Well, look at all I have to do. 6:17I have to encrypt and decrypt, encrypt and decrypt, encrypt and decrypt and so forth. 6:22That slows things down. 6:23So that's going to be a disadvantage. 6:26There's also no guarantee that when you get from here to here, that there won't have been a compromised node, 6:32or again, that this gap might not have exposed you. 6:36Also, there are other things to consider that that where you're going is a dangerous place. 6:42And because it's a dangerous place, you may run into malware 6:45that you get downloaded to your system without your knowledge. 6:49There may be phishing attacks. 6:50There may be network based attacks. 6:52There's a lot of things that can happen. 6:54Again, you're going into a rough neighborhood. 6:56So be really careful and maybe you don't go there at all. 7:00You just want to learn what this is about. 7:02That's a good idea, too. 7:03But if you're going certainly you're going to start with some technologies like I talked about. 7:08You're going to want Tor because that's how you're going to be able to get to these non indexed places in the first place. 7:15You're going to need some other things. 7:16Maybe a sandbox. 7:18A security sandbox. 7:19What's that? 7:20Well, it means if you were to get to one of these sites and it automatically downloaded malware onto your system, 7:26if the Tor browser was running in a sandbox, then it's running on a specially protected portion of your system. 7:33It will not then be able to the malware get out of that sandbox and infect the rest of your system. 7:38So that's another protection that you can use. 7:41You may also want to double up and use a virtual private network that carries your traffic in the end. 7:48And with that, you would get more protection. 7:51You're encrypting your information from one node to the next. 7:55But this would be more of an end to end type of connection. 7:58So where you can find uses for that, you might basically get kind of what we refer to as belt and suspenders. 8:04That way, if one fails, the other will keep your pants up. 8:08And then you want to use a firewall on your system 8:11so that you can see what traffic is leaving your system and make sure that it's only 8:15the things you want. And that traffic coming into your system is only from places that you expect it to be. 8:21There may be a lot of other things you may also want to consider to add to your security stack. 8:27Because, again, if you're going into a dangerous place, you want to be very well-protected. 8:33Hopefully this video is demystified. 8:35This thing we call the Dark Web may have shining some light on this subject 8:40that otherwise you don't see because you're living up in this portion of the Internet. 8:45Well, the Dark Web, again, is a place where there can be good things that happen. 8:50There can be bad things that happen. 8:53It's a dual use technology. 8:54So it depends on how it's being used. 8:56As to whether it's a good thing or a bad thing. 8:59But it's definitely a thing and it's a thing that's not for the technologically faint of heart. 9:04You need a lot of understanding about where you're going because there are a lot of risks that go along with it. 9:09One of those lists, risk might even be a legal risk. 9:12In certain countries, it's illegal to access certain parts of the Dark Web. 9:16So be very careful with that. 9:18But the good news is you don't have to go to the Dark Web in order to benefit from the learnings that can come out of that. 9:25IBM's X-Force researchers regularly stay and monitor the Dark Web. 9:30And they're looking for what are the attack trends so that we can pass that information on to you. 9:35And you can stay safe. 9:37If you like this video and want to see more like it, please like and subscribe. 9:42If you have any questions or want to share your thoughts about this topic, please leave a comment below.