Unofficial Internet. Deep Web, or the Invisible Side of the Internet

Over the past few years, I have heard the concept of the Deep Web more and more often. But I never thought about how to get there. And so, after a little digging, I decided to understand this topic.

There is an opinion on the Internet that the deep Internet stores almost 100,000 TB of information, while the regular Internet does not exceed 2,000 TB. Almost all information on the dark side of the Internet is open source and free. Deep Web is not indexed by Google or Yandex search engines.

How to get there

If you want to access such a domain through a regular browser, you will see this.

Well, if through TorBrowser, then the page will naturally open. In the screenshot below, I opened the local Wikipedia (Hidden Wiki)

What can be found on the Deep Web

Since the deep internet is used by hackers, criminals and law enforcement agencies, this place is considered dangerous. The truth is not entirely clear why.

Somehow it happened that the first thing I came across was the Runion forum, which has things that amazed me.

I'm not even sure if it's worth writing about it at all, since modern laws of the Russian Federation can be punished for this. I just hope that all the people who sell weapons on the forum are police officers, thus calculating the alleged criminals.

I was surprised not so much by the fact that they sell firearms, but by the fact that for communication they use strange boxes of the type: 4d2b151932e7 and require encrypting letters.

Most sellers only accept Bitcoin for payment. A little later, I found a service that allows you to send messages to such strange addresses.

On the forum there are orders for body armor and even acetone. There are even SIM cards issued for legal entities. Many branches about politics, mercenary camps and the like.

On the portal http://doe6ypf2fcyznaq5.onion/ there is a catalog of popular resources. Of the harmless ones, there is a virtual confessional, in which you can absolutely anonymously ask priests from the local religion to forgive your sins.

The web is a bit like an iceberg. And the information available for mass use is only the tip of this iceberg. The underwater part is something containing a huge amount of forbidden information. This is the so-called hidden Deep Web. It is not a secret for Internet users how to get there.

Shadow internet

Due to the presence of a large number of information sites, blogs, social networks, as well as torrent trackers, many users do not even think that there is much more information on the network. According to some estimates, only 1/5000 of the total data is on the surface. On the Internet, it is only rare to find atypical or strange content that is usually hidden from ordinary readers. Increasingly, netizens are interested in the question of what the Deep Web is and how to get there, as well as what opportunities this side of the Internet offers. The Deep Web is an anonymous shadow internet that provides absolute freedom of action.

Deep Web: how to get there?

To get into the deep web, you first need to get a Tor browser. The capabilities of this browser are represented by means of anonymous network connections that bypass the provider's servers. The surfing speed on the shadow Internet is much lower than on the usual one, the reason is that data transmission is carried out through several network nodes. Such a system allows you to hide IP addresses, as well as other client information. But on the other hand, the data transmitted along the chain turns out to be securely encrypted at the last node, which interacts directly with the server. So it is possible to intercept them. Therefore, it is recommended to periodically change the packet sending chain. It should be understood that in terms of anonymity, the browser is the best option, but it cannot guarantee it 100%. Finding in the Tor browser in a regular search engine will not be difficult. The interface of this browser repeats the elements of the popular Mozilla Firefox browser, so users can easily get used to it.

The hidden wiki

Traveling on the hidden Internet using Deep Web Search has already acquired a certain tinge of mysticism. Users who have sunk to the bottom of the network have already managed to acquire their own name. They are called non-stalkers. It is believed that for this kind of surfing it is necessary to have certain technical knowledge and be able to highlight encrypted hidden codes and links. However, even a few resources, whose addresses are posted on the main page of The Hidden Wiki, will be quite enough to surprise and interest the user. All prohibited sites have an "onion" domain. As a rule, access to them in ordinary Internet browsers is limited.

