Skip to main content

An Unofficial Wikipedia For The Dark Web Created By Ex-Facebook Engineer

The Internet began to arrive in a massive way to all the homes in the world, one of the main advantages of the Internet is that it is an inexhaustible source of information of all kinds. However, now recently, due to privacy issues, an Ex-Facebook engineer has created an unofficial Wikipedia for the Dark Web.

An Unofficial Wikipedia For The Dark Web Created By Ex-Facebook Engineer


Since the Internet began to arrive in a massive way to all the homes in the world, one of the main advantages that it has been offering is having become an inexhaustible source of information of all kinds, more or less truthful, of course.

At present, one of the most used ways in a good number of countries around the globe when it comes to knowing about almost any subject, in addition to a relatively reliable way, is using Wikipedia, an encyclopedia that nowadays it has become almost a source of essential information. In fact, this is one of the Internet portals that we really do not value in its proper measure until we cannot access it.

That is why, in many parts of the world, the regular use of Wikipedia is something that is taken for granted and that we access continuously, however we must bear in mind that there are also some regions where the use of this encyclopedia Free Internet access is prohibited, as is the case, for example, in countries such as Turkey or Syria, where access to Wikipedia, in addition to being difficult, can even become dangerous.

This is something that for defenders of freedom on the Internet, a hot topic these days, is totally unfeasible, so they try to take action on this, as it has happened in this case. We say this because, to make the use of Wikipedia much safer for users at risk from countries where it is not allowed, the former Facebook security engineer Alec Muffett, has begun to carry out an experimental service in the Dark Web for a Wikipedia that offers visitors various safe protections related to their privacy.

The Tor network will have its own anonymous access to Wikipedia

We must bear in mind that we are talking about a project that at the moment is not official, that is to say, that the Wikipedia that we all know is not at all involved in all this. In this way, the service is accessible through Tor Browser and offers a plus of privacy to our connections around the world to hide our location from anyone trying to track us. It is true that the normal version of Wikipedia is already accessible through Tor, but to get access to it the user has to leave the private network, so the risks of being detected increase considerably.

So Muffett has created what is known as a Tor service for Wikipedia, which means that traffic never leaves the encrypted and secure confines of the private network, keeping us hidden. At the moment this new alternative in Tor is read-only, so for the service to be more useful, it is necessary that Wikipedia itself participate in the project later.

So, what do you think about this? Simply share your views and thoughts in the comment section below.

Comments

Popular posts from this blog

What is the difference between a direct and an indirect address instruction ?

Direct addressing means the instruction refers directly to the address being accessed. That is, the instruction encoding itself contains the address of the location. Depending on the instruction set, it may also allow computing a small index relative to the address. When used that way, you can think of that as a direct-indexed mode. (Note: Some processors call ‘direct’ mode ‘absolute’, such as the 6502.)

Indirect addressing uses an address held in a register or other location to determine what memory location to read or write. The idea here is that the instruction itself isn’t directly telling you the address to access, but rather indirectly telling the CPU where to find that address. The processor may also allow you to add a small offset to the indirect address, giving an indirect-indexed addressing mode.
Also Read : 5 Best Terminal Emulators for Linux The 6502 one is a little quirky: The 6502 doesn’t have general-purpose registers large enough to store addresses, so i…

What is ASP.NET? and it's ARCHITECTURE

What is ASP.Net?ASP.Net is a web development platform provided by Microsoft. It is used for creating web-based applications. ASP.Net was first released in the year 2002.
The first version of ASP.Net deployed was 1.0. The most recent version of ASP.Net is version 4.6. ASP.Net is designed to work with the HTTP protocol. This is the standard protocol used across all web applications.

ASP.Net applications can also be written in a variety of .Net languages. These include C#, VB.Net, and J#. In this chapter, you will see some basic fundamental of the .Net framework.

The full form of ASP is Active Server Pages, and .NET is Network Enabled Technologies.
ASP.NET Architecture and its Components ASP.Net is a framework which is used to develop a Web-based application. The basic architecture of the ASP.Net framework is as shown below.
 he architecture of the.Net framework is based on the following key components

Language – A variety of languages exists for .net framework. They are VB.n…

What Is Defensive Programming ?

Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed. – WikiPedia


Introduction Defensive programming is a form of defensive design intended to ensure the continuing function of a piece of software under under unforeseen circumstances. Defensive programming practices are often used where high availability, safety or security is needed.
Advantages Defensive programming is an approach to improve software and source code, in terms of:
General qualityMaking the source code comprehensibleMaking the software behave in a predictable mannerDrawback Overly defensive programming, however, may safeguard against errors that will never be encountered, thus incurring run-time and maintenance costs. There is also the risk that the code traps or prevents too many exceptions, potentially resulting i…