SlideShare a Scribd company logo
1 of 13
1
2
• SURFACE WEB
• WEBPAGES THAT ARE INDEXED BY A SEARCH
ENGINE
• DEEP WEB
• WEBPAGES THAT ARE NOT INDEXED BY A
SEARCH ENGINE
• DARK WEB
• A SUBSET OF THE DEEP WEB (NON-INDEXABLE)
THAT
NEEDS EXTRA SOFTWARE TO ACCESS ITS CONTENTS
2
SURFACE WEB
• WEBSITES DISPLAYED BY
SEARCH
ENGINES
• FACEBOOK
• YOUTUBE
• INSTAGRAM
• WIKIPEDIA
• CAN BE ACCESSED BY GOOGLE’S
WEB CRAWLER
• CAN BE FOUND THROUGH THE
DOMAIN NAME SYSTEM (DNS)
3
DEEP
WEB
• NON-INDEXABLE WEBSITES
• FORUMS WHERE CONTENT IS
BLOCKED BY A LOGIN
SCREEN
• CONTAINS A ROBOT.TXT FILE
THAT STOPS SEARCH ENGINES
FROM CRAWLING IT
• ALGORITHM THAT STOPS
INCOMING REQUESTS AFTER
A CERTAIN AMOUNT OF
VISITS
4
DARK
WEB
• A SUBSET OF THE DEEP WEB
• ONLY ACCESSIBLE BY SOFTWARE SUCH AS TOR
• CONTAINS LEGAL AND ILLEGAL MATERIAL
• LEGAL (32%)
• FORUMS
• IRC SERVERS
• RADIO SERVICES
• ILLEGAL (68%)
• BLACK MARKET
• SELLING DRUGS, CHILD PORNOGRAPHY,
ASSASSINATION SERVICES
• MALWARE SERVERS
• WEAPONS
5
DARK WEB ANONYMITY
SYSTEMS
• TOR BROWSER (ANONYMITY NETWORK)
• CLIENT-SERVER
• ORBOT
• HORNET (HIGH SPEED ONION ROUTING)
• I2P (INVISIBLE INTERNET PROTOCOL)
• PEER TO PEER
• ACTS LIKE A NETWORK LAYER
• BUILDS ADDITIONAL LAYER WITHIN
TCP/IP
• FREENET
• MIX BETWEEN TOR AND I2P 6
• SOFTWARE USED TO PROTECT
USERS BY MAKING
COMMUNICATIONS HARD TO TRACE
• BOUNCES COMMUNICATIONS TO
DIFFERENT NODES LOCATED ALL AROUND
THE WORLD
• USES ENCRYPTION IN THE
APPLICATION LAYER
• HIDES LOCATION THROUGH MANY
NETWORK RELAYS
• HIDDEN WEBSITES USE THE ".ONION"
SUFFIX
7
FREEN
ET
• MIX BETWEEN PEER TO PEER AND
CLIENT- SEVER
• DE-CENTRALIZED SERVERS & DATA
• USES PEERS TO HOST NODES WHICH
STORE OTHER USER'S ENCRYPTED
DATA
• NO WAY TO TELL IF DATA IS LEGAL OR
ILLEGAL
• DE-CENTRALIZED DATA MAKES IT
HARDER TO HACK INTO
8
• The original "Silk Road" website was
located on Tor Servers
• Some think Tor has been
compromised
• A new website "Silk Road Reloaded"
appeared on a different dark web
network called I2P
• I2P uses a peer-to-peer approach where
"Essentially all peers participate in
routing for others"
• Supports various online currencies other
than Bitcoin such as Anoncoin,
Darkcoin, Dogecoin and can convert
currencies for users for a small fee
SOCIETAL IMPLICATIONS OF THE DARK
WEB
• THE DARK WEB CAN BE SEEN AS BOTH GOOD AND BAD.
• INFORMATION CAN BE EXCHANGED WITHOUT HAVING A GOVERNMENT REPRESENTATIVE
FINDING OUT.
• ALLOWS ACCESS TO REGION BLOCKED INFORMATION.
• HOWEVER, IT IS A PLATFORM FOR ILLEGAL ACTIVITY.
• ALLOWS THE PURCHASE OR SALE OF DRUGS, WEAPONS, AND HITMAN SERVICES.
10
SECURITY PRECAUTIONS WHEN
VISITING
THE DARK WEB
• DON'T TRUST ANYONE
• COVER YOUR WEBCAM WITH TAPE
• DON'T DOWNLOAD ANYTHING
• DISABLE JAVASCRIPT ON YOUR BROWSER
• CHECK THAT YOUR VIRTUAL PRIVATE
NETWORK
(VPN) IS WORKING
• USE PROXIES
• ANONYMOUS OPERATING SYSTEMS
• TAILS
• WHONIX
• JONDO
• INTERNET CAFE 11
DIFFICULTIES IN REMOVAL OF THE DARK
WEB
• IDENTITIES OF THE SITE OWNERS ARE PRESERVED WITH SOFTWARE.
• INVESTIGATING A SINGLE MARKET IS EXPENSIVE AND TIME
CONSUMING.
• TRACING PAYMENT IS DIFFICULT.
12
Thank
You

More Related Content

What's hot (20)

Dark wed
Dark wedDark wed
Dark wed
 
Dark web
Dark webDark web
Dark web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
The dark web
The dark webThe dark web
The dark web
 
Deep web
Deep webDeep web
Deep web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
The dark web
The dark webThe dark web
The dark web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Dark web
Dark webDark web
Dark web
 
Darknet
DarknetDarknet
Darknet
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Deep web
Deep webDeep web
Deep web
 