Narcotic substances

In The Hidden Wiki, you can find a special item called Drugs. Here is a fairly extensive list of resources for the sale of drugs. Sites with onion domains are usually not very reliable. They change their Deep Web addresses quite often. How can you get to the same page next time? It is very likely that you will have to find out about this from the latest news from various Internet forums. All this can be explained by a sufficiently large number of users who do not want to put up with the proximity of prohibited content, as well as their illegality. Silk Road is one of the most popular online drug dealing sites. After the arrest of its creator, this project was closed. In its place there was a larger-scale Silk Road 2.0 in terms of turnover. The third version of Silk Road has recently arrived behind it. Due to the fact that payment is carried out in Bitcoin, users are guaranteed complete confidentiality. To use this resource, you must go through the registration procedure. After that, you will immediately be given the opportunity to start choosing the offered goods with the specified price. It all looks about the same as in ordinary online stores. The only exception in this case is the product itself.

Immoral content

A certain share of the shadow market is occupied by the sale of immoral content. On the Deep Web, it is represented by video content. The fight with such a product is not very successful for the reason that huge cash flows are associated with it. A large proportion of onion sites simply do not host such content for ethical reasons. Check out The Hidden Wiki about other controversial Deep Web Links that provide a huge variety of rather unusual products and services.

Russified content

The Shadow Internet consists almost entirely of English sites. The share of Russified sources is quite small here. However, there are several marketplaces led by Russian Road. They offer stolen electronic equipment, forged documents, and contraband products. The site also adheres to the rules of morality. It does not host child pornography and does not provide killer services. Many resources declare that the sale of weapons and drugs is not prohibited in all countries, but the danger of immoral content is quite obvious.

Weapon

Thanks to the shadow internet, anyone can purchase firearms on the Black Market website. The cost in this case will be about $ 300 cheaper than in official stores. This will also require lengthy processing and paperwork. According to the administration of the resource, they have several warehouses with narcotic drugs and substances. They can successfully disguise them and send them in parcels.

Killer services

The Hitman Network is quite interesting in terms of the services it offers. The shadow Internet has its own concepts of life values. For example, in the United States, ordering such a service would cost approximately $ 10,000. In Europe, even the service will cost 12,000 already. The service in this case will not be any different from purchasing goods in a regular online store. The organizers also have their own restrictions - the object must be more than 16 years old and it must not be included in the TOP-10 politicians. Also on the site there are discounts in the amount of 1% of the order from attracted customers.

Fake documents

There are a huge number of onion sites that sell and produce fake documents. You can find such resources using the Deep web search, represented by the search engines Duck Duck Go, deeper web, and so on. E-mail is used to contact the site owners. In most cases, sellers use hacked e-mail boxes of users who are completely not involved in such operations.

Hacker services

Such resources also quite often offer services for hacking mail and accounts on the Internet. There are specialists who can completely destroy a person's reputation, accusing him of unacceptable actions. At the same time, the price range of such operations is in the range of $ 200-300.

Stolen goods

In the vastness of the shadow Internet, you can launder Bitcoins, purchase stolen Paypal accounts and other services. The sale of stolen mobile phones is also flourishing here. In terms of cost, they will cost only 30% of the real cost. Online resources mainly try to work, covering a significant range of services and goods.

News services

If you want to read news that has been censored, then the Deep Web will also come to your rescue. Today it is no longer a secret how you can get to such sites in the deep web. There is a huge number of banned political and terrorist sites here. Wiki Leaks was the first project to be implemented using the onion technology provided in the Tor browser. Deep Wiki Leaks 2014 is represented by popular services. Here users can find interesting and working news sites. On the lower levels of the Deep Web, you can find more bizarre resources that contain information with a mystical or even paranormal connotation.

Hearing about the mythical Deep or Dark Internet, the user immediately wonders how to get there, how to enter a site that is not available to ordinary Internet users. If you are also tormented by such curiosity, then this article should help you.

What is the Dark or Deep Internet

First, you need to briefly understand what the Deep Internet is and what the Dark Internet is. There is a lot of confusion with these terms, but to speak in simple terms, these two names mean the same thing, namely the hidden part of the World Wide Web.

