Contents:

Cybersecurity: How to become a specialist in 6 steps
Find out moreReasons for the emergence of the alternative Internet
The Internet that we know today has gone through significant stages of its development. Its history begins in 1969, when DARPA (the Defense Advanced Research Projects Agency) developed ARPANET for military purposes. This project laid the foundation for the first network protocols and concepts that formed the basis of the modern Internet. Over time, ARPANET expanded and became available to academic and research institutions, facilitating the exchange of information and the development of new technologies. In the 1980s, the Internet began to actively develop and attract commercial organizations, which contributed to its widespread adoption. Today, the Internet is an integral part of our lives, connecting billions of users worldwide. ARPANET was initially a limited network created for the exchange of data between scientists and engineers. However, over time, it expanded significantly, reaching users not only in the United States but also abroad. Connections to ARPANET were provided via telephone lines and satellite channels, which contributed to the growth of the number of users and the development of Internet technologies. This network became the foundation for the modern internet, ushering in a new era of communication and information exchange.
With the advent of the modern internet, developed by Tim Berners-Lee and Robert Cailliau at CERN, key technologies such as HTML, HTTP, and the Uniform Resource Identifier (URI) specification emerged. These technologies became the foundation for the World Wide Web. In 1993, CERN opened up the software that supported this network, which contributed to its spread and development. HTML (Hypertext Markup Language) made it possible to create web pages, and HTTP (Hypertext Transfer Protocol) ensured the exchange of data between servers and clients. The URI (Uniform Resource Identifier) specification became an important tool for identifying resources on the network. These advances were fundamental in shaping the structure of the internet as we know it today.
The modern internet is a vast global network connecting numerous computers, servers, and routers that are interconnected using various physical and wireless technologies. This complex infrastructure enables the instant exchange of data between users, allowing the transfer of information in unlimited volumes. The Internet has become an integral part of everyday life, providing access to information, communications, and services, making it an essential tool for business and personal needs.

Even though the internet isn't controlled by a single country or corporation, complete user anonymity isn't guaranteed. All user requests are processed through servers owned by various organizations, including major companies like Google, Amazon, and Microsoft. These companies can collect, store, and analyze user activity data, which raises concerns about online privacy. Therefore, it's important to understand that even on a decentralized internet, your activity can be tracked and analyzed.
Companies have access to a significant amount of information about their users, including interests, contact information, and financial information. This data is actively used to create personalized offers, improving the user experience. In some cases, information may be shared with third parties, raising questions about privacy and data protection. Responsible use of such data requires companies to adhere to principles of transparency and responsibility.
Data breaches are becoming increasingly common, and 2022 saw a record number of hacker attacks. As a result of these attacks, the data of billions of users became publicly available. Protecting personal information and user data is becoming a critical concern for organizations and individuals. The need to implement effective security measures and raise awareness of cyberthreats is more pressing than ever.
In the face of current challenges, the concept of an alternative internet has emerged, based on the principles of decentralization and independence from large corporations and government agencies. This idea aims to create a freer and more secure network where users have control over their data and interactions. The alternative internet offers solutions for protecting privacy and ensuring open access to information, which is becoming especially relevant in light of the growing threats from centralized platforms and government interventions.

Internet founder Tim Berners-Lee emphasized the importance of the openness and accessibility of the network in an interview with Wired. He noted that his goal is to create an internet that is accessible to all countries and not tied to a specific territory. This position reflects his desire to ensure global equality in access to information and technology, which is fundamental to the further development of the internet as a tool for communication and knowledge sharing.
Dependence on large corporations and centralized servers hinders innovation and technological development. In this regard, the need for an alternative internet is becoming increasingly important. Alternative solutions can facilitate the faster adoption of new ideas and technologies, as well as provide greater freedom and security for users. The development of decentralized platforms and services will reduce the influence of large players on the internet space and stimulate its further growth and evolution.
Read also:
The Great Firewall of China: China's Control over the Domestic Internet
The Great Firewall of China, also known as the Golden Shield, is a set of measures and technologies used by the Chinese government to control and filter internet content. This project was launched in the late 1990s and continues to evolve, ensuring strict control over access to information in the country.
