TikTok – Indian Government Plans to Close Down the Application [UPDATED]

Looks like the golden days of the most popular TikTok app is now over. The mega-popular Chinese app future is uncertain especially after the Indian government decided to put a ban on its usage in one of its key markets around the globe.

As per reports, the Indian government has asked the world’s top IT conglomerates Apple Inc. and Google to bring down the TikTok app from its official play store. The application operates on both the Android and the iOS platforms and allows users to create and share short video clips with their loved ones. The app in question drew immense criticism from Indian politicians for its offensive content yet, on the contrary, grew popular amongst the youth of the country.

Read More


Technology Fascinates You? Check out These 5 Emerging Trends for 2019

No one can really understand the exponential rate of change when it comes to technology. Tech experts around the globe create something unusual every second and IT firms know it well. The uprise in technology paves the way to faster processing even though tech careers do not change at that speed. This upheaval forces the IT professional to realize the importance of learning, even if done out of necessity.

Keep your eyes on the future and be aware w.r.t the skills you need to inculcate within yourself. Having knowledge of required skills will help you understand about the jobs you are qualified to do and grab the right opportunity.

2019 has just begun and it is time to know five technology trends you should watch out this year. Get yourself acquainted with these trends, begin your training sessions right away and pave a way to your successful career in the tech domain.

Read More


Google Pixel 3 Event: A Quick Recap

Earlier today Google decided to shut down Google+ platform after a bug exposed 5,00,000 user’s data, while on the flip side, the search engine giant also organized its annual hardware event – the #MadebyGoogle event. The event saw the unveiling of three new products: A smart display and Home Assistant – Google Home Hub; Pixel 3 Smartphone; and a Pixel Slate which is a combination of both a laptop and a tablet.

Read More


Android 9 Pie: A New Yum In Digitalization

Google’s latest Android OS with most recent features is rolling out in the market to a selective list of smartphones. Smartphone users are always on the lookout for an Operating System that possesses the latest features and is low on RAM usage. Android 9 Pie is in huge demand already among mobile users, and they have high expectations with the same. Google’s next edition of Android dubbed as Pie comes forth with latest features, from new action navigation to unlimited battery life and much more.

Read More


Honor 9N Review: A Thing of Beauty but Not a Joy Forever

Honor is quite well known for making stellar budget smartphones. The company has now again launched a new phone that’s not a pinch in your pocket. The Honor 9N is a gorgeous looking heavy duty smartphone with its prices starting at INR 11,999. However, a state of the art design is not the only thing that motivates you to buy a phone as a smart user. So, we decided to review the Honor 9N thoroughly to figure out whether it delivers what it promises.

Read More


A Comprehensive Guide to Root an Android Smartphone

Are you a proud owner of an Android smartphone? If yes, this guide is just for you. Kids like us born in the 90s era saw technology advancing from smartphones to tablets to iPads and to what not. One thing that never changed was  – how people perceive technology especially using smartphones.

The technology is definitely advancing, but smartphones have their own space and none can deny it. There are a multitude of OS options you can find on smartphones, but two most popular OS are definitely Android and iOS. Recent statistics too support the same and clearly show how the percentage of Android OS users is on a constant rise surpassing the count of iOS users with a good margin.



Every Android user faces two major issues i.e., battery issues and storage issues. Though one can easily combat these recurring issues by installing a CUSTOM ROM but is everyone that tech-geek to go through all that hassle of Rooting the Android smartphone and installing a Custom ROM on it? Definitely NOT.  Rooting Android device requires an extensive reading combined with a handful of practical knowledge on the subject.

Still, if you wish to know How to Root an Android smartphone, keep reading this one-stop guide till the end and make yourself acquainted with the basics. However, before we begin, let me clear one important point:

ROOTING is risky if done wrong. I won’t be held responsible for any damage done to your smartphone.  Read and re-read the guide properly before you proceed.