Different parts of this Deep Internet operate on different principles. Sometimes these are just sites that are not indexed by search engines and therefore only accessible via a direct link. Sometimes these are sites for access to which you need to know the password. And in some cases, these are sites operating in the TOR network.

In this article, we will tell you how to get into this part of the Dark Internet, which works on the basis of the TOR network. The TOR network is a computer network that runs on top of the regular Internet and uses the principle of onion routing. All information on the TOR network is encrypted and transmitted through several intermediate servers in order to make it more difficult to track the location and identity of the user.

Resources in the TOR network have their own top-level domain - ONION. Of course, this domain is not officially registered anywhere, but this does not prevent its use if the software for working with the TOR network is installed on the computer. Thanks to this domain, it is very easy to distinguish links to regular websites on the regular Internet from links to Dark Internet resources on the TOR network.

How to get to the Deep or Dark Internet

From the outside it may seem that in order to get into the Deep Internet you need to be a hacker and have some significant knowledge in the field of computer networks. In fact, everything is much simpler. All you need to enter the Dark Internet is a special browser called TOR Browser. Well, you will also need access to the regular Internet, but I think this is understandable.

So, we take the first step to enter the Deep Internet - download the TOR Browser. To do this, go to the site, click on the "Download" button and download the installation EXE file to your computer.

Next, run the downloaded EXE file and install the TOR Browser on your computer. The installation process for this browser is no different from installing other programs, so this should not cause any problems. Just select the Russian language, select the folder for installation and wait until the TOR Browser is installed on your computer.

After installation, launch the TOR Browser and click "Connect" in the window that appears. This will connect you to the TOR network with standard settings. This connection option is suitable for most cases. But, if there are problems with the usual connection, then you can click on the "Configure" button and change the standard connection settings. You can read more about this in our article "".

After connecting to the TOR network, a message "Congratulations" or "Welcome" should appear in the TOR browser. This means that everything is working and you can enter the Deep Internet.

Now, in order to get into the Dark Internet, we enter the site "thehiddenwiki.org" into the address bar of the TOP browser and go to it.

After loading thehiddenwiki.org site, you will see a list of links to popular resources on the Deep Internet. Go to any resource and you are already on the Deep Internet. As it was written at the beginning of the article, you can distinguish links to resources of the Deep Internet from regular links by the first-level domain. All site addresses on the Deep Internet end in ONION.

It should be noted that some of the links to the resources of the Dark Internet may not open. This is quite normal, don't be surprised. This is no ordinary Internet for you, not everything here works as smoothly as you are used to.

The "Deep Zone" or, as it is called in English, DeepWeb is thousands of Internet pages that are hidden from indexing by search engines, and you can get to them only from encrypted Internet connections. In this area of ​​the network, the distribution of child porn is flourishing, there you can buy any weapon or drugs, and it is in such networks that terrorist attacks and crimes are planned.
Any law-enforcing person will be extremely unpleasant to find out the information that I want to tell you further. Therefore, if you want to get a good night's sleep, it is better not to go into the continuation of the fast.

TOR client management console. The screen displays the current traffic route through the encrypted network.
All connections are anonymous, you can create a new route at any time. At the same time, TOR does not guarantee 100% protection against interception, since data can be "listened to" at the provider level at the stages of entering and exiting the network. The software client can work in the mode of an entry or exit point, so that flows of someone else's traffic will pass through it and the owner of such a computer will always be able to say “that it was someone else who downloaded / entered” and will be right. By the way, they say about TOR that 99% of it consists of trolls, hackers, lovers of child porn and FBI agents.

Since the usual search indexing on the network is not available, collections of links to various resources are popular in TOR.
The most famous of these is HiddenWiki, one of the largest. Since access to it is anonymous, it is often vandalized, for example, by deleting sections with links to child porn. It also contains the archives of all AnonOps operations, with all data and files stolen from the FBI. Even WikiLeaks would envy some information.