The main goal of this mechanism is to restrict access to foreign web resources and platforms that may contain information undesirable to the government. This includes blocking social media, news sites, and other online resources that may threaten political stability and the ideology of the Chinese Communist Party.
In addition to blocking content, the Great Firewall of China also monitors users' internet activity. This allows authorities to track and suppress any forms of discontent or opposition. Users who attempt to bypass blocks using VPNs or other technologies may also face serious consequences.
Thus, the Great Firewall of China is an important tool with which China controls information and maintains political stability in the country. This mechanism not only restricts access to information but also creates a unique digital environment that differs from the rest of the world.
Alternative Networks for Anonymity: Which One to Choose in 2023?
In today's digital world, there are many alternative networks that provide bypass restrictions and encryption of transmitted data. The most well-known of these are Tor, I2P, Freenet, and Solid. These networks offer users anonymity and protection of personal information online, making them popular among those who value their privacy and security online. Tor allows users to surf the web anonymously, I2P provides secure access to internal resources, Freenet offers decentralized information storage, and Solid emphasizes user control over their data. Using these alternative networks opens up new opportunities for secure and free access to information in today's digital reality.
Tor is one of the most well-known projects aimed at creating a decentralized internet, familiar to many users. This network provides a high level of anonymity, using unique routing technology to conceal users' personal data and online activity. Tor allows users to securely bypass censorship and access blocked resources, making it an important tool for protecting online privacy. Connecting to the Tor network does not occur through centralized servers, but through a chain of random nodes, which are other users' computers. This provides a high level of anonymity, as the server receives a virtually impersonal request, making it significantly more difficult to determine its source. The Tor network allows users to bypass censorship and protect their personal information. Using Tor is an effective way to improve online privacy. Data transmission within the Tor network is carried out using a technology known as onion routing. This process involves multi-layered encryption, which ensures user anonymity. When data is transmitted through the Tor network, it is wrapped in several layers of encryption, like the layers of an onion. Each node in the Tor network removes one layer of encryption before passing the data on, making it difficult to trace the source and destination of the information. Thus, onion routing not only protects user privacy but also provides a high level of security when exchanging data on the Internet.
- The message content is encrypted, forming the first layer of the "peel", which only the recipient can remove.
- Additional layers of encryption are applied to this first layer, like an onion. This is done on the sender's computer and/or at intermediate nodes.
- Intermediate nodes have no information about the sender, recipient, or message contents.
- Decryption occurs in reverse order, with each node removing only one layer of the "peel", which preserves the sender's anonymity.
- Ultimately, the recipient receives the decrypted message and can read it.

Accessing Tor network resources requires special clients, and the most popular of them is Tor Browser. It is important to note that Tor uses the same protocols as the traditional Internet, which can lead to blocking of access by governments. This happened in Russia in 2021, when access to the Tor network was restricted. Users should be aware of these aspects when using Tor and take measures to ensure their anonymity and security online.
Tor provides a high level of anonymity for users, but complete security cannot be guaranteed. Government agencies in different countries may monitor network nodes, which can lead to information leaks. Therefore, despite the benefits, it is important to be aware of the potential risks and use additional security measures to enhance online security.
I2P, or the Invisible Internet Project, is a decentralized peer-to-peer network that operates on top of the traditional internet. This network ensures anonymity and security for users, allowing them to exchange data without the risk of surveillance and censorship. Key features of I2P include personal information protection, traffic encryption, and connection anonymization. I2P uses a unique routing architecture, making it resistant to external attacks and tracking attempts. Users can anonymously browse websites, send messages, and share files, remaining out of sight of third parties. Thus, I2P is an attractive solution for those who value their privacy and freedom online.
- An overlay network that operates on top of other networks, such as the regular Internet.
- Decentralized, without a master node, which ensures resilience to failures.
- Peer-to-peer, where all participants have equal rights and opportunities.