Basic Terms You Must Know

The process of Rooting the smartphone comes with a lot of technical jargon and not all of you can understand it at one go. So, let me give you all an overview of the basic terminologies to understand this guide in a better way:

  1. ROOT: Let me explain this term using WhatsApp as an example. Every WhatsApp group has at-least one Admin who has the rights to Add/Delete any user. Similarly, ‘ROOT’ is like an Admin of your Android smartphone. Any user who gets ROOT is allowed to ADD/Edit/DELETE/Modify any file in the phone irrespective of its location. You can also call that person as ‘Superuser’.
  2. BOOTLOADER: Post rooting, BOOTLOADER is the first thing you get on your phone every-time it turns ON. Its responsible for booting up your device hardware and other items into memory before the ROM (Read-Only-Memory) starts. You can learn more about Bootloader (Booting) through its Wikipedia page.
  3. KERNEL: Its simply responsible for managing communication between hardware & software components of your Android smartphone.
  4. BRICK: It’s that stage when your Android smartphone is no less than an actual brick. It won’t turn ON in any way. One can classify BRICK stage into two parts:
    • SOFT BRICK – When you are stuck in a boot-loop due to a software issue
    • HARD BRICK – When your phone fails to boot in any way. Its major cause is flashing a CUSTOM ROM not meant for your device
  5. CUSTOM RECOVERY: Any custom recovery can be used for 2 purposes:
    • To Boot the STOCK OS (one that comes pre-installed on your device)
    • To install software’ s bypassing OS completely
  6. SuperSU: Its just a management tool designed by Chainfire. Once you Root your Android device, SuperSU gets installed on your device. Its a combination of  ‘SU Binary’ and  ‘Superuser management’ tool.
  7. Nandroid Backup: Its the process of taking a complete backup of any Android smartphone. Nandroid Backup as the name states: is responsible for backing up everything installed on the device. All files/folders/themes and their customized settings everything gets included in Nandroid Backup.

Tip: You must create a NANDROID BACKUP to safeguard your personal customization and data from getting lost. You can check out this direct link to understand the process of creating a Nandroid Backup and Restoring it Back. You can use either TWRP or CWM recoveries for backing up the data.

Rooted Your Android Smartphone? What Next?

As such rooting an Android smartphone has a wide range of benefits. However, if you talk about the most important one, here it is:

It gives you full access to your phone’s system files allowing you to ADD/DELETE/MODIFY them. You get access to functions on the gadget that were out-of-bonds before

But the question is – Should we consider these benefits and Root our Android smartphone OR safeguard its originality? Let’s check it out.

Should You Root Your Android Smartphone?

Now, the answer to this question varies. If you are a tech-geek like me, you would definitely experiment and with your phone. ROOTING is a personal choice, yet should be exercised with utmost caution. Its your first step to device modification in form of installing Custom Recoveries, FLASH Custom ROM/Kernel etc.

ROOTING your Android smartphone would void its WARRANTY, something which is not to the liking of everyone.

So, ROOTING would void your device warranty. Hmm, now that is definitely worth considering. But is that it? Ain’t there any other side-effects of rooting, that I am hiding from you guys. Go one, keep reading to know more about it.

After-effects of Rooting Android Smartphone

You must have heard that proverb: A coin has two sides. Similarly, even though there are ample benefits of ROOTING an Android smartphone, you can not ignore the other side of it. You got to keep a check on the negative aspects too before you proceed with the process cycle:

  • Your device loses its Warranty status endangering the device to several other security malfunctions
  • You got to check the authenticity of every application before installation
  • Any wrong move and your Android smartphone would be nothing, but a paper-weight

Pre-requisites of Rooting Android Smartphone

The entire process of Rooting ain’t that difficult. You just need a few software’s and a little subject knowledge to accomplish it in an orderly fashion. Lets begin with the step-wise guide.

  1. Unlocking the BOOTLOADER: If your Android device is from any of the manufacturers listed below, there is a high probability that your device BOOTLOADER is Locked.