HackBB is one of the largest cybercrime experience boards. There is also a kind of market here,
where you can buy a pack of credit cards, spambots, order DDoS (for example, on LJ) or hack mail or a specific site.
Most transactions go through an intermediary - a person with an established reputation who will not lose it for the sake of immediate profit.
Of course, the middleman takes a percentage for his services. Basically, they trade in credit card data, but once they even sold an administrator account in World of Warcraft.

The prices are not very high. Card data is obtained from skimmers at ATMs. With such cards, you can easily make purchases on the Internet.
Data with a pin and full scans of cards are a little more expensive - with such information you can make a real card and make purchases in stores.

Due to encryption and a large chain of nodes, the connection speed in TOR is very, very low, so most sites are designed extremely ascetic. Often this is ordinary HTML, just like 15 years ago, when the Internet was just appearing in Russia, and even that was carried out via dial-up access.

Search for the services of a computer cracker. Pay attention - 6 (six!) Minutes from posting the assignment to finding the vulnerability and showing willingness to help in this delicate matter. This is where Department K needs to look for its talent.

And here is an incipient scam using the operator Verizon.

In addition to online services, there are also clothing stores on the deep Internet that sell stolen equipment and appliances.
These are very affordable prices for Apple products. Surely my brand new MacBook, which was stolen from me in Madagascar, is also somewhere here.

But the guys from Russia are playing with skimmers. Put it in an ATM and take off the data of other people's cards until you get bored.
Below are a few more photos of their products.

Reader for cards, installed as a cover on an ATM.

A camera box that simulates an ATM part.

Her insides. Miniature camera and Flash memory.

Installation examples. Complete with a skimmer, as expected, an instruction manual, a warranty card and drivers are sent.

Here we understand that the guys are from Russia. Here the soul will not be overjoyed for the craftsmen-compatriots ...

Nationalist-revolutionaries from various countries find themselves in the vastness of the encrypted network.
They create forums, and only trusted members who have proven their loyalty in some brave act, such as beating an immigrant or drawing swastikas on fences, can access restricted areas.

Revolutionaries in Denmark are actively sharing personal information of statesmen they dislike. Their phone numbers, addresses, names of their relatives. This is the chief of all prisons in Denmark.

And here is the chief of police. The radicals are also unhappy with her. These guys, in particular, had a lot of information about Denmark, Sweden and Germany. It turns out that everything is not as calm there as it seems to us from here, from Russia.

For lovers of all sorts of dark deeds, there is always a wide range of fake documents and identity cards. Too lazy to do Schengen and visa? Buy yourself a Czech passport, for example, and that's it.

Product samples: driver's license. States of Hawaii and Maine.
You can open all the categories and travel with them in Russia without any problems.

And here is the fake passport. The seller prudently works with gloves so as not to leave unnecessary marks.

As a result, it is also easy to buy all the necessary documents in Europe. True, unlike in Russia, they can do all this via the Internet - that's what service means.

Another passport. By the way, all goods are sent by regular mail. Contrary to the statements of the postal services, no organization is simply not able to inspect all goods and parcels for the presence of substances and items prohibited for transportation. The drugs are hidden, and the weapons are disassembled into their component parts and sent through several parcels. How difficult do you think it is to hide and forward a passport or a plastic card?

The title page of a section with links to child pornography in HiddenWiki. 5 seconds before the screenshot was taken, it was "covered up" - but after a moment - it was restored again. Inveterate pedophiles, as a rule: self-organize into sites of interest, where they exchange photos and experiences. Some of these resources are open to everyone, and some require a "contribution" to the common collection of porn materials.

List of major porn forums with DP. Nobody knows the exact amount of disgusting resources, but there are a lot of them.

Home page of one of the popular English-language forums on this topic.
It is unlikely that such a site would have lasted more than 10 minutes on the regular Internet.

And here is the dating section on one of the resources. A married couple is looking for a young boy to sleep with his young wife.

One of the biggest child porn sites. The creators claim hundreds of gigabytes. To the services of perverts
its visitors have a search, tags, catalogs and commenting on the materials they like. If you transplant all pedophiles from this site, the number of this scum at large will be reduced at least several times.

