Dark net to lightcoin
"Dark network" refers to the hidden network. Ordinary netizens can't search and access through conventional means. They need to use some specific software, configuration or authorization to log in
main features
1. Simple access
as long as you master the basic "wall crossing" technology, you only need to set up the computer and download small software to access the "dark network" by hiding your identity. In addition, the "dark network" development organization has also released access software on the smartphone platform to facilitate "dark network" access
2, strong anonymity
"dark network" uses distributed, multi node data access method and multi-layer data encryption to design encrypted IP address for each data packet for communication. In order to obtain the online records of "dark network", we must crack the encryption system used by "dark network"
3. Hidden money flow
the main payment method of illegal transactions in "dark network" is "bitcoin", which is a kind of virtual electronic currency, and is composed of 64 bit digital network domain names with association. Bitcoin does not need the personal information of the buyer and the seller. It gives consideration to both efficiency and security at the technical level. It ensures the convenience of the transaction and the confidentiality of the identity of the two parties
4, ideological confusion
the "dark net" itself is formed by a group of liberals and anarchists, many of whom are against non liberalism or against government. In addition, the US government deliberately promotes the situation, which makes the freedom inclination of the "dark net" very obvious
extended data
dark network is a scientific research project initiated by the U.S. military and implemented in 2003, which is the famous tor project. The main purpose of its research and development is to provide services for Internet users to hide their own identity. Because of this feature,
the dark network has two sides. On the one hand, it can be used to protect the privacy of Internet users, on the other hand, it can be used by criminals to hide criminal traces or engage in other malicious acts