NOTE: The process of unlocking the BOOTLOADER is different for different smartphone manufacturers. So, you need to follow the official vendor developer pages to know the right process of unlocking the BOOTLOADERS: 

Once you are sure that you have successfully unlocked your device BOOTLOADER, you can proceed with the next steps.

  1. Installation of Android SDK: You also need to install  Android SDK (Software Development Kit) to ROOT your legacy device. Check out this complete process of SDK installation on different platforms.
  2. Using PAID Apps: I know many of you would flinch of the idea of purchasing a paid app to Root your device, but trust me it will be worth the efforts. There are a lot of options you can explore when it comes to PAID Apps. The apps are explanatory enough to allow naïve users to walk through the entire process of Rooting seamlessly. However, do check for Application compatibility before using it on your Android device. If one fails, then repeat the process with next application in-line and try it on the device.

Why Are Paid Apps So Important For Rooting Android Device?

Research says that there are ample ways you can try for Rooting your device. However, Paid Apps have their own importance. If you too wish to know what all paid apps you can hit on, do check out this list of my 4 favorite apps:



  • CF-Auto-Root: Owned and designed by Chainfire, this app is your best bet if you are a beginner. It shows compatibility with STOCK Samsung and NEXUS devices and enables SuperSU on your device so that installed applications can gain ROOT access easily.
  • Towelroot:  You might not be able to use this app unless you own Samsung Galaxy S5 or its variants. However, do consider yourself lucky if your device runs on an unpatched kernel.
  • Kingo ROOT: Even though all latest Android smartphones are coming with Android Oreo, a large chunk of smartphones is still operational on lower Android versions. If you too are a proud owner of one such device, this exploit is just the right choice for you. It shows compatibility with Android v2.x to v5.x including some Windows OS supportable devices.

Although there are a plethora of other Paid Apps, these are my top favorites. If you are using some other Paid application, do let me know in the comment section and I would include it in the list.

Practical Implementation Of Rooting

This brings an end to the basics of Rooting. Let us now start with practical implementation. Before we begin, understand that every vendor follows a different tactic, so ensure you are familiar with the right process to Root Android device specific to a particular manufacturer.


If you own an old SAMSUNG device, you must be having MY KNOX app installed on your device by default. Have you ever given a thought as to why it comes preinstalled OR why can’t you disable it just like other applications?   It’s because its a part of SAMSUNG security feature. Having it installed on your Android device enables business and personal content to coexist on your handset in Bring Your Own Device Environments (BYOD). You can learn more about SAMSUNG KNOX on the official SAMSUNG website.

SAMSUNG has officially stopped supporting My KNOX from December 2017 and have removed it from Google Play Store

However, if you still have My KNOX installed and are keen on Rooting your device, you got to first disable My KNOX on your SAMSUNG device, so that it lets you bypass the security layer and doesn’t interfere your progress.  Once you have successfully disabled My KNOX, you should install latest ODIN version on your system. No matter which SAMSUNG variant you own, ODIN is the easiest means to install any CUSTOM ROM/Kernel on your device. Simply put, ODIN pushes the ROM image files on the internal storage of the device replacing the pre-existing image files.

You need proper USB drivers installed on your system to use ODIN, else you won’t be flash custom ROM or any other zip file on your device

NOTE: As ODIN is to Windows, Heimdall is to MAC or Linux OS.

HTC Devices

Just like any other Android device, you need to unlock BOOTLOADER in case of HTC devices also. You need to first register yourself on the official HTC Developer page and then you can initiate the process. If you find this process a little trickier, you can also try Rooting the HTC device using Android SDK.

LG Devices

Just like other vendors, even LG devices follow a different route to install files required for Rooting. You have pick any of the two choices:

Lenovo (Motorola) Devices

Almost three years back, Lenovo acquired Motorola in 2014.   Rooting Motorola device follows the same two tactics I mentioned above. The only main point to remember is that you are following the instructions from the official developer page. Another important fact that you must know is that NO Manufacturer ever lists down all products on its website. In case you aren’t able to find your device on the developer page, you can rely on third-party apps to root your Android device. Ex: OneClickRoot or MOFOROOT.