These freaks live among us, go to work with us, ride in transport, etc. Having gained access to such resources, they only aggravate their decay, which can ultimately lead to their active actions. Access to such resources must be unambiguously blocked and denied. Unfortunately, our law enforcement agencies do not seem to be aware of the existence of TOR at all.

And of course, there is a place for the traditional perverts. The ulybaka dog happily greets everyone who has come to the site.

Oddly enough, there are also fighters against pedophilia in the deep web. Here is a screenshot from one of the resources, where pedophilia is discussed as a disease, and the administrator is trying to instruct the perverts who come to him on the right path.

Silk Road is the largest drug dealing resource on the web. On the site and its forums, you can buy any kind of all kinds of substances.
In addition, weapons and equipment for drug laboratories are actively traded there. SilkRoad uses an internal currency - bitcoins. For the normal functioning of the market, there are exchange offices where bitcoins can be exchanged for ordinary money.

Heroin delivery. Sealed packages, Russian Post.

The legendary "Desert Eagle" - delivered in parts worldwide.

Nice and convenient Glock for solving life problems.

A lot placed to resolve some private transactions. "For Dmitry" - the Russian trace is immediately visible.

Two Glocks with silencers. Worldwide delivery, by mail, in parts.

We are approaching the Russian segment of the TOR network. Directory of links.
Child porn is neatly called "highly specialized subject matter" here.

There are also their own, Russian, drug stores.

Another example of such a store.

Large selection of items and several delivery options.

Not only drugs are available. Left Sims:

Few weapons:

And discussion of current political topics.

In the Russian Federation, there are no problems with documents either. In the discussion, the seller says that there are also Russian passports, but more complicated and more expensive.

And here are the Russian pedophiles. One of their many forums. To get access there, you need to put your story of the abuse of a child in one of the available sections so that everyone else can make sure that he is a pedophile and embrace him.

In fact, TOR was not meant to be a pedophile network. It was created for some kind of military needs, but in the end it was declassified and made public, after which its active development began. It began to be used by a wide variety of people, ranging from journalists seeking to remain incognito during investigations and safe communication with the organizers to law enforcement agencies who do not want to "shine" their official IP addresses when visiting various sites. Thus, there is nothing wrong with the TOR network directly, it is a very convenient and good tool for protecting a person's privacy and bypassing Internet censorship.

And nevertheless, now it is simultaneously a breeding ground for pedophiles, cybercriminals and perverts, which is just a couple of clicks from the regular Internet, and the essence of this problem in relation to our country lies not at all in the availability of TOR, but in the complete prostration of our law enforcement agencies regarding capabilities of this network.

The governments of different countries are trying to fight the deep internet. In 2006, German intelligence agencies seized six computers running as nodes on the Tor network on the grounds that they had been illegally used to access child pornography.

In 2007, the German police arrested Alexander Janssen in Dusseldorf, who organized a Tor server on his computer, through which an unknown person sent a false report about the terrorist attack. Even though Mr. Janssen was soon released, he decided to abandon his continued use of his computer as a Tor exit point.

On September 25, 2009, 80% of the IP addresses of public Tor servers were blacklisted on the Great China Firewall.

Unfortunately, I have not found the facts of the fight against TOR of domestic law enforcement agencies. They may be doing it anonymously.

Why am I telling all this? The next time you see a message that you have closed another torrent tracker or pirate, do not rush to be indignant. The image of internet pirates has been overly idealized lately. And the problem is much deeper. That is why more attention needs to be drawn to them and it is necessary to fight them. Until a broad resonance arises in society on this issue, pedophiles and cybercriminals will continue to fearlessly continue their dirty work.

Due to the infinity of social media feeds, not everyone thinks that they are "floating" on the surface. They "float" in the media, blogs and public sites, which include chat rooms, forums and hardcore porn. But sometimes strange photos and videos burst out from the depths of the invisible web. Deep web (English - deep network) - a part of the Internet that is not indexed by conventional search engines, so its users are not identified in the systems. It is believed to be 5,000 times larger than the tip of the iceberg.

