

The Journey beginsĮverything starts on the boat headed to the island where once, humans and gods lived together, now nothing more than piles, ruins, and enigmatic inhabitants. The game features puzzles, an island to explore, and tactical turn-based battles. No node supposedly knows the entire path, guaranteeing the anonymity of the users: a significant advantage for cybercriminals.The Dark Egg by indie dev Transcend Pixels is a text-based RPG adventure where players take on the role of an explorer looking for a Dark Egg on a remote and mysterious island. In that case, the traffic first passes through London (first node, or guard node), then through Buenos Aires (second node, or middle node), then through Tokyo (third node, or exit node), and then reaches New York. Suppose you are connecting from your house in Rome to a website in New York. By contrast, when using TOR, the traffic passes through multiple nodes (computers) before arriving at the destination website, hiding the origin data with misdirection. For example, whether you connect from a specific city in Europe or the US (through the IP address).

Usually, a destination website knows some information about your connection. Most illicit activities are publicised on the dark web due to navigating without divulging identifying information. You can access these websites otherwise locked using the software TOR (free download). Some others are accessible only using specific software: the dark web (sometimes comprehended into the deep web, but technically different). Some web pages are accessible only with a password or encryption (the deep web): the content of an email account or an online banking account. Indeed, through standard search engines (GOOGLE, BING), we can see only a tiny part of the internet pages: the surface web (roughly 10 % of the total web pages).