Nexus Devices

Nexus series is one of the most popular series ever launched by Google. They feature some of the best specs and are the first ones to receive latest Google updates. It is important that you understand the process of Rooting Nexus devices properly alongside how to install and configure Android SDK on your system. With a proper understanding of the subject, it would be easier for you to flash STOCK Nexus image files on your device and avoid any mishappening.

Still, if you encounter an issue, you can visit official Google official support forums. They have stepwise instructions for almost every Nexus variant ready to assist you in case of any mishappening with your Android handset. If you are fond of tinkering with Android OS, buy one Nexus and you will have every new update right at your fingertips.


Android OS is completely Linux-based OS. An important fact which makes it people friendly and easy to customize. As its Linux-based, Rooting Android device is easy if you know the right tactic and have practical experience. Even if you haven’t tried experimenting to date, I believe its time for you to start. Understanding that not all of you would be a tech-geek, just one advice before you begin:



Did I use to take Backups? Yes indeed. I always took a backup of my device and Stock ROMs separately on a hard disk. Before experimenting with my SAMSUNG Galaxy J5, I used to keep a backup copy within arm’s reach to restore everything back in just a few minutes if anything goes haywire.

What is your say about Rooting the devices? Do you now feel confident about it and would likely experiment with your device? Do share your thoughts in the comments section below. Your suggestions are as always welcome. 🙂

Keep reading this blog if you want to be the first one to know:  what all applications you can install and use after Rooting your Android smartphone.

Happy Reading, Happy Sharing folks 🙂

Video Source: PhoneBuff


Snap Accelerate: Snapchat Latest Program Targeting Mobile Start-ups

Snapchat has always been concerned about its advertising business. With the latest Snap Accelerate update, one can say Snapchat in 2017 replicates Facebook as it was seen in 2012. The firm is known to widely imitate largest social networking website Facebook from quite a while.

The latest add-on targets the same marketers which Facebook did to expand its mobile ad business. Snap Accelerate will enable mobile start-ups to advertise on Snapchat. One can take benefits in two ways:

  • Either in the form of getting early access to new ad products
  • In the form of credits which one can use to purchase ads

Many believe Snapchat released Snap Accelerate to lower down the barrier to entry for advertisers. The company now allows the brands to automate their Snap Ads purchase by releasing an advertising API. Corporates can buy Snap Ads on their own and can use them to create vertical video ads using two self-serve tools offered by Snapchat.

By targeting startups,  Snapchat allows them to expand their user base as well as business. The more the business grows, the more financially stable these start-ups will get. The stability will in turn allow them to purchase Snap Ads more easily. As the count of successful case studies improves, more companies will pitch in for purchasing Snap Ads.

Snap Accelerate Target Audience

As per the official developer page of Snapchat, the new program i.e. ,Snap Accelerate will target three startup types:

  • Commerce
  • Entertainment
  • Gaming

However, not every startup will benefit from Snap Accelerate program, there’s a unique catch for them. These startups must be interested in direct response advertising and should operate consumer-facing mobile apps. In simple language, Snap Ads will target only those organizations that helped Facebook conquer mobile ad market surpassing its concerns both in 2012 and 2013.