I2P provides an anonymous connection by using a chain of nodes to transmit information. Data is encrypted in such a way that intermediate nodes have no way to decode it. As a result, they cannot determine either the sender or the recipient of the information. This makes I2P an effective tool for ensuring privacy and security on the network.
The technology used in I2P is based on garlic routing. This method ensures anonymity and security of data transmission on the network. Garlic routing works by packing data in several layers of encryption, which resembles an onion structure. Each message passes through a chain of routers, each of which removes one layer of encryption before passing the data on. This makes it difficult to trace the source and destination of data, making I2P an effective tool for anonymous communication and information exchange on the Internet. This technology is widely used to protect user privacy and ensure the security of network connections.
- The message is divided into small fragments called "teeth".
- These "teeth" are collected into "onions", each containing several fragments.
- The traffic is split, making it difficult to trace the sender.
- On the recipient's device, the "onions" are combined and decrypted.
I2P supports standard Internet protocols, which provides access to regular websites. However, maximum anonymity is achieved within the network itself, where there are no DNS servers. This makes I2P the ideal solution for users seeking to maintain their online privacy. The I2P network's internal structure allows users to securely exchange data and hide their activity from prying eyes. Freenet is an innovative network where users don't host websites, but instead store data accessible through special keys. This system resembles a vast distributed hash table, providing secure and anonymous storage of information. Freenet allows users to share files and content without worrying about censorship or privacy violations. With this technology, anyone can participate in creating a decentralized space where freedom of speech and privacy are important. When data is uploaded, it is automatically distributed across network nodes and stored in multiple copies, protecting against information loss. Users are often unaware of what information is stored on their devices, adding a layer of security and anonymity. This approach to data storage minimizes risks and ensures the reliability of information storage in distributed systems.
To access data, a key is used, which enables searching and decrypting information. This process is critical to ensuring the security and confidentiality of data. Keys can be either symmetric or asymmetric, depending on the cryptographic system used. Proper key management effectively protects data and prevents unauthorized access.
Solid (Social Linked Data) is an initiative developed by the Massachusetts Institute of Technology with the participation of Tim Berners-Lee, the creator of the World Wide Web. The main goal of Solid is to give users complete control over their data. The project offers a new approach to personal information management, allowing users to store and control their data in a secure and decentralized environment. Solid provides the ability to interact with data while maintaining privacy and security, making it an important step towards more transparent and ethical use of information in the digital world.
Users have the option to package their data into a container (pod), which allows access only to trusted applications. This ensures a high level of privacy and protection of personal information.
Kwangmyeon: North Korea's Closed Network
Kwangmyeon, which translates from Korean as "Enlightenment Network," is a unique form of internet in North Korea. This isolated network operates separately from the global web and provides users with limited access to information. Kwangmyeon is designed to monitor and filter content, ensuring access only to resources that are approved by the state. This allows the government to maintain ideological control and prevent the spread of unwanted information. Kwangmyeon users can access educational materials, news, and specialized websites, but all are subject to strict censorship. Thus, Kwangmyeon serves as a tool for managing information and shaping public opinion in the country.
Since its founding in 2000, Kwangmyeon has attracted approximately 100,000 users. Currently, approximately 5,500 websites are operating online. A significant portion of these are focused on political agitation and propaganda, as well as offering educational and cultural resources. Kwangmyeon continues to be an important platform for information exchange and active participation in various areas of public life.
In Kwangmyeon, information control and censorship are carried out by government agencies. Special requests determine the selection of materials, which are then retrieved from the global internet. The information is then translated and filtered before publication on the intranet. This approach ensures that content complies with established state standards and requirements.
Despite strict isolation, some party officials, academics, and diplomats in North Korea have limited access to the global internet. The country has only 1,024 registered IP addresses, which provide these individuals with access to the open internet. This extremely low number of IP addresses significantly limits access to information and resources available on the global internet. This situation highlights the strict controls in place in the DPRK and the need for internet access for educational and research purposes.
The issue of internet centralization is a concern not only for academics and experts, but also for governments around the world, which perceive it as a potential threat. In response, they are seeking decentralization and the development of technologies that support freedom of information. Kwangmyong serves as a clear example of how authorities can control access to information and restrict free speech, highlighting the importance of protecting an open internet and the right to free expression.