There are several ways to become "faceless" and plunge into the depths. The easiest one is using the Tor browser, which establishes an anonymous network connection by bypassing the ISP's servers. Data is transmitted in encrypted form through the same network participants - hence the slow data transfer. Also, many sites on the invisible web require registration or fees, which makes them even more difficult to use. But here it is almost impossible to determine who, where and what is sending.

Downloading Tor on the regular Internet is not a problem. Outwardly, it resembles the Mozilla Firefox browser. It was developed by the US Navy, and they use it so as not to become an unnecessary object of surveillance by the special services. Those who (surveillance) avoid it for good reason “make” the deep web - because of anonymity, it becomes a quiet corner where a huge amount of prohibited content is located, turning into a kind of bottom of the Internet.

Invisible Wikipedia

Web surfing on the lower layers of the Internet is done by people who call themselves net stalkers. Conventionally, they divide the Internet into several levels. In order to get deep into the network, you need to have not only technical knowledge, but also the ability to find codes encrypted in pictures, audio files and even in dreams, and use them as a key for a gradual immersion.

Netstalkers call the visible network layer D. Layer C opens the deep web. The Hidden Wiki is a kind of guide to this layer. It is a directory of links to resources that cannot be opened at the D level. All of them are located not on the usual.com or.ru domains, but on the .onion pseudo-domain. Links also do not fit into the usual framework. There are no beautiful names, the address often consists of a chaotic set of numbers and letters, and the entrance to the site is carried out either after registration, or after entering the password found on special forums.

In this version, Wikipedia will tell you where drugs, weapons, stolen electronics, child and adult pornography are sold. Due to the fact that the owners and clients of such resources are constantly hunted by the cyberpolice of all countries, the sites often change addresses. You will definitely not be able to follow the same link in a year. They also periodically "lie" - there are many people on the Internet who do not want to put up with the neighborhood of immoral content. Child pornography sites are the most resistant to such attacks - too much money has been invested in this business to allow moralizers to set their own terms of the game.

Drugs are the most popular commodity in the light deep web. The most famous site for the sale of drugs is the Silk Road store. After the alleged founder of the site, Ross William Ulbrtricht, was arrested in 2013, Silk Road 2.0 was opened, presumably unrelated to the original. The store became the record holder for money turnover and aroused the envy of its competitors, who periodically destroyed it with DDos attacks. He also contributed to the growth of the attractiveness of the electronic currency Bitkoin. Bitcoin, which has become a popular and fashionable electronic currency, came out precisely from the deep web. They pay with them even now - only they guarantee the anonymity of the buyer.

The Deep web is mostly English, but it also has local sites. The Russian web is home to many markets selling stolen electronics, smuggled caviar, fake dollars, passports and license plates. One of these sites is consonant with the popular Silk Road site and is called Russian Road. Another similarity is that the sale of child pornography and the services of killers are prohibited here. Many sites selling illegal goods do not post immoral content on their site for ethical reasons.

They say that it is possible to sell drugs or weapons, because their sale is not prohibited in all countries, therefore, their danger is relative. The danger of immoral content is clear.

The majority have a lighter attitude towards life at the “depth”. The founders of Hitman Network are three contract killers, for about $ 10,000 they will do their job in the United States and Canada. Slightly more expensive, they estimate their work in Europe at 12 thousand dollars. Everything happens as in a regular online store. You choose the quantity of "goods" and press "buy now". The killers promise to contact the customer within two days and complete the case within three. Although these guys have their own limitations - they warn that they do not kill children under sixteen and the top 10 politicians. To order a murder, you need to have a sufficient amount of bitcoins on your account, so it won't be possible to joke. Everything is serious here, even discounts work - 1% from orders of attracted customers.

Weapons are another popular commodity. On the Black Market website, you can order weapons anywhere in the world. Today, the bitcoin rate is so high that for two or three bitcoins you can buy a Desert Eagle pistol (one bitcoin equals about $ 592), which is $ 300 cheaper than in stores. The owners say they have several warehouses with drugs and weapons. “We know many ways to hide them in packages,” they assure.