Snap Accelerate Benefits and Tiers

All marketers who qualify for Snap Accelerate program get a number of benefits like:

  • A significant amount of money for purchasing ad creation and ads on Snapchat
  • Early access to new ad products and tools alongside Snap’s Marketing API
  • They can run a free branded filter around their headquarters for a specific tenure

The marketers get benefits from Snap Accelerate program as per the features offered by it in the form of three different tiers. The categorization is based on the participating company’s size and stage of growth. Check out how the three tiers differ from each other:



  1. Kick start
  • Up to $20,000 worth of benefits offered to the organization
  • Additional credits to use them for buying ads or to pay for ad creation
  • Free branded filter is available for 3 months
  1. Sprint
  • Benefits worth up to $50,000.
  • Credits for buying ads and paying for ad creation
  • Free branded filter is available for 6 months
  • Personal invitation to attend Snap-hosted education events
  • Priority over other firms for business and technical support
  1. Scale
  • The firms get up to $100,000 worth of benefits
  • Firms can use credits for buying ads and paying for ad creation
  • Free branded filter service is available for 1 year
  • Attend both Snap-hosted education events and private networking events
  • Preference for business and technical support

Considering the perks offered to startups and other organizations, it can be said that Snap Accelerate has the potential to grow. Snapchat’s move to target upcoming startups is an excellent way to build long-term partnerships.

Do share your say on this latest Snapchat update in the comments section below.

Kickass Torrent website returns

Kickass Torrents Website Returns

None can deny the importance torrents used to play in our daily lifestyle before Indian government took action against them and shut down almost all of the existing torrent websites. PirateBay, Kickass Torrents were some of the widely used names but all were found with a label BANNED.

The closure definitely shocked a large mass of Indian youths who on a large extent relied on downloading the latest movies, games and stuff using torrents. It was just a matter of few hours and the latest collection was out in the hands of the youngsters. Taking the BAN seriously, another popular website Torrentz.eu  too shut itself down giving another major blow to the users worldwide.

However, after a considerable wait, it looks like the good old days of Torrents is back. As per reports, users can finally again start using the torrent websites for good. 🙂 This ain’t a joke since one of the website owners has definitely restored the status of their website.  Yes, you guessed it right, Kickass Torrents is finally back and here is the valid proof of that. What you see below is the new homepage of Kickass Torrents website:

Kickass Torrents New Homepage


Personally, even I thought this news just another rumor in the pile of fake news that we hear often. However, I still had that hinch – What IF the news is TRUE for a change? To give rest to my disturbing mind, I did some research and found the news authentic. The users can visit the below mentioned links for getting a hands-on-experience on the new website:

P.S – As of now, only this website is known to be working. If you come across any other working link, please feel free to update me. I would gladly update the list for my readers.

To verify the link, I tried downloading a random Bollywood movie using BitTorrent. To my utter astonishment, it actually started downloading with no glitches of any sort 🙂 Check out the image below in case you doubt my statement:

New Kickass Torrent website downloading torrent successfully


Needless to say, the above image definitely gives a hope. I as a techie is surely going to welcome that update and is looking forward to hearing the same from other website owners too at the earliest.

Let me know what do you think on this step taken by site owners in the comments section below.

Link source: Torrent Freak

Take care folks 🙂


Exploring the Hidden Internet – The Deep Web

A word of Caution This Blog post on Deep Web is just for information purpose. DO NOT misuse it’s information in a wrong way. DO NOT ATTEMPT to test or access the websites/links given here unless you are acquainted with the basics. Accessing the websites/links for fun purposes might open you up for cyber attacks invading your privacy. 

We as INDIANS are too confident that we are on the brink of seeing another Technology boom in form of Artificial Intelligence/Machine Learning/Big Data. We are already on #2 position in the list of countries with highest number of Internet users.  It won’t be wrong to state that if the progress continues at this pace, we would be soon on #1 ranking surpassing CHINA.

Our confidence is amazing, but food for thought is – Are we really gonna ever make it to #1 position?.  You might wonder why do I ask this question. The answer is simply: we might call ourselves heavy internet users, but are we using it to its full extent? NO we are NOT. Its’ because we have no idea the extent to which the internet has widespread.

DEEP WEB / THE DARKNET: Hidden part of web which a normal user can’t access

Various surveys leads to different theories. One of the core theories indicate that among the 7.9 Zettabytes of data available online, we are using just 4% available on search engines like Google, Bing etc. The rest 96% (90% + 4%)  is protected by high-security passwords hidden behind paywalls or can be accessed via special tools or software’s.



