
Tor is compatible with most versions of Windows, Mac OS X, and GNU/Linux.

It is also possible to run a portable version of the program from a USB flash drive or other external device. To connect to the Internet through the Tor network and use it for anonymity, privacy, and circumvention, you need to install the Tor client software on your computer. any of the independent relays to know who you are and where you go either by directly having your IP address or by being able to correlate browsing habits by consistently observing your traffic.the target Web site to know who you are (at least, to know your IP address).your ISP or any other local observer to know what your target Web site is or what information you are sending.All the traffic between Tor servers (or relays) is encrypted, and each of the relays knows only the IP address of two other machines – the one immediately previous to it and the one immediately after it in the chain. When you use Tor to access a Web site, your communications are randomly routed through a network of independent, volunteer proxies. General Information Supported operating system Finally, the outcomes are compared against a similar study for the I2P darknet, showing special features and differences between both darknets.Tor (The Onion Router) is a very sophisticated network of proxy servers. Our results can be summarized as follows: there is great general availability of websites on Freenet there are significant nodes within the network connectivity structure and underage porn or child pornography is predominant among illegal content.

This tool is, in turn, used in the experimentation that was carried out in a real distributed environment. Given the special features of this study, a new crawling tool, called c4darknet, was developed for the purpose of this work.

Hence, the current work presents an analysis of web site connectivity, relationships and content of one of the less known and explored darknets: Freenet. Although there are several darknets, Tor is the most well-known and widely analyzed. The latter is deployed in the so-called darknets, which have been the subject of much less study, where anonymity and privacy security services are preserved. The rest of the content, the Deep Web, is split between that unable to be indexed by usual search engines and content that needs to be accessed through specific methods and techniques. The World Wide Web is the most widely used service on the Internet, although only a small part of it, the Surface Web, is indexed and accessible.