The hidden wiki directory contains many sites offering fake documents. In such stores, feedback is possible only by e-mail, while e-mails do not belong to the real owners of the sites. Usually these are cracked boxes of people who have nothing to do with dark affairs.

Hackers can help get into someone else's mail. The deep web contains a huge number of their forums and sites with hacking and espionage services. In the world of information technology, they can almost anything, even destroy a person's reputation, accusing him of pedophilia. At the same time, prices for hacker services are relatively low - ranging from $ 200 to $ 500.

The huge scope of the deep web provides financial services with which you can quickly get rich. Here you can buy machines for copying plastic cards, stolen PayPal accounts, "launder" bitcoins. A separate column is occupied by commercial services offering to purchase stolen equipment, for example, unlocked iPhones for a third of the actual price. Many sites try to make a little bit of everything. These hodgepodge markets offer drug making equipment, fake doctoral degrees, and emigration clearance.

The hidden Internet is a comfortable platform for political and terrorist websites that are prohibited at the top. For example, it is here that the Kavkaz-Center blog of Chechen separatists, which is recognized as extremist in Russia, operates. WikiLeaks also appeared on the deep web.

On the brink

In addition to prohibited content, the top layer of the deep web contains sites that are not only illegal, but also immoral. In brutality, they are on the verge of a deeper terrifying level. The owners of such sites are engaged in the supply of slaves, they shoot a snuff video - a short video of the murder of people, with preliminary torture or perversion. Most often it is sexual abuse of women and children. Here you can also find sites for lovers of sex with the dead, communities of zoophiles, suicides and cannibals. A huge business is made of all this. Of course, you can get arrested for storing such content on disks.

The lower strata are not as immoral as they are strange and paranormal. No stalkers, people who search the Internet for something that is not reflected in the search engines, say that there is no mysticism here. Only the impact on the psyche. From time to time, strange photos and videos come to the surface. Most often these are surreal, at first glance, chaotic and meaningless shots, made in the best traditions of Japanese horror. It is believed that the lower strata are the abode of both madmen and scientists.

Netstalkers say level B contains secret government sites, numbered radio stations, and their own YouTube uncensored. According to their version, the upper, public level D is controlled from this depth.

Here are examples of what netstalkers find:

A translation was found from the cells in which the children were sitting. Apparently they were being sold. A certain clown was also found, already in another broadcast. It was a recording, since external movement was noticeable, the clown himself did not move for a week, although it was clear that it was a living person. Then the camera turned off. A room was also found in which there was daylight all the time, around the clock, seven days a week. The broadcast was not interrupted. There are no screenshots, because in those moments there was no time for them.

It is believed that getting to the lower levels is difficult not technically, but psychologically. If you stick with the content, you move on. If not, you remain in the middle, and the obstacle is only in the head. The nature of content can affect the psyche. According to legend, this is because at the lower levels are secret government developments in the field of psychotronic and cyber weapons. Or they are "made" by brilliant and crazy loners.

We suspect that some of these phenomena have found an independent life, almost a mind, and somehow they managed to punch a hole in the information reality, say netstalkers.

At level A, the top layer of the deep web is managed, and the most mysterious level is called the Quiet House. It is believed that once they get here, they never return to the real world. They say that here you can find answers to all questions and go crazy. Here, as in the forum, there is nothing but a white background and answers, where everything that happens to the world is explained.

What happens at the bottom is actually unknown. There is a lot of skepticism about such legends. But the danger of the deep web is not in its structure, but in the fact that when access to it is open and all the restrictions of society are removed, we are left alone with our conscience. At this point, we must decide what we allow ourselves to see and what will not harm our psyche. How can we use the acquired knowledge. Meanwhile, despite the fact that the creators of sites in the deep web do everything to prevent a random user from getting to them, their content seeps out and affects the surface. And this is not only the popularization of the Bitkoin cryptocurrency and the Tor browser.