The Deep Web is that part of web where all illicit activities take place. It’s that underground area where hackers, pedophiles,  gangsters and even terrorists come together to perform their business. The business involves just showcasing a sample of goods and services and getting their work done.

Levels of Deep Web or Dark Net

The 4% data we access is often termed as Surface Web. However, DEEP WEB on a contrary isn’t just one single layer, but amalgamation of multiple layers. Every layer has its own set of tools and software’s commonly used by dark-net users.



The image is self-explanatory,  isn’t it? We at most reach out till Level-3, all thanks to P2P software’s like Bit Torrent to download pirated content. However, the last two levels i.e., Level 4 and Level 5 are areas which you must visit with utmost caution unless you wish to endanger your security. Making yourself prone to cyber attack on the pretext of having fun isn’t acceptable.

Deep Web Market – What All Can You Purchase?

While I was busy researching on Deep web, I often came across one major saying that:

Anything/Everything that You Can Imagine Becomes Available on DEEP WEB

As the business market of DarkNet is rich and prone to unaccountable risks, covering every item is beyond the scope of this blog post. However, let me jot down few items which you might find on DarkNet websites quite easily:


DarkNet is an open market to both prescribed and illegal drugs. You can find any and all sorts of cocaine, heroin, designer drugs here that has its own adverse impact on the brain power of a normal human being. Few sellers post images of their products online rendering them as legal and 99% pure which worsens the  situation.



To showcase their products as more authentic, some sellers even attach verified documents with the products. You got to rely on the word-of-mouth as you have no means to verify the documents. Feedback of other users is equally important.


Forgery is defined as the practice of making a duplicate/fake copy of any document illegally. The forging of official documents like Driving Licenses, Government. ID’s, Immigration Certificates or citizenship papers of a country are more dangerous than purchase of a drug.



A recent study claims that you can easily obtain a U.S. driving license for $200 while U.S./UK passports for just few thousand bucks. The rapid rise of cryptocurrency in the past 2 years have made us more prone to cyber attacks. Bitcoin transactions/ Credit card details/ PayPal accounts nothing is safe anymore. You can easily obtain information of more than 1000+ credit cards in this market or can stamp the details on blank parchments.


Its no mere coincidence that Deep Web encompasses a plethora of options when we talk about firearms/ammunition or explosives. Cyber criminals leveraging technology can easily purchase these items in any variant on a single click of a button.



As per survey reports, vendors now ship their products by hiding them inside the toys or through shielded packages. The sole benefit of following such a practice is because X-ray machines don’t detect these packages. Other than toys, some suppliers are even seen using musical instruments like guitar, violin etc. to bypass security checks.

Guns are just a small segment of firearms. There is a whole army of weapons readily available for purchase on deep web market. Examples: quarter-sized piece of URANIUM or an EMP Pulse Generator.



One of the biggest examples ever known is of Silk Road shut down by FBI officials in 2013. If you have never heard about Silk Road, check out more information on Silk Road right here.

However, no matter what, a common man is still skeptical to buying arms on deep web. One major reason for such a behavior could be attributed to the availability of the product (in a single piece) in different weapon shows. It saves both the time and hassle of recombining individual components back together.


Yes, the heading might surprise you, but its a hard hitting reality. Deep Web does allow authorized and organized cyber-crime organizations to hire hackers for their illegal practices. A clear example: China’s Hidden Lynx group.



As reports claim, this group from CHINA involves 100+ professional hackers and thieves alike. Cyber criminals who bypassed security of tech giants like GOOGLE, ADOBE etc. too are a part of this group. In the span of last 6 years, this organization has been able to take down almost all major firms of U.S. region. You pay them and their experts would gladly provide you their services.

P.S. – Recently hackers broke into a Casino using fish-tank clearly showing how our reliance on Internet of Things has compromised our security. 

