SlideShare a Scribd company logo
1 of 28
Download to read offline
March 9, 2014
The darknet emerges

hugeinc.com
info@hugeinc.com
45 Main St. #220 Brooklyn, NY 11201
+1 718 625 4843
Darknet: The spaces and
technologies used avoid
personal identification on the
internet.
Components of the current darknet
•  Tor / Onion routing
•  VPNs of all types
•  PGP and encryption: Email, chat, whole disk, etc.
•  Bitcoin et al: pseudonymous crypto-currencies
•  Secure hardware environments: Linux and open source
software, non Intel / AMD processors
•  Encrypted, distributed virtual hosting (think Pirate Bay)
•  Generally speaking: Distributed, P2P, non-centralized
software infrastructure
•  Real-world OpSec: Keeping quiet
The Darknet in the news.
•  Drugs (Silk Road)
•  Wikileaks
•  Anonymous / Hacktivism
•  Civil disobedience
•  Murder / extortion for hire
•  Weapons
•  Personal / private information
•  Software, botnet, or exploit marketplaces
So why would anybody want to
be there?
“A mill for grinding rouges honest”
-Jeremy Bentham
The decline of physical privacy.
Generally speaking decent people.
The opportunities for abuse of the
panopticon are immense.
“Power corrupts. Absolute power
corrupts absolutely.”
-­‐Lord	
  Acton,	
  1887	
  
Blackmail.
Trading on personal information.
Exposure of unpopular / private
beliefs or activities.
As ‘real world’
privacy
disappears, digital
privacy will grow.
The birth of digital
schizophrenia.
SecDent
End-to-end encryption is just an app
away.
Commercializing privacy.

•  Silent Circle
•  Anonyme
•  Snapchat
•  Secret
•  Meshnet hardware / software
•  Anonymous local area networks
Emerging darknet capabilities.
•  Distributed platforms to enable contracts between
anonymous SecDents
•  Anonymous multi-signature escrow accounts to
allow for bonded transactions
•  SecDent ownership of real-world assets
•  Anonymous, multi-hop delivery services and
dropboxes
•  Encrypted
communications
•  Secure computing
environment
•  Bitcoin wallets
•  Whole-disk encryption
•  SecDents / handles
•  Low-risk political and
social speech
"The Personal is Political”
-Carol Hanisch
Defense of critical
institutions and
democratic processes
will require adoption of
darknet elements.
Questions…
hugeinc.com
info@hugeinc.com
45 Main St. #220 Brooklyn, NY 11201
+1 718 625 4843

More Related Content

What's hot

The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
Darwin de Leon
 

What's hot (20)

Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Darknet
DarknetDarknet
Darknet
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Darknet
DarknetDarknet
Darknet
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
Deep and Dark web
Deep and Dark webDeep and Dark web
Deep and Dark web
 
Dark wed
Dark wedDark wed
Dark wed
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The dark web
The dark webThe dark web
The dark web
 

Viewers also liked (8)

Coaching performance
Coaching performanceCoaching performance
Coaching performance
 
InsideOut Coaching
InsideOut CoachingInsideOut Coaching
InsideOut Coaching
 
Coaching for Performance - @Ei4Change
Coaching for Performance - @Ei4ChangeCoaching for Performance - @Ei4Change
Coaching for Performance - @Ei4Change
 
Coaching Philosophy
Coaching PhilosophyCoaching Philosophy
Coaching Philosophy
 
Grow model ppt
Grow model pptGrow model ppt
Grow model ppt
 
Coaching skills
Coaching skillsCoaching skills
Coaching skills
 
How To Use The GROW Coaching Model
How To Use The GROW Coaching ModelHow To Use The GROW Coaching Model
How To Use The GROW Coaching Model
 
Mentoring & coaching for optimal performance
Mentoring & coaching for optimal performanceMentoring & coaching for optimal performance
Mentoring & coaching for optimal performance
 

Similar to The Darknet Emerges

Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
raevenroxas
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
q3XKFc5XR
 

Similar to The Darknet Emerges (20)

The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
 
Dark net
Dark netDark net
Dark net
 
Dark net (escalona)
Dark net (escalona)Dark net (escalona)
Dark net (escalona)
 
Dark Net
Dark NetDark Net
Dark Net
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Dark web
Dark webDark web
Dark web
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Drm and crypto
Drm and cryptoDrm and crypto
Drm and crypto
 
Cryptoanarchism
CryptoanarchismCryptoanarchism
Cryptoanarchism
 
Dark Web
Dark WebDark Web
Dark Web
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017Help! I am an Investigative Journalist in 2017
Help! I am an Investigative Journalist in 2017
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 

More from Andrew Delamarter

More from Andrew Delamarter (9)

Scoop on converged media
Scoop on converged mediaScoop on converged media
Scoop on converged media
 
Geeking out on AdWords paid search tactics - Internet Summit 2013
Geeking out on AdWords paid search tactics - Internet Summit 2013Geeking out on AdWords paid search tactics - Internet Summit 2013
Geeking out on AdWords paid search tactics - Internet Summit 2013
 
Metadata Roundup for SEO
Metadata Roundup for SEOMetadata Roundup for SEO
Metadata Roundup for SEO
 
The Inbound Marketing Audit
The Inbound Marketing AuditThe Inbound Marketing Audit
The Inbound Marketing Audit
 
Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...
Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...
Enterprise Content Optimization - Building-in and Managing SEO, Content Strat...
 
Recent Developments in SEO and Paid Search
Recent Developments in SEO and Paid SearchRecent Developments in SEO and Paid Search
Recent Developments in SEO and Paid Search
 
Creating an inbound marketing services capacity
Creating an inbound marketing services capacityCreating an inbound marketing services capacity
Creating an inbound marketing services capacity
 
Coordinating agencies aligning campaigns
Coordinating agencies aligning campaignsCoordinating agencies aligning campaigns
Coordinating agencies aligning campaigns
 
Creating and running a homeschool collective / coop / alternative school
Creating and running a homeschool collective / coop / alternative schoolCreating and running a homeschool collective / coop / alternative school
Creating and running a homeschool collective / coop / alternative school
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

The Darknet Emerges