Similar to Dark Web Presentation.pptx

Team4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webTeam4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webIkramUlhaq401878
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark WebTom Kranz
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR BrowserArjith K Raj
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetPriyanka Aash
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous CommunicationFabio Pietrosanti
 
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesTor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesD. Hill
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion routerJapneet Singh
 

Similar to Dark Web Presentation.pptx (20)

Team4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webTeam4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark web
 
Deep Web
Deep WebDeep Web
Deep Web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Overview of Deep web
Overview of Deep webOverview of Deep web
Overview of Deep web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
Darknet
DarknetDarknet
Darknet
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Dark net
Dark netDark net
Dark net
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Darknet
DarknetDarknet
Darknet
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesTor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 

Recently uploaded

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 

Recently uploaded (20)

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 

Dark Web Presentation.pptx

  • 1. 1
  • 2. 2 • SURFACE WEB • WEBPAGES THAT ARE INDEXED BY A SEARCH ENGINE • DEEP WEB • WEBPAGES THAT ARE NOT INDEXED BY A SEARCH ENGINE • DARK WEB • A SUBSET OF THE DEEP WEB (NON-INDEXABLE) THAT NEEDS EXTRA SOFTWARE TO ACCESS ITS CONTENTS 2
  • 3. SURFACE WEB • WEBSITES DISPLAYED BY SEARCH ENGINES • FACEBOOK • YOUTUBE • INSTAGRAM • WIKIPEDIA • CAN BE ACCESSED BY GOOGLE’S WEB CRAWLER • CAN BE FOUND THROUGH THE DOMAIN NAME SYSTEM (DNS) 3
  • 4. DEEP WEB • NON-INDEXABLE WEBSITES • FORUMS WHERE CONTENT IS BLOCKED BY A LOGIN SCREEN • CONTAINS A ROBOT.TXT FILE THAT STOPS SEARCH ENGINES FROM CRAWLING IT • ALGORITHM THAT STOPS INCOMING REQUESTS AFTER A CERTAIN AMOUNT OF VISITS 4
  • 5. DARK WEB • A SUBSET OF THE DEEP WEB • ONLY ACCESSIBLE BY SOFTWARE SUCH AS TOR • CONTAINS LEGAL AND ILLEGAL MATERIAL • LEGAL (32%) • FORUMS • IRC SERVERS • RADIO SERVICES • ILLEGAL (68%) • BLACK MARKET • SELLING DRUGS, CHILD PORNOGRAPHY, ASSASSINATION SERVICES • MALWARE SERVERS • WEAPONS 5
  • 6. DARK WEB ANONYMITY SYSTEMS • TOR BROWSER (ANONYMITY NETWORK) • CLIENT-SERVER • ORBOT • HORNET (HIGH SPEED ONION ROUTING) • I2P (INVISIBLE INTERNET PROTOCOL) • PEER TO PEER • ACTS LIKE A NETWORK LAYER • BUILDS ADDITIONAL LAYER WITHIN TCP/IP • FREENET • MIX BETWEEN TOR AND I2P 6
  • 7. • SOFTWARE USED TO PROTECT USERS BY MAKING COMMUNICATIONS HARD TO TRACE • BOUNCES COMMUNICATIONS TO DIFFERENT NODES LOCATED ALL AROUND THE WORLD • USES ENCRYPTION IN THE APPLICATION LAYER • HIDES LOCATION THROUGH MANY NETWORK RELAYS • HIDDEN WEBSITES USE THE ".ONION" SUFFIX 7
  • 8. FREEN ET • MIX BETWEEN PEER TO PEER AND CLIENT- SEVER • DE-CENTRALIZED SERVERS & DATA • USES PEERS TO HOST NODES WHICH STORE OTHER USER'S ENCRYPTED DATA • NO WAY TO TELL IF DATA IS LEGAL OR ILLEGAL • DE-CENTRALIZED DATA MAKES IT HARDER TO HACK INTO 8
  • 9. • The original "Silk Road" website was located on Tor Servers • Some think Tor has been compromised • A new website "Silk Road Reloaded" appeared on a different dark web network called I2P • I2P uses a peer-to-peer approach where "Essentially all peers participate in routing for others" • Supports various online currencies other than Bitcoin such as Anoncoin, Darkcoin, Dogecoin and can convert currencies for users for a small fee
  • 10. SOCIETAL IMPLICATIONS OF THE DARK WEB • THE DARK WEB CAN BE SEEN AS BOTH GOOD AND BAD. • INFORMATION CAN BE EXCHANGED WITHOUT HAVING A GOVERNMENT REPRESENTATIVE FINDING OUT. • ALLOWS ACCESS TO REGION BLOCKED INFORMATION. • HOWEVER, IT IS A PLATFORM FOR ILLEGAL ACTIVITY. • ALLOWS THE PURCHASE OR SALE OF DRUGS, WEAPONS, AND HITMAN SERVICES. 10
  • 11. SECURITY PRECAUTIONS WHEN VISITING THE DARK WEB • DON'T TRUST ANYONE • COVER YOUR WEBCAM WITH TAPE • DON'T DOWNLOAD ANYTHING • DISABLE JAVASCRIPT ON YOUR BROWSER • CHECK THAT YOUR VIRTUAL PRIVATE NETWORK (VPN) IS WORKING • USE PROXIES • ANONYMOUS OPERATING SYSTEMS • TAILS • WHONIX • JONDO • INTERNET CAFE 11
  • 12. DIFFICULTIES IN REMOVAL OF THE DARK WEB • IDENTITIES OF THE SITE OWNERS ARE PRESERVED WITH SOFTWARE. • INVESTIGATING A SINGLE MARKET IS EXPENSIVE AND TIME CONSUMING. • TRACING PAYMENT IS DIFFICULT. 12