Ways to Access Deep Web Directories

Reminder – DO NOT ATTEMPT to access these Websites or links being mentioned for reference purpose. It’s for your own good.

In today’s digitized world, everybody is a tech-geek having knowledge of any or every technical topic. We are living in a world which is quite rich in information and accessing the layers of deep web is like making yourself prone to mystical dangers. Check out this list of web links you can access while browsing deep web:


I know the term ‘Anonymous browser’ isn’t new to you, but not all of you would be aware of its literal sense.  Being anonymous is the new trend. Everybody tries to surf through the internet on INCOGNITO (private browsing mode) on different browsers. Follow the link to know how to enable private mode on different browsers.

You must be wondering how can you browse all these websites/links to make an entry into deep web. The answer is using The Onion Router (TOR browser). Just like an onion has a number of layers, TOR browser also provides a gateway to the lower layers of Deep Web. Hiding the origin of the page request, it provides full security to the IP address of the end-user. Interested in knowing more about what is TOR and how it functions? Just follow the attached link and enlighten yourself more on the subject.



If you are using TOR, note that every webpage you access has a .onion suffix, indicating that you are not using a normal web browser. Post spoofing even law enforcement agencies are unable to track down a given or random IP address.

P.S:- You can’t access these TOR supportable webpages .onion suffix on your normal browser ever.


I know you are thinking that I have gone crazy. But trust me guys, even Deep web has its specialized search engine just like GOOGLE. Its called GRAMS and both the search engines are similar in user interface and the overall look and feel. A normal hacker built GRAMS in mid-2014 and it won’t be a surprise if one can call GRAMS as the GOOGLE of DarkNet.

Various claims have different stories to unfold. One major revelation claims GRAMS allow the criminals to purchase genuine/good quality guns, all sorts of drugs and even steal bank account details of multi-users across the globe. As the UI of both search engines is similar, GRAMS too comes with an ‘I’m Feeling Lucky’ button with targeted ads permitting drug leaders to fight for clicks.



P.S.- GRAMS is not just a simple search engine. Its on the same path as GOOGLE and so is diversified to many other domains like:

  • Gram words – similar to Google Ad-words
  • Grams Flow – it gives easy access to hidden sites

Check out this Wikipedia article on GRAMS if you are interested in knowing more about it and the services it offers.


When you get into a conversation with a random stranger online, you call it a chat. When you do this with multiple users at the same instance over a given network, you become a part of a chat-room. We as INDIANS are yet exploring this concept while globally people are too accustomed with the art of talking to random strangers online. You ought to be careful while indulging in a conversation with a random stranger and the same rule applies on Dark web chat-rooms.



The chatrooms on Dark Net operate on the same principle as online criminals have to confirm the authenticity of their product(s) before beginning the transaction process. Few chatrooms seek authentication of newcomers from the admin(s) of that room failing which the user is denied full access. Few chat-rooms hide behind unlisted alphanumeric web addresses making it hard to track them thus requiring special tactics to open up.


Every coin has a flip-side. Hence, I won’t call Dark Web aka Dark Net to be completely bad. It has existed ever since the internet marked its presence. What matters is how we as individuals take it and use it. Though you can find a number of painkillers, sedatives online, yet pharmaceutical agents feel elated by sharing their products through Deep web. What they forget is that they are endangering their national security by following such illicit practices.

What more can be done to improve the situation? Its simple: every countries government needs to understand that privacy is not just keeping government surveillance at bay, it also involves keeping hackers and other cyber-thieves away from a person living a regular life. It’s vital to exercise caution as there is a very thin line between the two worlds i.e., virtual and real and one must not surpass it for the greater good.

Be Aware, Be Safe. 

Pay heed to my warning again: This blog post is solely a guide to Deep Web and what all it covers. It in no manner encourages to start practicing illegal behavior. 

Do share your feedback on the blogpost and let me know your thoughts on Deep Web in the comments section below.