The Alternative Internet: What Does It Offer?
An alternative internet, free from traditional restrictions, is an attractive concept. Independent platforms, lack of censorship, and privacy protection are what make this segment of the internet unique. In an environment of growing censorship and control by large corporations and government agencies, the alternative internet offers users the opportunity to freely access information and express themselves. It is a space where innovation can flourish without barriers, and users have the ability to control their data and choose what information they want to share. The alternative internet is becoming an important tool for protecting individual rights and freedoms in the digital world.
The anonymity inherent in decentralized technologies has contributed to the growth of illegal activity on the internet. According to 2020 data, approximately 6.7% of all servers on the Tor network were used to traffic drugs, weapons, and other illicit goods. This highlights the complexities of anonymity: on the one hand, it provides users with protection of their personal information, but on the other, it creates conditions for illegal transactions. It is important to keep in mind that such technologies require a responsible approach and awareness of the consequences of their use.

Dmitry Galov, a cybersecurity specialist from Kaspersky Lab, notes in an interview for Forbes that the darknet is not always associated with illegal activity. The darknet also contains neutral platforms similar to social networks and forums for communication. It is important to understand the user's purpose for accessing the darknet. However, criminals and hackers do make up a significant portion of its activity. Understanding these aspects will help you better understand cybersecurity threats and use the darknet's opportunities more consciously.
The alternative internet is a vast repository of information across various categories. This segment contains extensive libraries, thematic forums, mail servers, and many other resources. For example, in May 2021, Facebook launched the third version of its social network on the Tor network, highlighting the growing interest of users in alternative platforms. The alternative internet offers anonymity and freedom, making it attractive to those seeking secure ways to communicate and exchange information.
The alternative internet is a segment of the global network that is not subject to censorship and control. In this space, users have the opportunity to anonymously exchange information, facilitating the free dissemination of ideas and opinions. The dark web serves as a platform for those seeking to escape the restrictions imposed by traditional internet resources and government agencies. This space also attracts the attention of activists, journalists, and those who value free speech.
The dark web is a segment of the internet that includes both legal and illegal resources. It can be dangerous for users, as it contains numerous risks associated with cybercrime and security threats. To safely navigate the dark web, it is necessary to take certain precautions and be aware of potential dangers.
The dark web offers unique opportunities for communication, information search, and access to resources unavailable on the traditional internet. It can be used as a platform for secure messaging and for accessing information that may be censored or unavailable on the main network. This segment of the internet also includes various communities where users can share knowledge and experiences, which helps expand the boundaries of digital communication and information.
Key Points about the Alternative Internet
In this article, we discussed the key aspects of the alternative internet, highlighting the main findings. The alternative internet is a decentralized network and platform that aims to provide users with greater freedom and security compared to traditional internet resources. Key benefits of the alternative internet include privacy protection, the ability to circumvent censorship, and independence from large corporations. In addition, the alternative internet promotes the development of open standards and technologies, allowing every user to access information without restrictions. We hope that the knowledge gained will help you better understand the meaning of the alternative internet and its impact on modern society.
- The alternative internet is a decentralized network that allows users to exchange information without the involvement of large corporate servers. The most well-known of these networks include Tor, I2P, and Freenet.
- Tor technology is based on the principle of onion routing. User messages are repeatedly encrypted and transmitted through various network nodes. Each of these intermediate nodes is unable to decrypt the data, which provides a high level of anonymity.
- The I2P network uses garlic routing, which breaks the transmitted information into small pieces called "cloves". These pieces are collected into "onions" and transmitted through different nodes, restoring the original message only on the recipient's device.
- Freenet functions as a distributed data store, unlike traditional websites. Data uploaded to the network is distributed among users' computers and assigned unique addresses that can be used to access the information.
Cybersecurity: Become an expert in 3 months!
Want to master cybersecurity? Find out how to become a sought-after specialist from scratch. Read the article!
Find out more
