A brief introduction to Dark Web. Covers difference between Surface, Deep and Dark Web. Shows application of Dark Web like illegal marketing of drugs, arms, etc. Also covers a case study of Silk Road which shows how it works and it's payment mode. It also covers technologies used to access Dark Web using various browsers like TOR and covers it's internal mechanism how it works keeping anonymity using Onion Routing.It also shows some Illegal marketing statistics which shows how it's affecting real world.
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Introduction To Dark Web
1.
2. What is Dark Web ?
• Basically 3 parts of WWW :
1. Surface Web
2. Deep Web
3. Dark Web
• Surface Web :
Publicly Available & Accessible
• Deep Web :
Invisible Web , inaccessible by Web Crawlers.
Not indexed by Standard Search Engines.
500 times > Surface Web
• Dark Web :
Tiny Part of Deep Web
Accessible by specialized Software such as Tor
Browser
Used for anonymous communication and
illegal activities.
3. Who Uses Dark Web ?
• Anonymous Nature
• Instrumental Role in illegal activities :
Child Pornography
Sale of Drugs
Fraud Services
Phishing and Scams
Terrorism
Hoaxes and Unverified Content
• Case Study : Silk Road
First online Black Market
Platform for selling Illegal Drugs
Operated as Tor’s Hidden Service
Transaction carried By Bitcoins (BTC)
Shutdown By F.B.I
• Journalists and activists also use the dark web
to avoid being traced by autocratic
governments
4.
5. How to access Dark Web ?
• Tools : Tor Browser
• Access websites whose address
ends with .onion extension
• Anonymizes Browser Traffic
• Establishes secure communications
• Slower than Normal Browsers
• Protects from Eavesdropping and
Surveillance
• Has Social Contracts with users
• Tor network is growing quickly
6.
7. What is Onion Routing ?
• Onion routing is a technique
for anonymous communication over
a computer network.
• In an onion network, messages are
encapsulated in layers of encryption,
analogous to layers of an onion.
• The encrypted data is transmitted through a
series of network nodes called onion
routers, each of which "peels" away a single
layer, uncovering the data's next destination.
• When the final layer is decrypted, the
message arrives at its destination.
• The sender remains anonymous because
each intermediary knows only the location
of the immediately preceding and following
nodes.
• There are methods to break the anonymity
of this technique, e.g. timing analysis.