- What is the dark web and who uses it?
- The purpose of the Tor Browser
- Cryptography and perfect forward secrecy
- Installing the Tor Browser
- Accessing the standard internet with the Tor Browser
- Safeguarding privacy on Tor
- The role of hidden servers on the dark web
- Locating and accessing hidden websites
- Vulnerabilities in Tor
Skill Level Beginner
- [Mike Chapple] Beneath the surface of the Internet that we use everyday lies a secret world of encrypted websites. This is the Dark Web. A collection of websites that use encryption technology to hide in plain sight. Users seeking to access these sites use a specialized tool called the Tor Browser to create connections to Dark Websites using strong encryption that protects their communications from prying eyes. The main benefit of Tor connections is that they guarantee anonymity. Not only are you protected against eavesdroppers, but if you use Tor properly, even the websites you visit will not have any way of knowing your identity. Website owners don't know the true identities of their users, and users don't know the true identity of website owners. It's a completely anonymized version of the Internet, hidden in plain sight. While criminals certainly find a home on the Dark Web, so do privacy-minded citizens, journalists, political dissidents and others. Hi, I'm Mike Chapple. I'm a cyber security expert, and I've been helping organizations navigate the Dark Web for years. In this course, we'll explore the technical and social concepts behind the Dark Web, and show you the tools that you'll need to access and host websites that are hiding in plain sight.